Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sentry JWKS validator: add support for passing root CA certs #7366

Merged
merged 5 commits into from Jan 13, 2024

Conversation

ItalyPaleAle
Copy link
Contributor

Allows fetching a JWKS from a HTTPS server that uses a custom CA certificate

Allows fetching a JWKS from a HTTPS server that uses a custom CA certificate

Signed-off-by: ItalyPaleAle <43508+ItalyPaleAle@users.noreply.github.com>
@ItalyPaleAle ItalyPaleAle requested review from a team as code owners January 11, 2024 19:38
Signed-off-by: ItalyPaleAle <43508+ItalyPaleAle@users.noreply.github.com>
@ItalyPaleAle ItalyPaleAle added this to the v1.13 milestone Jan 11, 2024
@JoshVanL JoshVanL modified the milestones: v1.13, v1.14 Jan 12, 2024
@JoshVanL
Copy link
Contributor

Moving to v1.14 milestone as we are beyond v1.13 feature freeze and imminently going into code freeze.

@ItalyPaleAle
Copy link
Contributor Author

This is a P0 for Microsoft for 1.13. It's only 5 LOCs if you exclude tests.

@ItalyPaleAle ItalyPaleAle modified the milestones: v1.14, v1.13 Jan 12, 2024
@JoshVanL
Copy link
Contributor

@ItalyPaleAle this has not been discussed with the project more widely and cannot be pushed through without consensus. Please create an issue as to why we need an exception to be included and the bug this is fixing. New features will not be accepted at this stage.

@JoshVanL JoshVanL modified the milestones: v1.13, v1.14 Jan 12, 2024
@ItalyPaleAle
Copy link
Contributor Author

@ItalyPaleAle this has not been discussed with the project more widely and cannot be pushed through without consensus. Please create an issue as to why we need an exception to be included and the bug this is fixing. New features will not be accepted at this stage.

@mukundansundar is aware and agreed.

Reason is pretty self-evident and it's related to security, we need to set the CA cert for when fetching a JWKS from a HTTPS endpoint. It's required for security otherwise the only option is HTTP, which doesn't allow authenticating the origin server, so the JWKS could be spoofed.

@ItalyPaleAle ItalyPaleAle modified the milestones: v1.14, v1.13 Jan 12, 2024
Copy link

codecov bot commented Jan 12, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Comparison is base (38b0511) 64.42% compared to head (1535370) 64.43%.

❗ Current head 1535370 differs from pull request most recent head 3106a14. Consider uploading reports for the commit 3106a14 to get more accurate results

Additional details and impacted files
@@            Coverage Diff             @@
##           master    #7366      +/-   ##
==========================================
+ Coverage   64.42%   64.43%   +0.01%     
==========================================
  Files         238      238              
  Lines       21833    21833              
==========================================
+ Hits        14066    14069       +3     
+ Misses       6560     6553       -7     
- Partials     1207     1211       +4     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@yaron2
Copy link
Member

yaron2 commented Jan 12, 2024

I agree that this is a feature that needs an exception and should be treated as such. We should always try to bring these up ahead of time. With that, judging by the small change-set and scope of the PR and coupled with the fact it improves our security posture, I support accepting this into the 1.13 release and have no issues getting this merged.

@ItalyPaleAle
Copy link
Contributor Author

Thank you @yaron2.

I agree that sooner would have been better. We didn't realize this was needed this till yesterday.

@artursouza
Copy link
Member

artursouza commented Jan 12, 2024

I agree to accept this change. I also recommend vendors to use internal fork to have their urgent needs met without the urge to workaround the OSS release process.

@yaron2 yaron2 merged commit f66edee into dapr:master Jan 13, 2024
11 of 15 checks passed
@ItalyPaleAle ItalyPaleAle deleted the jwks-ca branch January 16, 2024 18:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants