-
Notifications
You must be signed in to change notification settings - Fork 277
envoy/rbac: add support for server side RBAC fitler #2054
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good stuff! This is an important piece!
I tend to read unit tests to understand how something work. To me unit tests are also documentation.
I left a few small comments around tweaking the tests so these are easier to read as prose.
mockCatalog := catalog.NewMockMeshCataloger(mockCtrl) | ||
proxySvcAccount := service.K8sServiceAccount{Name: "sa-1", Namespace: "ns-1"} | ||
|
||
lb := &listenerBuilder{ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why not use newListenerBuilder()
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Because this allows to fill in minimal stuff into the object needed to build the filter. When a new field is added to the struct, if the test fails it helps find dependency issues faster.
This change introduces an RBAC filter in the inbound mesh filter chain. Currently, the RBAC filter grants full access to client identities that are permitted by an SMI traffic target policy. HTTP filtering based on HTTP routes still happens within RDS. The RBAC filter is omitted in permissive mode. This change is a part of openservicemesh#1964 and is required by openservicemesh#1521.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks!
…2054) This change introduces an RBAC filter in the inbound mesh filter chain. Currently, the RBAC filter grants full access to client identities that are permitted by an SMI traffic target policy. HTTP filtering based on HTTP routes still happens within RDS. The RBAC filter is omitted in permissive mode. This change is a part of openservicemesh#1964 and is required by openservicemesh#1521.
…2054) This change introduces an RBAC filter in the inbound mesh filter chain. Currently, the RBAC filter grants full access to client identities that are permitted by an SMI traffic target policy. HTTP filtering based on HTTP routes still happens within RDS. The RBAC filter is omitted in permissive mode. This change is a part of openservicemesh#1964 and is required by openservicemesh#1521.
…2054) This change introduces an RBAC filter in the inbound mesh filter chain. Currently, the RBAC filter grants full access to client identities that are permitted by an SMI traffic target policy. HTTP filtering based on HTTP routes still happens within RDS. The RBAC filter is omitted in permissive mode. This change is a part of openservicemesh#1964 and is required by openservicemesh#1521.
Description:
This change introduces an RBAC filter in the inbound mesh filter
chain. Currently, the RBAC filter grants full access to client identities
(ServiceAccounts) that are permitted by an SMI traffic target policy.
HTTP filtering based on HTTP routes still happens within RDS.
The RBAC filter is omitted in permissive mode.
This change is a part of #1964 and is required by #1521.
Affected area:
Please answer the following questions with yes/no.
No