GatewayTLSConfig: Well known options #896
Replies: 3 comments 5 replies
-
There hasn't been any discussion on specific options that I'm aware of, though I've always assumed many options like this would be standardized. The timing on this might be a bit early (would be interesting to see the intersection of options across implementations), but I expect that a proposal standardizing the TLS options vocabulary would be well received. |
Beta Was this translation helpful? Give feedback.
-
How do folks feel about standardizing on these options but without any sort of conformance definition (or just implementation-specific)? |
Beta Was this translation helpful? Give feedback.
-
One specific thing I noticed while starting on implementation for this functionality is that Envoy allows specifying a different TLS minimum and maximum version for incoming (downstream) versus outgoing (upstream) connections, and currently defaults to supporting incoming TLS 1.3 connections but only initiating outgoing TLS 1.2 connections. I'm curious if other proxies have a similarly configurable split, and if supporting that distinction would make sense in the future for well-known option keys in the Gateway API spec? |
Beta Was this translation helpful? Give feedback.
-
Hi folks, I'm working on the HashiCorp Consul Gateway API integration 👋🏼
One of our requirements is to be able to configure the TLS min version the gateway will accept. I'm planning on exposing that as an available option in the GatewayTLSConfig options map for our implementation. Has there been any discussion around a set of GatewayTLSConfig options with well-known keys/values that are perhaps candidates to eventually have their own field?
For example, instead of us defining the implementation specific key
api-gateway.consul.hashicorp.com/tls_min_version
namespace it undergateway.networking.k8s.io
and document the well known values.Beta Was this translation helpful? Give feedback.
All reactions