Skip to content

Commit d49ae96

Browse files
committed
gep: TLS mode in gep-2907
Signed-off-by: Mattia Lavacca <[email protected]>
1 parent e971a8d commit d49ae96

File tree

1 file changed

+71
-7
lines changed

1 file changed

+71
-7
lines changed

geps/gep-2907/index.md

+71-7
Original file line numberDiff line numberDiff line change
@@ -21,14 +21,12 @@ and [Client Certificate Verification](/geps/gep-91).
2121
is merely to provide space for future configuration, not a commitment that we
2222
will add it to the API.)
2323

24-
## Out of Initial Scope
24+
## Out of Scope
2525
There are a variety of related TLS concepts in Gateway API that are not currently
2626
in scope for this GEP. In the future, this GEP may be expanded to include:
2727

2828
1. Automatic mTLS (often associated with Service mesh)
29-
1. TLS Passthrough
30-
1. TLSRoute
31-
29+
2. TLSRoute
3230

3331
## Introduction
3432

@@ -75,6 +73,17 @@ flowchart LR
7573

7674
The above diagram depicts these four segments as edges in a graph.
7775

76+
### TLS mode
77+
78+
TLS can be configured with two distinct modes:
79+
80+
* **Terminate**: the TLS connection is instantiated between the frontend and the
81+
Gateway. The connection between the Gateway and the backend is either left unencrypted
82+
or a new TLS connection between the two entities is instantiated.
83+
* **Passthrough**: the TLS connection is instantiated between the frontend and the
84+
backend. The traffic flows through the Gateway encrypted, and the Gateway is not
85+
able to decrypt or inspect the TLS stream.
86+
7887
## Proposed Segments
7988
Note that this does not represent any form of commitment that any of these
8089
fields or concepts will exist within Gateway API. If or when they do, we propose
@@ -125,7 +134,6 @@ for a Gateway is not sufficiently different than the persona that would be
125134
responsible for frontend TLS, so the current proposal is likely the best option
126135
available to us.
127136

128-
129137
### 2. Configure TLS Termination, including Server Certificate
130138

131139
| Proposed Placement | Name | Status |
@@ -137,7 +145,6 @@ This is already finalized in the API and so we're stuck with this name. In
137145
hindsight a name that was more clearly tied to frontend TLS would have been
138146
ideal here.
139147

140-
141148
### 3. Configure Client Certificate that Gateway should use to connect to Backend
142149

143150
| Proposed Placement | Name | Status |
@@ -160,7 +167,6 @@ use when connecting to a backend, it should likely either be tied directly to
160167
the Gateway or Backend, but the Listener is not particularly relevant in this
161168
context.
162169

163-
164170
### 4. Validate Server Certificate that is provided by Backend
165171
| Proposed Placement | Name | Status |
166172
|-|-|-|
@@ -207,3 +213,61 @@ would be to introduce a Listener like resource for BackendTLS, resulting in a
207213
more consistent naming scheme within Gateway TLS configuration. Although it's
208214
not yet clear if we need this additional layer, we should reconsider it as we're
209215
further developing Backend TLS.
216+
217+
### 5. Configure TLS mode
218+
219+
| Proposed Placement | Name | Status |
220+
|-|-|-|
221+
| Gateway Listener | `Listener.TLS.Mode` | GA |
222+
223+
#### Rationale
224+
225+
Similarly to the broader [TLS termination](#2-configure-tls-termination-including-server-certificate)
226+
segment, this field is already finalized in the API. In hindsight, along with a
227+
different naming of `Listener.TLS`, we could have moved this field out of the broader
228+
frontend TLS configuration, as it is not bound to it.
229+
230+
#### How the TLS configuration is affected
231+
232+
The TLS mode affects how the frontend TLS should be configured. In case `Terminate`
233+
is set, the `Listener.TLS.CertificateRefs` field has to be populated, as the connection
234+
is intended to be terminated at the Gateway level, while for `Passthrough`, the Certificate
235+
does not need to be provided, as the TLS termination is handled by the backend.
236+
237+
## Routes and TLS
238+
239+
Multiple routes can be attached to listeners specifying TLS configuration. This section
240+
intends to clearly state how and when Routes can attach to listeners with TLS configuration.
241+
242+
### Context
243+
244+
The `*Route` objects refer the Gateway (or a specific Listener of the Gateway) they
245+
want to be attached to. A successful attachment can be granted by one of the two
246+
following conditions:
247+
248+
* the `Listener.AllowedRoutes` field allows that specific Route `GroupKind` to be
249+
attached to it, or
250+
* the `Listener.Protocol` field allows that specific Route to be attached to the
251+
Listener. This applies only in case the Gateway's AllowedRoutes field is not set.
252+
253+
In case the First condition is not satisfied (the Route references a Gateway that
254+
does not explicitly allow such an attachment), the Route `Accepted` condition
255+
is set to False with reason `NotAllowedByListeners`. In case the Route references
256+
a Gateway with no Listener matching the protocol needed by the Route, the Route
257+
`ResolvedRefs` condition is set to False with reason `UnsupportedProtocol`.
258+
259+
### What Routes are allowed by Listeners with TLS
260+
261+
The following is a summary of all the Routes and the TLS termination mode they support.
262+
263+
| Route | TLS with Terminate | TLS with Passthrough |
264+
|-|-|-|
265+
| `HTTPRoute` | yes | no |
266+
| `GRPCRoute` | yes | no |
267+
| `TLSRoute` | yes | yes |
268+
| `TCPRoute` | yes | yes |
269+
| `UDPRoute` | no | no |
270+
271+
It is worth highlighting that both `TLSRoute` and `TCPRoute` support TLS with `Termination`
272+
and `Passthrough`, but they are intended to be used in different use cases, as `TCPRoute`s
273+
allow destination port routing, while `TLSRoute`s allow SNI-based routing.

0 commit comments

Comments
 (0)