Skip to content

sds update for terminating gateway envoy config#23288

Merged
bharath-k1999 merged 12 commits intomainfrom
bharath/terminating-gateway-sds
Mar 27, 2026
Merged

sds update for terminating gateway envoy config#23288
bharath-k1999 merged 12 commits intomainfrom
bharath/terminating-gateway-sds

Conversation

@bharath-k1999
Copy link
Copy Markdown
Contributor

@bharath-k1999 bharath-k1999 commented Mar 2, 2026

Description

  1. Updated cluster upstream tls to utilise sds for dynamic updates
  2. Added a function to fetch secrets for terminating gateway

Testing & Reproduction steps

Links

PR Checklist

  • updated test coverage
  • external facing docs updated
  • appropriate backport labels added
  • not a security concern

PCI review checklist

  • I have documented a clear reason for, and description of, the change I am making.

  • If applicable, I've documented a plan to revert these changes if they require more than reverting the pull request.

  • If applicable, I've documented the impact of any changes to security controls.

    Examples of changes to security controls include using new access control methods, adding or removing logging pipelines, etc.

@bharath-k1999 bharath-k1999 requested review from a team as code owners March 2, 2026 08:50
@github-actions github-actions bot added the theme/envoy/xds Related to Envoy support label Mar 2, 2026
@bharath-k1999 bharath-k1999 requested a review from a team as a code owner March 11, 2026 07:37
with the same [name](/consul/commands/connect/envoy#service) provides additional fault tolerance
as well as the ability to perform rolling restarts.

-> **Kubernetes only**: On Kubernetes, you can specify the [`secretRef`](/consul/docs/reference/config-entry/terminating-gateway#secretref)
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

moved doc update here
hashicorp/web-unified-docs#2077

If none of these are provided, Consul will **only** encrypt connections to the gateway and not
from the gateway to the destination service.

-> **Kubernetes only**: On Kubernetes, you can use the `secretRef` field along with the file path fields (`caFile`, `certFile`, `keyFile`) to enable
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

moved doc update here
hashicorp/web-unified-docs#2077

@bharath-k1999 bharath-k1999 added backport/ent/1.22 Changes are backported to 1.22 ent and removed backport/ent/1.22 Changes are backported to 1.22 ent labels Mar 27, 2026
@bharath-k1999 bharath-k1999 enabled auto-merge (squash) March 27, 2026 17:25
@bharath-k1999 bharath-k1999 merged commit 94183d7 into main Mar 27, 2026
132 of 135 checks passed
rishabh-gupta-hashicorp pushed a commit that referenced this pull request Mar 31, 2026
* sds update for terminating gateway envoy config

* updated test cases and sni matcher logic

* update golden testdata with latest expected changes

* update terminating gateway testdata for lamba

* add changelog

* docs: add secretRef documentation for terminating gateway SDS support
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

theme/envoy/xds Related to Envoy support

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants