Replies: 10 comments 21 replies
-
Retry Budgets1. Describe the proposed feature 2. Why is this feature important for Gateway API? 3. How broadly supportable would this feature be? (Look at Envoy, HAProxy, and NGINX as a baseline)
The UX for how this functionality should be implemented in Gateway API will require some discovery work to determine whether the HTTPRoute 4. Do you have sufficient time to lead the development of this feature in Gateway API? Do you have anyone else that can help you? 5. Are there any relevant links for previous discussions about this topic in Gateway API? (It would be particularly helpful if you can provide links showing strong interest for this feature)
|
Beta Was this translation helpful? Give feedback.
-
Ready Condition1. Describe the proposed feature Currently a 2. Why is this feature important for Gateway API? There's no reliable way for clients to know when it is safe to make an request given the propagation delay of the config and actuation of the proxy. 3. How broadly supportable would this feature be? (Look at Envoy, HAProxy, and NGINX as a baseline) Would need help determining this. 4. Do you have sufficient time to lead the development of this feature in Gateway API? Do you have anyone else that can help you? Possibly. 5. Are there any relevant links for previous discussions about this topic in Gateway API? (It would be particularly helpful if you can provide links showing strong interest for this feature) Still open: |
Beta Was this translation helpful? Give feedback.
-
Auth*1. Describe the proposed feature Make forward progress on some sort of construct to describe authentication and/or authorization. Note that my personal opinion is that we should address the simplest possible case first - the Ingress, north/south case, and leave exact definition of GAMMA interactions for a later date. 2. Why is this feature important for Gateway API? This is a table-stakes feature for most Ingress implementations, and the lack of a solution here is a barrier to Gateway API adoption. 3. How broadly supportable would this feature be? (Look at Envoy, HAProxy, and NGINX as a baseline) Very, this is a table stakes feature. Envoy, HAProxy, and NGINX all support some variation of this already, and numerous Gateway API implementations have their own implementation specific config as well. 4. Do you have sufficient time to lead the development of this feature in Gateway API? Do you have anyone else that can help you? 5. Are there any relevant links for previous discussions about this topic in Gateway API? (It would be particularly helpful if you can provide links showing strong interest for this feature) We've talked about this already quite a bit:
|
Beta Was this translation helpful? Give feedback.
-
Gateway API Support for gRPC Retries1. Describe the proposed feature 2. Why is this feature important for Gateway API? 3. How broadly supportable would this feature be? (Look at Envoy, HAProxy, and NGINX as a baseline) 4. Do you have sufficient time to lead the development of this feature in Gateway API? Do you have anyone else that can help you? 5. Are there any relevant links for previous discussions about this topic in Gateway API? (It would be particularly helpful if you can provide links showing strong interest for this feature) |
Beta Was this translation helpful? Give feedback.
-
CORS Filter1. Describe the proposed feature 2. Why is this feature important for Gateway API? Cross-Origin Resource Sharing (CORS) is supported by all browsers. Complex applications often reference third-party APIs and resources in their client-side code. CORS allows browsers to enforce the same-origin security policy for preventing client-side from accessing sensitive resources of a server on a domain different than the domain that served the web page. 3. How broadly supportable would this feature be? (Look at Envoy, HAProxy, and NGINX as a baseline)
4. Do you have sufficient time to lead the development of this feature in Gateway API? Do you have anyone else that can help you? 5. Are there any relevant links for previous discussions about this topic in Gateway API? (It would be particularly helpful if you can provide links showing strong interest for this feature)
Originally posted by @lianglli in #3103 (comment) |
Beta Was this translation helpful? Give feedback.
-
HTTP Cookie Match1. Describe the proposed feature
2. Why is this feature important for Gateway API? Cookies are used to maintain state and identify specific users. Moreover, cookies, headers and query parameters are common techniques used in a canary release. 3. How broadly supportable would this feature be? (Look at Envoy, HAProxy, and NGINX as a baseline)
4. Do you have sufficient time to lead the development of this feature in Gateway API? Do you have anyone else that can help you? 5. Are there any relevant links for previous discussions about this topic in Gateway API? (It would be particularly helpful if you can provide links showing strong interest for this feature)
Originally posted by @lianglli in #3103 (comment) |
Beta Was this translation helpful? Give feedback.
-
Query Parameter Filter1. Describe the proposed feature 2. Why is this feature important for Gateway API? The query parameters are an important part of the request URL. 3. How broadly supportable would this feature be? (Look at Envoy, HAProxy, and NGINX as a baseline)
4. Do you have sufficient time to lead the development of this feature in Gateway API? Do you have anyone else that can help you? 5. Are there any relevant links for previous discussions about this topic in Gateway API? (It would be particularly helpful if you can provide links showing strong interest for this feature)
Originally posted by @lianglli in #3103 (comment) |
Beta Was this translation helpful? Give feedback.
-
From 1.2: #3103 (comment) ListenerSets - Merging many listeners into a single Gateway1. Describe the proposed feature Support for merging Gateway listeners should have standard & documented mechanic. 2. Why is this feature important for Gateway API? Knative generates on demand per-service certificates using HTTP-01 challenges. There can be O(1000) Knative Services in the cluster which means we have O(1000) distinct certificates. The Gateway Resource is a contention point since is the only place to attach listeners to gateways with certificates. The spec currently has language to indicate implemenations MAY merge Gateways resources but the mechanic isn't defined. gateway-api/apis/v1beta1/gateway_types.go Lines 76 to 78 in 541e9fc Secondly, given similar use-cases/needs for control planes to manage listeners it might make sense that merging Gateways is part of extended conformance. 3. How broadly supportable would this feature be? (Look at Envoy, HAProxy, and NGINX as a baseline) I believe Contour has prototyped this GEP. Envoy Gateway has a similar feature to merge gateways (https://gateway.envoyproxy.io/v0.6.0/api/extension_types/#envoyproxyspec) 4. Do you have sufficient time to lead the development of this feature in Gateway API? Do you have anyone else that can help you? Yes 5. Are there any relevant links for previous discussions about this topic in Gateway API? (It would be particularly helpful if you can provide links showing strong interest for this feature) Prior Discussions: GEP: |
Beta Was this translation helpful? Give feedback.
-
cont. from v1.2 (#3103 (comment)) gRPC Timeouts1. Describe the proposed feature 2. Why is this feature important for Gateway API? 3. How broadly supportable would this feature be? (Look at Envoy, HAProxy, and NGINX as a baseline) 4. Do you have sufficient time to lead the development of this feature in Gateway API? Do you have anyone else that can help you? 5. Are there any relevant links for previous discussions about this topic in Gateway API? (It would be particularly helpful if you can provide links showing strong interest for this feature) from 1.2 #3103 (comment) . We were not able to get it in last time with short notice, but will have more time this next release |
Beta Was this translation helpful? Give feedback.
-
HTTPRoute-level SSL redirection1. Describe the proposed feature There's no simple way to enforce SSL redirection solely the route level. A solution here could be being able to match on the scheme in the HTTPRoute. I'm open to others. 2. Why is this feature important for Gateway API? This would help with redirect loops and http => http redirects. Currently it requires two HTTPRoutes and configuring a two Gateway listeners to accomplish this. But that approach only works well if you have the ability to configure your Gateway. The goal here is to support this feature at the HTTPRoute level. 3. How broadly supportable would this feature be? (Look at Envoy, HAProxy, and NGINX as a baseline) nginx/K8s Ingress has an annotation ingress.kubernetes.io/force-ssl-redirect: "true" Contour supports the above annotations. I think this behaviour is pretty common in many implementaitons. 4. Do you have sufficient time to lead the development of this feature in Gateway API? Do you have anyone else that can help you? Yes 5. Are there any relevant links for previous discussions about this topic in Gateway API? (It would be particularly helpful if you can provide links showing strong interest for this feature) #2809 |
Beta Was this translation helpful? Give feedback.
-
In v1.3, we're continuing to work with our new release process, and we're currently in the first phase of that process - scoping. This discussion is intended to be a central place for proposed additions to the experimental channel in v1.3.
If you have an enhancement that you would like to see included in Gateway API v1.3, and you personally have time to lead the development of the feature, please add a comment below using the following template:
Ultimately, we'll likely have more proposals here than the project has room for. Each feature that leaves experimental channel in a release gives us an opening to add a feature to experimental channel, and we're expecting somewhere between 3 and 5 in this cycle. (You can help the project move more quickly and accept more new features by helping us move features out of experimental channel - see #3404 for details). Even if you don't have time to lead a feature, you can help us prioritize the features proposed in this thread by:
The scoping process is scheduled to wrap up on November 19, 2024. Please have all proposals in place at least 1 week before that point so everyone has sufficient time to comment and vote on proposals.
It's worth noting that maintainers will still have some discretion in terms of which proposals are accepted into the scope of a release, but the information gathered here will be the primary consideration for which proposals are included in v1.3. Essentially we're hoping to prioritize features that:
Beta Was this translation helpful? Give feedback.
All reactions