-
Notifications
You must be signed in to change notification settings - Fork 47
support wireguard encryption #654
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
|
@hown3d: The label(s) In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
Hi @hown3d. Thanks for your PR. I'm waiting for a github.com member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/cc @modzilla99 |
|
@hown3d: GitHub didn't allow me to request PR reviews from the following users: modzilla99. Note that only gardener members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
f750bbc to
9b0d278
Compare
|
/kind enhancement |
|
/ok-to-test |
|
/test pull-extension-networking-cilium-e2e-kind |
9b0d278 to
e549882
Compare
e549882 to
78692f5
Compare
|
/test pull-extension-networking-cilium-e2e-kind |
78692f5 to
de5a436
Compare
| {{- end }} | ||
|
|
||
| {{- if .Values.global.encryption.enabled }} | ||
| {{- if eq .Values.global.encryption.mode "ipsec" }} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we really include ipsec? Did you test it?
Last time I tested, I didn't get it to work in a real cluster. Though, I didn't spend time to debug.
At least, we should document, how to create the required secret.
I would prefer, to omit the ipsec part for now.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would agree to take smaller steps and only add wg for now. Also I could not find a test for ipsec in this PR.
|
@hown3d Could you add a small section to the usage docs? |
| # keys | ||
| secretName: cilium-ipsec-keys | ||
| # Encryption method. Can be either ipsec or wireguard. | ||
| mode: ipsec |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You're adding ipsec mode encryption as an option but I can't find a test for it. Please add an e2e test for the ipsec option or drop it and keep only wireguard.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I will remove the IPsec mode from the NetworkConfig API. All of these helm chart things for IPsec were already in place, however never usable from the outside.
We can add the mode to the NetworkConfig later on
| }) | ||
| }, | ||
| Entry("default config", "default", defaultOverlayCiliumConfig()), | ||
| Entry("wireguard config", "wg", wireguardCiliumConfig()), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ipsec option missing
test/e2e/network_test.go
Outdated
| }) | ||
| }, | ||
| Entry("default config", "default", defaultOverlayCiliumConfig()), | ||
| Entry("wireguard config", "wg", wireguardCiliumConfig()), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ipsec option missing
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
IPsec mode was never tested before, so I didn't add it to the E2E tests in this PR.
We can definitely add it in a follow up.
de5a436 to
633fc6e
Compare
Signed-off-by: Lukas Hoehl <[email protected]>
Signed-off-by: Lukas Hoehl <[email protected]>
Signed-off-by: Lukas Hoehl <[email protected]>
e6276f9 to
5388e4f
Compare
Signed-off-by: Lukas Hoehl <[email protected]>
Signed-off-by: Lukas Hoehl <[email protected]>
Signed-off-by: Lukas Hoehl <[email protected]>
5388e4f to
67fb035
Compare
How to categorize this PR?
/area networking
/kind enhancement
What this PR does / why we need it:
Adds support for Cilium's wireguard encryption mode
Which issue(s) this PR fixes:
Fixes #
Special notes for your reviewer:
Release note: