git/github: default GitHub webhooks to TLS verification#3714
Conversation
Set repository webhook HookConfig insecure_ssl to 0 so GitHub verifies TLS when delivering to HTTPS payload URLs Signed-off-by: Vi-shub <smsharma3121@gmail.com>
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: Vi-shub The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
|
Welcome @Vi-shub! It looks like this is your first PR to knative/func 🎉 |
|
Hi @Vi-shub. Thanks for your PR. I'm waiting for a knative member to verify that this patch is reasonable to test. If it is, they should reply with Regular contributors should join the org to skip this step. Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #3714 +/- ##
==========================================
+ Coverage 56.18% 56.91% +0.73%
==========================================
Files 181 181
Lines 20928 20929 +1
==========================================
+ Hits 11758 11912 +154
+ Misses 8007 7809 -198
- Partials 1163 1208 +45
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
@lkingland @gauron99 do you recall why we would disable tls here? Tests maybe? |
|
@Vi-shub welcome, Please recommit with one line changed. As for the actual change - I see it was written like this 3 years ago (#1594) when first added and there is no comments about it in the PR besides the code comment. I suggest the func team review this and take a decision. |
pkg/git/githubtoinsecure_ssl: "0"so GitHub verifies TLS when delivering to HTTPS payload URLs."1") and the associated TODO inCreateWebHook./kind bug
Fixes #3713
GitHub’s webhook
insecure_sslsetting was hard-coded to"1", which disables TLS certificate verification for HTTPS webhook targets. The secure default is"0"for normal HTTPS endpoints. Users whose controller URL uses a certificate that GitHub does not trust (for example self-signed TLS in lab environments) may need a follow-up opt-in if hook creation or deliveries fail.@davidhadas @lkingland can you please review this. Thanks for your time.