Skip to content

OSDOCS-1837: Release note for Ingress TLS 1.3 support #36649

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Oct 8, 2021

Conversation

skrthomas
Copy link
Contributor

@skrthomas skrthomas commented Sep 22, 2021

@openshift-ci openshift-ci bot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label Sep 22, 2021
@netlify
Copy link

netlify bot commented Sep 22, 2021

✔️ Deploy Preview for osdocs ready!

🔨 Explore the source changes: 42c63b4

🔍 Inspect the deploy log: https://app.netlify.com/sites/osdocs/deploys/61609f8c7d7c4e0007039a17

😎 Browse the preview: https://deploy-preview-36649--osdocs.netlify.app/openshift-enterprise/latest/release_notes/ocp-4-9-release-notes

@miheer
Copy link

miheer commented Sep 23, 2021

@skrthomas

In the product documentation for OCP 4.9, please search and delete statements that TLSv1.3 is not supported.

We also want to release notes in OCP 4.6, 4.7, 4.8 as follows -

In OCP 4.6, 4.7 and 4.8,

The “Modern” profile will continue to be unsupported on OpenShift 4.6, 4.7, and 4.8; selecting it will continue to have the effect of enabling the “Intermediate” profile.
Specifying TLSv1.3 cipher suites in Custom Profile will continue to have no effect; OpenShift router will enable Red Hat distributed OpenSSL’s default set of TLSv1.3 cipher suites which are TLS_AES_128_CCM_SHA256, TLS_CHACHA20_POLY1305_SHA256, TLS_AES_256_GCM_SHA384, TLS_AES_128_GCM_SHA256
Users need to aware that their clusters may be accepting TLSv1.3 connections and cipher suites when they did not expect this behavior.

@openshift-ci openshift-ci bot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Sep 29, 2021
@openshift-ci openshift-ci bot added needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. and removed needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. labels Sep 29, 2021
@openshift-ci openshift-ci bot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Oct 6, 2021
@jeana-redhat jeana-redhat added branch/enterprise-4.9 peer-review-needed Signifies that the peer review team needs to review this PR labels Oct 7, 2021
@jeana-redhat jeana-redhat added this to the Future Release milestone Oct 7, 2021
Copy link
Contributor

@jeana-redhat jeana-redhat left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just a couple small formatting things and a URL fix.

@jeana-redhat jeana-redhat added peer-review-done Signifies that the peer review team has reviewed this PR and removed peer-review-needed Signifies that the peer review team needs to review this PR labels Oct 7, 2021
@quarterpin
Copy link

quarterpin commented Oct 8, 2021

Imo, based on the current discussion in the associated doc bugs for previous releases, I believe the release note title should be:
Support added for configuring TLS v1.3 ciphers via Modern Profile in the ingress operator.
This release adds Ingress operator support for TLS 1.3 ciphers that can be configured via Modern profile in tlsSecurityProfile option.

@miheer
Copy link

miheer commented Oct 8, 2021

@quarterpin one can enable TLSv1.3 using Custom in 4.9

@jeana-redhat jeana-redhat merged commit 4849963 into openshift:enterprise-4.9 Oct 8, 2021
@skrthomas
Copy link
Contributor Author

#33497 (RN Tracker)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
branch/enterprise-4.9 peer-review-done Signifies that the peer review team has reviewed this PR size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants