OCPBUGS-78774: add TLS support for extractor-exporter communication#74
OCPBUGS-78774: add TLS support for extractor-exporter communication#74jmesnil wants to merge 2 commits intoopenshift:mainfrom
Conversation
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
|
@jmesnil: This pull request references Jira Issue OCPBUGS-78774, which is valid. 3 validation(s) were run on this bug
The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jmesnil The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Enable TLS encryption on the TCP connection between the extractor server (Rust) and the exporter client (Go) using rustls. The extractor loads a certificate and key from configurable paths and the exporter verifies the server certificate against a provided CA cert. Both components fall back to plain TCP when TLS is not configured. JIRA: https://redhat.atlassian.net/browse/OCPBUGS-78774
|
/retest |
|
@jmesnil: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
@BaiyangZhou: it appears that you have attempted to use some version of the payload command, but your comment was incorrectly formatted and cannot be acted upon. See the docs for usage info. |
1 similar comment
|
@BaiyangZhou: it appears that you have attempted to use some version of the payload command, but your comment was incorrectly formatted and cannot be acted upon. See the docs for usage info. |
|
@BaiyangZhou: The specified target(s) for The following commands are available to trigger optional jobs: Use DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/payload default-tls |
|
@BaiyangZhou: it appears that you have attempted to use some version of the payload command, but your comment was incorrectly formatted and cannot be acted upon. See the docs for usage info. |
|
/payload pull-ci-openshift-insights-operator-master-tls-scanner |
|
@BaiyangZhou: it appears that you have attempted to use some version of the payload command, but your comment was incorrectly formatted and cannot be acted upon. See the docs for usage info. |
|
/payload-job pull-ci-openshift-insights-operator-master-tls-scanner |
|
@BaiyangZhou: trigger 0 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command |
|
superseded by #76 |
|
@jmesnil: This pull request references Jira Issue OCPBUGS-78774. The bug has been updated to no longer refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
Enable TLS encryption on the TCP connection between the extractor server
(Rust) and the exporter client (Go) using rustls. The extractor loads a
certificate and key from configurable paths and the exporter verifies the
server certificate against a provided CA cert. Both components fall back
to plain TCP when TLS is not configured.
JIRA: https://redhat.atlassian.net/browse/OCPBUGS-78774