-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Move selectors to expressions in dev environment #141
Conversation
Signed-off-by: Adam Cattermole <acatterm@redhat.com>
"key": "user_id" | ||
"expression": { | ||
"key": "user_id", | ||
"value": "string(getHostProperty(['metadata', 'filter_metadata', 'envoy.filters.http.header_to_metadata', 'user_id']))" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
shouldn't be auth.somthing
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No this one is coming from the header_to_metadata
filter proving we can get filter state from non-kuadrant filters
"key": "user_id" | ||
"expression": { | ||
"key": "user_id", | ||
"value": "string(getHostProperty(['metadata', 'filter_metadata', 'envoy.filters.http.header_to_metadata', 'user_id']))" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wonder what would be required if the auth step is configured using gateway capabilities like Security Policy (but not used for ext auth service, but jwt
for instance.
Signed-off-by: Adam Cattermole <acatterm@redhat.com>
Signed-off-by: Adam Cattermole <acatterm@redhat.com>
request.headers
debug
log for therequest.headers
map