-
Notifications
You must be signed in to change notification settings - Fork 9.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CHANGELOG: add v3.3 pre-release #8979
Conversation
a8b0fa9
to
e8d8396
Compare
@hexfusion Good catch. It was missing from changelog. Just added. Will be shipped in v3.3. Thanks. |
eb1bcaa
to
11770e7
Compare
Codecov Report
@@ Coverage Diff @@
## master #8979 +/- ##
==========================================
- Coverage 76.09% 76.03% -0.06%
==========================================
Files 359 359
Lines 29841 29841
==========================================
- Hits 22707 22691 -16
- Misses 5556 5576 +20
+ Partials 1578 1574 -4
Continue to review full report at Codecov.
|
b462381
to
b5ad03b
Compare
cf0d4fb
to
0491faf
Compare
- Document [TLS authentication changes](https://github.com/coreos/etcd/pull/8895): | ||
- [Server accepts connections if IP matches, without checking DNS entries](https://github.com/coreos/etcd/pull/8223). For instance, if peer cert contains IP addresses and DNS names in Subject Alternative Name (SAN) field, and the remote IP address matches one of those IP addresses, server just accepts connection without further checking the DNS names. | ||
- [Server supports reverse-lookup on wildcard DNS `SAN`](https://github.com/coreos/etcd/pull/8281). For instance, if peer cert contains only DNS names (no IP addresses) in Subject Alternative Name (SAN) field, server first reverse-lookups the remote IP address to get a list of names mapping to that address (e.g. `nslookup IPADDR`). Then accepts the connection if those names have a matching name with peer cert's DNS names (either by exact or wildcard match). If none is matched, server forward-lookups each DNS entry in peer cert (e.g. look up `example.default.svc` when the entry is `*.example.default.svc`), and accepts connection only when the host's resolved addresses have the matching IP address with the peer's remote IP address. | ||
- Add [`etcd --peer-require-cn`](https://github.com/coreos/etcd/pull/8616) flag. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@mitake, please let me know if I am missing anything. Thanks.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@gyuho lgtm, thanks!
287e479
to
7bc3f18
Compare
e9ada1a
to
4809ff2
Compare
Signed-off-by: Gyuho Lee <gyuhox@gmail.com>
Signed-off-by: Gyuho Lee <gyuhox@gmail.com>
Signed-off-by: Gyuho Lee <gyuhox@gmail.com>
Signed-off-by: Gyuho Lee <gyuhox@gmail.com>
Signed-off-by: Gyuho Lee <gyuhox@gmail.com>
Signed-off-by: Gyuho Lee <gyuhox@gmail.com>
/cc @xiang90 @jpbetz @fanminshi
Will add
When the release candidate is out, sometime this or next month.