Bug 1964482
| Summary: | Ipv6 IP addresses are not accepted for whitelisting | ||
|---|---|---|---|
| Product: | OpenShift Container Platform | Reporter: | sajeel irkal <sirkal> |
| Component: | Networking | Assignee: | Andrey Lebedev <alebedev> |
| Networking sub component: | router | QA Contact: | Arvind iyengar <aiyengar> |
| Status: | CLOSED ERRATA | Docs Contact: | |
| Severity: | high | ||
| Priority: | high | CC: | alebedev, aos-bugs, dcaldwel, hongli, mjoseph, mmasters, wgordon |
| Version: | 4.4 | ||
| Target Milestone: | --- | ||
| Target Release: | 4.9.0 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2021-10-18 17:31:44 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 1984565 | ||
|
Comment 1
Miciah Dashiel Butler Masters
2021-05-25 16:13:33 UTC
Verified in "4.9.0-0.nightly-2021-06-29-114024" version. With this version, it is observed that the ipv6 whitelist configuration gets added in the router backend for which the annotation is applied:
------
oc get clusterversion
NAME VERSION AVAILABLE PROGRESSING SINCE STATUS
version 4.9.0-0.nightly-2021-06-29-114024 True False 4h44m Cluster version is 4.9.0-0.nightly-2021-06-29-114024
oc annotate route edge-route haproxy.router.openshift.io/ip_whitelist="2600:14a0::/40"
route.route.openshift.io/edge-route annotated
route config:
oc get route edge-route -o yaml
apiVersion: route.openshift.io/v1
kind: Route
metadata:
annotations:
haproxy.router.openshift.io/hsts_header: max-age=31536000
haproxy.router.openshift.io/ip_whitelist: 2600:14a0::/40 <-----
openshift.io/host.generated: "true"
creationTimestamp: "2021-06-30T07:15:43Z"
labels:
name: service-unsecure
name: edge-route
namespace: test2
Router configuration:
backend be_edge_http:test2:edge-route
mode http
option redispatch
option forwardfor
balance
acl whitelist src 2600:14a0::/40 <---
tcp-request content reject if !whitelist <---
timeout check 5000ms
http-request add-header X-Forwarded-Host %[req.hdr(host)]
http-request add-header X-Forwarded-Port %[dst_port]
http-request add-header X-Forwarded-Proto http if !{ ssl_fc }
http-request add-header X-Forwarded-Proto https if { ssl_fc }
http-request add-header X-Forwarded-Proto-Version h2 if { ssl_fc_alpn -i h2 }
http-request add-header Forwarded for=%[src];host=%[req.hdr(host)];proto=%[req.hdr(X-Forwarded-Proto)]
cookie 9e6916b23f1cdad50d8a86b48f87064e insert indirect nocache httponly secure attr SameSite=None
http-response set-header Strict-Transport-Security 'max-age=31536000'
server pod:web-server-rc-8lx6w:service-unsecure:http:10.129.2.25:8080 10.129.2.25:8080 cookie 1d739f57547fd5c0c5479298c4f8fe1d weight 256
------
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: OpenShift Container Platform 4.9.0 bug fix and security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:3759 |