Skip to content

Commit f92a68f

Browse files
authored
Clarify frontend/backend wording in GEP-91. (#3571)
The intention is to imply frontend/backend configuration are orthogonal, not mutex. Signed-off-by: Harvey Tuch <[email protected]>
1 parent a6ea2c4 commit f92a68f

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

geps/gep-91/index.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,9 @@ This table highlights the support. Please feel free to add any missing implement
3737

3838
* Introduce a `FrontendValidation` field of type `FrontendTLSValidation` within [GatewayTLSConfig][] that can be used to validate the peer (frontend) with which the TLS connection is being made.
3939
* Introduce a `caCertificateRefs` field within `FrontendTLSValidation` that can be used to specify a list of CA Certificates that can be used as a trust anchor to validate the certificates presented by the client.
40-
* This new field is mutually exclusive with the [BackendTLSPolicy][] configuation which is used to validate the TLS certificate presented by the backend peer on the connection between the Gateway and the backend, and this GEP is adding support for validating the TLS certificate presented by the frontend client on the connection between the Gateway and the frontend. Both these configurations can coexist at the same time without affecting one another.
40+
* This new field is separate from the existing [BackendTLSPolicy][] configuration. [BackendTLSPolicy][] controls TLS certificate validation for connections *from* the
41+
Gateway to the backend service. This proposal adds the ability to validate the TLS certificate presented by the *client* connecting to the Gateway (the
42+
frontend). These two validation mechanisms operate independently and can be used simultaneously.
4143
* Also introduce a `ObjectReference` structure that can be used to specify `caCertificateRefs` references.
4244

4345
#### GO

0 commit comments

Comments
 (0)