Skip to content

Conversation

rudrakhp
Copy link
Member

What type of PR is this?

api: support configuring crls in client traffic policies

Which issue(s) this PR fixes:

Ref #3021

Release Notes: No

@rudrakhp rudrakhp requested a review from a team as a code owner September 14, 2025 10:22
Copy link

codecov bot commented Sep 14, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 71.10%. Comparing base (7375ef0) to head (3747c2f).
⚠️ Report is 15 commits behind head on main.

Additional details and impacted files
@@           Coverage Diff           @@
##             main    #6955   +/-   ##
=======================================
  Coverage   71.09%   71.10%           
=======================================
  Files         227      227           
  Lines       40582    40582           
=======================================
+ Hits        28851    28854    +3     
+ Misses      10041    10035    -6     
- Partials     1690     1693    +3     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@rudrakhp rudrakhp force-pushed the api_ctp_crl branch 2 times, most recently from f225537 to 3f29b52 Compare September 14, 2025 11:23
// Expects the content in a key named `crl.pem`.
//
// References to a resource in different namespace are invalid UNLESS there
// is a ReferenceGrant in the target namespace that allows the crl
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thoughts on

crl:
  refs:
 - <>
  onlyVerifyLeafCertificate:

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

wdyt @envoyproxy/gateway-maintainers

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds good 👍

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should this be

  1. Refs
  2. References
  3. CertificateReferences ?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  1. crl.refs[] should be explicit enough IMO.
  2. crl.references[] is more verbose and doesn't align with other APIs.
  3. Not sure about crl.certificateReferences[] as CRL itself is a list of certificates, so technically each certificateReferences[i] can be a list of certificates, might be technically inaccurate. Is this commonly used anywhere else?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1 with 1


// A reference to a Kubernetes ConfigMap or a Kubernetes Secret,
// containing the certificate revocation list in PEM format
// Expects the content in a key named `crl.pem`.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is crl.pem the most commonly used key in the ecosystem ?

Copy link

@crinjes crinjes Sep 25, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's a mix between crl.pem and ca.crl. Both the Kubernetes project and nginx as well as HAProxy use ca.crl in their controllers, Contour and Ambassador use crl.pem, for example.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Checked Istio as well, changing it to ca.crl since most recent projects seem to be using the same.

@rudrakhp rudrakhp requested review from a team and arkodg September 27, 2025 07:31
Copy link
Contributor

@arkodg arkodg left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM thanks !

@arkodg arkodg requested review from a team October 3, 2025 20:19
// Crl specifies the crl configuration that can be used to validate the client initiating the TLS connection
// +optional
// +notImplementedHide
Crl *CrlContext `json:"crl,omitempty"`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is CRL well known enough ? does most of the ecosystem use this acronym or should we use the long form here ?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

During the sync I mentioned a preference for a longer name but I think that's wrong. NGINX, HAProxy, and other load balancers all use the abbreviated crl so this should be fine.

@jukie
Copy link
Contributor

jukie commented Oct 8, 2025

/retest

@rudrakhp rudrakhp merged commit 197fd10 into envoyproxy:main Oct 8, 2025
56 of 58 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants