-
Notifications
You must be signed in to change notification settings - Fork 681
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Can not disable Global External Authorization by default using authPolicy.disabled #6617
Comments
@sunjayBhatia Can I have your comment on this please? |
if you think we should fix it let us know so we start the merge request. @skriss @sunjayBhatia @stevesloka @tsaarni |
Changes: - use dagRoute's AuthContext and AuthDisabled in HTTPS-Upgrade to fix 6659 - Use globalExtAuth.AuthPolicy.Disabled to calculate dagRoute.AuthDisabled - Fix Tests Signed-off-by: Saman Mahdanian <[email protected]>
The Contour project currently lacks enough contributors to adequately respond to all Issues. This bot triages Issues according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
thank you @tsaarni for the labels |
What steps did you take and what happened:
We have been trying to setup
GlobalExtAuth
in our Contour deployment and we wanted to disabled it on all routes by default and ask our clients to enable it if they need to use it on their HTTPProxies.But, when we configured
globalExtAuth
and setglobalExtAuth.authPolicy.disabled
totrue
the External Authorization is still applied to all HTTPProxies even though they didn't asked for it.What did you expect to happen:
We expected (according to contour GlobalAuthorizationPolicy API Specification) that when we set
globalExtAuth.authPolicy.disabled
totrue
the external authorization is not applied to any routes unless it is specifically configured to be used by eithervirtualhost.authorization.authPolicy.disabled
orroute.authPolicy.disabled
.Environment:
kubectl version
): 1.27How to replicate this:
Use the following configs:
in
ContourConfiguration
:in sample
HTTPProxy
:then if you call
test-route.example.com
envoy will try to authorize using the authorization service specified inContourConfiguration
The text was updated successfully, but these errors were encountered: