Skip to content

Conversation

@koct9i
Copy link
Collaborator

@koct9i koct9i commented Dec 10, 2025

This feature allows to validate that only secure transports are allowed:

  • mTLS for native transport
  • HTTPS-only HTTP proxies
  • TLS-only RPC proxies

One feature to rule them all. It has effect only during spec validation.

Signed-off-by: Konstantin Khlebnikov [email protected]

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR adds a new SecureClusterTransports feature flag to enforce secure transport configurations across the YTsaurus cluster, validating that mTLS is used for native transport, HTTPS-only for HTTP proxies, and TLS-only for RPC proxies during spec validation.

  • Adds SecureClusterTransports boolean field to ClusterFeatures type
  • Implements webhook validation to enforce TLS requirements when the feature is enabled
  • Adds comprehensive test coverage for the new security validations

Reviewed changes

Copilot reviewed 15 out of 15 changed files in this pull request and generated 4 comments.

Show a summary per file
File Description
api/v1/ytsaurus_types.go Adds SecureClusterTransports field to ClusterFeatures struct
api/v1/ytsaurus_webhook.go Implements validation logic for secure transports including native transport, HTTP proxies, and RPC proxies
config/crd/bases/*.yaml Updates CRD schemas to include the new secureClusterTransports field for all resource types
ytop-chart/templates/crds/*.yaml Updates Helm chart CRD templates with the new field definition
test/webhooks/ytsaurus_webhooks_test.go Adds comprehensive test cases covering successful and failure scenarios for the feature
pkg/testutil/spec_builders.go Sets SecureClusterTransports to false in test builder to increase coverage
docs/api.md Documents the new secureClusterTransports field in API documentation

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@koct9i koct9i force-pushed the khlebnikov/flag-secure-cluster branch from fa7b238 to cac8548 Compare December 12, 2025 13:39
@koct9i koct9i requested a review from Copilot December 12, 2025 13:39
@koct9i koct9i force-pushed the khlebnikov/flag-secure-cluster branch from cac8548 to 4fd358c Compare December 12, 2025 13:42
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Copilot reviewed 15 out of 15 changed files in this pull request and generated 2 comments.


💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

This feature allows to validate that only secure transports are allowed:
- mTLS for native transport
- HTTPS-only HTTP proxies
- TLS-only RPC proxies

One feature to rule them all. It has effect only during spec validation.

Signed-off-by: Konstantin Khlebnikov <[email protected]>
@koct9i koct9i force-pushed the khlebnikov/flag-secure-cluster branch from 44c56f2 to 3d75cd6 Compare January 20, 2026 09:23
@koct9i koct9i requested a review from Copilot January 20, 2026 09:24
@koct9i koct9i requested a review from qurname2 January 20, 2026 09:29
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Copilot reviewed 20 out of 20 changed files in this pull request and generated no new comments.


💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Copy link
Collaborator

@qurname2 qurname2 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

@koct9i koct9i merged commit 4af140e into main Jan 20, 2026
14 of 15 checks passed
@koct9i koct9i deleted the khlebnikov/flag-secure-cluster branch January 20, 2026 17:27
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

Status: Done

Development

Successfully merging this pull request may close these issues.

3 participants