-
Notifications
You must be signed in to change notification settings - Fork 690
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
internal: Initial support for external client cert validation #2250
Conversation
8975f95
to
52cc094
Compare
Codecov Report
@@ Coverage Diff @@
## master #2250 +/- ##
==========================================
+ Coverage 77.97% 78.10% +0.12%
==========================================
Files 60 60
Lines 5204 5225 +21
==========================================
+ Hits 4058 4081 +23
+ Misses 1058 1057 -1
+ Partials 88 87 -1
Continue to review full report at Codecov.
|
This PR replaces #1226 by @uablrek. I'm submitting this as a draft in order to ask for direction. @jpeach: in design doc review #1233 you mentioned
In the I have however combined these into single Another alternative could be to include If we agree to keep two different types in Obviously any other comments are of course welcome too! |
Thanks @tsaarni; I'll review, but will need a few days to block out the time :) |
Thank you all for your discussion. With my tech lead hat on I do need to remind everyone that the policy of this project is to talk, then code. We should not be designing features by duking it out in PR comments, that is not how we work on this project. Thank you |
On 20 Feb 2020, at 1:00 pm, Dave Cheney ***@***.***> wrote:
Thank you all for your discussion. With my tech lead hat on I do need to remind everyone that the policy of this project is to talk, then code. We should not be designing features by duking it out in PR comments, that is not how we work on this project.
Dave, this was previously discussed and a design doc was merged :)
#1233
https://github.com/projectcontour/contour/blob/master/design/tls-client-verification.md
|
Oops, I am terribly sorry I mistook the discussion for the other auth discussions in fly at the moment. Please ignore me |
On 20 Feb 2020, at 1:07 pm, Dave Cheney ***@***.***> wrote:
Oops, I am terribly sorry I mistook the discussion for the other auth discussions in fly at the moment. Please ignore me
Yeh I can't find the PR for that, Github is making me terribly confused!
|
I wonder if you would have time to provide any feedback for me? Thank you! :) |
Sorry, I intended to review and then didn’t. I will review first thing next week.
… On Feb 28, 2020, at 6:15 PM, Tero Saarni ***@***.***> wrote:
I wonder if you would have time to provide any feedback for me? Thank you! :)
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall, I think this is pretty solid. I had a number of comments about style and so forth, so it might be easier to address some of those in small, separate PRs. I expect probably 2 more review passes. We can land docs towards the end of the review, or file a separate issue for that if you prefer.
52cc094
to
22f8d28
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This PR is in good shape, I just had a few small comments around style and improving documentation and so forth.
The last main thing that I think we need to do is add a test into internal/featuretests/
. Using one of the existing files as a stating point, you can add a new file downstreamvalidation_test.go
. These tests let you simulate updating Kubernetes objects and assert that the final envoy configuration is what you expect. You can also verify Kubernetes object status (valid or invalid).
ed158c8
to
feb7a6a
Compare
@tsaarni The lint check failure should go away if you rebase to pick up the tooling script changes. |
feb7a6a
to
561b557
Compare
I have prepared a commit that removes the API parts until #2347 is resolved. In case you would still like to review this PR as "complete", I will not add that commit here in this PR until you confirm it is OK. |
Please go ahead and apply the commit to remove the API. Then, please squash commits, remove the "WIP" tag and update the PR subject to describe the current content of the commit. I'll commit the result. Don't forget to rebase :) |
Adds initial support for authentication of external clients (downstream) by validating their client certificates against trusted CA certificate. The feature is not yet exposed in the API. Signed-off-by: Tero Saarni <tero.saarni@est.tech>
561b557
to
a5e9a96
Compare
Thanks! API removed, commits squashed, rebased and renamed! Just as a reference in case needed, the API changes are stored on this unsquashed fork/branch https://github.com/Nordix/contour/tree/client-authentication-no-squash |
internal: Initial support for external client cert validation
Adds initial support for authentication of external clients (downstream) by
validating their client certificates against trusted CA certificate.
The feature is not yet exposed in the API.
Signed-off-by: Tero Saarni tero.saarni@est.tech