►
From YouTube: Technical Oversight Committee 2020/10/16
Description
Istio's Technical Oversight Committee for October 16th, 2020.
Topics:
- API for external authorization plugins
- Release managers for 1.8
A
Does
anyone
know
how
to
access
the
youtube
account
because
I
don't
have
access
to
it?
I
have
the
video
from
last
time,
but
I
don't
have
the
login
craig.
Does
okay,
I'll
ping,
craig
and
I'll
get
that
loaded
up.
B
Since
I
hit
the
record
button,
I
might
get
the
email.
If
I
do
actually
I
created
the
invite.
A
To
fix
the
old
meeting,
because
the
old
meeting
was
owned
by
someone
who
left
the
company
and
that's
why
I
wasn't
recording
anymore
good
debugging,
but
then
I
was
silly
enough
to
create
the
meeting
so
now
I
have
to
do
that.
Upload.
C
D
A
A
But
you're
getting
feedback
yeah,
let's
go
through
the
release,
broker
blockers.
It's
a
good
idea.
B
E
B
E
Okay,
go
ahead.
Go
ahead,
all
right,
so
I
mean
for
those
who
don't
know.
This
will
be
my
very
last
day
in
istio
onward
that
trade
and
all
of
those
stuff,
and
so
I'm
moving
on
to
do
something
completely
different,
and
so
I
just
wanted
to
tell
people
in
person.
This
will
be
probably
my.
This
will
be
my
last
doc
meeting
and
anything
has
to
do
with
istio
kubernetes
the
whole
land.
E
E
E
No,
it
was
actually
I
mean
it
was.
I
mean
I
think
I
don't
know
if
dan
burke
was
actually
here,
but
I
think
he's
probably
the
only
one
here
who
who
he
and
I
go
back
like
five
six
years
back
in
this
entire
space
but
yeah,
it's
been
a
wild
ride
and
I
still
remember
the
very
first
time
we
presented
amalgamate
to
eric
prover
and
I
don't
know
who
else
was
actually
on
the
caller.
E
H
C
C
Sure
it's
been
a
pleasure
we've.
You
know
we've
been
working
together
for
a
long
time
in
this
project.
You
know:
we've
made
huge
contributions
to
it,
so
we're
all
really
thankful
for
everything
that
you've
done
and
you're
not
really
going
to
be
allowed
to
escape.
I'm
sorry,
I'm
going
to
ensure
that
personally
so
yeah.
E
C
Over
to
a
new
google,
you
know
account
you're
gonna,
get
like
a
thousand
notifications,
penance.
E
K
E
D
A
I
L
A
L
I
think
I
think
they
are
all
oh
actually,
two
of
them
are
missing
assignments
like
the
sds,
but
like
the
line
from
line
to
your
line,
five
are
assigned
to
william
and
I
think,
and
which
changes
in
progress.
So
I
don't
worry
too
much
about
those
two,
but
the
second
one.
Oh
sorry,
the
crd
regression,
I
don't
think
it's
assigned
to
everyone.
I
Yeah
jason
work
on
it
in
1.6.8
or
something.
A
L
Okay
and
this,
the
other
one,
is
the
dog
chaser
competition,
I'm
not
sure
whether
it's
a
regression
or
not,
but
I
mean
enjoying
your
market
so
for
this
blocker,
so
you
can
take
a
look
at
it.
M
L
L
L
Yeah,
we'll
clean
up
all
the
p0's
lots
of
gear,
zeros
or
long-term
work
and
can
be
removed
from
this
street,
and
I
think,
by
the
way
of
today,
we
will
have
a
better
look
and
I
will
ping
each
individual
assignments
of
those
speed
videos
to
get
an
eta.
L
A
A
Okay
and
also
a
call
out
for
the
testing.
I
Yes,
please,
it's
always
a
struggle
to
actually
chase
first
to
sign
up.
So
since
it's
starting
wednesday,
I
really
appreciate
if
we
can
get
some
sign-ups.
Please.
A
D
K
N
I
So
if
we
can,
I
don't
know,
try
to
get
at
least
five
percent.
Ten
percent
of
these
needs
automation
to
actually
get
automated.
It's
another
thing
which
you're
not
able
to
achieve.
