-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Trust DataPlaneUserSAN from Activator to Queue-Proxy #14452
Conversation
Codecov ReportAttention:
Additional details and impacted files@@ Coverage Diff @@
## main #14452 +/- ##
==========================================
- Coverage 86.15% 86.00% -0.16%
==========================================
Files 196 197 +1
Lines 14889 14915 +26
==========================================
- Hits 12828 12827 -1
- Misses 1753 1777 +24
- Partials 308 311 +3
☔ View full report in Codecov by Sentry. |
|
||
// dialTLSContext handles verify SAN before calling DialTLSWithBackOff. | ||
func dialTLSContext(ctx context.Context, network, addr string, cr *CertCache) (net.Conn, error) { | ||
cr.certificatesMux.Lock() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
defer unlock?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
At L#47 it unlocks the certificatesMux
.
We can use defer
but we just want to lock during the cloning (L#45-46) so unlock at L#47 is enough, I think.
Looks nice, thanks Kenjiro. |
e24ea72
to
4e61714
Compare
knative.dev/pkg upstream changes have landed |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dprotaso, nak3 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
* Trust DataPlaneUserSAN from Activator to Queue-Proxy * Fix lint * Fix plate * Remove * Use read lock * bump pkg * Use DataPlaneUserSAN instead of DataPlaneUserName
Fixes #14402
Proposed Changes
This patch changes activator to trust a new SAN
kn-user-<ns>
instead of legacy SAN.Release Note