Skip to content

Commit 1c090f1

Browse files
committed
cl-dataplane: Disable controlplane TLS session keys
This commit disables envoy from using TLS session keys when connecting to the controlplane. Enabling session keys produces big TLS client hello packets, which cause a "buffer full" error on the controlplane's SNI proxy. Signed-off-by: Or Ozeri <oro@il.ibm.com>
1 parent 9d7251f commit 1c090f1

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

cmd/cl-dataplane/app/envoyconf.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,7 @@ static_resources:
9292
typed_config:
9393
"@type": type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.UpstreamTlsContext
9494
sni: {{.controlplaneGRPCSNI}}
95+
max_session_keys: 0 # TODO: remove once controlplane no longer uses inet.af/tcpproxy
9596
common_tls_context:
9697
tls_certificate_sds_secret_configs:
9798
- name: {{.certificateSecret}}
@@ -120,6 +121,7 @@ static_resources:
120121
typed_config:
121122
"@type": type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.UpstreamTlsContext
122123
sni: {{.peerName}}
124+
max_session_keys: 0 # TODO: remove once controlplane no longer uses inet.af/tcpproxy
123125
common_tls_context:
124126
tls_certificate_sds_secret_configs:
125127
- name: {{.certificateSecret}}

0 commit comments

Comments
 (0)