A
All
right,
so,
if
people
could
pick
those
up,
your
efforts
will
be
eternally
rewarded
with
prizes
short
on.
We
need.
A
H
Yeah
I
mean:
do
we
do
any
twitter
or
external
messaging
other
than
the
calendaring
things
that
we
have
done
in
the
past.
D
I
H
Okay:
let's
try
to
do
some
twitter
messaging
and
see
if
that
helps,
but
I
agree
with
louis
louis
mostly
we
will
have
to
do
a
lot
of
testing
yeah
now.
H
O
I
can
I
can.
This
is
christian.
I
can
jump
in
and
help
on
this
release
on
testing,
and
then
we
can
also
make
announcements
I'll
I'll
make
sure
I
get
a
couple
of
these
automated
at
least
a
couple.
A
I
A
Okay,
all
right,
so
we
did
shurim's
announcement.
I
before
we
dive
into
authorization
support.
I
wanted
to
go
through
a
couple
quick
earth
things
so
that
we
nico
was
signed
up
to
be
one
of
the
release,
managers
for
1.8
he's
leaving
our
team
and
is
no
longer
going
to
be
released
manager
for
1.8.
A
A
I
A
I
Yeah,
especially
at
the
end
stages,
triaging,
getting
things
done.
Three
is
good,
we
probably
don't
need
them
in
the
beginning,
but
in
the
late
stages
we
it's
good
to
have.
I
A
Okay:
okay,
let's
follow
up
on
that!
Is
there
anything
else,
quick
on
this
before
we
should
before
we
dive
into
the
authorization
support
questions.
A
P
P
Hi
everyone,
so
this
is
a
design
proposal
from
the
security
work
group
about
having
better
and
first
class
support
of
the
excel
authorization
in
the
authorization
policy,
and
we
bring
this
up
in
the
tlc
meeting
to
resolve
so
first
to
review
the
design
and
also
resolve
many
issues
arised
in
the
review
process
that
might
need
input
from
the
toc
and
other
working
group
to
help
make
the
decision
and
approval
of
this
design.
P
Some
of
those
things
are
related
to
the
general
difficulty
in
using
our
filter.
Some
of
those
things
are
specific
to
the
external
oc
process.
Here,
for
example,
the
pipe
character
is
invalid
to
be
used
in
the
xlrc
grpc
client,
but
that
is
the
default
cluster
format
we
generate
in
pilot
and
also
the
only
filter,
it's
generally
hard
to
use,
not
only
because
of
the
syntax,
the
transparent
lecture.
It's
also
because
of
it's
exposing
the
native
onward
filter
api.
P
So
whenever
a
small
change
in
the
upstream
away
api,
it
could
cause
the
user
applied
onward
filter
to
fail.
Sometimes
it
will
fail
silently,
for
example,
we
have
seen
many
users
complaining
this,
that
the
version
of
the
object
in
the
onboard
filter
is
dependent
on
the
version
of
visual
is
using,
and
this
was
a
huge
pain.
P
So,
additionally,
the
other
big
pain
point
in
using
the
exclusive
flow
is
that
it
currently
cannot
support
to
trigger
the
extra
flow
conditionally.
You
have
to
enable
it
either
for
all
of
your
requests
or
you
disable
it
even
technically.
It
allows
you
to
use
the
per
route
override
to
find
controls
or
triggering
rule,
but
practically
it
is
very,
very
hard
and
mostly
impossible
to
use
because
of
the
complexity
in
dealing
with
the
rotting
rules
that
is
already
generated
by
istio.
H
P
I
think
it's
a
if
the
tlc
approves
this
design.
It
means
we
resolved
the
questions
and
concerns
from
about
this
talk.
It's
unfortunately
costing
is
not
here,
because
I
think
he
brought
up
most
of
the
concerns
that
resolves.
That
requires
the
result
from
the
tlc
and
other.
P
Previously,
this
is
targeting
one
eight,
but
for
now
I
think
it
will
most
likely
not
in
one
eighth.
Okay
got
it:
yeah
no
carriers.
A
Skip
ahead
a
little
bit
and
summarize
so
this
is
this
is
basically
the
same
api
as
mixer's
check
api
in
a
sense
right.
It's
it's
forming
the
same
place
in
istio,
where
you
can
say
you
know
or
like
the
external
tech
apis
right.
It's
like
when
this
match
occurs
in
this
in
this
situation.
Please
call
this
service
to
check
if
this
action
is
allowed.
G
H
K
P
H
J
B
External
call
has
a
pretty
high
cost,
but
it
is
no
worse
worse
than
using
the
envoy
x,
off
z,
filter
now
right.
This
is
there's.
A
A
A
P
I
C
C
C
Q
And
to
the
clear
user,
you
means
a
systematic,
because
that's
one
of
the
main
issues
we
have.
The
measured
means,
the
one
that
is
installing
sqrd
and-
and
you
know,
managing
this
ud
and
then
you
have
the
booking
for
user
who's,
actually
playing
booking,
for
which
user
is
deploying
the
other
server.
P
A
H
And
exactly
so,
and
what's
the
time
to
steer
system
here,
is
that
just
an
example
name
space
or
it
has
to
be
steer
system?
That's.
M
P
Yes,
so
this
is
one
example
of
the
deployment
as
a
namespace
owner
or
nmc
admin.
You
can,
of
course,
deploy
your
own
extra
oc
server
in
your
opening
space
and
configure
your
workload
in
your
namespace
to
use
that
extra
oscillator
server-
and
this
is
just
like
you-
can
apply
the
other
other
history
api
in
your
namespace
to
control
the
workloads
in
your
namespace.
P
N
A
H
So
we
should
not
try
to
take
additional
overhead
on
our
side
on
the
api
and
implementation,
in
my
opinion,
to
support
that
use
case.
As
of
today.
Q
Q
C
Here
I
guess
there
are
like,
without
an
example
of
a
user
needing
to
override,
let's
say
right,
so
there
are
kind
of
three
things
right:
the
mesh
white
admin
could
say
there
is
one
alt
z
policy
server
for
the
mesh
one.
Next
to
all
these
servers
for
the
batch,
or
they
could
save
for
many
right
because-
and
I
don't
know
have
we
seen
any
use
case
where
companies
or
users
have
more
than
one
xbox
server.
C
Yeah,
like
I
think,
that's
certainly
typical,
so
I
guess
there's
a
question
of
how
we
might
allow
for
migrations,
obviously
by
not
allowing
this
in
line
in
the
api
here.
Something
else
has
to
fulfill
that
role
elsewhere.
Q
Q
C
Q
All
right,
it
is
in
the
injection
time
because
the
the
site
card
needs
to
connect
to
this
server.
So
we
need
to
get
this
address
and
that's
the
only
way
to
get
there
yesterday.
We
can
have
a
default
if
we
want,
but
so
you
need
to
restart
your
workloads
today
for
tracing
ca
and
other
things.
You
need
to
restart.
H
H
Q
If
it's
mesh
config
default,
we
don't
have
to
restart
the
pose
every
time
you
change
proxy
configuration
it's
just
if
we
want
to
restart
them
for
some
things,
but
even
proxy
config
changes.
Many
of
them
are
actually
enforced
by
by
pilot
and
sending
configuration.
So
it
doesn't
really
make
a
difference,
but.
C
Q
A
Q
No,
no,
no,
the
other
is
the
parameters
that
you
know.
Support
is
like
we
do
for
telemeth
for
tracing
tracing
is
a
perfect
example.
You
deploy
jager
and
then
in
mesh
configure
specifies
the
address
of
jager.
You
specify
support,
you
specify
the
tls
settings
and
whatever
else
is
necessary.
H
So
when
you
say
multiple
swell,
then
you
have
to
have
a
selector
to
specify
which
workloads
which
will
choose
what
at
the
global
level.
A
C
All
right,
that's
the
nice
thing
about
right.
We
should
be
able
to
do
this
in
a
disruptive
way,
so
we
should
be
able
to
design
like
if
we
have
multiple.
What
would
the
schema
look
like
in
the
future
and
walk
the
schema
be
today
if
we
only
had
one
and
if
this
the
change
between
those
two
schemes
is
only
additive,
then
that's
good
right.
C
A
H
P
P
Config,
in
addition
to
the
address
of
the
target,
we
have
some
other
final
control
here
over,
like
a
one
headers
to
be
sent
to
the
extra
server
and
what
headers
the
extra
server
can
modify
in
the
original
request,
because
the
modification
part
is
often
needed
in
many
advanced
us
flow
today,
like
the
old
dc
flow,
it's
controlled
by
currently.
This
is
still
in
this
oc
policy,
but
I
will
just
use
this
as
an
example
here.
Q
So
one
comment
here
is:
if
you
deploy
on
a
particular
oc
server,
that
oc
server
will
have
some
particular
behavior.
I
mean
what
supports
whatever
does
it?
Support
so
typically
will
be
the
system
admins.
The
measure
means
that
deploys
other
server.
That
will
know
what
headers
need
to
be
forwarded
and
whatever
should
be
written.
It's
not
booking
for
developers.
That
needs
to
know
that
yeah.
P
So
this
is
a
part
of
this
right.
This
is,
I
mean
the
option
we
are
talking
like
a
lot
of
demonstration
here
is
like
moving
this
whole
part
from
which
configuration
okay,
perfect.
C
H
H
Q
My
concern
was
that
authorization
should
not
necessarily
be
involved
in
header
manipulation
and
someone
who
writes
an
authorization
policy
should
not
be
concerned
with
what
headers
particularly
are
used
in
what
way.
It's
very
insane.
C
C
H
R
Yeah,
just
just
a
just
a
random
proposal:
can
we
instead
of
putting
in
mesh
config,
can
we
actually
have
a
global
crd
like
a
global
authorization
policy
or
external
observation
policy
and
just
apply
this?
We
can
use
the
same
protocol
as
the
oscillation
policy,
but.
R
Yeah,
I
know,
but
this
is
a
little
different
right.
We
we
don't
want
to
apply
at
name
space
level,
so
we
cannot
just
restrict
the
namespace
has
to
be.
Is
your
system.
Q
Q
Well,
I
mean
that's
a
different
story:
we
need
to
improve
mesh
config,
but
not
by
putting
the
mesh
config
in
spreading
the
mess
in
here.
Yes,.
H
I
I
I
think
louis
you
can
correct
me
if
I'm
wrong
here,
we
should
start
simple.
Most
of
the
use
cases
that
are
going
to
come
across
are
going
to
be
ingress
enforcement,
let's
start
with
global
service
discovery
and
mesh
config
and
the
bindings
and
the
audsy
headers
that
you
need
in
the
api,
the
authorization
api
and
you
can
bind
it
to
ingress.
If,
if
the
feedback
is
no,
we
need
defaults
for
that.
C
Ingress
is
like
an
ad
like
it's
a
sub-admin
thing
right
if
it's
managed
infrastructure,
so
they
can
control
there
too.
So
I
I
don't
know
if
we
need
like
customers.
Well,
I
I
buy
your
argument
about
standardization
for
sure
I
don't
think
having
the
api
actually
represent.
The
information
presents
a
problem.
H
So
it
does
because
it's
a
bleed
over
for
the
internal
things
where
you
won't
be
using
it
for
east
west
workloads.
That's
not
good.
C
R
Ingress
is
the
majority
use
case,
but
I
think
I
did
see
some
use
case.
That's
not
limited
to
ingress.
R
Q
N
A
H
That's
where
I
was
going
right
so,
and
so
I
think
yangmin
was
highlighting
those
pieces
which
feels
like
we
don't
have
any
controversy,
putting
it
in
mesh
config
right
now
right
so,
but
the
real
controversy
is
just
the
authorization
request
allowed
headers.
P
Yes,
so
the
example
is
actually
the
primary
use
case,
so
we
have
three
examples
here.
The
most
and
the
fundamental
basic
example
is
just
use
extra
server
to
make
a
allow
or
delay
decision.
This
is
example
one
and
you
can
also
use
the
jpc
to
talk
to
your
extra
server.
This
is.
C
Just
a
use
case
in
in
in
the
business
sense
right,
so
I
I
get
the
overviews
and
I
want
to
ensure
that
when
traffic
comes
into
my
network
happens,
I'm
the
owner
of
a
service
and
when
traffic
comes
into
my
service,
I
want
blah
to
happen
and
I'm
the
admin
of
a
mesh
and
for
all
traffic
in
the
mesh.
