Revision b8aba30a9dba845db604823282fb28afdd035eba authored by Paul Chaignon on 19 May 2021, 21:54:14 UTC, committed by Nathan Sweet on 04 June 2021, 16:46:12 UTC
[ upstream commit 320ea0d9e1eaae533ad648c91acc1c63041ef6e3 ]

This commit partially reverts commit a9ecab17278d05b0492d450c239bbfed367f6d5e.

Disabling endpoint routes in an existing cluster is not supported for
now. We first need to find a way to properly remove the endpoint routes
(see previous commit) before we can support this.

We keep the override of endpoint datapath config. for the host endpoint
as otherwise host firewall test will error due to a failure to load
bpf_host.

Signed-off-by: Paul Chaignon <paul@cilium.io>
Signed-off-by: Quentin Monnet <quentin@isovalent.com>
1 parent ddf4433
Raw File
SECURITY.md
# Security Policy

## Supported Versions

| Version | Supported          |
| ------- | ------------------ |
| master  | :white_check_mark: |
| 1.9.x   | :white_check_mark: |
| 1.8.x   | :white_check_mark: |
| 1.7.x   | :white_check_mark: |
| < 1.7.0 | :x:                |

## Reporting a Vulnerability

We strongly encourage you to report security vulnerabilities to
our private security mailing list: security@cilium.io - first, before
disclosing them in any public forums.

This is a private mailing list where only members of the Cilium internal
security team are subscribed to, and is treated as top priority.
back to top