Skip to content

PostgreSQL filter – require downstream TLS #31049

Open
@wasd171

Description

@wasd171

Allow to configure downstream_ssl similar to upstream_ssl for envoy.filters.network.postgres_proxy

Description:
Currently envoy.filters.network.postgres_proxy allows to configure TLS mode for the upstream connection (DISABLE / REQUIRE). With Envoy deployed at the edge as a PostgreSQL proxy, it is often needed to force incoming outside connections to use TLS, which is not possible now. Another use case could be with projects that provide PostgreSQL-compatible API but do not implement encryption – in this case Envoy could be used as a sidecar requiring TLS.

Proposal:
With an additional downstream_ssl setting it should be possible to configure TLS requirements for the downstream traffic. The following values could be supported:

  1. REQUIRE – Envoy will drop downstream connections that refuse to upgrade to TLS
  2. ALLOW – this is current behaviour, Envoy would use TLS if the downstream supports it (and it is configured at the filter level), but otherwise would also work with unencrypted connection. This could be a default setting
  3. DISABLE – Envoy would force all downstream connections to be unencrypted

@cpakulski what would you say about this proposal?

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions