-
Notifications
You must be signed in to change notification settings - Fork 386
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
security policies for tcp gateways not working #4908
Comments
@davem-git Currently the SecurityPolicy only applies to HTTPRoute/GRPCRoute as all the other Security features except client IP based authz make no sense to TCPRoute. As a workaround, you should be able to add a RBAC filter to the filter chain through EnvoyPatchPolicy. Do we want to extend the SecurityPolicy to TCPRoute? @envoyproxy/gateway-maintainers ? |
I'll look into that, any documentation to help with his use case? I've looked in to the patch policy before, but I think my inexperience with envoys outside of the gateway has made it difficult. I've tried to patch other things without much luck. Here's the filter your referring to right? https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_filters/rbac_filter |
all the fields today in SecurityPolicy are HTTP specific, and do not directly apply to TCPRoute today.
I'm more inclined to 1. atm |
From this, I can't do as suggested and shoehorn this with a patch policy. I'd rather see it supported as it is a common use case. Companies like to say the endpoint is supported with an IP filter. |
The changes would need to be in the envoy proxy itself, then in the envoy gateway. Is that where I would look if I am interested in helping address this problem? using decision 1? |
+1 on reusing the sam API, but only support client IP based auth for TCP. |
@davem-git all the changes needed are in Envoy Gateway itself |
Description:
Security Policies can be applied on gateways, but they don't work on gateways with TCP listeners
[optional Relevant Links:]
gh discussion on it from this discussion
example log from from TCP gateway, you can see the source IP listed as
downstream_remote_address":"<redacted_public_address:51822"
example of the security policy
The text was updated successfully, but these errors were encountered: