[release-1.21] Backport centralized TLS configuration#8966
[release-1.21] Backport centralized TLS configuration#8966Fedosin wants to merge 4 commits intoknative:release-1.21from
Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: Fedosin The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
/retest |
|
There are empty aliases in OWNER_ALIASES, cleanup is advised. |
…#8901) Bump knative.dev/pkg to pick up the new knative.dev/pkg/tls package and replace the hardcoded TLS server config in eventingtls with the shared DefaultConfigFromEnv utility. This enables environment-based control of MinVersion, MaxVersion, CipherSuites, and CurvePreferences for all eventing TLS servers (broker filter/ingress, IMC dispatcher, job sink, auth proxy, request-reply). Since DefaultConfigFromEnv defaults to TLS 1.3 but eventing historically defaults to TLS 1.2, GetTLSServerConfig falls back to 1.2 unless TLS_MIN_VERSION is explicitly set. Also wires up TLS for the RequestReply data plane, which previously had a TODO placeholder. Signed-off-by: Mikhail Fedosin <mfedosin@redhat.com>
The knative.dev/pkg/tls package has been relocated to knative.dev/pkg/network/tls. Update all import references accordingly. Signed-off-by: Mikhail Fedosin <mfedosin@redhat.com>
Update knative.dev/pkg to the latest release-1.21 version to pick up the network/tls package required by the backported TLS changes. Signed-off-by: Mikhail Fedosin <mfedosin@redhat.com>
6fd0853 to
be42093
Compare
Replace hardcoded PEM certificates in eventingtlstesting with dynamically generated ones to prevent test failures from certificate expiry. The previous static certs expired on 2026-03-26. Signed-off-by: Mikhail Fedosin <mfedosin@redhat.com>
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## release-1.21 #8966 +/- ##
================================================
+ Coverage 51.11% 51.28% +0.16%
================================================
Files 409 409
Lines 21373 21353 -20
================================================
+ Hits 10925 10950 +25
+ Misses 9597 9552 -45
Partials 851 851 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
PR needs rebase. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Proposed Changes
Backport of #8901 and #8912 to
release-1.21.Cherry-picked commits
feat: use centralized TLS configuration from knative/pkg/tls (feat: use centralized TLS configuration from knative/pkg/tls #8901)
Bump knative.dev/pkg to pick up the new knative.dev/pkg/tls package and replace the hardcoded TLS server config in eventingtls with the shared DefaultConfigFromEnv utility. This enables environment-based control of MinVersion, MaxVersion, CipherSuites, and CurvePreferences for all eventing TLS servers (broker filter/ingress, IMC dispatcher, job sink, auth proxy, request-reply).
Since DefaultConfigFromEnv defaults to TLS 1.3 but eventing historically defaults to TLS 1.2, GetTLSServerConfig falls back to 1.2 unless TLS_MIN_VERSION is explicitly set.
Also wires up TLS for the RequestReply data plane, which previously had a TODO placeholder.
Update TLS import path to knative.dev/pkg/network/tls (Update TLS import path to knative.dev/pkg/network/tls #8912)
The knative.dev/pkg/tls package has been relocated to knative.dev/pkg/network/tls. Update all import references accordingly.
Release Note