-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
external authorization: set the SNI value from server name if it isn't available on the connection/socket #34100
Conversation
Hi @marc-barry, welcome and thank you for your contribution. We will try to review your Pull Request as quickly as possible. In the meantime, please take a look at the contribution guidelines if you have not done so already. |
88f6643
to
bde5425
Compare
I'm unable to determine which of the unit tests in |
A passing by comment: In the This is the actual error: https://dev.azure.com/cncf/envoy/_build/results?buildId=170326&view=logs&j=8c169225-0ae8-53bd-947f-07cb81846cb5&t=d1a98671-b7ba-5fbf-f06c-ff337c010df4&l=249 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for working on this!
Please add a test case for this new logic, and you'll need to add a release note.
/wait
source/extensions/filters/common/ext_authz/check_request_utils.cc
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please add some test coverage for the new functionality.
/wait
source/extensions/filters/common/ext_authz/check_request_utils.h
Outdated
Show resolved
Hide resolved
source/extensions/filters/common/ext_authz/check_request_utils.cc
Outdated
Show resolved
Hide resolved
I'm working on tests now. Both for the new functionality and addressing the tests that this new functionality is causing to fail. |
@ggreenway I addressed all you comments. I added a new unit test for TCP and then adapted |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good!
Please add a release note to changelogs/current.yaml
.
/wait
…lable on the connection/socket. Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
…ce and clang-format. Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
…quiring one less call to connection() and ssl(). Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
…e TLS session SNI isn't set. Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
…erver name. Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
… when the sessions SNI is empty. Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
Signed-off-by: Marc Barry <4965634+marc-barry@users.noreply.github.com>
046ca09
to
9cd3f27
Compare
@ggreenway is there anything I need to do for that failing check? It does look to me that it might be CI flakiness but perhaps there is an underlying issue that needs my attention. |
That's a weird error; pretty sure you didn't cause it. I'm re-running the failing job to see if it passes. |
This is my first commit to the Envoy project and I haven't written C++ in many years. I'm still navigating the types and hierarchy and best practices for obtaining the data I need to complete this pull request. I have started in
draft
first to see the CI processes and look at how the tests run and if my changes cause any issues with current tests.Commit Message: external authorization: set the SNI value from server name if it isn't available on the connection/socket
Additional Description: Leverages the TLS inspectors server name value, if one was set.
Risk Level: low
Testing: Will test that the SNI value is set from the server name of a connection when the TLS session doesn't have the SNI.
Docs Changes: N/A
Release Notes: exterbal authorization
Platform Specific Features: N/A
[Optional Runtime guard:]
Fixes #34002
[Optional Fixes commit #PR or SHA]
[Optional Deprecated:]
[Optional API Considerations:]