I
want
to
have
that
right.
P
So
I
so
currently
the
model
is
that
the
api
itself
doesn't
control
like
who
can
apply
this.
So
if
the
mesh
admin
or
namespace
admin,
they
have
the
necessary
permission,
they
can
apply
the
install
api
to
like
the
workload
under
the
air
control.
A
P
C
So
right,
because
the
y
has
a
lot
of
impact
on
the
shape
of
the
api
right.
If
there
was
no
ad
like
mesh
wide
admin
use
case
for
this,
we
wouldn't
put
things
in
mesh
convex
or
we
would
put
very
little
in
mesh
config.
If,
if
there
was
only
an
ingress
use
case,
then
we
wouldn't
bother
trying
to
make
mesh
white
default
management
for
mesh
admin
a
priority
in
the
shape
of
the
api.
A
H
I
think
let
me
try
to
help
here
so
I've
seen
hey
koston.
Do
you
mind
muting?
H
So
I
I
think
I've
seen
a
lot
of
requests
come
in
where
users
are
trying
to
configure
onwards,
external
filter.
H
Want
enforcement
at
ingress
where
they
want
to
consult
an
external
system
for
authorizing
their
services
just
like
they
want
to
consult
an
external
server
for
doing
jwt
verification
right
and
they
fail
miserably
when
using
onward
filters.
So
this
is
creating
a
first
class
api
to
support,
at
least
that
use
case
now,
yang
min,
you
might
have
more
use
cases
where
people
have
asked.
I
want
to
enforce
it
on
sidecar
workloads,
but
I
have
not.
P
Yeah,
the
primary
use
case
is
just
like
what
you
said:
it's
use
this
to
improve
the
overall
user
influence
when
you
are
leading
the
xlrc
and
increase
gateway
and
the
more
detail
like
cases
like
you
want
to
integrate
your
like
a
oitc
flow
or
you
want
to
integrate
with
maybe
whatever
like
oppa
or
whatever
your
extra
authorization
server,
and
that's
it's
just
like
the
jot
use
case
on
english
gateway.
P
You
delegate
this
work
to
istio
to
do
the
job
authentication
or
do
the
like
external
c,
and
then
you
can
like
kind
of
like
a
dedicated
disease
like
dodge
to
esteem.
H
Q
But
part
of
authentication
api
is
possible
because
odc
is
already.
We
already
have
an
api
for
ydc,
and
that
was
all
my
questions
that
we
are
putting
so
yeah.
Let's
talk
about.
H
H
A
Q
A
It
might
be
that
the
right
answer
is
still
a
single
api
call
for
optimization
and
performance
reasons,
but
like
we
should
at
least
make
that
decision
based
on
data,
so
be
good
to
know
like
do.
We
actually
think
we
need
to
have
authentication
use
cases
separate.
Could
we
actually
do
all
the
authentication
in
history
rather
than
forwarding
it
externally?
Do
we
need
to
do
that
or
like
that
part
needs
to
be
thought
through
separately
from
the
authorization
use
case.
C
C
I
think
that's
reasonable
and
we
should
aim
to
achieve
that,
even
if
we
would
have
like
if,
if
we
can
process
yvc
flows
in
a
snap
like,
we
would
still
have
an
api
to
process
industry,
standard
authentication
flows
right,
including
things
like
external
group
resolution
like
we
do
today
right,
but
plenty
of
people
have
facebook
stuff,
there's
not
much.
We
can
do
to
do
right.
We
can't
force
people
not
to
have
that,
but
we
should
agree
with
them.
A
A
Do
a
chemist
check
right
like
sorry,
a
mixer
check
call
this
thing
pass
it
some
stuff,
get
the
results
back
and
like
include
that
right
and
then
that
thing
is
very
powerful
and
can
be
used
for
lots
of
use
cases.
It
doesn't
require
to
continually
iterate
on
our
apis
every
time
any
use
case
comes
up.
R
R
C
So
so
it
doesn't
seem
like
there
was
a
lot
of
controversy,
at
least
with
starting
out
with
one
external
service
in
mesh
config
in
in
the
the
runtime
aspects
of
mesh
config
and
proxy
config.
I'm
not
trying
to
resolve
that
question
here
and
there's
a
separate
subject
about
whether
we
need
to
default
the
headers,
whether
they
can
be
overridden
or
whether
we
should
just
let
them
be
defined
in
line
every
time.
H
C
They
cannot
vary
too
much,
so
it
defaults
with
override.
C
A
G
I
think
one
of
one
of
the
one
of
the
issues
that
we're
having
here
is
that
x,
dot
c.
Is
it
it's
not
a
standard
but
ydc
flow
is
a
standard
and,
like
rest
of
the
odds,
see
stuff
that
we're
talking
about
are
like
standard
things,
and
now
this
is
mixing
standards
with
an
escape
hatch,
and
I
think
that,
like
that's
where
we
are
having
these
use
case
issues
even
because
escape
hatch
use
cases,
I
mean
it's.
G
Let's
actually
create
a
real
api
to
directly
address
those
those
use
cases,
and
so,
if
we,
if
we
don't
get
to
it
like
quickly,
people
are
going
to
continue
using
x,
dot
z
in
like
really
strange
ways.
A
G
So
so
I
mean
there
is
like
there
are
things
that
that
we
need
to
do
at
kind
of
the
low
level
of
either
defining
which
headers
are
like
what
is
sent
out.
What
context
is
sent
out,
but
that's
mostly
on
a
a
lot
of
it,
is
on
the
efficiency
of
efficiency.
Side
of
and
it's
like
mesh
admin
is
fine
to
define
that
you,
you
don't
need
individual,
like
name
space
or
service
owners
to
define
it.
So
sorry,
I
don't
think
we
need
to
go
deeper
than
that.
A
So
we
could
start
with
this,
basically
all
being
defined
in
mesh
config
in
terms
of
that
block
kind
of
highlighted
there.
The
external
block
saying
here
is
the
external
office
service,
here's
the
here's,
the
headers,
it
takes,
here's
the
editors
it
responds
with
and
then
in
the
namespace
admin.
All
they
would
say
is
here's
the
here's.
The
match
conditions
called
the
external,
obviously
service.
C
Q
One
comment
about
dimension
efficiency
says
the
word:
efficiency
and
probably
human,
also
stability,
scalability
and
so
forth.
The
mixer
has
this
wonderful
facility
to
you
know
cash,
some
some
requests.
So
if
the
server
goes
down,
it
will
keep
you
know
not
failing,
which
relied
on
the
fact
that
requests
were
were
very
important
or
cashable.
So
I
think
that
would
be
pretty
important
to
address,
because
one
of
the
problem
with
mixed
reasoning,
drop
mixer
was.
G
Right
so
so
so
question
I
I
mean
I
yes,
we
like
I'm
super
aware
of
that
and
we
had
excluded
it
from
the
x
dot,
z,
api
specifically
to
get
customer
feedback
and
then
say
that,
okay,
if
x0
customers
complain,
then
we
will
add
the
complexity
and
it's
been
almost
like
two
and
a
half
three
years
and
people
have
have
not
complained,
so
I
so
it
seems
like.
Q
Q
P
H
M
If
I
can,
if
I
can
jump
in
like
a
higher
level,
is
that
we
keep
comparing
this
to
the
envoy
filter
solution,
but
I
I
don't
think
we
should
compare
to
onboard
solution.
C
M
Yeah,
so
I
don't
think
we
should
be
comparing
to
envoy
filter
because
everything's,
better
than
onboard
filter.
So
if
we
keep
doing
that,
we're
going
to
have
a
bunch
of
horrible
apis
and
I'm
not
saying
this
is
one,
but
we
we
should
really
be
looking
at
it
in
isolation.
M
Then
I
don't
think
we
would
have
come
up
with
this
api
and,
like,
furthermore,
like
we
is
this
something
that
we
want
to
support,
because
we
got
rid
of
mixer
policy
and
then
now
we're
basically
adding
back
mixer
policy.
So
I
want
to
make
sure
we're
not
just
doing
it,
because
this
is
better
than
the
envoy
filter.
So
let's
do
it
because
now
we're
committing
to
it
we're
going
to
be
supporting
it
for
years,
et
cetera.
