Skip to content

feat(api): add insecureSkipVerify flag to Backend TLS settigns#6222

Merged
arkodg merged 1 commit intoenvoyproxy:mainfrom
AlexKrudu:api-tls-disable
Jun 3, 2025
Merged

feat(api): add insecureSkipVerify flag to Backend TLS settigns#6222
arkodg merged 1 commit intoenvoyproxy:mainfrom
AlexKrudu:api-tls-disable

Conversation

@AlexKrudu
Copy link
Contributor

@AlexKrudu AlexKrudu commented May 29, 2025

feat(api): add insecureSkipVerify flag to Backend TLS settigns

What this PR does / why we need it:

provides an opportunity for skipping upstream certificate validation

Fixes #4595

Decided to add the flag to Backend.BackendSpec.TLS instead of EnvoyProxySpec.BackendTLSConfig because chosen option provides better granularity – there may be cases where the user wants to disable validation selectively (skip validation only for some of Backends, not for all of them). Also, certificate validation settings within Envoy are already at a level equivalent to the Backend (the setting in Envoy is at the Cluster level, and in EG Backend, after transformations, it maps to the Cluster).

Release Notes: Yes/No

@AlexKrudu AlexKrudu requested a review from a team as a code owner May 29, 2025 12:26
Signed-off-by: a.krudu <a.krudu@tbank.ru>
@codecov
Copy link

codecov bot commented May 29, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 70.46%. Comparing base (845b36b) to head (6cfdc23).
Report is 10 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #6222      +/-   ##
==========================================
- Coverage   70.46%   70.46%   -0.01%     
==========================================
  Files         220      220              
  Lines       36593    36607      +14     
==========================================
+ Hits        25787    25794       +7     
- Misses       9281     9287       +6     
- Partials     1525     1526       +1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@AlexKrudu
Copy link
Contributor Author

/retest

1 similar comment
@AlexKrudu
Copy link
Contributor Author

/retest

// +kubebuilder:default=false
// +optional
// +notImplementedHide
InsecureSkipVerify *bool `json:"insecureSkipVerify,omitempty"`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

im not a fan of this term, but its an industry wide term

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@envoyproxy/gateway-maintainers thoughts on insecureSkipVerify vs skipValidation ?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1 insecureSkipVerfiy

arkodg
arkodg previously approved these changes May 29, 2025
Copy link
Contributor

@arkodg arkodg left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM thanks !

@arkodg arkodg requested review from a team May 29, 2025 23:59
@AlexKrudu
Copy link
Contributor Author

I messed up - pushed implementation in the same branch and rolled it back

@AlexKrudu
Copy link
Contributor Author

/retest

// must be specified with at least one entry for a valid configuration. Only one of
// CACertificateRefs or WellKnownCACertificates may be specified, not both.
//
// Only used for DynamicResolver backends.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I dont think will work, we'll need to enable this TLS section for all backend, lets raise a GH issue to track it

@arkodg arkodg merged commit 5b857da into envoyproxy:main Jun 3, 2025
101 of 108 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

TLS Backend cert validation types

4 participants