Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

gRPC TLS fixes #2764

Merged
merged 3 commits into from
Mar 5, 2024
Merged

gRPC TLS fixes #2764

merged 3 commits into from
Mar 5, 2024

Conversation

cthulhu-rider
Copy link
Contributor

No description provided.

The gRPC lib defaults min accepted TLS version to 1.2 since release
v1.60.0 (grpc/grpc-go#6758).

Refs #2755.

Signed-off-by: Leonard Lyubich <leonard@morphbits.io>
Insecure cipher suites must never be allowed.

Refs #2755.

Signed-off-by: Leonard Lyubich <leonard@morphbits.io>
The gRPC lib defaults to all secure TLS cipher suites supported by Go
stdlib since release v1.60.0 (grpc/grpc-go#6758).
Previously passed handwritten ciphers remained the same.

Closes #2755.

Signed-off-by: Leonard Lyubich <leonard@morphbits.io>
Copy link

codecov bot commented Mar 5, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 22.03%. Comparing base (14b650c) to head (4ebfa0b).

Additional details and impacted files
@@           Coverage Diff           @@
##           master    #2764   +/-   ##
=======================================
  Coverage   22.03%   22.03%           
=======================================
  Files         787      787           
  Lines       46763    46750   -13     
=======================================
- Hits        10304    10302    -2     
+ Misses      35576    35565   -11     
  Partials      883      883           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@cthulhu-rider cthulhu-rider merged commit 9e9b571 into master Mar 5, 2024
15 of 16 checks passed
@cthulhu-rider cthulhu-rider deleted the 2755-grpc-srv-tls branch March 5, 2024 16:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants