Add the support on clock_skew_seconds in request authentication#3710
Add the support on clock_skew_seconds in request authentication#3710freedomljc wants to merge 1 commit into
Conversation
|
😊 Welcome @freedomljc! This is either your first contribution to the Istio api repo, or it's been You can learn more about the Istio working groups, Code of Conduct, and contribution guidelines Thanks for contributing! Courtesy of your friendly welcome wagon. |
|
Hi @freedomljc. Thanks for your PR. I'm waiting for a istio member to verify that this patch is reasonable to test. If it is, they should reply with Regular contributors should join the org to skip this step. Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
howardjohn
left a comment
There was a problem hiding this comment.
In what scenario do you need more than a 60s clock skew?
I guess there're two scenarios we might want to adjust clock_skew_seconds:
|
|
The short lived case is a pure hypothetical from 6 years ago not a real use case. It sounds more like what you want is not "clock skew" but to disable expiry validation? |
I'd like to disable the expiry validation within requestAuthentication and let subsequent components determine how to handle expired tokens instead. |
|
@howardjohn , would you mind to follow-up and share your thoughts? Having envoyfilter to override jwt_authn configuration is quite inconvenient, due to the |
It's to mimic the support of
clock_skew_secondson jwt_authn https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/http/jwt_authn/v3/config.proto