You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Current implementations of the API are skipping CA validation by the client (the gateway) to the EPP. This does not meaningful security layer as there is no validation.
+1 on leveraging BackendTLSPolicy for this use case, especially since we want to stabilize the existing APIs. However,the BackendTLSPolicy GEP will need to be updated to no longer be Service-specific.
What happened:
We currently default to self signed certificate.
Current implementations of the API are skipping CA validation by the client (the gateway) to the EPP. This does not meaningful security layer as there is no validation.
For example:
gateway-api-inference-extension/config/manifests/gateway/patch_policy.yaml
Lines 38 to 50 in b7d35b6
https://github.com/kgateway-dev/kgateway/blob/main/internal/kgateway/extensions2/plugins/inferenceextension/endpointpicker/plugin.go#L414-L429
In istio, we have to add DestiationRule with insecureSkipVerify which does the same.
What you expected to happen:
There should be TLS validation, perhaps using backendTLSPolicy?
/kind feature
The text was updated successfully, but these errors were encountered: