-
Notifications
You must be signed in to change notification settings - Fork 632
Gep-91: Address connection coalescing security issue #3942
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Relates to kubernetes-sigs#3760 (comment) Signed-off-by: Arko Dasgupta <[email protected]>
|
Hi @kl52752. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/assign @robscott @shaneutt @youngnick |
b5c8c13 to
494f360
Compare
arkodg
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
thanks @kl52752 for driving this enhancement
robscott
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @kl52752!
/ok-to-test
| // to a subset of listeners by creating only per-port configurations. Listeners | ||
| // with a port that does not match any TLS configuration will not have | ||
| // `frontendValidation` set. | ||
| type GatewayTLSConfigs = []TLSConfig |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this meant to represent the top level field on the Gateway spec? Assuming that's the case, it could be helpful to clarify that.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good point.
I added a snippet with extending GatewaySpec with a new field. I hope it's more clear now.
geps/gep-91/index.md
Outdated
| * Add a new `FrontendValidationModeType` enum within `FrontendTLSValidation` indicating how gateway should validate client certificates. As for now we support following values but it might change in the future: | ||
| * `AllowValidOnly` | ||
| * `AllowInvalidOrMissingCert` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is not rendering as intended in the deploy preview - take a look at https://deploy-preview-3942--kubernetes-sigs-gateway-api.netlify.app/geps/gep-91/
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That's weird in my VS code it's rendering as intended. I changed this to numbers.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah, mkdocs is quite picky. I think it may require 4 spaces or something, lots of other markdown renderers accept how you had the list formatted.
|
This LGTM with the latest changes. I'll leave the hold in place in case anyone else wants to review though. /lgtm |
|
Thanks @kl52752! /approve |
|
Will aim for some lazy consensus on here - we've got 3 approvals. Let's plan on removing the hold tomorrow unless there's any additional feedback. |
shaneutt
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/unhold
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: arkodg, kl52752, robscott, shaneutt The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
…#3942) * GEP 91: Update API Relates to kubernetes-sigs#3760 (comment) Signed-off-by: Arko Dasgupta <[email protected]> * GEP-91: Address connection coalescing security issue * remove changes in API --------- Signed-off-by: Arko Dasgupta <[email protected]> Co-authored-by: Arko Dasgupta <[email protected]>
What type of PR is this?
/kind gep
What this PR does / why we need it:
Introduce changes to client certificate validation API to address connection coalescing security issue.
Which issue(s) this PR fixes:
Relates to: #3760 (comment)
Fixes #
Does this PR introduce a user-facing change?: