Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

initial TLSRoute support #10601

Open
wants to merge 47 commits into
base: main
Choose a base branch
from
Open

initial TLSRoute support #10601

wants to merge 47 commits into from

Conversation

puertomontt
Copy link

@puertomontt puertomontt commented Feb 8, 2025

Description

Adds initial support for TLSRoutes. TLSRoutes are similar to TCPRoutes, but the distinction between them is that TLSRoutes allows routing decisions by SNI. See docs.

This PR adds support for TLS Passthrough on a TLS listener using a TLSRoute.

API changes

Code changes

CI changes

Docs changes

Context

Interesting decisions

Testing steps

Notes for reviewers

This PR doesn't add TLS support for TCPRoutes (kgateway-dev#10621)

Checklist:

  • I have performed a self-review of my own code
  • I have commented my code, particularly in hard-to-understand areas
  • I have made corresponding changes to the documentation
  • I have added tests that prove my fix is effective or that my feature works

@puertomontt
Copy link
Author

/kick-ci

@puertomontt puertomontt changed the title Puertomontt/tls route initial TLSRoute support Feb 13, 2025
@@ -248,6 +248,16 @@ func (p *plugin) computeTcpFilterChain(
}, nil
}

// needed to handle passthrough
if sslConfig.GetSslSecrets() == nil && len(sslConfig.GetSniDomains()) != 0 {
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

in the case of passthrough, we don't have ssl secrets, only sni domain.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: Call len(sslConfig.GetSniDomains() once and store the results in a var. Then you can use the var here and in L256.

@puertomontt puertomontt marked this pull request as ready for review February 13, 2025 15:37
Copy link

github-actions bot commented Feb 13, 2025

Visit the preview URL for this PR (updated for commit fb523b5):

https://gloo-edge--pr10601-puertomontt-tls-rout-e8bxf1cb.web.app

(expires Sun, 02 Mar 2025 13:31:07 GMT)

🔥 via Firebase Hosting GitHub Action 🌎

Sign: 77c2b86e287749579b7ff9cadb81e099042ef677

@@ -128,6 +128,8 @@ func (r *gatewayQueries) GetRouteChain(
case *gwv1a2.TCPRoute:
backends = r.resolveRouteBackends(ctx, typedRoute)
// TODO (danehans): Should TCPRoute delegation support be added in the future?
case *gwv1a2.TLSRoute:

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@puertomontt can you create an issue to rename projects/gateway2/query/httproute.go to projects/gateway2/query/route.go and link to this PR?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@@ -813,6 +813,35 @@ var _ = Describe("Query", func() {
Expect(err).To(MatchError(query.ErrMissingReferenceGrant))
Expect(backend).To(BeNil())
})

It("should match TLSRoutes for Listener", func() {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please add more test cases (see TCPRoute). Disregard the RefGrant test cases if this PR does not support TLSRoute RefGrants. Ensure one of the test cases includes a Gateway with multiple listeners with different protocols and hostnames to ensure the listener selection logic is correct.

@@ -248,6 +248,16 @@ func (p *plugin) computeTcpFilterChain(
}, nil
}

// needed to handle passthrough
if sslConfig.GetSslSecrets() == nil && len(sslConfig.GetSniDomains()) != 0 {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: Call len(sslConfig.GetSniDomains() once and store the results in a var. Then you can use the var here and in L256.

@solo-changelog-bot
Copy link

Issues linked to changelog:
kgateway-dev#10074


// Assert expected responses
for i, port := range tc.ports {
if tc.name == crossNsNoRefGrantTestName {
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
if tc.name == crossNsNoRefGrantTestName {
if tc.expectedErrorCode != 0 {

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants