Skip to content

🌱 Replace generated mozilla_data.go with go:embed + runtime parsing#2634

Open
tmshort wants to merge 1 commit intooperator-framework:mainfrom
tmshort:use-embed-to-update-profiles
Open

🌱 Replace generated mozilla_data.go with go:embed + runtime parsing#2634
tmshort wants to merge 1 commit intooperator-framework:mainfrom
tmshort:use-embed-to-update-profiles

Conversation

@tmshort
Copy link
Copy Markdown
Contributor

@tmshort tmshort commented Apr 8, 2026

Embed mozilla_data.json and parse it at init() time using the existing cipherSuiteId()/curveId() helpers. Unsupported ciphers are skipped and recorded in skippedCiphers, validated by TestNoSkippedCiphers. Simplify update-tls-profiles.sh to a curl download and drop the gojq dependency.

When the profile changes, make verify will show a diff of the profile. The build will still complete using the old data. The updated profile will need to be commited in order for it to be included in the build.

Description

Reviewer Checklist

  • API Go Documentation
  • Tests: Unit Tests (and E2E Tests, if appropriate)
  • Comprehensive Commit Messages
  • Links to related GitHub Issue(s)

Embed mozilla_data.json and parse it at init() time using the existing
cipherSuiteId()/curveId() helpers. Unsupported ciphers are skipped and
recorded in skippedCiphers, validated by TestNoSkippedCiphers. Simplify
update-tls-profiles.sh to a curl download and drop the gojq dependency.

When the profile changes, `make verify` will show a diff of the profile.
The build will still complete using the old data. The updated profile
will need to be commited in order for it to be included in the build.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
Signed-off-by: Todd Short <tshort@redhat.com>
Copilot AI review requested due to automatic review settings April 8, 2026 14:13
@openshift-ci openshift-ci bot requested review from anik120 and trgeiger April 8, 2026 14:13
@openshift-ci
Copy link
Copy Markdown

openshift-ci bot commented Apr 8, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign pedjak for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@netlify
Copy link
Copy Markdown

netlify bot commented Apr 8, 2026

Deploy Preview for olmv1 ready!

Name Link
🔨 Latest commit d3e0d27
🔍 Latest deploy log https://app.netlify.com/projects/olmv1/deploys/69d66287aa91fd00089ae0f1
😎 Deploy Preview https://deploy-preview-2634--olmv1.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR replaces the generated mozilla_data.go file with an embedded JSON approach, simplifying the TLS profile management. Instead of generating Go code from the Mozilla SSL/TLS Configuration Guidelines, the PR embeds the JSON data and parses it at runtime during package initialization. This eliminates the dependency on gojq and makes profile updates clearer through simple JSON diffs.

Changes:

  • Embed mozilla_data.json using go:embed and parse at init() time instead of generating Go code
  • Simplify update-tls-profiles.sh to just download the JSON file, removing all jq-based code generation
  • Add TestNoSkippedCiphers to validate that all ciphers in the Mozilla data are supported by Go's crypto/tls
  • Remove gojq dependency from the Makefile

Reviewed changes

Copilot reviewed 5 out of 5 changed files in this pull request and generated no comments.

Show a summary per file
File Description
internal/shared/util/tlsprofiles/mozilla_data.go Rewritten to embed and parse mozilla_data.json at runtime, with helper functions to convert Mozilla cipher/curve names to Go TLS identifiers
internal/shared/util/tlsprofiles/mozilla_data.json New embedded JSON file containing Mozilla TLS profile configurations for "modern" and "intermediate" profiles
hack/tools/update-tls-profiles.sh Simplified from 131 lines to 12 lines - now just downloads JSON from Mozilla instead of generating Go code
Makefile Removed gojq dependency from the update-tls-profiles target
internal/shared/util/tlsprofiles/tlsprofiles_test.go Added TestNoSkippedCiphers to ensure all ciphers in the embedded data are supported by Go

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@codecov
Copy link
Copy Markdown

codecov bot commented Apr 8, 2026

Codecov Report

❌ Patch coverage is 67.50000% with 13 lines in your changes missing coverage. Please review.
✅ Project coverage is 68.94%. Comparing base (8614e3b) to head (d3e0d27).

Files with missing lines Patch % Lines
internal/shared/util/tlsprofiles/mozilla_data.go 67.50% 7 Missing and 6 partials ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##             main    #2634      +/-   ##
==========================================
+ Coverage   68.93%   68.94%   +0.01%     
==========================================
  Files         139      140       +1     
  Lines        9891     9931      +40     
==========================================
+ Hits         6818     6847      +29     
- Misses       2563     2569       +6     
- Partials      510      515       +5     
Flag Coverage Δ
e2e 37.66% <67.50%> (+0.37%) ⬆️
experimental-e2e 52.32% <67.50%> (+0.11%) ⬆️
unit 53.66% <67.50%> (+0.05%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants