Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Proxy: Add TLS client infrastructure. #1158

Merged
merged 9 commits into from
Jun 20, 2018
Merged

Proxy: Add TLS client infrastructure. #1158

merged 9 commits into from
Jun 20, 2018

Conversation

briansmith
Copy link
Contributor

Use the same configuration to act as a client and a server.

Signed-off-by: Brian Smith brian@briansmith.org

Signed-off-by: Brian Smith <brian@briansmith.org>
Use the same configuration to act as a client and a server.

Signed-off-by: Brian Smith <brian@briansmith.org>
Signed-off-by: Brian Smith <brian@briansmith.org>
Signed-off-by: Brian Smith <brian@briansmith.org>
@briansmith briansmith requested a review from hawkw June 19, 2018 22:44
Signed-off-by: Brian Smith <brian@briansmith.org>
#[derive(Clone, Debug)]
pub enum Conditional<C, R> where
C: Clone + std::fmt::Debug,
R: Clone + std::fmt::Debug
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It shouldn't block this review, but the formatting used here is used nowhere else in the project as far as i can tell. We already have a smattering of styles, and I'd prefer not to introduce an N+1th form. Perhaps just run rustfmt over the file before merging?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I did the rustfmt.

C: Clone + std::fmt::Debug,
R: Copy + Clone + std::fmt::Debug
{
pub fn to_empty(&self) -> Conditional<(), R> {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

tioli, but this would be more clearly (to me) named as to_unit (or as_unit).

// TODO: when we can use TLS for client connections, indicate
// whether or not the connection was TLS here.
ctx::transport::TlsStatus::Disabled,
tls.to_empty(),
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is subtle enough that it probably warrants a comment -- iiuc we don't actually pass the tls configuration into the client, since it's not needed (we only need to indicate the presence of TLS as a boolean). It's only the Connect impl below that actually needs the TLS config?

Copy link
Contributor Author

@briansmith briansmith Jun 19, 2018

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is now recast as TlsStatus::from(&tls),; TlsStatus::from replaces the to_empty() function.

Signed-off-by: Brian Smith <brian@briansmith.org>
Copy link
Member

@hawkw hawkw left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not convinced by the Conditional type introduced in this branch, it seems like another layer of complexity that obscures what's going on here. However, if you feel like it's better than the alternatives, I'm willing to approve it.

I also wasn't sure if storing configurations in the context type was consistent with that type's original intentions.

Finally, a lot of these changes seem to use a different whitespace style than the surrounding code, and while I'm not going to block on that, it might be easier to read if there was more consistency...

EDIT: Ah, I see you've already addressed most of the formatting issues while I was in the process of reviewing, consider that last comment withdrawn.

use std;

/// Like `std::option::Option<C>` but `None` carries a reason why the value
/// isn't available.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

From that description, this basically sounds like a Result.

I understand why you didn't want to use a type which implies one case is an "error" here, though...

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I also don't like the introduction of Conditional much but this shouldn't be Result since Result should be used strictly for errors. Either makes more sense but I don't want to import another library. Note that this is basically your Either type that you implemented Stream on. We could move Either to a more generic place and then use that instead?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this shouldn't be Result since Result should be used strictly for errors.

I think "a reason we were not able to do TLS" falls into a (sufficiently broad) definition of "error"; Err is used elsewhere for signalling that something is not available. However, I'm not going to press that because I think the discussion is just semantics at this point. :)

We could move Either to a more generic place and then use that instead?

I would be fine with that as well, but (coming at it from another direction) I think Conditional does better encode the meaning of each branch, so, having thought about it a bit, I'm ready to put a green check on this as it is.

pub struct Process {
/// Identifies the Kubernetes namespace in which this proxy is process.
pub scheduled_namespace: String,

pub start_time: SystemTime,

tls_client_config: tls::ClientConfigWatch,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure if the process context is the right place to put configurations. As per @olix0r in #1050 (comment), the ctx::* types were intended to be for describing a context, not configuring that context.

On the other hand, I'm not sure where else we'd put this, besides passing it around everywhere...

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

While it's true that this was initially intended to be "just the metadata" -- every ctx object throughout the proxy ends up with a reference back to this thing -- i don't yet have an opinion on whether there are better approaches for this.

Copy link
Contributor Author

@briansmith briansmith Jun 19, 2018

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

On the other hand, I'm not sure where else we'd put this, besides passing it around everywhere...

Right. If we don't put it in ctx::Process then we end up Arcing more and IIRC we have to thread the watch through lots of things. ctx/mod.rs says it's also for "policy" so I think it's not the end of the world.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah. at the very least, let's not let this block things

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Alright, that's fair, I just wanted to bring it up since Oliver mentioned something similar while reviewing my PR.

pub fn current_connection_config<C>(identity: Option<&Identity>, watch: &Watch<Option<C>>)
-> ConditionalConnectionConfig<C> where C: Clone + std::fmt::Debug
{
match identity {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

TIOLI: I find the multiple nested matches somewhat unclear.

I think this could also be expressed with Option::and_then or matching on (identity, *watch.borrow()), though your approach does have the advantage of not borrowing the watch when there's no identity...

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we were using Result instead of Conditional, this could also be represented as

identity.and_then(|identity| {
    *watch.borrow()
        .and_then(|ref config| Some(ConnectionConfig {
            identity: identity.clone(),
            config: config.clone()
        })
        .ok_or(ReasonForNoTls::NoConfig)
}).ok_or(ReasonForTls::Disabled)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

and_then ...ok_or isn't clearer than the nested matches.

Note that this is a generalization of the nested if let Some(...) construct we already have in src/connection.rs in BoundPort::listen_and_fold. I wrote this to be generic in the hope that we'd be able to clean up BoundPort::listen_and_fold using this.

NotImplementedForControlPlane,

/// TLS is only enabled for HTTP (HTTPS) right now.
NotImplementedForNonHttp,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we expect these individual NotImplemented... variants to be exposed to the user? Otherwise, especially if we intend to implement some of these cases soon, we might want to just have one NotImplemented case.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would like to expose the reasoning for not using TLS in more detail than what I've done here. In particular, I want to replace NoConfig with more specific reasoning like CaBundleIsMissing, PrivateKeyDoesNotMatchCertificate, etc., so that it serves as a more useful diagnostic tool for likely problems that the proxy will encounter. I only folded them into one case for telemetry reporting purposes in this PR due to lack of time and also because I don't know what would need to be changed in the telemetry system to support that kind of change.

Note that the "no TLS for the control plane connection" case will go away very soon.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would like to expose the reasoning for not using TLS in more detai

Agreed, I'm in support of this potentially having a lot of variants if necessary.

},
};
if let Some(s) = new_state {
std::mem::replace(self, s);
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this could also just be

if let Some(s) = new_state {
   *self = s;
}

Unless there's some particular reason that didn't work in this context?

/// The configuration in effect for a client (`ClientConfig`) or server
/// (`ServerConfig`) TLS connection.
#[derive(Clone, Debug)]
pub struct ConnectionConfig<C> where C: Clone + std::fmt::Debug {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Another potential alternative to adding a generic Conditional type could be just changing this to an enum

pub enum ConnectionConfig<C>
   Some { identity: Identity, config: C },
   None(ReasonForNoTls)
}

or similar...

return Ok(Async::Ready(Connection::tls(tls_stream)));
},
};
if let Some(s) = new_state {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what is the case where a None is returned?

Copy link
Member

@hawkw hawkw Jun 19, 2018

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I couldn't find any case where None was returned; I think the use of an Option here might be unnecessary?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks. originally I had a different (broken) implementation and I didn't clean it up enough. Fixed now.

Signed-off-by: Brian Smith <brian@briansmith.org>
Copy link
Member

@hawkw hawkw left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Based on the rationale behind these changes we discussed in the review, this seems good to me.

@@ -184,15 +184,15 @@ impl Future for Connecting {

fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
loop {
let new_state = match self {
*self = match self {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Incidentally, I really don't like that we have this explicit Future implementation. I would prefer it to be rewritten in terms of combinators but I couldn't get that to work after spending some time spent on it. Also, since we're going to implement some "fall back to non-secure if TLS failed" logic, we should probably do that fallback logic first and then see if we can simplify things.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah, I think that sounds like the right approach.

Signed-off-by: Brian Smith <brian@briansmith.org>
Signed-off-by: Brian Smith <brian@briansmith.org>
Copy link
Member

@olix0r olix0r left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for making these changes. Looking good to me!

