Skip to content
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion helm/aws-load-balancer-controller/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -259,7 +259,7 @@ tolerateNonExistentBackendService:
tolerateNonExistentBackendAction:

# defaultSSLPolicy specifies the default SSL policy to use for TLS/HTTPS listeners
defaultSSLPolicy:
defaultSSLPolicy: ELBSecurityPolicy-TLS13-1-3-2021-06
Copy link
Contributor

@guessi guessi Feb 14, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Quoted from doc

  • The ELBSecurityPolicy-TLS13-1-2-2021-06 policy is the default security policy for HTTPS listeners created using the AWS Management Console.
  • The ELBSecurityPolicy-2016-08 policy is the default security policy for HTTPS listeners created using the AWS CLI.

Keep in mind that changing the values.yaml could be a breaking change for those who don't set values while helm install/upgrade.


FYI, default of the defaultSSLPolicy will be set via flag here,

where the default definition could be found at

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1. This change is particularly dangerous. If you wish to enforce SSL policy enforcement, I would suggest a feature that sets the default at the controller level using feature flags.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We already have a controller flag default-ssl-policy which customers can use to set their desired policy. The controller level default is ELBSecurityPolicy-2016-08 which aligns with our CLI behavior mentioned earlier. So I don't think this is a valid change as this could break existing customer.


# Liveness probe configuration for the controller
livenessProbe:
Expand Down
Loading