Description
Allow to configure downstream_ssl
similar to upstream_ssl
for envoy.filters.network.postgres_proxy
Description:
Currently envoy.filters.network.postgres_proxy
allows to configure TLS mode for the upstream connection (DISABLE
/ REQUIRE
). With Envoy deployed at the edge as a PostgreSQL proxy, it is often needed to force incoming outside connections to use TLS, which is not possible now. Another use case could be with projects that provide PostgreSQL-compatible API but do not implement encryption – in this case Envoy could be used as a sidecar requiring TLS.
Proposal:
With an additional downstream_ssl
setting it should be possible to configure TLS requirements for the downstream traffic. The following values could be supported:
REQUIRE
– Envoy will drop downstream connections that refuse to upgrade to TLSALLOW
– this is current behaviour, Envoy would use TLS if the downstream supports it (and it is configured at the filter level), but otherwise would also work with unencrypted connection. This could be a default settingDISABLE
– Envoy would force all downstream connections to be unencrypted
@cpakulski what would you say about this proposal?