-
Notifications
You must be signed in to change notification settings - Fork 52
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix DomainMappings when internal-encryption is enabled #878
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: KauzClay The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Codecov Report
@@ Coverage Diff @@
## main #878 +/- ##
==========================================
+ Coverage 93.89% 94.04% +0.15%
==========================================
Files 7 7
Lines 802 789 -13
==========================================
- Hits 753 742 -11
+ Misses 28 27 -1
+ Partials 21 20 -1
|
5556f33
to
516bc1b
Compare
/assign @dprotaso |
Right now the queue proxy will spin up two http servers (TLS & non-TLS) - but long term I don't think we should continue to spin up the non-TLS server when internal encryption is on. So I wonder if the right thing to do here is to make sure we start probing the TLS ports as a solution vs. continuing to probe on an unencrypted port 80 |
@dprotaso Maybe I misunderstood when I was poking at it, but the trouble I've run into is that when using a domain mapping, the service that gets probed is that top level service that points to the envoy. So if we update that service to have a 443 entry, then we also need the envoy to listen on 443. And then that starts creeping into the territory of adding TLS for internal routes. My cluster is all messed up right now, but once I fix it I'll try to get a better example of what I'm trying to say All that to say, I didn't know how to make a change do the right thing without spilling into a substantial change. And my goal for this PR was just to get the current broken implementation into a workable state. |
When internal TLS is turned on everything goes through the activator so I believe that would be the target of the probing. I believe TLS for internal routes should 'just work'
We do want all the hops encrypted though so that would included traffic from external proxy => internal proxy. I'm flexble on the path we take to get there so let me know what you think. |
Sorry the target of the probing = what responds to the probe
…On Tue, Mar 14, 2023 at 19:21 Dave Protasowski ***@***.***> wrote:
The service that gets probed is that top level service that points to the
envoy.
...
So if we update that service to have a 443 entry, then we also need the
envoy to listen on 443. And then that starts creeping into the territory of
adding TLS for internal routes.
When internal TLS is turned on everything goes through the activator so I
believe that would be the target of the probing. I believe TLS for internal
routes should 'just work'
And my goal for this PR was just to get the current broken implementation
into a workable state.
We do want all the hops encrypted though so that would included traffic
from external proxy => internal proxy. I'm flexble on the path we take to
get there so let me know what you think.
—
Reply to this email directly, view it on GitHub
<#878 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAAERARMZLR7LSJVS2OVLPTW4D4PTANCNFSM6AAAAAAVF5DOD4>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
|
516bc1b
to
410f567
Compare
* the K-Original-Host header doesn't get set on the endpoint probe, so the previous check would use h2 on port 80 for the probe
kinda left this one hanging, but, I think the work to add https to clusterLocal routes here (knative-extensions/net-certmanager#538) might help in this scenario. As that moves forward, I assume there will be net-* changes required too. I'll see if I can do the net-contour one, and maybe that will help move this one along. |
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
This Pull Request is stale because it has been open for 90 days with |
Changes
/kind bug
Fixes #862
Release Note
Docs