-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Append a request header with a value from a secret #37656
Comments
Sounds a bit risky. |
@adisuissa another use case: appending authentication header to the HTTP CONNECT request sent to the upstream forward proxy, like Squid. Currently, we can only set a literal value in I could try to contribute this feature. |
@adisuissa sharing a real use case example here I would like to route API requests from downstream and upstream it to OpenAI, which uses an API Key as an authentication mechanism https://platform.openai.com/docs/quickstart?language-preference=curl#make-your-first-api-request |
I have similar usecase. I have a static website, and I need to communicate with an API behind Envoy. Instead of creating a proxy to add api token to the reqeust for me, I just want to let envoy handle that before routing traffic to that API |
I agree that the header's value should not be part of the config-dump, and adding a way to annotate it as sensitive seems the right way to go. However, this is different than what I thought the original request was: adding an ability to copy the output of SDS and send it to the upstream. |
I like the annotation idea @adisuissa , does this design pattern already exist in Envoy Proxy today ? looks like an attempt was made to redact header values in a bottom up way #27820
|
closing this issue as it can be solved with https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_filters/credential_injector_filter |
Description:
I'd like the ability to append a request header value from a secret (SDS) , this header represents the API key header and the secret represents the actual API key
The request_headers_to_add field in the RouteConfiguration uses the HeaderValueOption which only supports a literal value
Relates to envoyproxy/gateway#4757
[optional Relevant Links:]
The text was updated successfully, but these errors were encountered: