You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add new BackendTLSPolicy configuration options to documentation:
- Gateway backendTLS field
- subjectAltNames field
- options field
The documentation includes descriptions of each new field along with
their purpose, usage constraints and reference links.
Copy file name to clipboardExpand all lines: site-src/api-types/backendtlspolicy.md
+45-2Lines changed: 45 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,6 +28,17 @@ to prevent the complications involved with sharing trust across namespace bounda
28
28
29
29
All Gateway API Routes that point to a referenced Service should respect a configured BackendTLSPolicy.
30
30
31
+
## Gateway Backend TLS Configuration
32
+
33
+
??? example "Experimental Channel since v1.1.0"
34
+
35
+
These fields were added to Gateway in `v1.1.0`
36
+
The Gateway specification now includes a new backendTLS field that allows configuration of TLS settings when the Gateway connects to backends. This provides a default configuration for all backend Services. It is important to note that if a BackendTLSPolicy is attached to a specific Service, it will override the backendTLS configuration on the Gateway.
37
+
This functionality enables the specification of client certificates that the Gateway should use when establishing TLS connections with backends.
38
+
The backendTLS configuration consists of a single field:
39
+
40
+
-[ClientCertificateRef][clientCertificateRef] - References an object containing a Client Certificate and its associated private key
41
+
31
42
## Spec
32
43
33
44
The specification of a [BackendTLSPolicy][backendtlspolicy] consists of:
@@ -36,19 +47,21 @@ The specification of a [BackendTLSPolicy][backendtlspolicy] consists of:
36
47
-[Validation][validation] - Defines the configuration for TLS, including hostname, CACertificateRefs, and
37
48
WellKnownCACertificates.
38
49
-[Hostname][hostname] - Defines the Server Name Indication (SNI) that the Gateway uses to connect to the backend.
50
+
-[SubjectAltNames][subjectAltNames] - Specifies one or more Subject Alternative Names that the backend certificate must match. When specified, the certificate must have at least one matching SAN. This field enables separation between SNI (hostname) and certificate identity validation. A maximum of 5 SANs are allowed.
39
51
-[CACertificateRefs][caCertificateRefs] - Defines one or more references to objects that contain PEM-encoded TLS certificates,
40
52
which are used to establish a TLS handshake between the Gateway and backend Pod. Either CACertificateRefs or
41
53
WellKnownCACertificates may be specified, but not both.
42
54
-[WellKnownCACertificates][wellKnownCACertificates] - Specifies whether system CA certificates may be used in the TLS
43
55
handshake between the Gateway and backend Pod. Either CACertificateRefs or WellKnownCACertificates may be specified, but not both.
56
+
-[Options][options] - A map of key/value pairs enabling extended TLS configuration for implementations that choose to provide support. Check your implementation's documentation for details.
44
57
45
58
The following chart outlines the object definitions and relationship:
This field was added to BackendTLSPolicy in `v1.2.0`
132
+
The subjectAltNames field enables basic mutual TLS configuration between Gateways and backends, as well as the optional use of SPIFFE. When subjectAltNames is specified, the certificate served by the backend must have at least one Subject Alternative Name matching one of the specified values. This is particularly useful for SPIFFE implementations where URI-based SANs may not be valid SNIs.
133
+
Subject Alternative Names may contain one of either a Hostname or URI field, and must contain a Type specifying whether Hostname or URI is chosen.
134
+
135
+
!!! info "Restrictions"
136
+
137
+
- IP addresses and wildcard hostnames are not allowed. (see the description for Hostname above for more details).
138
+
- Hostname: DNS name format
139
+
- URI: URI format (e.g., SPIFFE ID)
140
+
141
+
#### TLS Options
142
+
143
+
??? example "Experimental Channel since v1.2.0"
144
+
145
+
This field was added to BackendTLSPolicy in `v1.2.0`
146
+
The options field allows specification of implementation-specific TLS configurations. This can include:
0 commit comments