Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport of [NET-5772] Make tcp external service registered on terminating gw reachable from peered cluster into release/1.18.x #20946

Conversation

hc-github-team-consul-core
Copy link
Collaborator

Backport

This PR is auto-generated from #19881 to be assessed for backporting due to the inclusion of the label backport/1.18.

The below text is copied from the body of the original PR.


Note

This is a followup to #18959 which fixed the same problem specifically when using http protocol.

Description

The terminating gateways needs to be able to handle TCP connections from peers which are not TLS-terminated at the local mesh gateway. This amounts to including the target SNI that downstreams from peers would use when building the TLS context for the terminating gateway.

Filter chain match before this change
filter_chain_match: {
  server_names: [
    "destination.default.dc2.internal.b81d6ee2-8454-768e-0a06-38a62620f76a.consul"
  ]
}
Filter chain match after this change
filter_chain_match: {
  server_names: [
    "destination.default.dc2.internal.b81d6ee2-8454-768e-0a06-38a62620f76a.consul",
    "destination.default.default.dc1.external.b81d6ee2-8454-768e-0a06-38a62620f76a.consul"
  ]
}

Testing & Reproduction steps

You can test this fix using the setup here, changing the <ServiceDefaults>.spec.protocol as necessary in resources/dc2/external-service.yaml if you want to see the behavior for http services as well.

You will need to pin a build of this branch as global.image in values-dc2.yaml. I would recommend doing an install without this build to witness things in their current broken state, and then doing a helm upgrade with global.image set.

Links

PR Checklist

  • updated test coverage
  • external facing docs updated
  • appropriate backport labels added
  • not a security concern

Overview of commits

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto approved Consul Bot automated PR

@github-actions github-actions bot added the theme/envoy/xds Related to Envoy support label Apr 3, 2024
@nathancoleman nathancoleman enabled auto-merge (squash) April 3, 2024 16:39
@vercel vercel bot temporarily deployed to Preview – consul April 3, 2024 16:44 Inactive
@nathancoleman nathancoleman merged commit 0e62661 into release/1.18.x Apr 3, 2024
81 of 82 checks passed
@nathancoleman nathancoleman deleted the backport/export-terminating-gw-service/gratefully-welcome-panther branch April 3, 2024 16:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
theme/envoy/xds Related to Envoy support
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants