Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
44 changes: 28 additions & 16 deletions apis/v1/gateway_types.go
Original file line number Diff line number Diff line change
Expand Up @@ -279,15 +279,6 @@ type GatewaySpec struct {
// +optional
Infrastructure *GatewayInfrastructure `json:"infrastructure,omitempty"`

// BackendTLS configures TLS settings for when this Gateway is connecting to
// backends with TLS.
//
// Support: Core
//
// +optional
// <gateway:experimental>
BackendTLS *GatewayBackendTLS `json:"backendTLS,omitempty"`

// AllowedListeners defines which ListenerSets can be attached to this Gateway.
// While this feature is experimental, the default value is to allow no ListenerSets.
//
Expand All @@ -296,7 +287,7 @@ type GatewaySpec struct {
// +optional
AllowedListeners *AllowedListeners `json:"allowedListeners,omitempty"`
//
// GatewayTLSConfig specifies frontend tls configuration for gateway.
// TLS specifies frontend and backend tls configuration for entire gateway.
//
// Support: Extended
//
Expand Down Expand Up @@ -525,8 +516,6 @@ type GatewayBackendTLS struct {
// ClientCertificateRef can reference to standard Kubernetes resources, i.e.
// Secret, or implementation-specific custom resources.
//
// This setting can be overridden on the service level by use of BackendTLSPolicy.
//
// Support: Core
//
// +optional
Expand Down Expand Up @@ -602,8 +591,31 @@ type ListenerTLSConfig struct {
Options map[AnnotationKey]AnnotationValue `json:"options,omitempty"`
}

// GatewayTLSConfig specifies frontend tls configuration for gateway.
// GatewayTLSConfig specifies frontend and backend tls configuration for gateway.
type GatewayTLSConfig struct {
// Backend describes TLS configuration for gateway when connecting
// to backends.
//
// Note that this contains only details for the Gateway as a TLS client,
// and does _not_ imply behavior about how to choose which backend should
// get a TLS connection. That is determined by the presence of a BackendTLSPolicy.
//
// Support: Core
//
// +optional
// <gateway:experimental>
Backend *GatewayBackendTLS `json:"backend,omitempty"`

// Frontend describes TLS config when client connects to Gateway.
// Support: Core
//
// +optional
// <gateway:experimental>
Frontend *FrontendTLSConfig `json:"frontend,omitempty"`
}

// FrontendTLSConfig specifies frontend tls configuration for gateway.
type FrontendTLSConfig struct {
// Default specifies the default client certificate validation configuration
// for all Listeners handling HTTPS traffic, unless a per-port configuration
// is defined.
Expand Down Expand Up @@ -653,17 +665,17 @@ const (
// within this Gateway. Currently, it stores only the client certificate validation
// configuration, but this may be extended in the future.
type TLSConfig struct {
// FrontendValidation holds configuration information for validating the frontend (client).
// Validation holds configuration information for validating the frontend (client).
// Setting this field will result in mutual authentication when connecting to the gateway.
// In browsers this may result in a dialog appearing
// that requests a user to specify the client certificate.
// The maximum depth of a certificate chain accepted in verification is Implementation specific.
//
// Support: Core
//
// +required
// +optional
// <gateway:experimental>
FrontendValidation FrontendTLSValidation `json:"frontendValidation"`
Validation *FrontendTLSValidation `json:"validation,omitempty"`
}

type TLSPortConfig struct {
Expand Down
50 changes: 37 additions & 13 deletions apis/v1/zz_generated.deepcopy.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

53 changes: 53 additions & 0 deletions applyconfiguration/apis/v1/frontendtlsconfig.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

9 changes: 0 additions & 9 deletions applyconfiguration/apis/v1/gatewayspec.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

27 changes: 11 additions & 16 deletions applyconfiguration/apis/v1/gatewaytlsconfig.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

10 changes: 5 additions & 5 deletions applyconfiguration/apis/v1/tlsconfig.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

35 changes: 20 additions & 15 deletions applyconfiguration/internal/internal.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 2 additions & 0 deletions applyconfiguration/utils.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading