-
Notifications
You must be signed in to change notification settings - Fork 493
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GEP-2907: TLS mode and allowed routes #3190
Conversation
/cc @candita |
I have no idea why the CI robot has put this in hold 🤔 /unhold |
/hold |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: mlavacca The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
6fcc43f
to
4cfcb35
Compare
/retest |
Signed-off-by: Mattia Lavacca <[email protected]>
4cfcb35
to
cbff145
Compare
| `HTTPRoute` | yes | no | | ||
| `GRPCRoute` | yes | no | | ||
| `TLSRoute` | yes | yes | | ||
| `TCPRoute` | no | no | |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We might need a note here that for TCPRoute, the packets are passed through untouched to the backend. If you want to terminate a TLS stream at a Gateway and forward a TCP stream unencrypted to the backend, use TLSRoute.
@mlavacca: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
The Kubernetes project currently lacks enough active contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/reopen |
@mlavacca: Failed to re-open PR: state cannot be changed. The gep-2907-update branch was force-pushed or recreated. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/reopen |
@mlavacca: Failed to re-open PR: state cannot be changed. The gep-2907-update branch has been deleted. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/reopen |
@mlavacca: Failed to re-open PR: state cannot be changed. The gep-2907-update branch was force-pushed or recreated. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
What type of PR is this?
/kind gep
What this PR does / why we need it:
This PR updates GEP-2907 with two different aspects:
This PR intends to reach an agreement that will make #2111 and #1474 addressable.
Which issue(s) this PR fixes:
Fixes #
Does this PR introduce a user-facing change?: