Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

tcpproxy: add tls passthrough #850

Merged

Conversation

glerchundi
Copy link
Contributor

@glerchundi glerchundi commented Jan 13, 2019

Allow an IngressRoute for TCP forwarding but without a tls section
which implicitly configures it as a TLS Passthrough. TLS Passthrough
only reads the very first TLS packets and routes the traffic without
doing any kind of TLS termination. The chosen virtualhost is
discovered by reading the TLS SNI (Server Name Indication) extension.

Closes #15

Signed-off-by: Gorka Lerchundi Osa glertxundi@gmail.com

Allow an IngressRoute for TCP forwarding but without a `tls` section
which implicitly configures it as a TLS Passthrough. TLS Passthrough
only reads the very first TLS packets and routes the traffic without
doing any kind of TLS termination. The chosen `virtualhost` is
discovered by reading the TLS SNI (Server Name Indication) extension.

Closes projectcontour#15

Signed-off-by: Gorka Lerchundi Osa <glertxundi@gmail.com>
@glerchundi
Copy link
Contributor Author

glerchundi commented Jan 13, 2019

PTAL @davecheney we tested it in our environment and it works should work as expected. This is the first of two MR we'll submit (the other will add support for delegation in TCP proxies).

Kudos to @igarciaolaizola for making most of the hard work by testing it empirically and fixing a subtle bug that prevented this from working before. 👏

@davecheney
Copy link
Contributor

@glerchundi thank you very much for working on this. I really appreciate you taking the lead and pushing for this change.

We (waves at heptio in general) are at an all hands this week, but I will try to find the time to review and merge this and your related PRs

@glerchundi
Copy link
Contributor Author

No hurries at all take your time as we're not blocked by this. Thanks!

@davecheney davecheney added this to the 0.9.0 milestone Jan 16, 2019
@davecheney davecheney merged commit a6996bb into projectcontour:master Jan 16, 2019
davecheney added a commit to davecheney/contour that referenced this pull request Jan 25, 2019
Updates projectcontour#850

TCP proxying requires one of a `tls.secretName` or `tls.passthrough` to
be present. The `tls.passthrough` option has no effect if
`spec.tcpproxy` is empty.
davecheney added a commit to davecheney/contour that referenced this pull request Jan 25, 2019
Updates projectcontour#850

TCP proxying requires one of a `tls.secretName` or `tls.passthrough` to
be present. The `tls.passthrough` option has no effect if
`spec.tcpproxy` is empty.

Signed-off-by: Dave Cheney <dave@cheney.net>
davecheney added a commit to davecheney/contour that referenced this pull request Jan 25, 2019
Updates projectcontour#850

TCP proxying requires one of a `tls.secretName` or `tls.passthrough` to
be present. The `tls.passthrough` option has no effect if
`spec.tcpproxy` is empty.

Signed-off-by: Dave Cheney <dave@cheney.net>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants