-
Notifications
You must be signed in to change notification settings - Fork 115
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bad request returns forbidden #646
Comments
Can this be achieved with the |
We've thought about that but the concern there is that setting covers a wide range of errors including network errors. When considering the patch, we were thinking of specifically handling errors that occur in envoyauth.RequestToInput as "Bad Request"... |
Gotcha. Yeah I think that makes sense. If you'd pick that up, it'll be great. Can you imagine cases where the current behaviour is desirable? I'm wondering about backwards compatibility... |
Off the top of my head I was not sure if there are situations where the current behavior is desirable. However, we could make this behavior opt-in via configuration if we wanted to be safe... |
This issue has been automatically marked as inactive because it has not had any activity in the last 30 days. |
When using the opa-envoy-plugin, requests such as sending invalid JSON result in a "403 - Forbidden" being returned to the downstream.
Example:
Returns:
The error in the case above occurs when the plugin is attempting to fetch the parsed body here.
We think we could potentially submit a PR to the plugin that provides an enhancement to return a
service.auth.v3.DeniedHttpResponse
with a "400 - Bad Request" response but wanted to see what the community's thoughts were on something like this before we did so.Would this type of enhancement make sense? Are there other possible solutions here that we may have overlooked?
Other data:
v0.35.0-envoy-1
Logs:
The text was updated successfully, but these errors were encountered: