Skip to content

Backport of [NET-5772] Make tcp external service registered on terminating gw reachable from peered cluster into release/1.18.x#20946

Merged
nathancoleman merged 5 commits intorelease/1.18.xfrom
backport/export-terminating-gw-service/gratefully-welcome-panther
Apr 3, 2024
Merged

Backport of [NET-5772] Make tcp external service registered on terminating gw reachable from peered cluster into release/1.18.x#20946
nathancoleman merged 5 commits intorelease/1.18.xfrom
backport/export-terminating-gw-service/gratefully-welcome-panther

Conversation

@hc-github-team-consul-core
Copy link
Collaborator

Backport

This PR is auto-generated from #19881 to be assessed for backporting due to the inclusion of the label backport/1.18.

The below text is copied from the body of the original PR.


Note

This is a followup to #18959 which fixed the same problem specifically when using http protocol.

Description

The terminating gateways needs to be able to handle TCP connections from peers which are not TLS-terminated at the local mesh gateway. This amounts to including the target SNI that downstreams from peers would use when building the TLS context for the terminating gateway.

Filter chain match before this change
filter_chain_match: {
  server_names: [
    "destination.default.dc2.internal.b81d6ee2-8454-768e-0a06-38a62620f76a.consul"
  ]
}
Filter chain match after this change
filter_chain_match: {
  server_names: [
    "destination.default.dc2.internal.b81d6ee2-8454-768e-0a06-38a62620f76a.consul",
    "destination.default.default.dc1.external.b81d6ee2-8454-768e-0a06-38a62620f76a.consul"
  ]
}

Testing & Reproduction steps

You can test this fix using the setup here, changing the <ServiceDefaults>.spec.protocol as necessary in resources/dc2/external-service.yaml if you want to see the behavior for http services as well.

You will need to pin a build of this branch as global.image in values-dc2.yaml. I would recommend doing an install without this build to witness things in their current broken state, and then doing a helm upgrade with global.image set.

Links

PR Checklist

  • updated test coverage
  • external facing docs updated
  • appropriate backport labels added
  • not a security concern

Overview of commits

@hc-github-team-consul-core hc-github-team-consul-core force-pushed the backport/export-terminating-gw-service/gratefully-welcome-panther branch from 59a284c to 2345bbe Compare April 3, 2024 16:38
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto approved Consul Bot automated PR

@github-actions github-actions bot added the theme/envoy/xds Related to Envoy support label Apr 3, 2024
@nathancoleman nathancoleman enabled auto-merge (squash) April 3, 2024 16:39
@vercel vercel bot temporarily deployed to Preview – consul April 3, 2024 16:44 Inactive
@nathancoleman nathancoleman merged commit 0e62661 into release/1.18.x Apr 3, 2024
@nathancoleman nathancoleman deleted the backport/export-terminating-gw-service/gratefully-welcome-panther branch April 3, 2024 16:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

theme/envoy/xds Related to Envoy support

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants