You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: pkg/cmd/server/api/v1/swagger_doc.go
+2
Original file line number
Diff line number
Diff line change
@@ -765,6 +765,8 @@ var map_ServingInfo = map[string]string{
765
765
"bindNetwork": "BindNetwork is the type of network to bind to - defaults to \"tcp4\", accepts \"tcp\", \"tcp4\", and \"tcp6\"",
766
766
"clientCA": "ClientCA is the certificate bundle for all the signers that you'll recognize for incoming client certificates",
767
767
"namedCertificates": "NamedCertificates is a list of certificates to use to secure requests to specific hostnames",
768
+
"minTLSVersion": "MinTLSVersion is the minimum TLS version supported. Values must match version names from https://golang.org/pkg/crypto/tls/#pkg-constants",
769
+
"cipherSuites": "CipherSuites contains an overridden list of ciphers for the server to support. Values must match cipher suite IDs from https://golang.org/pkg/crypto/tls/#pkg-constants",
glog.Warningf("Potentially insecure TLS cipher suites are allowed in client connections because environment variable OPENSHIFT_ALLOW_DANGEROUS_TLS_CIPHER_SUITES is set")
110
+
cipherValues=append(cipherValues, cipher)
111
+
}
112
+
returncipherValues
113
+
}
114
+
funcValidCipherSuites() []string {
115
+
validCipherSuites:= []string{}
116
+
fork:=rangeciphers {
117
+
validCipherSuites=append(validCipherSuites, k)
118
+
}
119
+
sort.Strings(validCipherSuites)
120
+
returnvalidCipherSuites
121
+
}
122
+
funcDefaultCiphers() []uint16 {
123
+
return []uint16{
124
+
// Ciphers below are selected and ordered based on the recommended "Intermediate compatibility" suite
125
+
// Compare with available ciphers when bumping Go versions
126
+
//
127
+
// Available ciphers from last comparison (go 1.6):
128
+
// TLS_RSA_WITH_RC4_128_SHA - no
129
+
// TLS_RSA_WITH_3DES_EDE_CBC_SHA
130
+
// TLS_RSA_WITH_AES_128_CBC_SHA
131
+
// TLS_RSA_WITH_AES_256_CBC_SHA
132
+
// TLS_RSA_WITH_AES_128_GCM_SHA256
133
+
// TLS_RSA_WITH_AES_256_GCM_SHA384
134
+
// TLS_ECDHE_ECDSA_WITH_RC4_128_SHA - no
135
+
// TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
136
+
// TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
137
+
// TLS_ECDHE_RSA_WITH_RC4_128_SHA - no
138
+
// TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
139
+
// TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
140
+
// TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
141
+
// TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
142
+
// TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
143
+
// TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
144
+
// TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
145
+
146
+
tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
147
+
tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
148
+
tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
149
+
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
150
+
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
151
+
tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
152
+
tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
153
+
tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
154
+
// the next two are in the intermediate suite, but go1.6 http2 complains when they are included at the recommended index
155
+
// fixed in https://github.com/golang/go/commit/b5aae1a2845f157a2565b856fb2d7773a0f7af25 in go1.7
156
+
// tls.TLS_RSA_WITH_AES_128_GCM_SHA256,
157
+
// tls.TLS_RSA_WITH_AES_256_GCM_SHA384,
158
+
tls.TLS_RSA_WITH_AES_128_CBC_SHA,
159
+
tls.TLS_RSA_WITH_AES_256_CBC_SHA,
160
+
tls.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
161
+
tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,
162
+
}
163
+
}
164
+
165
+
// SecureTLSConfig enforces the default minimum security settings for the cluster.
0 commit comments