-
Notifications
You must be signed in to change notification settings - Fork 89
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support system-internal-tls in net-istio #1063
Comments
If all net-* plugins are going to support the TLS encryption for the path
|
(This may be off topic but) for the Kingress API addition, if we add the "SanName" field it would also help to solve knative/serving#12797 by using the SAN for each ingress like: (based on Feature Track document) type InternalTLS struct {
// SecretName is the name of the secret used to SSL traffic against upstream(backend).
// The secret should store the CA (root) cert to use SSL traffic.
SecretName string `json:"secretName,omitempty"`
// SanName is the name of SAN which s verified if at least one of SAN is matched.
// The field is array to store two SANs such as activator and queue-proxy.
SanName []string `json:"secretName,omitempty"`
} (I know we should use SNI but I think SNI solution is not possible...) |
This issue is stale because it has been open for 90 days with no |
/remove-lifecycle stale |
Larger description in the Feature Track document
Parent-issue: knative/serving#11906
Summary
net-istio should support calling activator / backends with a known CA key and subject name.
/kind feature-request
The text was updated successfully, but these errors were encountered: