oauth2 filter: encrypt tokens#39059
Conversation
0c894d8 to
84dc803
Compare
|
This pull request has been automatically marked as stale because it has not had activity in the last 30 days. It will be closed in 7 days if no further activity occurs. Please feel free to give a status update now, ping for review, or re-open when it's ready. Thank you for your contributions! |
|
This pull request has been automatically closed because it has not had activity in the last 37 days. Please feel free to give a status update now, ping for review, or re-open when it's ready. Thank you for your contributions! |
84dc803 to
47b4c52
Compare
b6b043b to
4b95c2d
Compare
Signed-off-by: Huabing (Robin) Zhao <zhaohuabing@gmail.com>
Signed-off-by: Huabing (Robin) Zhao <zhaohuabing@gmail.com>
Signed-off-by: Huabing (Robin) Zhao <zhaohuabing@gmail.com>
Signed-off-by: Huabing (Robin) Zhao <zhaohuabing@gmail.com>
This reverts commit 5261a1f. Signed-off-by: Huabing (Robin) Zhao <zhaohuabing@gmail.com>
Sounds good. I'm adding a runtime guard. |
Signed-off-by: Huabing (Robin) Zhao <zhaohuabing@gmail.com>
Signed-off-by: Huabing (Robin) Zhao <zhaohuabing@gmail.com>
Signed-off-by: Huabing (Robin) Zhao <zhaohuabing@gmail.com>
Signed-off-by: Huabing (Robin) Zhao <zhaohuabing@gmail.com>
This comment was marked as resolved.
This comment was marked as resolved.
|
see below |
Co-authored-by: phlax <phlax@users.noreply.github.com> Signed-off-by: Huabing (Robin) Zhao <zhaohuabing@gmail.com>
Signed-off-by: Huabing (Robin) Zhao <zhaohuabing@gmail.com>
|
/retest |
Signed-off-by: Huabing (Robin) Zhao <zhaohuabing@gmail.com>
Signed-off-by: Huabing (Robin) Zhao <zhaohuabing@gmail.com>
|
/retest |
|
I wonder if this encryption stuff should be runtime flag in the first place vs the API knob. This is a breaking change to any existing deployment and at least we will NEVER be able to turn off the runtime flag. |
Commit Message: This PR encrypts the access, ID, and refresh tokens for the OAuth2 filter.
Risk Level: low
Testing: Unit tests and integration tests. I also manually verified that this worked using AWS Cognito.
Docs Changes: No user-facing change, as the token cookies are decrypted before forwarding to the backend service.
Release Notes: Yes
Implements #23508
@denniskniep