-
Notifications
You must be signed in to change notification settings - Fork 1.5k
[feat gw api] Add auth cognito action for secure listeners on ALBs #4313
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[feat gw api] Add auth cognito action for secure listeners on ALBs #4313
Conversation
72c8f0f
to
5ec3c44
Compare
@@ -166,7 +166,7 @@ type AuthenticateCognitoActionConfig struct { | |||
// +kubebuilder:default=604800 | |||
// +kubebuilder:validation:Minimum=1 | |||
// +kubebuilder:validation:Maximum=604800 | |||
SessionTimeout *int32 `json:"sessionTimeout,omitempty"` | |||
SessionTimeout *int64 `json:"sessionTimeout,omitempty"` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just curious, why the change?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
To match the elbv2 model.
@@ -476,6 +476,8 @@ _Appears in:_ | |||
| `enableICMP` _boolean_ | EnableICMP [Network LoadBalancer]<br />enables the creation of security group rules to the managed security group<br />to allow explicit ICMP traffic for Path MTU discovery for IPv4 and dual-stack VPCs | | | | |||
| `manageBackendSecurityGroupRules` _boolean_ | ManageBackendSecurityGroupRules [Application / Network LoadBalancer]<br />specifies whether you want the controller to configure security group rules on Node/Pod for traffic access<br />when you specify securityGroups | | | | |||
| `minimumLoadBalancerCapacity` _[MinimumLoadBalancerCapacity](#minimumloadbalancercapacity)_ | MinimumLoadBalancerCapacity define the capacity reservation for LoadBalancers | | | | |||
| `wafV2` _[WAFv2Configuration](#wafv2configuration)_ | WAFv2 define the AWS WAFv2 settings for a Gateway [Application Load Balancer] | | | |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for adding this in!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah no worries. Next time if you change anything in CRDs make sure you also run make gw-api-ref-docs
to update our Spec docs.
/approved |
/lgtm |
if len(tf.Options.CertificateARNs) == 0 { | ||
Skip("Skipping tests, certificates not specified") | ||
} | ||
// Skip test if Cognito options not provided (similar to certificate check) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for writing this E2E test, it is super helpful! Can you (in a separate PR) please include some instructions for setting up your testing environment?
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: shraddhabang, zac-nixon The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest pull-aws-load-balancer-controller-e2e-test |
@shraddhabang: The
Use
In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/test pull-aws-load-balancer-controller-e2e-test |
Description
This commit implements complete support for AWS Cognito authentication actions in ALB listener rules through Gateway API ListenerRuleConfiguration resources, enabling users to configure authentication at the load balancer level.
Complete Cognito Configuration Support
Enhanced Testing Framework
FollowRedirects
support intest/framework/http/verifier.go
to handle 302 authentication redirectsChecklist
README.md
, or thedocs
directory)BONUS POINTS checklist: complete for good vibes and maybe prizes?! 🤯