Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

All Hops Encrypted: alpha Kourier support for encrypted backends #750

Closed
evankanderson opened this issue Jan 13, 2022 · 1 comment · Fixed by #761
Closed

All Hops Encrypted: alpha Kourier support for encrypted backends #750

evankanderson opened this issue Jan 13, 2022 · 1 comment · Fixed by #761
Assignees
Milestone

Comments

@evankanderson
Copy link
Contributor

Larger description in the Feature Track document

Summary:

Kourier should support calling activator / backends with a known CA key and subject name (provided by the cluster administrator in config-network for the All Hops Encrypted alpha).

Expected config-network keys:

  • activator-ca -- contains the CA public certificate used to sign the activator TLS certificate
  • activator-name -- contains the SAN (Subject Alt Name) used to validate the activator TLS certificate

This probably involves extending the Cluster configuration with an UpstreamTlsContext and CommonTlsContext, and possibly implementing SDS for these certificates.

/kind feature-request

@evankanderson
Copy link
Contributor Author

@nak3 nak3 self-assigned this Jan 19, 2022
knative-prow-robot pushed a commit to knative/networking that referenced this issue Feb 8, 2022
* Add `activator-ca` and `activator-name` keys in `config-network`

This pach adds `activator-ca` and `activator-name` keys in `config-network`.

Part of knative-extensions/net-kourier#750
knative-extensions/net-kourier#761 demonstrates how it works.

* Rename activator-name to activator-san
knative-prow-robot pushed a commit to knative/networking that referenced this issue Mar 2, 2022
This pach supports TLS server on each test image.
It needs to verify if Ingress surely connects to the backend with TLS.

The usage is as follows:

1. Create server certificate with the name `server-certs` in `serving-tests` namespace.

  ```shell
  $ kubectl create -n serving-tests secret tls server-certs \
      --key=tls.key --cert=tls.crt
  ```

1. Set env variable `UPSTREAM_TLS_CERT=server-certs` and run the tests.

  ```shell
  $ export UPSTREAM_TLS_CERT=server-certs
  $ go test -race -count=1 -tags=e2e ./test/conformance/ -run "TestIngressConformance/basic"
  ```

1. The backend test server starts running with TLS.

  ```shell
  $ kubectl -n serving-tests logs ingress-conformance-basics-tfpnykaw
  2022/01/27 11:54:14 Server starting on port with TLS 8047
    ...
  ```

Part of knative-extensions/net-kourier#750
knative-extensions/net-kourier#761 demonstrates how it works.
@nak3 nak3 added this to the v1.4.0 milestone Mar 3, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants