-
Notifications
You must be signed in to change notification settings - Fork 24.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add TLS version changes to deprecation checks #37793
Conversation
This adds a warning to the deprecations API for any SSL contexts that rely on the default `supported_protocols` list. This list will change in ES 7.0 and will no longer include TLS 1.0 by default.
Pinging @elastic/es-security |
@gwbrown @jaymode A config like this:
should generate 2 deprecation warnings:
It should not generate a default protocols warning for However, it does the exact opposite. The deprecation check sees filtered settings, so it only gets:
and it doesn't generate any @gwbrown Is it intentional that the deprecation checks run on filtered settings? Any thoughts on how to resolve this? |
This is because the deprecation checks rely on |
We want the default deprecation rest tests to run without any deprecations. This means we need to configure "supported_protocols" for transport.ssl Note: This doesn't currently work because supported_protocols is a filtered setting, and filtered settings are not available in deprecation checks
Thanks for doing this, and for catching the issue @tvernum. You're absolutely correct that it does work on filtered settings, and I don't think there's a way to get around that without significantly reworking the deprecations API, which probably isn't going to happen before the next release. Given that the problem with filtered settings doesn't show up with the way we've been testing these, I'm going to go through all of the deprecation checks and check for any others - I believe there is at least one other check that may look for filtered settings. I'm going to have to think about what to do about this, because there isn't a clear answer. |
I've opened #37845 to track the problem, as it's not confined to this check. |
Nice catch Tim. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The changes here LGTM. I guess merging depends on what we're going to do with these that need filtered settings
@tvernum The fixes for the bug discussed above are merged to master - I went ahead and merged master into this PR and made the required changes on a branch, you can take a look here: 6.x...gwbrown:pr/37793 |
A https monitoring exporter may not have any "ssl.*" settings, but should still issue a deprecation warning as target cluster (or infrastructure in between) may require TLSv1.0
Hello everyone! |
This adds a warning to the deprecations API for any SSL contexts that
rely on the default
supported_protocols
list. This list will changein ES 7.0 and will no longer include TLS 1.0 by default.
Relates: #37512