Envoy Gateway - internal TLS support
<!--
NOTICE: This Issue tracker is for the GitLab Helm chart, not the GitLab Rails application.
Support: Please do not raise support issues for GitLab.com on this tracker. See https://about.gitlab.com/support/
-->
## Summary
Internal TLS is required for FedRAMP compliance on GitLab Dedicated for US PubSec. This is currently supported on nginx but not on Envoy Gateay.
## Steps to reproduce
For the Ingress nginx implementation on GitLab Dedicated we currently set these settings for FedRAMP tenants:
- global.workhorse.tls.enabled: true
- registry.tls.enabled: true
- gitlab.kas.tls.enabled: true
Once enabled, this makes the services within the K8s cluster accept only TLS connections for those services.
## Current behavior
Current implementation of Envoy Gateway will not be able to route traffic to these endpoints because it will send HTTP traffic to these HTTPS points.
## Expected behavior
We should be able to turn this on with Envoy Gateway and have internal TLS traffic between the Gateway pods and the Webservice/Registry/Kas pods.
This can be accomplished by adding implementing a [BackendTLSPolicy](https://gateway-api.sigs.k8s.io/api-types/backendtlspolicy/) when internal TLS is enabled.
## Versions
- Chart: 9.10.0
- Platform:
- Cloud: AWS EKS
- Kubernetes: 1.30
- Helm: v3.20
issue