-
Notifications
You must be signed in to change notification settings - Fork 83
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
All Hops Encrypted: alpha Kourier support for encrypted backends #750
Comments
6 tasks
Ref https://github.com/nak3/net-kourier/pull/11 for a prototype |
This was referenced Jan 26, 2022
knative-prow-robot
pushed a commit
to knative/networking
that referenced
this issue
Feb 8, 2022
* Add `activator-ca` and `activator-name` keys in `config-network` This pach adds `activator-ca` and `activator-name` keys in `config-network`. Part of knative-extensions/net-kourier#750 knative-extensions/net-kourier#761 demonstrates how it works. * Rename activator-name to activator-san
knative-prow-robot
pushed a commit
to knative/networking
that referenced
this issue
Mar 2, 2022
This pach supports TLS server on each test image. It needs to verify if Ingress surely connects to the backend with TLS. The usage is as follows: 1. Create server certificate with the name `server-certs` in `serving-tests` namespace. ```shell $ kubectl create -n serving-tests secret tls server-certs \ --key=tls.key --cert=tls.crt ``` 1. Set env variable `UPSTREAM_TLS_CERT=server-certs` and run the tests. ```shell $ export UPSTREAM_TLS_CERT=server-certs $ go test -race -count=1 -tags=e2e ./test/conformance/ -run "TestIngressConformance/basic" ``` 1. The backend test server starts running with TLS. ```shell $ kubectl -n serving-tests logs ingress-conformance-basics-tfpnykaw 2022/01/27 11:54:14 Server starting on port with TLS 8047 ... ``` Part of knative-extensions/net-kourier#750 knative-extensions/net-kourier#761 demonstrates how it works.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Larger description in the Feature Track document
Summary:
Kourier should support calling activator / backends with a known CA key and subject name (provided by the cluster administrator in
config-network
for the All Hops Encrypted alpha).Expected
config-network
keys:activator-ca
-- contains the CA public certificate used to sign the activator TLS certificateactivator-name
-- contains the SAN (Subject Alt Name) used to validate the activator TLS certificateThis probably involves extending the
Cluster
configuration with anUpstreamTlsContext
andCommonTlsContext
, and possibly implementing SDS for these certificates./kind feature-request
The text was updated successfully, but these errors were encountered: