File tree Expand file tree Collapse file tree 4 files changed +5
-2
lines changed
Expand file tree Collapse file tree 4 files changed +5
-2
lines changed Original file line number Diff line number Diff line change @@ -31,7 +31,7 @@ type: application
3131# This is the chart version. This version number should be incremented each time you make changes
3232# to the chart and its templates, including the app version.
3333# Versions are expected to follow Semantic Versioning (https://semver.org/)
34- version : 2.11.4
34+ version : 2.11.5
3535
3636# This is the version number of the application being deployed. This version number should be
3737# incremented each time you make changes to the application. Versions are not expected to
Original file line number Diff line number Diff line change @@ -123,6 +123,7 @@ The command removes all the Kubernetes components associated with the chart and
123123| apisix.ssl.enabled | bool | ` false ` | |
124124| apisix.ssl.existingCASecret | string | ` "" ` | Specifies the name of Secret contains trusted CA certificates in the PEM format used to verify the certificate when APISIX needs to do SSL/TLS handshaking with external services (e.g. etcd) |
125125| apisix.ssl.fallbackSNI | string | ` "" ` | Define SNI to fallback if none is presented by client |
126+ | apisix.ssl.sslCiphers | string | ` "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA" ` | TLS ciphers allowed to use. |
126127| apisix.ssl.sslProtocols | string | ` "TLSv1.2 TLSv1.3" ` | TLS protocols allowed to use. |
127128| apisix.status.ip | string | ` "0.0.0.0" ` | |
128129| apisix.status.port | int | ` 7085 ` | |
Original file line number Diff line number Diff line change @@ -162,7 +162,7 @@ data:
162162 {{- toYaml . | nindent 10}}
163163 {{- end }}
164164 ssl_protocols: {{ .Values.apisix.ssl.sslProtocols | quote }}
165- ssl_ciphers: "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA"
165+ ssl_ciphers: {{ .Values.apisix.ssl.sslCiphers | quote }}
166166 {{- if and .Values.apisix.ssl.enabled .Values.apisix.ssl.existingCASecret }}
167167 ssl_trusted_certificate: "/usr/local/apisix/conf/ssl/{{ .Values.apisix.ssl.certCAFilename }}"
168168 {{- end }}
Original file line number Diff line number Diff line change @@ -320,6 +320,8 @@ apisix:
320320 enableHTTP3 : false
321321 # -- TLS protocols allowed to use.
322322 sslProtocols : " TLSv1.2 TLSv1.3"
323+ # -- TLS ciphers allowed to use.
324+ sslCiphers : " ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA"
323325 # -- Define SNI to fallback if none is presented by client
324326 fallbackSNI : " "
325327
You can’t perform that action at this time.
0 commit comments