-
Notifications
You must be signed in to change notification settings - Fork 690
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
XFCC header support #4797
XFCC header support #4797
Conversation
Codecov Report
Additional details and impacted files@@ Coverage Diff @@
## main #4797 +/- ##
==========================================
+ Coverage 76.10% 76.15% +0.05%
==========================================
Files 140 140
Lines 16896 16932 +36
==========================================
+ Hits 12858 12894 +36
Misses 3786 3786
Partials 252 252
|
Do you think this change could make it to the 1.23 release? |
Unfortunately it's too late to get these into 1.23, but we'll pick up with reviews shortly. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looking very good 👍 Just one tiny remark from me.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Needs merging & regenerating after the other PR was merged, but otherwise ready to go from my perspective.
Signed-off-by: Gautier Delorme <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you @gautierdelorme 👍
Leaving for others to review as well.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks @gautierdelorme! Will leave open for a bit in case @sunjayBhatia wants to take a look.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks great!
one thing that could be useful to help troubleshoot header size issues would be to enable upstream cluster req/resp statistics: https://www.envoyproxy.io/docs/envoy/latest/configuration/upstream/cluster_manager/cluster_stats#request-response-size-statistics
I can add a new issue for that so we can consider it (if we dont have one already)
Closes projectcontour#2885. Signed-off-by: Gautier Delorme <[email protected]>
This is required to let apps use details from client certificates (e.g. Subject, SAN...). Since the certificate (or the certificate chain) could exceed the web server header size limit, we give the ability to select what specific part of the certificate to expose in the
x-forwarded-client-cert
header.Fixes #2885 (I've read through this issue and since that feature is only usable when
ClientValidation
is used (since that's required for the server to request certs) I think havingForwardClientCertificate
underClientValidation
makes more sense)Signed-off-by: Gautier Delorme [email protected]