@@ -21,14 +21,12 @@ and [Client Certificate Verification](/geps/gep-91).
21
21
is merely to provide space for future configuration, not a commitment that we
22
22
will add it to the API.)
23
23
24
- ## Out of Initial Scope
24
+ ## Out of Scope
25
25
There are a variety of related TLS concepts in Gateway API that are not currently
26
26
in scope for this GEP. In the future, this GEP may be expanded to include:
27
27
28
28
1 . Automatic mTLS (often associated with Service mesh)
29
- 1 . TLS Passthrough
30
- 1 . TLSRoute
31
-
29
+ 2 . TLSRoute
32
30
33
31
## Introduction
34
32
@@ -75,6 +73,17 @@ flowchart LR
75
73
76
74
The above diagram depicts these four segments as edges in a graph.
77
75
76
+ ### TLS mode
77
+
78
+ TLS can be configured with two distinct modes:
79
+
80
+ * ** Terminate** : the TLS connection is instantiated between the frontend and the
81
+ Gateway. The connection between the Gateway and the backend is either left unencrypted
82
+ or a new TLS connection between the two entities is instantiated.
83
+ * ** Passthrough** : the TLS connection is instantiated between the frontend and the
84
+ backend. The traffic flows through the Gateway encrypted, and the Gateway is not
85
+ able to decrypt or inspect the TLS stream.
86
+
78
87
## Proposed Segments
79
88
Note that this does not represent any form of commitment that any of these
80
89
fields or concepts will exist within Gateway API. If or when they do, we propose
@@ -125,7 +134,6 @@ for a Gateway is not sufficiently different than the persona that would be
125
134
responsible for frontend TLS, so the current proposal is likely the best option
126
135
available to us.
127
136
128
-
129
137
### 2. Configure TLS Termination, including Server Certificate
130
138
131
139
| Proposed Placement | Name | Status |
@@ -137,7 +145,6 @@ This is already finalized in the API and so we're stuck with this name. In
137
145
hindsight a name that was more clearly tied to frontend TLS would have been
138
146
ideal here.
139
147
140
-
141
148
### 3. Configure Client Certificate that Gateway should use to connect to Backend
142
149
143
150
| Proposed Placement | Name | Status |
@@ -160,7 +167,6 @@ use when connecting to a backend, it should likely either be tied directly to
160
167
the Gateway or Backend, but the Listener is not particularly relevant in this
161
168
context.
162
169
163
-
164
170
### 4. Validate Server Certificate that is provided by Backend
165
171
| Proposed Placement | Name | Status |
166
172
| -| -| -|
@@ -207,3 +213,61 @@ would be to introduce a Listener like resource for BackendTLS, resulting in a
207
213
more consistent naming scheme within Gateway TLS configuration. Although it's
208
214
not yet clear if we need this additional layer, we should reconsider it as we're
209
215
further developing Backend TLS.
216
+
217
+ ### 5. Configure TLS mode
218
+
219
+ | Proposed Placement | Name | Status |
220
+ | -| -| -|
221
+ | Gateway Listener | ` Listener.TLS.Mode ` | GA |
222
+
223
+ #### Rationale
224
+
225
+ Similarly to the broader [ TLS termination] ( #2-configure-tls-termination-including-server-certificate )
226
+ segment, this field is already finalized in the API. In hindsight, along with a
227
+ different naming of ` Listener.TLS ` , we could have moved this field out of the broader
228
+ frontend TLS configuration, as it is not bound to it.
229
+
230
+ #### How the TLS configuration is affected
231
+
232
+ The TLS mode affects how the frontend TLS should be configured. In case ` Terminate `
233
+ is set, the ` Listener.TLS.CertificateRefs ` field has to be populated, as the connection
234
+ is intended to be terminated at the Gateway level, while for ` Passthrough ` , the Certificate
235
+ does not need to be provided, as the TLS termination is handled by the backend.
236
+
237
+ ## Routes and TLS
238
+
239
+ Multiple routes can be attached to listeners specifying TLS configuration. This section
240
+ intends to clearly state how and when Routes can attach to listeners with TLS configuration.
241
+
242
+ ### Context
243
+
244
+ The ` *Route ` objects refer the Gateway (or a specific Listener of the Gateway) they
245
+ want to be attached to. A successful attachment can be granted by one of the two
246
+ following conditions:
247
+
248
+ * the ` Listener.AllowedRoutes ` field allows that specific Route ` GroupKind ` to be
249
+ attached to it, or
250
+ * the ` Listener.Protocol ` field allows that specific Route to be attached to the
251
+ Listener. This applies only in case the Gateway's AllowedRoutes field is not set.
252
+
253
+ In case the First condition is not satisfied (the Route references a Gateway that
254
+ does not explicitly allow such an attachment), the Route ` Accepted ` condition
255
+ is set to False with reason ` NotAllowedByListeners ` . In case the Route references
256
+ a Gateway with no Listener matching the protocol needed by the Route, the Route
257
+ ` ResolvedRefs ` condition is set to False with reason ` UnsupportedProtocol ` .
258
+
259
+ ### What Routes are allowed by Listeners with TLS
260
+
261
+ The following is a summary of all the Routes and the TLS termination mode they support.
262
+
263
+ | Route | TLS with Terminate | TLS with Passthrough |
264
+ | -| -| -|
265
+ | ` HTTPRoute ` | yes | no |
266
+ | ` GRPCRoute ` | yes | no |
267
+ | ` TLSRoute ` | yes | yes |
268
+ | ` TCPRoute ` | yes | yes |
269
+ | ` UDPRoute ` | no | no |
270
+
271
+ It is worth highlighting that both ` TLSRoute ` and ` TCPRoute ` support TLS with ` Termination `
272
+ and ` Passthrough ` , but they are intended to be used in different use cases, as ` TCPRoute ` s
273
+ allow destination port routing, while ` TLSRoute ` s allow SNI-based routing.
0 commit comments