application-connectivity-validator/

directory
v0.0.0-...-a52e8f6 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jan 30, 2020 License: Apache-2.0

README

Application Connectivity Validator

Overview

The Application Connectivity Validator validates client certificate subjects. It proxies the requests to the Event Service and the Application Registry.

A single instance of the component is deployed for an Application and uses these parameters:

  • proxyPort is the port on which the reverse proxy is exposed. The default port is 8081.
  • externalAPIPort is the port on which the external API is exposed. The default port is 8080.
  • tenant is the tenant of the Application for which the proxy is deployed. Omitted if empty.
  • group is the group of the Application for which the proxy is deployed. Omitted if empty.
  • eventServicePathPrefixV1 is the path prefix for which requests are forwarded to the Event Service V1 API. The default value is /v1/events.
  • eventServicePathPrefixV2 is the path prefix for which requests are forwarded to the Event Service V2 API. The default value is /v2/events.
  • eventServiceHost is the host and the port of the Event Service. The default value is events-api:8080.
  • appRegistryPathPrefix is the path prefix for which requests are forwarded to the Application Registry. The default value is /v1/metadata.
  • appRegistryHost is the host and the port of the Event Service. The default value is application-registry-external-api:8081.

Details

The certificate subjects are validated using the X-Forwarded-Client-Cert header. After successful client certificate verification defined in the Istio Gateway, the Envoy Proxy adds the header to the request. The service to which the header is added must have mutual TLS between Istio sidecar Pods enabled. This is an example X-Forwarded-Client-Cert header:

Hash=f4cf22fb633d4df500e371daf703d4b4d14a0ea9d69cd631f95f9e6ba840f8ad;Subject="CN=test-application,OU=OrgUnit,O=Organization,L=Waldorf,ST=Waldorf,C=DE";URI=,By=spiffe://cluster.local/ns/kyma-integration/sa/default;Hash=6d1f9f3a6ac94ff925841aeb9c15bb3323014e3da2c224ea7697698acf413226;Subject="";URI=spiffe://cluster.local/ns/istio-system/sa/istio-ingressgateway-service-account

The header contains information about multiple certificates because of the client certificate used in mTLS-secure communication between sidecars of a service.

The Application Connectivity Validator forwards only the requests with the X-Forwarded-Client-Cert header that contains Subject with the following fields corresponding to the Application custom resource:

  • CommonName is the name of the Application custom resource.
  • (Optional) Organization is the tenant.
  • (Optional) OrganizationalUnit is the group.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL