You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Simply using port 443 doesn't transform the listener to a TLS enabled listener. You need to add a TLS section at the very least:
apiVersion: gateway.networking.k8s.io/v1kind: Gatewaymetadata:
name: envoy-publicnamespace: envoy-publicspec:
gatewayClassName: envoy-publiclisteners:
- name: httpprotocol: HTTPport: 80allowedRoutes:
namespaces:
from: All
- name: httpsprotocol: HTTPS # The protocol needs to be HTTPS and not HTTPport: 443allowedRoutes:
namespaces:
from: Alltls: # This section is missing in the configuration files you listed abovecertificateRefs: # The place where the server X.509 certificate can be found
- group: ""kind: Secretname: example-certmode: Terminate
Since TLS is not configured for any of the listeners, limiting the supported TLS version to 1.3 in a ClientTrafficPolicy doesn't really make any sense here.
Looking at the listener configuration, none of those listeners are configured to use TLS.
Your gateway is defined like this:
Simply using port 443 doesn't transform the listener to a TLS enabled listener. You need to add a TLS section at the very least:
Since TLS is not configured for any of the listeners, limiting the supported TLS version to 1.3 in a
ClientTrafficPolicy
doesn't really make any sense here.Originally posted by @liorokman in #3060 (comment)
The text was updated successfully, but these errors were encountered: