-
Notifications
You must be signed in to change notification settings - Fork 490
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Insecure Connection Policy #51
Comments
#35 lays the ground work for per route TLS configuration. If "Insecure Connection Policy" is a route-level configuration, then this can be added as a field of |
This seems like a route level property since each application or route will want to control it. I do see value in having a Gateway-level property where one configures redirects for every request. |
/kind user-story |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle rotten |
In Contour, we've implemented this by having the 301 redirect from http->https if a cert is defined on the route. Then if someone needs to remove the redirect, we have a field to allow the route path to serve insecure. What's nice about this is by default most folks probably want the 301 redirect if they have a cert applied, but don't need more configuration. |
#713 covers this in some sense. |
Agree with that, feel free to reopen if there's a better more portable way to handle this. /close |
@robscott: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Created CloudArmor GKE ingress recipe
What would you like to be added:
The ability to enforce how insecure (http) connections are handled for a
xRoute
:InsecureConnections: “Redirect”
: Redirects http > https connections for anxRoute
.InsecureConnections: “None”
: Refuse http connections for anxRoute
.InsecureConnections: “Allow”
: Allows insecure connections for anxRoute
.Why is this needed:
As a cluster operator, I need the ability to enforce how insecure (i.e. http) connections are handled for an
xRoute
bound to a Gateway. For example, I have hostname "foo.example.com" hosted by service-apis that routes to a backend httpService
. TheGateway
exposes a secure and insecure listener. I want to ensure any attempt for "http://foo.example.com" is either allowed, disallowed or redirected to "https://foo.example.com".The text was updated successfully, but these errors were encountered: