-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support encrypted traffic between ingress and queue-proxy #12797
Comments
This issue is stale because it has been open for 90 days with no |
This is possible to support if we sign the server certs in activator and queue-proxy by the same CA and SAN. However, it is better to support different SAN or CA for the server certs on each namespace, which means the support of the encrypted traffic between ingress and queue-proxy is very difficult. |
This issue is stale because it has been open for 90 days with no |
/remove-lifecycle stale |
This issue is stale because it has been open for 90 days with no |
/remove-lifecycle stale |
Just linking to the discussion #13005 (comment) This is achievable with the current same CA and same SAN but we should try SNI. |
With the latest discussion, we'll focus on doing the multi-SAN approach for Istio + Kourier and let activator stay in path for contour + gw-api as long as they do not support the multi-SAN approach. So no need for SNI in activator for now. /close |
@ReToCode: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
As described in the feature docs:
the alpha release does not support the encrypted traffic between ingress and queue-proxy but it is a temporary state and we should support it.
The text was updated successfully, but these errors were encountered: