-
Notifications
You must be signed in to change notification settings - Fork 687
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Host security policies are affecting other Hosts. #2888
Comments
This is fixed in the upcoming release. |
This fix is in 1.7.0, which is now available. |
This is active again now that we've reverted the code in 1.7.4-rc.1 |
It is unclear if this is still and issue or not. Based on the milestones it appears it is. Can you please confirm that this is not fixed yet? |
Assuming its not fixed, this is actively blocking us from enabling http to https redirection. |
This was addressed in the 2.0.0 EA release. The subsequent 2.0.4 release that shipped earlier this week is now Generally Available. |
Summary
When using more than one
Host
, thespec.requestPolicy.insecure.action
value on one host can affect the actions of another host. Selecting either Route or Redirect onclient1.myhost.net
would causeclient2.myhost.net
to follow the same behavior, regardless of what is set on theclient2.myhost.net
Host
. This is particularly relevant for host-based routing as, for example, aHost
that requires insecure routing (but is somehow secured in some other fashion), could potentially overwrite the behavior of a more exposedHost
, resulting in cleartext routing on what is expected to be a secure gateway.Issue/Request
Ambassador should explicitly follow the
Host
insecure behavior specified to the exact host that is being applied.Replicator
Kubernetes cluster info
Ambassador install info
Ambassador configuration
Repro:
Apply the following hosts:
```yaml
---
apiVersion: getambassador.io/v2
kind: Host
metadata:
name: client1-host
namespace: ambassador
spec:
hostname: client1.example.net
acmeProvider:
authority: https://acme-v02.api.letsencrypt.org/directory
email: example@datawire.io
privateKeySecret:
name: client1-host-secret
tlsSecret:
name: client1-example-net
requestPolicy:
insecure:
action: "Redirect"
QotM
backend.curl -Lv http://client2.example.net/backend/
Notes
It appears as though it operates alphanumerically. Adding
application.example.net
overwritesclient1.example.net
andclient2.example.net
, for example.I have not tested if it affects other Ambassador deployments, however I suspect it does not.
The text was updated successfully, but these errors were encountered: