-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make the name of the client certificate attribute which is mapped to roles configurable #40838
Make the name of the client certificate attribute which is mapped to roles configurable #40838
Conversation
This comment has been minimized.
This comment has been minimized.
...nsions/vertx-http/runtime/src/main/java/io/quarkus/vertx/http/runtime/AuthRuntimeConfig.java
Outdated
Show resolved
Hide resolved
integration-tests/mtls-certificates/src/main/resources/c-role-mappings.txt
Outdated
Show resolved
Hide resolved
There is difference betweenJDK 17 and JDK21 as far as SAN list is concerned (17 doesn't parse ASN1). I'll fix the CI failure. |
d9d5ea5
to
214c8b7
Compare
This comment has been minimized.
This comment has been minimized.
Hi @michalvavrik, it is done very comprehensively which is a trademark of your work, it is totally ready to go, and I think having String instead of the enum keeps options open for custom certificate attributes being used as well, though I see now it required you to do some extra parsing. However, I'd like to suggest that you review which of SAN properties do we really want to support out of the box immediately. We don't usually do some wildcard kind of mappings from the identity to roles, as some of these attributes allow, like mapping any certificate from a given IP address to roles, etc. IMHO only those SAN attributes which can |
Sure. I can see users mapping roles from:
@cescoffier @sberyozkin please let's share your thoughts on what SANs should be supported, it will limit number of iterations and reworks. |
I'd keep those 3 you listed, those which are used in some setups and are unique enough to identity a single subject |
214c8b7
to
d8ee626
Compare
I have dropped all SANs but URI, ANY and RFC822. IMO we need to wait for @cescoffier feedback when he finds a time. |
Sounds good, thanks @michalvavrik. Starting with these SAN attributes is reasonable IMHO |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, waiting for @cescoffier to review as well
@michalvavrik By the way, I forgot to ask, can we use |
This comment has been minimized.
This comment has been minimized.
It's very easy for me to change it, actually it will simplify situation. I don't mind to changing it. In the future, if someone asks for something else than DN/SN, we will need to keep convention that only RDN is not prefixed. Let me change it. |
d8ee626
to
e6441a5
Compare
Status for workflow
|
hey @cescoffier , if you have any RFCs in the future when you find a time, just write them down and I'll address them ASAP. Thanks |
closes: #39364