Conversation
|
Hi @lance5890. Thanks for your PR. I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
@lance5890 thanks for the contribution. We don't make this type of change in this manner, because we would not edit the generated file directly. Update: you followed correct procedure here. |
|
Note: this can make sense to align the cipersuites used for |
d67fae4 to
702a13c
Compare
@candita @alebedev87 |
|
@lance5890 Thanks for the updates. One more question - what is the reasoning for making these changes? Was there an issue with the metrics that you were trying to solve? |
|
/ok-to-test |
|
@lance5890 CI error messages in e2e-aws-ovn indicate an issue with cipher suite. Can you investigate?
|
702a13c to
96e454e
Compare
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
Signed-off-by: lan.tian <lance5890@163.com>
96e454e to
9306886
Compare
|
/retest |
1 similar comment
|
/retest |
|
@lance5890: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
@lance5890 the config you're changing is specifically for Prometheus's metric retrieval, is this PR to fix an issue with Prometheus? Please let us know, and update the commit message with details. This PR is pending acceptance while waiting for your answer and we will drop review soon without an answer. |
This is not an actual issue. I just noticed that the kube-rbac-proxy uses an unsafe TLS certificate. Feel free to close this PR if it's not necessary. |
|
@lance5890 we are going to close this because we think the change should be made in https://github.com/openshift/api/blob/master/config/v1/types_tlssecurityprofile.go. If you'd like to file an issue there, that would be very helpful. |
|
/close |
|
@candita: Closed this PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
change the
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256andTLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256insecure cipher to more safer suites