Skip to content
GitLab
Next
Projects Groups Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • Spamcheck Spamcheck
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
    • Locked Files
  • Issues 20
    • Issues 20
    • List
    • Boards
    • Service Desk
    • Milestones
    • Iterations
  • Merge requests 0
    • Merge requests 0
  • Deployments
    • Deployments
    • Releases
  • Packages and registries
    • Packages and registries
    • Package Registry
    • Container Registry
    • Infrastructure Registry
  • Activity
  • Graph
  • Create a new issue
  • Commits
  • Issue Boards
Collapse sidebar
  • GitLab.comGitLab.com
  • GitLab Security DepartmentGitLab Security Department
  • Engineering and Research Sub-department
  • Security Automation Team (SecAuto)Security Automation Team (SecAuto)
  • spamspam
  • SpamcheckSpamcheck
  • Issues
  • #171
Closed
Open
Issue created Nov 24, 2021 by Balasankar 'Balu' C@balasankarcDeveloper

Improve authentication capabilities of Spamcheck to cover self-managed multi-node instances

In the omnibus-gitlab implementation, spamcheck service will run over localhost, and thus doesn't require any authentication. However, users can technically run spamcheck on one VM listening on a public IP and GitLab on another VM. In that case, we currently depend on any third party authentication services to limit access to the spamcheck node, or external methods like IP blocking/allowlisting.

Feature Request: Can we implement the functionality in Spamcheck itself so that spamcheck can authenticate the incoming requests without relying on a separate mechanism.

Assignee
Assign to
Time tracking