Skip to content

Conversation

@hown3d
Copy link
Contributor

@hown3d hown3d commented Nov 5, 2025

How to categorize this PR?

/area networking
/kind enhancement

What this PR does / why we need it:
Adds support for Cilium's wireguard encryption mode

Which issue(s) this PR fixes:
Fixes #

Special notes for your reviewer:

Release note:

Allow configuration of Cilium's wireguard encryption

@gardener-prow gardener-prow bot added do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. area/networking Networking related labels Nov 5, 2025
@gardener-prow
Copy link

gardener-prow bot commented Nov 5, 2025

@hown3d: The label(s) kind/todo cannot be applied, because the repository doesn't have them.

In response to this:

How to categorize this PR?

/area networking
/kind TODO

What this PR does / why we need it:

Which issue(s) this PR fixes:
Fixes #

Special notes for your reviewer:

Release note:


Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@gardener-prow gardener-prow bot added the do-not-merge/needs-kind Indicates a PR lacks a `kind/foo` label and requires one. label Nov 5, 2025
@gardener-prow
Copy link

gardener-prow bot commented Nov 5, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign domdom82 for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@gardener-prow gardener-prow bot added cla: yes Indicates the PR's author has signed the cla-assistant.io CLA. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Nov 5, 2025
@gardener-prow
Copy link

gardener-prow bot commented Nov 5, 2025

Hi @hown3d. Thanks for your PR.

I'm waiting for a github.com member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@gardener-prow gardener-prow bot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Nov 5, 2025
@hown3d
Copy link
Contributor Author

hown3d commented Nov 5, 2025

/cc @modzilla99

@gardener-prow
Copy link

gardener-prow bot commented Nov 5, 2025

@hown3d: GitHub didn't allow me to request PR reviews from the following users: modzilla99.

Note that only gardener members and repo collaborators can review this PR, and authors cannot review their own PRs.

In response to this:

/cc @modzilla99

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@hown3d hown3d force-pushed the wireguard-encryption branch 2 times, most recently from f750bbc to 9b0d278 Compare November 7, 2025 10:45
@hown3d hown3d changed the title feat: support wireguard encryption support wireguard encryption Nov 7, 2025
@hown3d hown3d marked this pull request as ready for review November 7, 2025 10:45
@hown3d hown3d requested a review from a team as a code owner November 7, 2025 10:45
@gardener-prow gardener-prow bot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Nov 7, 2025
@hown3d
Copy link
Contributor Author

hown3d commented Nov 7, 2025

/kind enhancement

@gardener-prow gardener-prow bot added kind/enhancement Enhancement, improvement, extension and removed do-not-merge/needs-kind Indicates a PR lacks a `kind/foo` label and requires one. labels Nov 7, 2025
@axel7born
Copy link
Contributor

/ok-to-test

@gardener-prow gardener-prow bot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Nov 12, 2025
@axel7born
Copy link
Contributor

/test pull-extension-networking-cilium-e2e-kind

@hown3d hown3d force-pushed the wireguard-encryption branch from 9b0d278 to e549882 Compare November 12, 2025 15:18
@gardener-prow gardener-prow bot added size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. and removed size/L Denotes a PR that changes 100-499 lines, ignoring generated files. labels Nov 12, 2025
@hown3d hown3d force-pushed the wireguard-encryption branch from e549882 to 78692f5 Compare November 13, 2025 11:14
@gardener-prow gardener-prow bot removed the cla: yes Indicates the PR's author has signed the cla-assistant.io CLA. label Nov 13, 2025
@gardener-prow gardener-prow bot added cla: no Indicates the PR's author has not signed the cla-assistant.io CLA. cla: yes Indicates the PR's author has signed the cla-assistant.io CLA. and removed cla: no Indicates the PR's author has not signed the cla-assistant.io CLA. labels Nov 13, 2025
@axel7born
Copy link
Contributor

/test pull-extension-networking-cilium-e2e-kind

@hown3d hown3d force-pushed the wireguard-encryption branch from 78692f5 to de5a436 Compare November 18, 2025 15:58
{{- end }}

{{- if .Values.global.encryption.enabled }}
{{- if eq .Values.global.encryption.mode "ipsec" }}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we really include ipsec? Did you test it?
Last time I tested, I didn't get it to work in a real cluster. Though, I didn't spend time to debug.
At least, we should document, how to create the required secret.
I would prefer, to omit the ipsec part for now.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would agree to take smaller steps and only add wg for now. Also I could not find a test for ipsec in this PR.

@axel7born
Copy link
Contributor

@hown3d Could you add a small section to the usage docs?

# keys
secretName: cilium-ipsec-keys
# Encryption method. Can be either ipsec or wireguard.
mode: ipsec
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You're adding ipsec mode encryption as an option but I can't find a test for it. Please add an e2e test for the ipsec option or drop it and keep only wireguard.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I will remove the IPsec mode from the NetworkConfig API. All of these helm chart things for IPsec were already in place, however never usable from the outside.
We can add the mode to the NetworkConfig later on

})
},
Entry("default config", "default", defaultOverlayCiliumConfig()),
Entry("wireguard config", "wg", wireguardCiliumConfig()),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ipsec option missing

})
},
Entry("default config", "default", defaultOverlayCiliumConfig()),
Entry("wireguard config", "wg", wireguardCiliumConfig()),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ipsec option missing

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

IPsec mode was never tested before, so I didn't add it to the E2E tests in this PR.
We can definitely add it in a follow up.

@hown3d hown3d force-pushed the wireguard-encryption branch from de5a436 to 633fc6e Compare November 20, 2025 11:11
Lukas Hoehl and others added 3 commits November 20, 2025 16:04
Signed-off-by: Lukas Hoehl <[email protected]>
Signed-off-by: Lukas Hoehl <[email protected]>
@hown3d hown3d force-pushed the wireguard-encryption branch 2 times, most recently from e6276f9 to 5388e4f Compare November 20, 2025 17:35
Signed-off-by: Lukas Hoehl <[email protected]>
Signed-off-by: Lukas Hoehl <[email protected]>
Signed-off-by: Lukas Hoehl <[email protected]>
@hown3d hown3d force-pushed the wireguard-encryption branch from 5388e4f to 67fb035 Compare November 21, 2025 10:25
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/networking Networking related cla: yes Indicates the PR's author has signed the cla-assistant.io CLA. kind/enhancement Enhancement, improvement, extension ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/XL Denotes a PR that changes 500-999 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants