How I encountered the problem: While I am running pipeline, I am not able to authenticate as the above annotations or not handled properly in my Gateway or HTTPRoute
Hi @rajasekhar.yannam , thanks so much for your interest in our project!
Here’s how these annotations map to NGF with Gateway API:
auth-tls-secret + auth-tls-verify-client These are addressed by FrontendTLSValidation, which is coming in the next NGF release. You’ll configure this on your Gateway listener:
auth-tls-match-cn Gateway API has no native concept of filtering by client certificate CN. One approach is to propagate the cert subject as a request header using RequestHeaderModifier and have your backend perform the CN check. Support for NGINX variables in RequestHeaderModifier is also coming in the next release, so you’ll be able to do:
However - Note that auth-tls-match-cn enforces CN validation at the gateway, returning 403 before the request reaches your backend. The RequestHeaderModifier approach shifts that enforcement to the backend and so it is not an equivalent replacement if you require the gateway to be the enforcement point. If this is important for your use case, please let us know by opening an issue!
auth-tls-verify-depth There is currently no equivalent for this in Gateway API or NGF. As above, if this is important for your use case, please let us know by opening an issue!
proxy-body-size This is supported today via ProxySettingsPolicy. See the proxy settings documentation for configuration details.
Hi @Ciara , Thank you for prompt response. I will definitely verify the given solutions. Meanwhile, Could you please let me know when can we expect the next release, So u am eager to apply these changes.