So.
C
So
there
are,
I
think,
there's
a
couple
things
like
certainly
john.
I
would
agree
with
you
on
the
http
versus
grpc
stuff
right
if
we
have
service
declaration-
and
we
already
have
all
that
information
in
service
right
right,
so
we
don't
need
to
expose
it
in
this
api
right.
We
know
a
port.
Is
the
rpc
a
it's
going
to
be
a
grpc
service?
That's
what
you
should
call
right.
We
should
just
rely
on
the
existing
service
method,
the
right
and
that
that
goes
for
timeouts
and
other
things
right.
C
C
As
for
whether
it's
a
good
api,
I
think
there's
some
interesting
questions
right.
I
think
we
all
agree
that
we
need
the
ability
for
third
parties
to
integrate
like
authorization
systems
that
are
not
ones
that
we
provide
all
right.
That's
pretty
clear,
like
we
have
very
strong
use
cases
for
that,
so
I
don't
think
we
should.
We
should
recognize
that
we
should
try
to
deliver
an
api
experience
that
covers
that,
and
so
you
know
we
could
provide
it,
maybe
a
better
abstraction
than
we
think
the
envy
filter
is
providing
right
like
so
we
can.
C
C
C
M
Was
one
of
the
big
things
that
I
was
thinking
of
whether
we
want
to
support
only
wasm
that
does
this
or
also
a
wasm?
I
don't
think
it
was
really
mentioned
here,
but
it
seems
like
there's
a
lot
of
considerations
with
lawson
that
need
to
be
accounted
for
here.
C
A
P
H
S
Q
C
There's
an
open
there's,
a
debate
to
be
had
about
header
control
and
in
particular
that
needs
to
be
more
generic
or
not.
So
I
think
that's
a
detailed
question
to
do
in
follow-up
and
then
john
has
a
good
question
about.
This
is
just
one
form
of
external.
C
H
So
for
enforcement
like
whether
it's
implemented
with
an
onboard
native
api
or
a
wasm,
that
should
always
that's
the
problem.
That
applies
to
almost
all
of
the
configuration
we
supply
right
now
right,
so
many
things
that
we
configure
in
mesh
config
tomorrow
can
be
implemented
in
wasm
by
a
custom
filter.
So
we
should
think
about
it,
generically
and
not
just
for
authorization.
M
Yeah,
it's
actually
interesting
that
authorization
is
policy,
is
almost
becoming
like
this
catch-all
of
a
very
extensive
matching
and
then
driving
some
action
like
we
added,
which
is
in
many
ways
related
to
security,
but
it's
also
logging
and
now
we're
adding
this
external
authorization
server,
which
yes,
it
can
be
used
for
authorization,
but
people
are
also
using
it
for
token
exchange
for
all
sorts
of
stuff
and
then
in
the
future,
if
we
add
wasm
that
can
obviously
be
used
for
anything.
C
Yeah,
it
is
becoming
a
bit
like
a
generic
trigger
api
yeah.
That's
not
necessarily
bad
by
the
way.
Right,
like
we
have
pretty
good
user
feedback
that
it's
a
good
trigger
api
for
authorization
use
cases
like
people
seem
pretty
happy
with
the
api
right,
modulo
feature
gaps
but
which
is-
and
it
may
be
an
interesting
paradigm
to
consider
for
the
future
of
envoy
filter
right,
maybe
instead
of
doing
a
whole
bunch
of
matching
in
the
control
plane
to
try
and
figure
out
what
to
do.
C
F
But
quick
question
off
topic:
we
had
a
couple
docs,
which
were
beta
promotion
reviews
yeah
next
friday
seems
kind
of
late
to
do
that
when
when
should
we
pick
that
up.
C
That's
a
good
question.
I
presume
the
working
group
meeting
on
tuesday
is
pretty
focused
on
the
release.
C
I'm
happy
to
show
up.
Basically,
we
just
want
to
sign
off.
I
think
we
can
handle
that
offline.
Okay,
if
you
want
to
just
whack
them
all
on
slack.
Okay,
I
can
do
that.
I
think
that
makes
sense.
John
you
had
the
other
doc
right
was
that
yeah.