-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
All Hops Encrypted: Activator uses queue-proxy TLS if available #12503
Labels
kind/feature
Well-understood/specified features, ready for coding.
Comments
evankanderson
added
the
kind/feature
Well-understood/specified features, ready for coding.
label
Jan 13, 2022
6 tasks
Ref nak3#25 for a prototype |
nak3
added a commit
to nak3/serving
that referenced
this issue
Apr 5, 2022
nak3
added a commit
to nak3/serving
that referenced
this issue
Apr 5, 2022
This was referenced Apr 5, 2022
Same with #12501 (comment). |
nak3
added a commit
to nak3/serving
that referenced
this issue
Apr 7, 2022
nak3
added a commit
to nak3/serving
that referenced
this issue
Apr 7, 2022
knative-prow bot
pushed a commit
to knative/pkg
that referenced
this issue
Apr 11, 2022
…S proxy (#2479) * Add `NewProxyAutoTLSTransport` and `DialTLSWithBackOff` to support TLS proxy Part of: knative/serving#12503 PoC: knative/serving#12815 This patch `NewProxyAutoTLSTransport` which is `NewProxyAutoTransport + TLS config. Current proxy does not support TLS but it needs for knative/serving#12503. `DialTLSWithBackOff` is also `DialWithBackOff` + TLS config. It needs `newH2Transport` which handles HTTP2 with TLS. * Fix lint * Fix review comments
nak3
added a commit
to nak3/serving
that referenced
this issue
Apr 11, 2022
nak3
added a commit
to nak3/serving
that referenced
this issue
Apr 12, 2022
nak3
added a commit
to nak3/serving
that referenced
this issue
Apr 12, 2022
nak3
added a commit
to nak3/serving
that referenced
this issue
Apr 12, 2022
nak3
added a commit
to nak3/serving
that referenced
this issue
Apr 13, 2022
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Larger description in the Feature Track document
Summary:
The Activator should attempt connection to the queue-proxy TLS port and validate the client certificate if TLS is available. If not, it should fall back to the existing HTTP (non-TLS) path.
For certificate validation, the activator may need to be provided with a CA root certificate and a known (per-namespace) SNI target name. If needed, configuration should be added to
config-network
configmap, or managed as a secret.Recommended configuration extension for the activator Deployment for alpha to enable mounting secrets if needed (the CA public keys could also be stored in
config-network
):The text was updated successfully, but these errors were encountered: