fix: memory leak in id_token mutator cache #1209
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Set a TTL on the cached JWTs in the
id_token
mutator.It fixes a memory leak in Oathkeeper 🙌
We are running internally a fork of Oathkeeper with this patch applied, and the resulting memory footprint:
Unsure how to properly test it properly in a unit test though, since the
getFromCache
logic also checks if the cached TTL value is not expired (and not only the new ristretto internal TTL).Related issue(s)
Split from #1177.
Checklist
introduces a new feature.
contributing code guidelines.
vulnerability. If this pull request addresses a security vulnerability, I
confirm that I got the approval (please contact
[email protected]) from the maintainers to push
the changes.
works.
Further Comments