Trust DataPlaneUserSAN from Activator to Queue-Proxy#14452
Conversation
Codecov ReportAttention:
Additional details and impacted files@@ Coverage Diff @@
## main #14452 +/- ##
==========================================
- Coverage 86.15% 86.00% -0.16%
==========================================
Files 196 197 +1
Lines 14889 14915 +26
==========================================
- Hits 12828 12827 -1
- Misses 1753 1777 +24
- Partials 308 311 +3
☔ View full report in Codecov by Sentry. |
|
|
||
| // dialTLSContext handles verify SAN before calling DialTLSWithBackOff. | ||
| func dialTLSContext(ctx context.Context, network, addr string, cr *CertCache) (net.Conn, error) { | ||
| cr.certificatesMux.Lock() |
There was a problem hiding this comment.
At L#47 it unlocks the certificatesMux.
We can use defer but we just want to lock during the cloning (L#45-46) so unlock at L#47 is enough, I think.
|
Looks nice, thanks Kenjiro. |
e24ea72 to
4e61714
Compare
|
knative.dev/pkg upstream changes have landed |
|
/lgtm |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dprotaso, nak3 The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
* Trust DataPlaneUserSAN from Activator to Queue-Proxy * Fix lint * Fix plate * Remove * Use read lock * bump pkg * Use DataPlaneUserSAN instead of DataPlaneUserName
Fixes #14402
Proposed Changes
This patch changes activator to trust a new SAN
kn-user-<ns>instead of legacy SAN.Release Note