Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: Implicitly allow egress traffic to *.amazoncognito.com #236

Open
bcelenza opened this issue Jul 22, 2020 · 1 comment
Open
Labels
enhancement Roadmap: Awaiting Customer Feedback We need to get more information in order understand how we will implement this feature.

Comments

@bcelenza
Copy link
Contributor

bcelenza commented Jul 22, 2020

If you want to see App Mesh implement this idea, please upvote with a 👍.

Tell us about your request
Today App Mesh allows endpoints within the mesh to communicate with all AWS services (*.amazonaws.com) without the customer needing to explicitly define them as backends. However, some AWS services have different domains, such as Amazon Cognito (*.amazoncognito.com). It would be great to automatically allow egress traffic from endpoints within the mesh to Cognito.

Which integration(s) is this request for?
All

Are you currently working around this issue?
It's possible to model Amazon Cognito as a Virtual Service and a Virtual Node where the Virtual Service name and Virtual Node DNS hostname is the same as the exact Cognito domain used. However, for this to work, the proxy will need to initiate TLS using a client policy, and the application will need to disable TLS for Cognito communication (see #162 for why this is the case).

@jamsajones jamsajones added enhancement Roadmap: Awaiting Customer Feedback We need to get more information in order understand how we will implement this feature. labels Jul 29, 2020
@bcelenza bcelenza removed their assignment Dec 3, 2020
@hscheib
Copy link

hscheib commented May 3, 2021

This is a similar problem to the request above.

We have our mesh set to DROP_ALL by default and have added any EKS app backends and database backends to the appropriate apps and all traffic works as expected. We have an external non AWS https request that fails even when we have it added as a virtual service and virtual node and set as a backend.



My use case is for https://redacted.auth0.com domain and when we try to curl that service the request fails for a TLS error



curl: (35) error:1408F10B:SSL routines:ssl3_get_record:wrong version number

We are getting around this by adding appmesh.k8s.aws/egressIgnoredPorts: "443” to our EKS pods. This now opens up every service on 443 on the internet to that app which is not in line with DROP_ALL paradigm and allowing only defined backends.

This closed issue seems to be related. We want to keep apps as locked down as possible, and this seems to be the last link in our least permissible chain.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement Roadmap: Awaiting Customer Feedback We need to get more information in order understand how we will implement this feature.
Projects
None yet
Development

No branches or pull requests

4 participants