You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
(This is @kflynn editing @jwm's original text, in case others land here. Thanks for the help nailing down what's up, @jwm!)
Fast validation causes Kubernetes Secrets of type opaque to not be correctly processed by Ambassador. Nope, I was wrong when I said that. OpaqueSecrets are OK: the problem is that Ambassador tries really hard not to load Secrets that it doesn't actually need, and when fast validation is on, 1.10 tries so hard that it would never load the ca_secret of a TLSContext at all. Obviously that makes it hard to use client-cert authentication.
Prior to Ambassador 1.10, all would be well if AMBASSADOR_FAST_VALIDATION was not set. As of 1.10, fast validation is the default, so you will need to set AMBASSADOR_LEGACY_MODE=true to use client-cert auth in 1.10.
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.
kflynn
changed the title
Fast validation/reconfig breaks TLS client cert auth
Fast validation breaks TLS client cert auth
Jan 7, 2021
kflynn
changed the title
Fast validation breaks TLS client cert auth
Fast validation breaks TLS client cert auth when using Opaque secrets
Jan 7, 2021
kflynn
changed the title
Fast validation breaks TLS client cert auth when using Opaque secrets
Fast validation breaks TLS client cert auth when using opaque secrets
Jan 7, 2021
jcornick-alabs
changed the title
Fast validation breaks TLS client cert auth when using opaque secrets
Regression: Fast validation breaks TLS client cert auth when using opaque secrets
Jan 13, 2021
kflynn
changed the title
Regression: Fast validation breaks TLS client cert auth when using opaque secrets
Regression: Fast validation breaks TLS client cert auth when using TLSContexts
Jan 14, 2021
** State as of 1.10 **
(This is @kflynn editing @jwm's original text, in case others land here. Thanks for the help nailing down what's up, @jwm!)
Fast validation causes KubernetesNope, I was wrong when I said that.Secret
s of typeopaque
to not be correctly processed by Ambassador.Opaque
Secret
s are OK: the problem is that Ambassador tries really hard not to loadSecret
s that it doesn't actually need, and when fast validation is on, 1.10 tries so hard that it would never load theca_secret
of aTLSContext
at all. Obviously that makes it hard to use client-cert authentication.Prior to Ambassador 1.10, all would be well if
AMBASSADOR_FAST_VALIDATION
was not set. As of 1.10, fast validation is the default, so you will need to setAMBASSADOR_LEGACY_MODE=true
to use client-cert auth in 1.10.(@jwm's original text)
Describe the bug
Client cert auth seems broken with fast validation and reconfig (not sure ATM if it's one, the other, or both).
To Reproduce
Steps to reproduce the behavior:
TLSContext
that validates client certs:Expected behavior
When the supplied client cert is valid, the request should be successful.
Versions (please complete the following information):
Additional context
The text was updated successfully, but these errors were encountered: