-
Notifications
You must be signed in to change notification settings - Fork 365
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support tls termination for tcp traffic #1431
support tls termination for tcp traffic #1431
Conversation
dd09e06
to
26a6a21
Compare
Signed-off-by: tanujd11 <[email protected]>
26a6a21
to
e4b5666
Compare
Codecov Report
@@ Coverage Diff @@
## main #1431 +/- ##
==========================================
- Coverage 61.98% 61.94% -0.04%
==========================================
Files 79 79
Lines 11318 11388 +70
==========================================
+ Hits 7015 7054 +39
- Misses 3844 3874 +30
- Partials 459 460 +1
|
Signed-off-by: tanujd11 <[email protected]>
Signed-off-by: tanujd11 <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for working on this : ) LGTM
@tanujd11 is there any conformace test for this? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Greate Job.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Greate Job.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Greate Job.
internal/ir/xds.go
Outdated
@@ -612,7 +612,9 @@ type TCPListener struct { | |||
Port uint32 | |||
// TLS information required for TLS Passthrough, If provided, incoming | |||
// connections' server names are inspected and routed to backends accordingly. | |||
TLS *TLSInspectorConfig | |||
TLSInspectorConfig *TLSInspectorConfig |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thoughts on making this
tls:
passthrough:
terminate:
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I feel in future we could use SNIs to route traffic in TCP terminate mode as well? Wdyt? Istio does it on the basis of gateway hostname. However at the moment it does not make sense as TCPRoute does not have any SNI based routing. Maybe I am missing something. Wdyt?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
that case is handled in the HTTPListener
Line 117 in 3344221
type HTTPListener struct { |
@arkodg PTAL |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM thanks for adding this feature !
can you also raise a GH issue here or in upstream to add a conformance test for it, TIA
kubernetes-sigs/gateway-api#2060 for tracking conformance test related to this |
What type of PR is this?
Feature to provide TLS termination with TCP trafficWhat this PR does / why we need it:
Supports the following configuration:
Listener Protocol = TLS
TLS Mode = Terminate
Route Type =TCPRoute
Which issue(s) this PR fixes:
Fixes #1391