-
Notifications
You must be signed in to change notification settings - Fork 689
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WIP: Implement client certificate validation (mTLS) #1226
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for working on this.
Can you please split this PR into two. We will review the design document first then move on to the implementation when the design has been nailed down.
Thank you.
Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Updates: projectcontour#1090 Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Updates projectcontour#1090 Signed-off-by: Lars Ekman <lars.g.ekman@est.tech> Add a "clientValidation" in the IngressRoute for validation of client certificated (mTLS). This commit does not include CRD validation.
Updates projectcontour#1090 Signed-off-by: Lars Ekman <lars.g.ekman@est.tech> The clientValidation is used for client certificate validation (mTLS)
Update projectcontour#1090 Signed-off-by: Lars Ekman <lars.g.ekman@est.tech> If ClientValidation is configured for a virtual host Envoy is configured to validate the client certificate (mTLS)
Updates projectcontour#1090 Signed-off-by: Lars Ekman <lars.g.ekman@est.tech> If ClientValidation is configured validation data is sent to Envoy for client validation (mTLS)
No unit-tests for mTLS added in this commit Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Updates projectcontour#1090 Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Updates projectcontour#1090 Signed-off-by: Lars Ekman <lars.g.ekman@est.tech> Also remove misplaced ForwardCertificateDetails items.
Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Signed-off-by: Lars Ekman <lars.g.ekman@est.tech> Moved to a separate PR
The new and improved design proposal is now in #1233 and can be viewed here; |
Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Thank you for working on this. I'm sorry its taken so long to reply. Sadly I don't see it will be possible to land this before contour 1.0 as we're deep in code freeze now. I'll assign this to the backlog to review once Contour 1.0 is out the door. |
Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Signed-off-by: Lars Ekman <lars.g.ekman@est.tech>
Marking this PR stale since there has been no activity for 14 days. It will be closed if there is no activity for another 90 days. |
Replaced by #2250. Closing... |
This PR implements mTLS and updates #1090 .
Please see design documentation in PR #1233 .
Work items
clientValidation
configuration itemclientValidation
ClientValidation
inSecureVirtualHost
DownstreamTLSContext()
functionRequireClientCertificate
to "true" ifclientValidation
is !=nil
Example
mTLS
must be configured with anIngressRoute
;Client certificate validation can be tested with
curl
;