-
Notifications
You must be signed in to change notification settings - Fork 748
CMP-3630: Filter route protection rule by edge termination #13968
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
The routes_protected_by_tls rule will check for any routes that are allowing insecure termination policies. In other words, recommending that users setup their routes to require secure communication, or redirect from http to https. However, some routes might be using passthrough, where the route passes that off to the application to handle. Let's exclude passthrough cases from this rule since that's handled by the application, and not the route.
/test |
@rhmdnd: The
Use
In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/test 4.18-e2e-aws-ocp4-cis |
/test 4.18-e2e-aws-ocp4-pci-dss |
@rhmdnd: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Looks like this passed by default:
|
I guess the operators reported in the issue are not available by default? |
Correct - it doesn't look like it. I created some routes locally when testing, but we could add one to the e2e testing if we want to test that it catches invalid routes by default, although we don't typically put the cluster in a bad state for testing. Instead, we just harden things that fail out-of-the-box. |
The routes_protected_by_tls rule will check for any routes that are
allowing insecure termination policies. In other words, recommending
that users setup their routes to require secure communication, or
redirect from http to https. However, some routes might be using
passthrough, where the route passes that off to the application to
handle. Let's exclude passthrough cases from this rule since that's
handled by the application, and not the route.