You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
oauth2: make CSRF and code verifier token expiration configurable (#39877)
Commit Message: oauth2: make CSRF and code verifier token expiration
configurable
Additional Description: Currently, the OAuth2 filter hardcodes the
values of the CSRF and code verifier tokens to `600s` (10 minutes) .
This limits flexibility for use cases where:
- Users need shorter expiration (e.g., high-security scenarios).
- Users need longer expiration (e.g., backward-compatibility).
This PR makes both tokens configurable, adding
`default_csrf_token_expires_in` and
`default_code_verifier_token_expires_in` fields to the OAuth2 filter
configuration. Both default to ``600s`` (10 minutes) if not specified,
keeping backward compatibility.
Risk Level: Low
Testing: Added tests for cases where uses sets the values of the new
fields in the configuration. The default values are already tested in
almost all the tests.
Docs Changes: N/A
Release Notes: N/A
Platform Specific Features: N/A
[Optional Runtime guard:]
[Optional Fixes #Issue]
[Optional Fixes commit #PR or SHA]
[Optional Deprecated:]
[Optional [API
Considerations](https://github.com/envoyproxy/envoy/blob/main/api/review_checklist.md):]
---------
Signed-off-by: Gustavo Moyano <[email protected]>
Mirrored from https://github.com/envoyproxy/envoy @ d7a588d5ccdfd9bcccad57dd9b764683017e0da1
0 commit comments