-
Notifications
You must be signed in to change notification settings - Fork 484
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for TLS Certificate Management in Gateway API TLSRoute #3249
Comments
Thanks for logging this issue @chifu1234.
I think it's important to clarify what TLSRoute is intended for - it's intended for use cases where you are only using TLS properties (currently only the SNI is available) to choose which backend to forward to. We've discussed Terminated TLSRoutes (in #2111), but we haven't actually implemented anything. Note that in that case, the expected behavior would be a decrypted TCP stream directed towards the chosen backend. No HTTP routing would be possible. If you want to use HTTP information for routing, the correct resource would be HTTPRoute, with TLS termination. All of that said, we built the current design with the assumption that people would either:
It's important to remember that we don't mandate any checking of the served certificates, which means that solutions that allow users to specify their own TLS certificates are trusting those users to do the right thing with generation. What would happen if one Route or similar defines a TLS certificate for I think that what would happen there is very dependent on exactly how the Gateway implementation handles TLS certificates and builds the routing rules for TLS. Edge cases like this are why we find it's better to go slowly and carefully, making sure we cover edge cases like that in the specification, and why, after long discussion, we decided not to put TLS certificates directly in Routes - either TLSRoute or HTTPRoute. |
/triage needs-information |
@chifu1234 Does mutual tls configuration in BackendTLSPolicy help your case: https://github.com/kubernetes-sigs/gateway-api/blob/main/geps/gep-3155/index.md? |
related #3418 |
Description:*
The current Gateway API specification does not seem to provide a straightforward way to manage TLS certificates and handle SNI-based routing without pre-defining certificates in the Gateway resource. This limits the flexibility and scalability of managing certificates, particularly in environments where IPs are limited.
Problem Statement:
I am trying to set up a Gateway that:
Currently, the Gateway API does not support defining certificate within the TLSRoute specification. This means in order for user the
Proposed Solution:
TLS certificate management directly within TLSRoute.
add
TLSRoute.spec.tls.certificateRefs
The text was updated successfully, but these errors were encountered: