-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Investigate alternatives for StrongSwan #6027
Comments
I would personally like to deprecate it in 1.25 and remove it in 1.26, with the suggestion that anyone using the |
What are the reasons to remove strongswan? I'm not sure if we can really treat wireguard as an "improved" strongswan. Therefore, we could find strongswan users against moving to wireguard |
For supportability reasons, we're investigating dropping external components from K3s that are linked against crypto libraries. All of the golang components can be built with goboring/boringssl, but strongswan uses openssl (if I remember correctly). There's also the fact that wireguard is easier to support since it's all in the kernel, and dropping the strongswan component from k3s-root would save us a decent chunk of size from the shipping binary. |
$ k3s -v
=========== k3s config =========== $ k3s server --help | grep flannel-backend
$ VERSION=v1.26.0-rc2+k3s1
journalctl output
|
For several reasons, we'd like to look into replacing StrongSwan in k3s. Let's use this issue track progress and list out the actual work that would be involved with doing this, including investigating what we may use as a replacement (wireguard?)
The text was updated successfully, but these errors were encountered: