-
Notifications
You must be signed in to change notification settings - Fork 2.7k
fix: fix issue with change ssl_protocols failed #8985
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -3311,8 +3311,7 @@ const message = { | |
|
||
panelExist: | ||
'Mengesan perkhidmatan 1Panel V1 sedang berjalan pada nod ini. Sila naik taraf ke V2 menggunakan skrip migrasi sebelum menambah.', | ||
coreExist: | ||
'Nod ini telah mempunyai perkhidmatan 1Panel V2 dipasang, tidak boleh ditambah sebagai nod sekunder.', | ||
coreExist: 'Node ini telah diaktifkan sebagai nod utama dan tidak boleh ditambah sebagai nod hamba.', | ||
agentExist: | ||
'Mengesan 1panel-agent telah dipasang pada nod ini. Jika diteruskan, data sedia ada akan dikekalkan dan hanya perkhidmatan 1panel-agent akan diganti. Teruskan?', | ||
dataExist: 'Mengesan data sejarah 1Panel wujud pada nod ini. Sahkan untuk terus menambah?', | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The code appears to have some discrepancies:
Overall, ensure that the error handling messages are understandable and provide users with appropriate guidance based on the current node's configuration. |
||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -144,10 +144,10 @@ | |
<el-checkbox :value="'TLSv1.3'">{{ 'TLS 1.3' }}</el-checkbox> | ||
<el-checkbox :value="'TLSv1.2'">{{ 'TLS 1.2' }}</el-checkbox> | ||
<el-checkbox :value="'TLSv1.1'"> | ||
{{ 'TLS 1.0' + $t('website.notSecurity') }} | ||
{{ 'TLS 1.1' + $t('website.notSecurity') }} | ||
</el-checkbox> | ||
<el-checkbox :value="'TLSv1'"> | ||
{{ 'TLS 1.1' + $t('website.notSecurity') }} | ||
{{ 'TLS 1.0' + $t('website.notSecurity') }} | ||
</el-checkbox> | ||
</el-checkbox-group> | ||
</el-form-item> | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The provided code snippet is not clear regarding the specific context of what it's supposed to accomplish. However, based on typical error messages or warnings associated with HTML/CSS/JavaScript discrepancies, I can highlight some key points that might indicate issues:
To resolve this, you should ensure that the same version number appears only once within each checkbox label before any additional information such as a safety notice. Additionally:
If the goal is to clearly display which protocols lack security features without repeating the protocol name multiple times, consider normalizing the way these version numbers are handled in the checkboxes. Example correction (assuming consistent naming): <el-checkbox-group v-model="tlsVersionPreferences">
<div style="display: flex; gap: 4px;">
<el-checkbox :label="'TLSv1.3'">{{ 'TLS 1.3' }}</el-checkbox>
<el-checkbox :label="'TLSv1.2'">{{ 'TLS 1.2' }}</el-checkbox>
<!-- Consistent representation -->
<div style="display: flex;">
<el-checkbox :label="'TLSv1.1'" />
<span>{{ $t('website.notSecurity') }} (Not recommended)</span>
</div>
<div style="display: flex;">
<el-checkbox :label="'TLSv1'" />
<span>{{ $t('website.notSecurity') }} (Recommended against due to severe vulnerabilities)</span>
</div>
</div>
</el-form-item> This approach maintains clarity while maintaining semantic separation between protocol descriptions and security advisories, improving readability and maintainability. |
||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The code snippet you provided has two minor adjustments:
The line
if len(req.SSLProtocol) == 0: nginxParams[i].Params = []string{"TLSv1.3", "TLSv1.2", "TLSv1.1", "TLSv1"}
is corrected to avoid including "TLSv1.1" when no SSL protocols are specified. However, it could be more efficient if you handle this more robustly. For example, instead of specifying all supported versions, consider using the standard recommended settings like"ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-CBC-SHA:AES256-SHA"
.The list of available SSL ciphers can also vary widely depending on the environment, so handling them individually might not be necessary. Instead, consider generating a comprehensive cipher suite that includes modern standards such as TLS_AES_256_GCM_SHA384 and TLS_ECC_RSA_P521_SHA384 for maximum security against known vulnerabilities.
These changes improve clarity and adaptability without introducing unnecessary complexity.