You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Each incoming gRPC/HTTP invocation is represented by a message containing two Channel handles: a "request receiver" and a "response sender".
Currently the "response sender" gets the public_untrusted label. However, as explained in the docs, it should have a confidentiality component that is set based on the identity of the user. This is needed to avoid any accidental data leaks.
The text was updated successfully, but these errors were encountered:
Yes. But partially. I'll update the description here, and can create a separate issue to track setting the user identity as the integrity label. Do we have a top-level issue for integrity labels?
rbehjati
changed the title
Set correct invocation channel labels for HTTP and gRPC server nodes based on user identity
Set the user's identity as the confidentiality tag in invocation channels for HTTP and gRPC server nodes
Nov 18, 2020
Each incoming gRPC/HTTP invocation is represented by a message containing two Channel handles: a "request receiver" and a "response sender".
Currently the "response sender" gets the public_untrusted label. However, as explained in the docs, it should have a confidentiality component that is set based on the identity of the user. This is needed to avoid any accidental data leaks.
The text was updated successfully, but these errors were encountered: