Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Gep 2907 update - TLS mode and allowed routes #3458

Merged
merged 5 commits into from
Mar 27, 2025

Conversation

mlavacca
Copy link
Member

@mlavacca mlavacca commented Nov 19, 2024

What type of PR is this?

/kind gep

What this PR does / why we need it:

This PR supersedes #3190.

This PR updates GEP-2907 with two different aspects:

  • definition of TLS mode (Terminate and Passthrough)
  • what routes can be attached to Listeners that specify TLS configuration.

A key takeaway and most discussed point of this PR is allowing TLS termination for TLSRoute. A lot of context can be found in #2111 and #3458 (comment). The needs of this feature boils down to "I want to route L4 and L7 traffic on the same listener, and I want to route L4 traffic based on hostname."

This PR intends to reach an agreement that will make #2111 and #1474 addressable.

Which issue(s) this PR fixes:

Does this PR introduce a user-facing change?:

NONE

@k8s-ci-robot k8s-ci-robot added release-note-none Denotes a PR that doesn't merit a release note. kind/gep PRs related to Gateway Enhancement Proposal(GEP) do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. labels Nov 19, 2024
@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. approved Indicates a PR has been approved by an approver from all required OWNERS files. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Nov 19, 2024
@mlavacca
Copy link
Member Author

/cc @candita @youngnick

@youngnick
Copy link
Contributor

youngnick commented Nov 21, 2024

Yeah, this accurately conveys the current state, although I think that we do not have any conformance testing at all about TLSRoute with Terminate behavior.

Edit LGTM, but I'd like to hear from others too.

@mlavacca
Copy link
Member Author

Yeah, this accurately conveys the current state, although I think that we do not have any conformance testing at all about TLSRoute with Terminate behavior.

Edit LGTM, but I'd like to hear from others too.

Yep, I just created #3466 to track conformance tests with TLSRoutes in Terminate Mode.

@mlavacca
Copy link
Member Author

/cc @robscott @shaneutt

@shaneutt shaneutt requested review from kflynn, gcs278 and arkodg January 23, 2025 13:45
Copy link
Member

@robscott robscott left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @mlavacca! Sorry I missed this one!

Comment on lines 271 to 275
> [!NOTE]
> When the traffic is routed to the backend via `TCPRoute`, the packets
> are left untouched by the gateway. In order to terminate the TLS connection to
> the gateway and forward the traffic unencrypted to the backend, a `TLSRoute` configured
> with `Terminate` as TLS mode has to be used.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is a bit confusing to me. Why does the route type matter here? In the case of TLS passthrough, it seems like you'd have two options if you wanted to use SNI to select the backend:

  1. Multiple Listeners with different hostnames specified
  2. One Listener with multiple TLSRoutes attached, each specifying a different SNI

On the other hand, if you wanted to do TLS termination, you'd have the following options:

  1. Route based on HTTP attributes: HTTPRoute
  2. Send all traffic attached to a Listener to the same set of backends: HTTPRoute or TCPRoute

Writing that all out makes me continue to think that our <L7 route types may not be entirely necessary (x-ref the related doc).

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There is a third plausible option, you could do "One Listener with multiple TLSRoutes attached, each specifying a different SNI" but still use terminate. I mean hypothetically, I believe we say this isn't the semantics of the routes.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@howardjohn that's a good point, it's certainly possible with the API surface we currently have, do you know of any common use cases for that?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is good discussion, I have a question: In the case of encrypted L4 traffic, why users should use TCPRoute with TLS Terminate overTLSRoute? This is one of the main aspects I'm trying to capture with this GEP update. The assumption I'm making is: in case you need TLS, use either HTTPRoute or TLSRoute, depending on your needs and use-case.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So why do we need both TCPRoute and TLSRoute? Could TCPRoute just have optional TLS config? It's a bit of a sidebar, but the omission. Of TCPRoute here prompts the question I think

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I get your point, and it makes a lot of sense to me. Adding TCPRoute to the list of routes for which TLS with terminate is allowed:

Protocol Routes TLS Terminate TLS Passthough
HTTP HTTPRoute no no
HTTPS HTTPRoute yes no
GRPC GRPCRoute yes no
TLS TLSRoute yes yes
TCP TCPRoute yes no
UDP UDPRoute no no

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just catching up on this - @mlavacca's updated table in the previous comment LGTM, thanks for all the great discussion on this thread!

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yep, addressed in 358b483. Closing the thread

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @mlavacca! I ended up looking at the PR, forgetting the context and having to reread this thread to understand how we got to this conclusion. Do you mind adding some of this context/rationale in the PR?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep, I've added some context to the PR description.

Comment on lines 271 to 275
> [!NOTE]
> When the traffic is routed to the backend via `TCPRoute`, the packets
> are left untouched by the gateway. In order to terminate the TLS connection to
> the gateway and forward the traffic unencrypted to the backend, a `TLSRoute` configured
> with `Terminate` as TLS mode has to be used.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So why do we need both TCPRoute and TLSRoute? Could TCPRoute just have optional TLS config? It's a bit of a sidebar, but the omission. Of TCPRoute here prompts the question I think

@robscott
Copy link
Member

Thanks @mlavacca! LGTM other than my last comment.

@youngnick
Copy link
Contributor

This LGTM as well - although I think that we should be clear that none of the new things we've added are final until we have conformance tests to lock in the required behavior.

mlavacca and others added 5 commits March 27, 2025 14:33
Signed-off-by: Mattia Lavacca <[email protected]>
Signed-off-by: Mattia Lavacca <[email protected]>
Co-authored-by: Keith Mattix II <[email protected]>
Co-authored-by: Mike Morris <[email protected]>
The table related to protocol-supported routes-TLS mode has been
improved to address reviews' comments.

Signed-off-by: Mattia Lavacca <[email protected]>
Signed-off-by: Mattia Lavacca <[email protected]>
@mlavacca
Copy link
Member Author

mlavacca commented Mar 27, 2025

It took me some time, but I eventually managed to get back to this one and address the last comments. Please take another look.

@robscott @youngnick @howardjohn

@youngnick
Copy link
Contributor

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Mar 27, 2025
Copy link
Member

@shaneutt shaneutt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: howardjohn, mlavacca, shaneutt

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@shaneutt shaneutt removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Mar 27, 2025
@k8s-ci-robot k8s-ci-robot merged commit a33dd25 into kubernetes-sigs:main Mar 27, 2025
13 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/gep PRs related to Gateway Enhancement Proposal(GEP) lgtm "Looks good to me", indicates that a PR is ready to be merged. release-note-none Denotes a PR that doesn't merit a release note. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

9 participants