Skip to content

Commit 85edc74

Browse files
upgrade to latest dependencies (#274)
bumping knative.dev/pkg c2f1f3e...e325df6: > e325df6 upgrade to latest dependencies (# 2490) > 00c122e Add genreconcile for ConfigMap (# 2489) > 6bb6518 Update actions (# 2488) > 5b0e728 drop deprecated eventing repos (# 2463) > 75629c8 Update community files (# 2487) > ca82d2b Add `NewProxyAutoTLSTransport` and `DialTLSWithBackOff` to support TLS proxy (# 2479) > e2b4d74 Update community files (# 2486) > 4d62e1d bump our min k8s version to 1.22 (# 2485) > 9ae44fe Update community files (# 2484) > 29f716f Fix `InitialBuckets()` for statefulSetBuilder's electors (# 2483) > 8db11d0 Update community files (# 2482) > dcd5d7c bump go version of tekton downstream workflow (# 2481) > 0ce1e92 Update actions (# 2480) > 4f42bf4 Update actions (# 2478) > 7479994 Update actions (# 2477) bumping knative.dev/networking 0aef61e...1145ec5: > 1145ec5 upgrade to latest dependencies (# 658) > 56c4a3e upgrade to latest dependencies (# 657) > c173eed Add certificates config keys in config-network (# 648) > f96f8e2 upgrade to latest dependencies (# 655) > 224a816 Update actions (# 656) > 57ad9cf Update community files (# 654) > 88881dd Update community files (# 653) > 0d114b7 upgrade to latest dependencies (# 652) > 7307ffd Update community files (# 651) > 7fa8012 Update community files (# 650) > a49d1a2 Update actions (# 649) > 5dd0002 Update actions (# 647) > dde40b0 drop knative.dev/release label (# 646) bumping knative.dev/hack a75ca49...6ffd841: > 6ffd841 Update community files (# 168) > 02c525c Update community files (# 167) > 0e0784b Update community files (# 166) Signed-off-by: Knative Automation <automation@knative.team>
1 parent e5ed7e1 commit 85edc74

16 files changed

Lines changed: 155 additions & 30 deletions

File tree

go.mod

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ require (
1212
k8s.io/client-go v0.23.5
1313
k8s.io/code-generator v0.23.5
1414
k8s.io/utils v0.0.0-20220210201930-3a6ce19ff2f9
15-
knative.dev/hack v0.0.0-20220401031746-a75ca495e7f4
16-
knative.dev/networking v0.0.0-20220401171946-0aef61efb50c
17-
knative.dev/pkg v0.0.0-20220401214546-c2f1f3ec291f
15+
knative.dev/hack v0.0.0-20220411131823-6ffd8417de7c
16+
knative.dev/networking v0.0.0-20220412163509-1145ec58c8be
17+
knative.dev/pkg v0.0.0-20220412134708-e325df66cb51
1818
sigs.k8s.io/gateway-api v0.4.0
1919
sigs.k8s.io/yaml v1.3.0
2020
)

go.sum

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1253,15 +1253,12 @@ k8s.io/utils v0.0.0-20210820185131-d34e5cb4466e/go.mod h1:jPW/WVKK9YHAvNhRxK0md/
12531253
k8s.io/utils v0.0.0-20211116205334-6203023598ed/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
12541254
k8s.io/utils v0.0.0-20220210201930-3a6ce19ff2f9 h1:HNSDgDCrr/6Ly3WEGKZftiE7IY19Vz2GdbOCyI4qqhc=
12551255
k8s.io/utils v0.0.0-20220210201930-3a6ce19ff2f9/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
1256-
knative.dev/hack v0.0.0-20220224013837-e1785985d364/go.mod h1:PHt8x8yX5Z9pPquBEfIj0X66f8iWkWfR0S/sarACJrI=
1257-
knative.dev/hack v0.0.0-20220328133751-f06773764ce3/go.mod h1:PHt8x8yX5Z9pPquBEfIj0X66f8iWkWfR0S/sarACJrI=
1258-
knative.dev/hack v0.0.0-20220401031746-a75ca495e7f4 h1:3r8FksGn1yd8Zv3xVrQxJgElytra1/VaVeTdN6SHAa0=
1259-
knative.dev/hack v0.0.0-20220401031746-a75ca495e7f4/go.mod h1:PHt8x8yX5Z9pPquBEfIj0X66f8iWkWfR0S/sarACJrI=
1260-
knative.dev/networking v0.0.0-20220401171946-0aef61efb50c h1:acwBduWQuqYfgi1haFApifk+hA52K7G7ELZeom2b6/0=
1261-
knative.dev/networking v0.0.0-20220401171946-0aef61efb50c/go.mod h1:5mOmDZAOLZ4spdHWoiRpjIVCSWuA8V4NYIVtFycdSn8=
1262-
knative.dev/pkg v0.0.0-20220325200448-1f7514acd0c2/go.mod h1:5xt0nzCwxvQ2N4w71smY7pYm5nVrQ8qnRsMinSLVpio=
1263-
knative.dev/pkg v0.0.0-20220401214546-c2f1f3ec291f h1:1+/0tVXahb4v0bW19hewJEnf0UpZiOOO/YpLRi5/+5Y=
1264-
knative.dev/pkg v0.0.0-20220401214546-c2f1f3ec291f/go.mod h1:0A5D5tOLettuVoi5x+0SLGRfrvVemXXtLH247WupPJk=
1256+
knative.dev/hack v0.0.0-20220411131823-6ffd8417de7c h1:aXsFXeky/GccNQxwf72CS4NR3EoqTqsCVNKQnblfwr0=
1257+
knative.dev/hack v0.0.0-20220411131823-6ffd8417de7c/go.mod h1:PHt8x8yX5Z9pPquBEfIj0X66f8iWkWfR0S/sarACJrI=
1258+
knative.dev/networking v0.0.0-20220412163509-1145ec58c8be h1:MmwR4SfwlXgt/jnjronkTTOKBrwN1mP/VNhHH08pIoc=
1259+
knative.dev/networking v0.0.0-20220412163509-1145ec58c8be/go.mod h1:6OZIUimxPelIIudzHWRd+Lc7ippC5t+DC8CsZKCOjcI=
1260+
knative.dev/pkg v0.0.0-20220412134708-e325df66cb51 h1:4AmaxeY7+r/PYYz3HS9pMY21Mw3ykO6STLFEk2FoJ2s=
1261+
knative.dev/pkg v0.0.0-20220412134708-e325df66cb51/go.mod h1:j2MeD8s+JoCu1vegX80GbRXV/xd20Jm1NznxBYtVXiM=
12651262
pgregory.net/rapid v0.3.3/go.mod h1:UYpPVyjFHzYBGHIxLFoupi8vwk6rXNzRY9OMvVxFIOU=
12661263
rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8=
12671264
rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=

vendor/knative.dev/networking/config/certificate.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ metadata:
1818
name: certificates.networking.internal.knative.dev
1919
labels:
2020
app.kubernetes.io/name: knative-serving
21+
app.kubernetes.io/component: networking
2122
app.kubernetes.io/version: devel
22-
serving.knative.dev/release: devel
2323
knative.dev/crd-install: "true"
2424
spec:
2525
group: networking.internal.knative.dev

vendor/knative.dev/networking/config/config-network.yaml

Lines changed: 33 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,8 @@ metadata:
2121
app.kubernetes.io/name: knative-serving
2222
app.kubernetes.io/component: networking
2323
app.kubernetes.io/version: devel
24-
serving.knative.dev/release: devel
2524
annotations:
26-
knative.dev/example-checksum: "7c86cb6a"
25+
knative.dev/example-checksum: "d0b91f80"
2726
data:
2827
_example: |
2928
################################
@@ -189,3 +188,35 @@ data:
189188
# NOTE: This flag is in an alpha state and is mostly here to enable internal testing
190189
# for now. Use with caution.
191190
activator-san: ""
191+
192+
# The server certificates to serve the TLS traffic from ingress to activator.
193+
# It is specified by the secret name, which has the "tls.crt" and "tls.key" data field.
194+
# Use an empty value to disable the feature (default).
195+
#
196+
# NOTE: This flag is in an alpha state and is mostly here to enable internal testing
197+
# for now. Use with caution.
198+
activator-cert-secret: ""
199+
200+
# The CA public certificate used to sign the queue-proxy TLS certificate.
201+
# It is specified by the secret name, which has the "ca.crt" data field.
202+
# Use an empty value to disable the feature (default).
203+
#
204+
# NOTE: This flag is in an alpha state and is mostly here to enable internal testing
205+
# for now. Use with caution.
206+
queue-proxy-ca: ""
207+
208+
# The SAN (Subject Alt Name) used to validate the activator TLS certificate.
209+
# It must be set when "queue-proxy-ca" is specified.
210+
# Use an empty value to disable the feature (default).
211+
#
212+
# NOTE: This flag is in an alpha state and is mostly here to enable internal testing
213+
# for now. Use with caution.
214+
queue-proxy-san: ""
215+
216+
# The server certificates to serve the TLS traffic from activator to queue-proxy.
217+
# It is specified by the secret name, which has the "tls.crt" and "tls.key" data field.
218+
# Use an empty value to disable the feature (default).
219+
#
220+
# NOTE: This flag is in an alpha state and is mostly here to enable internal testing
221+
# for now. Use with caution.
222+
queue-proxy-cert-secret: ""

vendor/knative.dev/networking/config/domain-claim.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ metadata:
1818
name: clusterdomainclaims.networking.internal.knative.dev
1919
labels:
2020
app.kubernetes.io/name: knative-serving
21+
app.kubernetes.io/component: networking
2122
app.kubernetes.io/version: devel
22-
serving.knative.dev/release: devel
2323
knative.dev/crd-install: "true"
2424
spec:
2525
group: networking.internal.knative.dev

vendor/knative.dev/networking/config/domain.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ metadata:
1919
labels:
2020
app.kubernetes.io/name: knative-serving
2121
app.kubernetes.io/version: devel
22-
serving.knative.dev/release: devel
22+
app.kubernetes.io/component: networking
2323
knative.dev/crd-install: "true"
2424
spec:
2525
group: networking.internal.knative.dev

vendor/knative.dev/networking/config/ingress.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ metadata:
1818
name: ingresses.networking.internal.knative.dev
1919
labels:
2020
app.kubernetes.io/name: knative-serving
21+
app.kubernetes.io/component: networking
2122
app.kubernetes.io/version: devel
22-
serving.knative.dev/release: devel
2323
knative.dev/crd-install: "true"
2424
spec:
2525
group: networking.internal.knative.dev

vendor/knative.dev/networking/config/realm.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ metadata:
1818
name: realms.networking.internal.knative.dev
1919
labels:
2020
app.kubernetes.io/name: knative-serving
21+
app.kubernetes.io/component: networking
2122
app.kubernetes.io/version: devel
22-
serving.knative.dev/release: devel
2323
knative.dev/crd-install: "true"
2424
spec:
2525
group: networking.internal.knative.dev

vendor/knative.dev/networking/config/serverlessservice.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ metadata:
1818
name: serverlessservices.networking.internal.knative.dev
1919
labels:
2020
app.kubernetes.io/name: knative-serving
21+
app.kubernetes.io/component: networking
2122
app.kubernetes.io/version: devel
22-
serving.knative.dev/release: devel
2323
knative.dev/crd-install: "true"
2424
spec:
2525
group: networking.internal.knative.dev

vendor/knative.dev/networking/pkg/network.go

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -196,6 +196,21 @@ const (
196196

197197
// ActivatorSANKey is the config for the SAN used to validate the activator TLS certificate.
198198
ActivatorSANKey = "activator-san"
199+
200+
// ActivatorCertKey is the config for the secret name, which stores certificates
201+
// to serve the TLS traffic from ingress to activator.
202+
ActivatorCertKey = "activator-cert-secret"
203+
204+
// QueueProxyCAKey is the config for the secret name, which stores CA public certificate used
205+
// to sign the queue-proxy TLS certificate.
206+
QueueProxyCAKey = "queue-proxy-ca"
207+
208+
// QueueProxySANKey is the config for the SAN used to validate the queue-proxy TLS certificate.
209+
QueueProxySANKey = "queue-proxy-san"
210+
211+
// QueueProxyCertKey is the config for the secret name, which stores certificates
212+
// to serve the TLS traffic from activator to queue-proxy.
213+
QueueProxyCertKey = "queue-proxy-cert-secret"
199214
)
200215

201216
// DomainTemplateValues are the available properties people can choose from
@@ -302,6 +317,20 @@ type Config struct {
302317
// ActivatorSAN defines the SAN (Subject Alt Name) used to validate the activator TLS certificate.
303318
// It is used only when ActivatorCA is specified.
304319
ActivatorSAN string
320+
321+
// ActivatorCertSecret defines the secret name of the server certificates to serve the TLS traffic from ingress to activator.
322+
ActivatorCertSecret string
323+
324+
// QueueProxyCA defines the secret name of the CA public certificate used to sign the queue-proxy TLS certificate.
325+
// The traffic to queue-proxy is not encrypted if QueueProxyCA is empty.
326+
QueueProxyCA string
327+
328+
// QueueProxySAN defines the SAN (Subject Alt Name) used to validate the queue-proxy TLS certificate.
329+
// It is used only when QueueProxyCA is specified.
330+
QueueProxySAN string
331+
332+
// QueueProxyCertSecret defines the secret name of the server certificates to serve the TLS traffic from activator to queue-proxy.
333+
QueueProxyCertSecret string
305334
}
306335

307336
// HTTPProtocol indicates a type of HTTP endpoint behavior
@@ -359,6 +388,10 @@ func defaultConfig() *Config {
359388
MeshCompatibilityMode: MeshCompatibilityModeAuto,
360389
ActivatorCA: "",
361390
ActivatorSAN: "",
391+
ActivatorCertSecret: "",
392+
QueueProxyCA: "",
393+
QueueProxySAN: "",
394+
QueueProxyCertSecret: "",
362395
}
363396
}
364397

@@ -392,6 +425,10 @@ func NewConfigFromMap(data map[string]string) (*Config, error) {
392425
cm.AsString(DefaultExternalSchemeKey, &nc.DefaultExternalScheme),
393426
cm.AsString(ActivatorCAKey, &nc.ActivatorCA),
394427
cm.AsString(ActivatorSANKey, &nc.ActivatorSAN),
428+
cm.AsString(ActivatorCertKey, &nc.ActivatorCertSecret),
429+
cm.AsString(QueueProxyCAKey, &nc.QueueProxyCA),
430+
cm.AsString(QueueProxySANKey, &nc.QueueProxySAN),
431+
cm.AsString(QueueProxyCertKey, &nc.QueueProxyCertSecret),
395432
asMode(MeshCompatibilityModeKey, &nc.MeshCompatibilityMode),
396433
asLabelSelector(NamespaceWildcardCertSelectorKey, &nc.NamespaceWildcardCertSelector),
397434
); err != nil {
@@ -456,6 +493,14 @@ func NewConfigFromMap(data map[string]string) (*Config, error) {
456493
return nil, fmt.Errorf("%q must be set when %q was set", ActivatorCAKey, ActivatorSANKey)
457494
}
458495

496+
if nc.QueueProxyCA != "" && nc.QueueProxySAN == "" {
497+
return nil, fmt.Errorf("%q must be set when %q was set", QueueProxySANKey, QueueProxyCAKey)
498+
}
499+
500+
if nc.QueueProxyCA == "" && nc.QueueProxySAN != "" {
501+
return nil, fmt.Errorf("%q must be set when %q was set", QueueProxyCAKey, QueueProxySANKey)
502+
}
503+
459504
return nc, nil
460505
}
461506

0 commit comments

Comments
 (0)