-
Notifications
You must be signed in to change notification settings - Fork 527
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GEP: Describe Backend Properties #1282
Comments
/kind gep |
Okay, I've started something rough in https://docs.google.com/document/d/1M8EPrZKuhYsQjHnVrdsBxU8mVPKUWUYLXW9qE_Et9-Y/edit?usp=sharing . Remember that we're working first on a "what" and a "why", not on a "how" yet. Let's do a Provisional GEP agreeing on those things, then we can move to the "how". |
One interesting twist here is that for mesh cases it may be preferable for the TLS identity to be assigned by a mesh controller rather than specified manually (but maybe possible to override? manual specification likely needed for non-mesh cases too) which could suggest a status field for exposing this to consumers. |
Would it be reasonable for the mesh to fill in the TLS details in the ServiceMetadata? Perhaps a spec/status split where the mesh could fill in the status if the cert was not specified in spec. |
I mentioned this elsewhere but IMO application TLS and mesh encryption (which is not always tls...) should be kept entirely separated |
I think that having a space in the status of resources to put generated TLS details makes some sense, but I think that we need to resolve the confusion about what we're putting in spec first, when you do want to request. Then, any status info can be added to that same resource. |
As suggested by @mikemorris in Slack, it seems useful to describe why we ended up removing BackendPolicy earlier. Unfortunately we didn't leave much of a paper trail, but here's what I remember:
As always, feel free to correct me if I got anything wrong or missed anything. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
My take away from the Nov 14 community meeting (notes,video) is the GEP is going through a redux with a reduced scope of dealing with backend TLS. Use cases are being gathered here - https://docs.google.com/document/d/17sctu2uMJtHmJTGtBi_awGB0YzoCLodtR6rUNmKMCs8/edit This doesn't address the needs described in #1244 and no one is driving that at the moment. |
Thanks @dprotaso, that's correct. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale I still care about this! As a refresher, for Knative, we'd like to be able to specify the following upstream server behavior using a consistent (Gateway-API conformance tested) interface:
If those should be separate GEPs, that seems fine. |
yeah, I think that this one has not gone well because I leaned too deep into combining everything into a single type, and then it had a large impact on many things. I'm working with @candita at the moment on how we can make something smaller, that just covers managing a TLS connection between the data plane and the backend, using the new Direct Attached Policy type that is being introduced in #1565 (once I get that merged, anyway). Once we've got something smaller done there, I think we can look at if we continue adding smaller, tightly scoped Policy objects, or do something bigger with a more involved design. |
What would you like to be added:
As people have started implementing Gateway API, some functionality has come up that:
But that we need a way to represent in the API.
The first examples that came up are:
These are certainly not the only things that we'll need to add to this sort of construct though, so it must be extensible and designed with the future in mind.
This GEP covers the work to design and implement solutions to these problems.
As @shaneutt suggested, the first step will be implementing a provisional GEP that sets out the terms of what we're doing - the "What" and "Why" of the solution, and then once we're on the same page, we'll talk more about the "How".
Part of this GEP process should also be clarifying if we're using Policy Attachment for this, and why we've chosen to use it or not.
Why this is needed:
Layer 7 implementations already allow both of the first functionality, solving these in a more general way will give us a path towards adding more things.
The text was updated successfully, but these errors were encountered: