policy: add new certificate-authority option for downstream mTLS client certificates (#1835)

* policy: add new certificate-authority option for downstream mTLS client certificates

* update proto, docs
This commit is contained in:
Caleb Doxsey 2021-02-01 08:10:32 -07:00 committed by GitHub
parent 8e3404e7be
commit cc85ea601d
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
15 changed files with 490 additions and 406 deletions

View file

@ -62,7 +62,7 @@ func Test_getEvaluatorRequest(t *testing.T) {
}},
})
actual := a.getEvaluatorRequestFromCheckRequest(
actual, err := a.getEvaluatorRequestFromCheckRequest(
&envoy_service_auth_v2.CheckRequest{
Attributes: &envoy_service_auth_v2.AttributeContext{
Source: &envoy_service_auth_v2.AttributeContext_Peer{
@ -88,6 +88,7 @@ func Test_getEvaluatorRequest(t *testing.T) {
ID: "SESSION_ID",
},
)
require.NoError(t, err)
expect := &evaluator.Request{
Session: evaluator.RequestSession{
ID: "SESSION_ID",
@ -278,7 +279,7 @@ func Test_getEvaluatorRequestWithPortInHostHeader(t *testing.T) {
}},
})
actual := a.getEvaluatorRequestFromCheckRequest(&envoy_service_auth_v2.CheckRequest{
actual, err := a.getEvaluatorRequestFromCheckRequest(&envoy_service_auth_v2.CheckRequest{
Attributes: &envoy_service_auth_v2.AttributeContext{
Source: &envoy_service_auth_v2.AttributeContext_Peer{
Certificate: url.QueryEscape(certPEM),
@ -299,6 +300,7 @@ func Test_getEvaluatorRequestWithPortInHostHeader(t *testing.T) {
},
},
}, nil)
require.NoError(t, err)
expect := &evaluator.Request{
Session: evaluator.RequestSession{},
HTTP: evaluator.RequestHTTP{