Skip to content

Use audiences field from AuthProvider if available#11

Closed
sarvaniv wants to merge 1 commit intoistio:masterfrom
sarvaniv:bug_33486639
Closed

Use audiences field from AuthProvider if available#11
sarvaniv wants to merge 1 commit intoistio:masterfrom
sarvaniv:bug_33486639

Conversation

@sarvaniv
Copy link
Contributor

No description provided.

@googlebot
Copy link
Collaborator

Thanks for your pull request. It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

📝 Please visit https://cla.developers.google.com/ to sign.

Once you've signed, please reply here (e.g. I signed it!) and we'll verify. Thanks.


  • If you've already signed a CLA, it's possible we don't have your GitHub username or you're using a different email address. Check your existing CLA data and verify that your email is set on your git commits.
  • If you signed the CLA as a corporation, please let us know the company's name.

@sarvaniv sarvaniv closed this Dec 13, 2016
@sarvaniv sarvaniv deleted the bug_33486639 branch December 13, 2016 17:18
qiwzhang added a commit that referenced this pull request Feb 16, 2018
* Remove protobuf based entry calls.

* Add new file src/client_impl_test.cc

* Updated comment

* move time_v outside of union.

* Fix format.
howardjohn pushed a commit that referenced this pull request Feb 11, 2020
* Fixed JWT CVE related to exact PATH matches (#9)

* Fixed JWT CVE related to exact PATH matches

Problem: The JWT filter when matching exact paths included query parameters
which meant the JWT requirement could be bypassed by adding a "?" after the
path. The API was intended to only work for URIs.

Solution: The fix updates the match logic to only include URIs i.e. path
stripped off the query section.

Added unit tests to validate these cases.

* Fixed formatting

* Strip fragment of Path

Added unit tests to validate combination of query & fragment

* Fix lint

* Minor refactoring and more unit test cases (#11)

* Minor refactoring and more unit test cases

* Lint fixes
howardjohn pushed a commit to howardjohn/proxy that referenced this pull request Feb 11, 2020
* Fixed JWT CVE related to exact PATH matches (istio#9)

* Fixed JWT CVE related to exact PATH matches

Problem: The JWT filter when matching exact paths included query parameters
which meant the JWT requirement could be bypassed by adding a "?" after the
path. The API was intended to only work for URIs.

Solution: The fix updates the match logic to only include URIs i.e. path
stripped off the query section.

Added unit tests to validate these cases.

* Fixed formatting

* Strip fragment of Path

Added unit tests to validate combination of query & fragment

* Fix lint

* Minor refactoring and more unit test cases (istio#11)

* Minor refactoring and more unit test cases

* Lint fixes

(cherry picked from commit 859552a)
istio-testing pushed a commit that referenced this pull request Feb 11, 2020
* Fixed JWT CVE related to exact PATH matches (#9)

* Fixed JWT CVE related to exact PATH matches

Problem: The JWT filter when matching exact paths included query parameters
which meant the JWT requirement could be bypassed by adding a "?" after the
path. The API was intended to only work for URIs.

Solution: The fix updates the match logic to only include URIs i.e. path
stripped off the query section.

Added unit tests to validate these cases.

* Fixed formatting

* Strip fragment of Path

Added unit tests to validate combination of query & fragment

* Fix lint

* Minor refactoring and more unit test cases (#11)

* Minor refactoring and more unit test cases

* Lint fixes

(cherry picked from commit 859552a)

Co-authored-by: Neeraj Poddar <nrjpoddar@gmail.com>
rlenglet pushed a commit that referenced this pull request Feb 12, 2020
* Fixed JWT CVE related to exact PATH matches (#9)

* Fixed JWT CVE related to exact PATH matches

Problem: The JWT filter when matching exact paths included query parameters
which meant the JWT requirement could be bypassed by adding a "?" after the
path. The API was intended to only work for URIs.

Solution: The fix updates the match logic to only include URIs i.e. path
stripped off the query section.

Added unit tests to validate these cases.

* Fixed formatting

* Strip fragment of Path

Added unit tests to validate combination of query & fragment

* Fix lint

* Minor refactoring and more unit test cases (#11)

* Minor refactoring and more unit test cases

* Lint fixes
rlenglet pushed a commit that referenced this pull request Feb 12, 2020
* Fixed JWT CVE related to exact PATH matches (#9)

* Fixed JWT CVE related to exact PATH matches

Problem: The JWT filter when matching exact paths included query parameters
which meant the JWT requirement could be bypassed by adding a "?" after the
path. The API was intended to only work for URIs.

Solution: The fix updates the match logic to only include URIs i.e. path
stripped off the query section.

Added unit tests to validate these cases.

* Fixed formatting

* Strip fragment of Path

Added unit tests to validate combination of query & fragment

* Fix lint

* Minor refactoring and more unit test cases (#11)

* Minor refactoring and more unit test cases

* Lint fixes
istio-testing pushed a commit that referenced this pull request Feb 12, 2020
* Fixed JWT CVE related to exact PATH matches (#9)

* Fixed JWT CVE related to exact PATH matches

Problem: The JWT filter when matching exact paths included query parameters
which meant the JWT requirement could be bypassed by adding a "?" after the
path. The API was intended to only work for URIs.

Solution: The fix updates the match logic to only include URIs i.e. path
stripped off the query section.

Added unit tests to validate these cases.

* Fixed formatting

* Strip fragment of Path

Added unit tests to validate combination of query & fragment

* Fix lint

* Minor refactoring and more unit test cases (#11)

* Minor refactoring and more unit test cases

* Lint fixes

Co-authored-by: Neeraj Poddar <nrjpoddar@gmail.com>
yangminzhu pushed a commit to yangminzhu/proxy that referenced this pull request Feb 25, 2020
* Fixed JWT CVE related to exact PATH matches (istio#9)

* Fixed JWT CVE related to exact PATH matches

Problem: The JWT filter when matching exact paths included query parameters
which meant the JWT requirement could be bypassed by adding a "?" after the
path. The API was intended to only work for URIs.

Solution: The fix updates the match logic to only include URIs i.e. path
stripped off the query section.

Added unit tests to validate these cases.

* Fixed formatting

* Strip fragment of Path

Added unit tests to validate combination of query & fragment

* Fix lint

* Minor refactoring and more unit test cases (istio#11)

* Minor refactoring and more unit test cases

* Lint fixes
yangminzhu pushed a commit to yangminzhu/proxy that referenced this pull request Feb 25, 2020
* Fixed JWT CVE related to exact PATH matches (istio#9)

* Fixed JWT CVE related to exact PATH matches

Problem: The JWT filter when matching exact paths included query parameters
which meant the JWT requirement could be bypassed by adding a "?" after the
path. The API was intended to only work for URIs.

Solution: The fix updates the match logic to only include URIs i.e. path
stripped off the query section.

Added unit tests to validate these cases.

* Fixed formatting

* Strip fragment of Path

Added unit tests to validate combination of query & fragment

* Fix lint

* Minor refactoring and more unit test cases (istio#11)

* Minor refactoring and more unit test cases

* Lint fixes

Signed-off-by: Yangmin Zhu <ymzhu@google.com>
istio-testing pushed a commit that referenced this pull request Feb 26, 2020
* Fixed JWT CVE related to exact PATH matches (#9)

* Fixed JWT CVE related to exact PATH matches

Problem: The JWT filter when matching exact paths included query parameters
which meant the JWT requirement could be bypassed by adding a "?" after the
path. The API was intended to only work for URIs.

Solution: The fix updates the match logic to only include URIs i.e. path
stripped off the query section.

Added unit tests to validate these cases.

* Fixed formatting

* Strip fragment of Path

Added unit tests to validate combination of query & fragment

* Fix lint

* Minor refactoring and more unit test cases (#11)

* Minor refactoring and more unit test cases

* Lint fixes

Signed-off-by: Yangmin Zhu <ymzhu@google.com>

Co-authored-by: Neeraj Poddar <nrjpoddar@gmail.com>
istio-testing pushed a commit to istio-testing/proxy that referenced this pull request Feb 26, 2020
* Fixed JWT CVE related to exact PATH matches (istio#9)

* Fixed JWT CVE related to exact PATH matches

Problem: The JWT filter when matching exact paths included query parameters
which meant the JWT requirement could be bypassed by adding a "?" after the
path. The API was intended to only work for URIs.

Solution: The fix updates the match logic to only include URIs i.e. path
stripped off the query section.

Added unit tests to validate these cases.

* Fixed formatting

* Strip fragment of Path

Added unit tests to validate combination of query & fragment

* Fix lint

* Minor refactoring and more unit test cases (istio#11)

* Minor refactoring and more unit test cases

* Lint fixes

Signed-off-by: Yangmin Zhu <ymzhu@google.com>
istio-testing added a commit that referenced this pull request Feb 26, 2020
* Fixed JWT CVE related to exact PATH matches (#9)

* Fixed JWT CVE related to exact PATH matches

Problem: The JWT filter when matching exact paths included query parameters
which meant the JWT requirement could be bypassed by adding a "?" after the
path. The API was intended to only work for URIs.

Solution: The fix updates the match logic to only include URIs i.e. path
stripped off the query section.

Added unit tests to validate these cases.

* Fixed formatting

* Strip fragment of Path

Added unit tests to validate combination of query & fragment

* Fix lint

* Minor refactoring and more unit test cases (#11)

* Minor refactoring and more unit test cases

* Lint fixes

Signed-off-by: Yangmin Zhu <ymzhu@google.com>

Co-authored-by: Neeraj Poddar <nrjpoddar@gmail.com>
kyessenov pushed a commit to kyessenov/proxy that referenced this pull request Jul 12, 2022
telemetry: set SharedWithUpstreamConnection on workload meta obj
YaoZengzeng pushed a commit to YaoZengzeng/proxy that referenced this pull request Dec 27, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants