-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
[NET-1151 NET-11228] security: Add request normalization and header match options to prevent L7 intentions bypass #21816
Merged
zalimeni
merged 1 commit into
main
from
zalimeni/feature/net-1151-l7-intentions-security-fixes
Oct 16, 2024
Merged
[NET-1151 NET-11228] security: Add request normalization and header match options to prevent L7 intentions bypass #21816
zalimeni
merged 1 commit into
main
from
zalimeni/feature/net-1151-l7-intentions-security-fixes
Oct 16, 2024
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
github-actions
bot
added
theme/api
Relating to the HTTP API interface
theme/cli
Flags and documentation for the CLI interface
theme/ui
Anything related to the UI
theme/envoy/xds
Related to Envoy support
labels
Oct 12, 2024
zalimeni
added
the
backport/all
Apply backports for all active releases per .release/versions.hcl
label
Oct 12, 2024
zalimeni
changed the title
[NET-1151 NET-11228] CE draft
[NET-1151 NET-11228] security: Add request normalization and header match options to prevent L7 intentions bypass
Oct 14, 2024
zalimeni
requested review from
blake,
jmurret,
ndhanushkodi and
dduzgun-security
October 14, 2024 14:46
zalimeni
force-pushed
the
zalimeni/feature/net-1151-l7-intentions-security-fixes
branch
4 times, most recently
from
October 14, 2024 16:49
b844f93
to
7f5b4db
Compare
zalimeni
force-pushed
the
zalimeni/feature/net-1151-l7-intentions-security-fixes
branch
from
October 14, 2024 17:00
7f5b4db
to
947d789
Compare
Fixed whitespace causing issues w/ docs mesh config entry render, and incorrect copilot-ed defaults I missed in the last two entries. |
dduzgun-security
approved these changes
Oct 15, 2024
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Awesome work, LGTM! 🙌 Only 2 suggestions for the changelogs.
ndhanushkodi
approved these changes
Oct 15, 2024
zalimeni
force-pushed
the
zalimeni/feature/net-1151-l7-intentions-security-fixes
branch
from
October 16, 2024 01:50
b62f0fa
to
650ad8a
Compare
Rebased and squashed for merge |
zalimeni
force-pushed
the
zalimeni/feature/net-1151-l7-intentions-security-fixes
branch
from
October 16, 2024 15:21
650ad8a
to
810ba95
Compare
Fixed minor docs misalignment from docs PR -> api/agent structs |
zalimeni
deleted the
zalimeni/feature/net-1151-l7-intentions-security-fixes
branch
October 16, 2024 16:23
hc-github-team-consul-core
added
backport/1.20
Changes are backported to 1.20
backport/ent/1.15
Changes are backported to 1.15 ent
backport/ent/1.18
Changes are backported to 1.18 ent
backport/ent/1.19
Changes are backported to 1.19 ent
labels
Oct 16, 2024
zalimeni
removed
backport/ent/1.15
Changes are backported to 1.15 ent
backport/all
Apply backports for all active releases per .release/versions.hcl
backport/ent/1.18
Changes are backported to 1.18 ent
backport/ent/1.19
Changes are backported to 1.19 ent
labels
Oct 16, 2024
This was referenced Oct 16, 2024
This was referenced Oct 17, 2024
This was referenced Oct 18, 2024
Merged
4 tasks
missylbytes
pushed a commit
that referenced
this pull request
Oct 29, 2024
…atch options to prevent L7 intentions bypass (#21816) mesh: add options for HTTP incoming request normalization Expose global mesh configuration to enforce inbound HTTP request normalization on mesh traffic via Envoy xDS config. mesh: enable inbound URL path normalization by default mesh: add support for L7 header match contains and ignore_case Enable partial string and case-insensitive matching in L7 intentions header match rules. ui: support L7 header match contains and ignore_case Co-authored-by: Phil Renaud <phil@riotindustries.com> test: add request normalization integration bats tests Add both "positive" and "negative" test suites, showing normalization in action as well as expected results when it is not enabled, for the same set of test cases. Also add some alternative service container test helpers for verifying raw HTTP request paths, which is difficult to do with Fortio. docs: update security and reference docs for L7 intentions bypass prevention - Update security docs with best practices for service intentions configuration - Update configuration entry references for mesh and intentions to reflect new values and add guidance on usage
missylbytes
pushed a commit
that referenced
this pull request
Oct 30, 2024
…atch options to prevent L7 intentions bypass (#21816) mesh: add options for HTTP incoming request normalization Expose global mesh configuration to enforce inbound HTTP request normalization on mesh traffic via Envoy xDS config. mesh: enable inbound URL path normalization by default mesh: add support for L7 header match contains and ignore_case Enable partial string and case-insensitive matching in L7 intentions header match rules. ui: support L7 header match contains and ignore_case Co-authored-by: Phil Renaud <phil@riotindustries.com> test: add request normalization integration bats tests Add both "positive" and "negative" test suites, showing normalization in action as well as expected results when it is not enabled, for the same set of test cases. Also add some alternative service container test helpers for verifying raw HTTP request paths, which is difficult to do with Fortio. docs: update security and reference docs for L7 intentions bypass prevention - Update security docs with best practices for service intentions configuration - Update configuration entry references for mesh and intentions to reflect new values and add guidance on usage
# for free
to join this conversation on GitHub.
Already have an account?
# to comment
Labels
backport/1.20
Changes are backported to 1.20
theme/api
Relating to the HTTP API interface
theme/cli
Flags and documentation for the CLI interface
theme/envoy/xds
Related to Envoy support
theme/ui
Anything related to the UI
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
This PR brings in all previously reviewed changes from the
zalimeni/feature/net-1151-l7-intentions-security-fixes
feature branch intomain
and release branches. All changes were previously approved as part of Enterprise reviews except for the changelog added in this PR.Changes include:
I'll squash and rebase these commits prior to merge to make backports more manageable.
Once this PR is merged, I'll cut
api
across active release branches, which will allow for hashicorp/consul-k8s#4385 to be updated and merged as well, completing the cross-repo changeset.Testing & Reproduction steps
See previous PRs for testing details. All unit and integration tests are expected to pass.
PR Checklist