@briansmith briansmith merged commit 8ece9c4 into master Jun 20, 2018
@briansmith briansmith deleted the b/tls-client branch June 20, 2018 00:26
olix0r added a commit that referenced this pull request Jun 21, 2018
* Propagate errors in conduit containers to the api (#1117)

- It would be nice to display container errors in the UI. This PR gets the pod's container 
statuses and returns them in the public api

- Also add a terminationMessagePolicy to conduit's inject so that we can capture the 
proxy's error messages if it terminates

* proxy: Update prost to 0.4.0 (#1127)

prost-0.4.0 has been released, which removes unnecessary dependencies.
tower-grpc is being updated simultaneously, as this is the proxy's
primary use of prost.

See: https://github.com/danburkert/prost/releases/tag/v0.4.0

* Simplify & clarify "No TLS" server configuration (#1131)

The same pattern will be used for the "No TLS" client configuration.

Signed-off-by: Brian Smith <brian@briansmith.org>

* proxy: Fix Inotify falling back to polling when files don't exist yet (#1119)

This PR changes the proxy's Inotify watch code to avoid always falling back to
polling the filesystem when the watched files don't exist yet. It also contains
some additional cleanup and refactoring of the inotify code, including moving
the non-TLS-specific filesystem watching code out of the `tls::config` module
and into a new `fs_watch` module.

In addition, it adds tests for both the polling-based and inotify-based watch
implementations, and changes the polling-based watches to hash the files rather
than using timestamps from the file's metadata to detect changes. These changes
are originally from #1094 and #1091, respectively, but they're included here
because @briansmith asked that all the changes be made in one PR.

Closes #1094. Closes #1091. Fixes #1090. Fixes #1097. Fixes #1061.

Signed-off-by: Eliza Weisman <eliza@buoyant.io>

* test: Use proxy instead of lb for external test traffic (#1129)

* test: Use proxy instead of lb for external test traffic
* Adjust timeouts on install and get tests

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>

* Display proxy container errors in the Web UI (#1130)

* Display proxy container errors in the Web UI

Add an error modal to display pod errors
Add icon to data tables to indicate errors are present
Display errors on the Service Mesh Overview Page and all the resource pages

* Start running integration tests in CI (#1064)

* Start running integration tests in CI
* Add gcp helper funcs
* Split integration test cleanup into separate phase

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>

* Fix conduit version issue in integration tests (#1139)

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>

* Keep accepting new connections after TLS handshake error. (#1134)

When a TLS handshake error occurs, the proxy just stops accepting
requests. It seems my expectations of how `Stream` handles errors
were wrong.

The test for this will be added in a separate PR after the
infrastructure needed for TLS testing is added. (This is a chicken
and egg problem.)

Signed-off-by: Brian Smith <brian@briansmith.org>

* Add optional TLS client certificate authentication. (#1135)

Refactor the way the TLS trust anchors are configured in preparation
for the client and server authenticating each others' certificates.

Make the use of client certificates optional pending the implementation
of authorization policy.

Signed-off-by: Brian Smith <brian@briansmith.org>

* Attempt to load TLS settings immediately prior to starting watch (#1137)

Previously, the proxy would not attempt to load its TLS certificates until a fs
watch detected that one of them had changed. This means that if the proxy was
started with valid files already at the configured paths, it would not load 
them until one of the files changed.

This branch fixes that issue by starting the stream of changes with one event
_followed_ by any additional changes detected by watching the filesystem.

I've manually tested that this fixes the issue, both on Linux and on macOS, and
can confirm that this fixes the issue. In addition, when I start writing 
integration tests for certificate reloading, I'll make sure to include a test
to detect any regressions.

Closes #1133.

Signed-off-by: Eliza Weisman <eliza@buoyant.io>

* Proxy: Make the control plane completely optional. (#1132)

Proxy: Make the control plane completely optional.

* Update Rustls to the latest Git version to fix a bug. (#1143)

Using MS Edge and probably other clients with the Conduit proxy when
TLS is enabled fails because Rustls doesn't take into consideration
that Conduit only supports one signature scheme (ECDSA P-256 SHA-256).
This bug was fixed in Rustls when ECDSA support was added, after the
latest release. With this change MS Edge can talk to Conduit.

Signed-off-by: Brian Smith <brian@briansmith.org>

* Enable get for nodes/proxy for Prometheus RBAC (#1142)

The `kubernetes-nodes-cadvisor` Prometheus queries node-level data via
the Kubernetes API server. In some configurations of Kubernetes, namely
minikube and at least one baremetal kubespray cluster, this API call
requires the `get` verb on the `nodes/proxy` resource.

Enable `get` for `nodes/proxy` for the `conduit-prometheus` service
account.

Fixes #912

Signed-off-by: Andrew Seigner <siggy@buoyant.io>

* Grafana: remove fill and stack from individual resource breakouts (#1092)

Remove the filling and stacking in request rate graphs that combine resources, 
to make it easier to spot outliers.

* Grafana: remove fill and stack from individual resource breakouts
* Remove all the stacks and fills from request rates everywhere

* Build CLI only for host platform (#884)

* Build CLI only for host platform

Signed-off-by: Alena Varkockova <varkockova.a@gmail.com>

* Changes after code review

Signed-off-by: Alena Varkockova <varkockova.a@gmail.com>

* Fix unbound variable issue in docker-build script (#1146)

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>

* v0.4.4 release notes (#1145)

* v0.4.4 release notes

* Tweak wording about adblocker fix

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>

* Upgrade to webpack 4 and webpack-dev-server 3 (#1138)

Speeds up performance of webpack-dev-server.

* proxy: Upgrade h2 to 0.1.10 (#1149)

This picks up a fix for hyperium/h2#285

* Proxy: Make TLS server aware of its own identity. (#1148)

* Proxy: Make TLS server aware of its own identity.

When validating the TLS configuration, make sure the certificate is
valid for the current pod. Make the pod's identity available at that
point in time so it can do so. Since the identity is available now,
simplify the validation of our own certificate by using Rustls's API
instead of dropping down to the lower-level webpli API.

This is a step towards the server differentiating between TLS
handshakes it is supposed to terminate vs. TLS handshakes it is
supposed to pass through.

This is also a step toward the client side (connect) of TLS, which will
reuse much of the configuration logic.

Signed-off-by: Brian Smith <brian@briansmith.org>

* proxy: Add `tls="true"` metric label to connections accepted with TLS (#1050)

Depends on #1047.

This PR adds a `tls="true"` label to metrics produced by TLS connections and
requests/responses on those connections, and a `tls="no_config"` label on 
connections where TLS was enabled but the proxy has not been able to load
a valid TLS configuration.

Currently, these labels are only set on accepted connections, as we are not yet
opening encrypted connections, but I wired through the `tls_status` field on 
the `Client` transport context as well, so when we start opening client 
connections with TLS, the label will be applied to their metrics as well.

Closes #1046

Signed-off-by: Eliza Weisman <eliza@buoyanbt.io>

* Truncate very long error messages, small tweaks to error messages (#1150)

- If error messages are very long, truncate them and display a toggle to show the full message
- Tweak the headings - remove Pod, Container and Image - instead show them as titles
- Also move over from using Ant's Modal.method to the plain Modal component, which is a 
little simpler to hook into our other renders.

* proxy: Clarify Outbound::recognize (#1144)

The comments in Outbound::recognize had become somewhat stale as the
logic changed. Furthermore, this implementation may be easier to
understand if broken into smaller pieces.

This change reorganizes the Outbound:recognize method into helper
methods--`destination`, `host_port`, and `normalize`--each with
accompanying docstrings that more accurately reflect the current
implementation.

This also has the side-effect benefit of eliminating a string clone on
every request.

* Add integration tests for tap (#1152)

* Add integration tests for tap
* Collect fewer tap events

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>

* dest service: close open streams on shutdown (#1156)

* dest service: close open streams on shutdown
* Log instead of print in pkg packages
* Convert ServerClose to a receive-only channel

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>

* Don't panic on stats that aren't included in StatAllResourceTypes (#1154)

Problem
`conduit stat` would cause a panic for any resource that wasn't in the list 
of StatAllResourceTypes
This bug was introduced by https://github.com/runconduit/conduit/pull/1088/files

Solution
Fix writeStatsToBuffer to not depend on what resources are in StatAllResourceTypes
Also adds a unit test and integration test for `conduit stat ns`

* Fix dashboard integration test (#1160)

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>

* Proxy: Add TLS client infrastructure. (#1158)

Move TLS cipher suite configuration to tls::config.

Use the same configuration to act as a client and a server.

Signed-off-by: Brian Smith <brian@briansmith.org>

* Proxy: More carefully keep track of the reason TLS isn't used. (#1164)

* Proxy: More carefully keep track of the reason TLS isn't used.

There is only one case where we dynamically don't know whether we'll
have an identity to construct a TLS connection configuration. Refactor
the code with that in mind, better documenting all the reasons why an
identity isn't available.

Signed-off-by: Brian Smith <brian@briansmith.org>

* Don't allow stat requests for named resources in --all-namespaces  (#1163)

Don't allow the CLI or Web UI to request named resources if --all-namespaces is used.

This follows kubectl, which also does not allow requesting named resources
over all namespaces.

This PR also updates the Web API's behaviour to be in line with the CLI's. 
Both will now default to the default namespace if no namespace is specified.

* Enable optional parallel build of docker images (#978)

* Enable optional parallel build of docker images

By default, docker does image builds in a single thread. For our containers, this is a little slow on my system. Using `parallel` allows for *optional* improvements in speed there.

Before: 41s
After: 22s

* Move parallel help text to stderr

* proxy: re-enabled vectored writes through our dynamic Io trait object. (#1167)

This adds `Io::write_buf_erased` that doesn't required `Self: Sized`, so
it can be called on trait objects. By using this method, specialized
methods of `TcpStream` (and others) can use their `write_buf` to do
vectored writes.

Since it can be easy to forget to call `Io::write_buf_erased` instead of
`Io::write_buf`, the concept of making a `Box<Io>` has been made
private. A new type, `BoxedIo`, implements all the super traits of `Io`,
while making the `Io` trait private to the `transport` module. Anything
hoping to use a `Box<Io>` can use a `BoxedIo` instead, and know that
the write buf erase dance is taken care of.

Adds a test to `transport::io` checking that the dance we've done does
indeed call the underlying specialized `write_buf` method.

Closes #1162

* proxy: add HTTP/1.1 Upgrade support automatically (#1126)

Any HTTP/1.1 requests seen by the proxy will automatically set up
to prepare such that if the proxied responses agree to an upgrade,
the two connections will converted into a standard TCP proxy duplex.

Implementation
-----------------

This adds a new type, `transparency::Http11Upgrade`, which is a sort of rendezvous type for triggering HTTP/1.1 upgrades. In the h1 server service, if a request looks like an upgrade (`h1::wants_upgrade`), the request body is decorated with this new `Http11Upgrade` type. It is actually a pair, and so the second half is put into the request extensions, so that the h1 client service may look for it right before serialization. If it finds the half in the extensions, it decorates the *response* body with that half (if it looks like a response upgrade (`h1::is_upgrade`)).

The `HttpBody` type now has a `Drop` impl, which will look to see if its been decorated with an `Http11Upgrade` half. If so, it will check for hyper's new `Body::on_upgrade()` future, and insert that into the half. 

When both `Http11Upgrade` halves are dropped, its internal `Drop` will look to if both halves have supplied an upgrade. If so, the two `OnUpgrade` futures from hyper are joined on, and when they succeed, a `transparency::tcp::duplex()` future is created. This chain is spawned into the default executor.

The `drain::Watch` signal is carried along, to ensure upgraded connections still count towards active connections when the proxy wants to shutdown.

Closes #195

* Add controller admin servers and readiness probes (#1168)

* Add controller admin servers and readiness probes
* Tweak readiness probes to be more sane
* Refactor based on review feedback

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>

* bin: Remove unused script (#1153)

Committed in error.

Signed-off-by: Eliza Weisman <eliza@buoyant.io>

* Proxy: Implement TLS conditional accept more like TLS conditional connect. (#1166)

* Proxy: Implement TLS conditional accept more like TLS conditional connect.

Clean up the accept side of the TLS configuration logic.

Signed-off-by: Brian Smith <brian@briansmith.org>

* Upgrade prometheus to v2.3.1 (#1174)

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>

* proxy: Document tls::config::watch_for_config_changes (#1176)

While investigating TLS configuration, I found myself wanting a
docstring on `tls::config::watch_for_config_changes`.

This has one minor change in functionality: now, `future::empty()`
is returned instead of `future:ok(())` so that the task never completes.
It seems that, ultimately, we'll want to treat it as an error if we lose
the ability to receive configuration updates.

* Add CA certificate bundle distributor to conduit install (#675)

* Add CA certificate bundle distributor to conduit install
* Update ca-distributor to use shared informers
* Only install CA distributor when --enable-tls flag is set
* Only copy CA bundle into namespaces where inject pods have the same controller
* Update API config to only watch pods and configmaps
* Address review feedback

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>

* Add probes and log termination policy for distributor (#1178)

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>
khappucino pushed a commit to Nordstrom/linkerd2 that referenced this pull request Mar 5, 2019
Move TLS cipher suite configuration to tls::config.

Use the same configuration to act as a client and a server.

Signed-off-by: Brian Smith <brian@briansmith.org>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants