Split JWT verification from forwarding logic.#1754
Split JWT verification from forwarding logic.#1754nickrmc83 wants to merge 2 commits intoistio:masterfrom
Conversation
Splitting logic previously in jwt_authenticator into 2 parts. - jwt_authenticator just contains logic for verifying/authenticating JWTs - JWT forwarding logic has been moved into jwt_auth filter. The changes enable greater re-usability of the JWT verification code across filters. All tests updated and passing.
|
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here (e.g. What to do if you already signed the CLAIndividual signers
Corporate signers
|
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: nickrmc83 Assign the PR to them by writing The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Hi @nickrmc83. Thanks for your PR. I'm waiting for a istio member to verify that this patch is reasonable to test. If it is, they should reply with I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@nickrmc83 I am in the middle of porting jwt_authn code from Isito/proxy to Envoy. Here is: envoyproxy/envoy#3339 The jwt_authn code in istio/proxy is frozen now. I strongly suggest you make your change after I done the porting. If you don't want to wait, you can create a private branch in istio/proxy to submit your change. We may not have time to review it since it is in the private branch. |
|
@qiwzhang I'll wait until you've finished porting and then migrate the changes directly to envoy. I'll leave this PR open for the time being in case anyone wants to give some general feedback as what will appear in envoy will closely resemble these changes. Additionally if there's anything I can do to help envoyproxy/envoy#3339 along let me know. |
|
@nickrmc83: PR needs rebase. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
Hi @nickrmc83 could you help to review this config change in Envoy: envoyproxy/envoy#3381 |
|
Hi @nickrmc83 I was wondering where this was at. Are you still working on this? We are also interested in introducing OIDC to Envoy. |
|
Closing as the world has moved on as has the approach. |
What this PR does / why we need it:
This is the first PR in a set that will slowly introduce OpenID Connect end-user authentication and session management.
Splitting logic previously in jwt_authenticator into 2 parts.
The changes enable greater re-usability of the JWT verification code across filters.
All tests updated and passing.
Special notes for your reviewer:
Envoy related PR: envoyproxy/envoy#3428
Design discussions:
Release note: