You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -420,7 +427,7 @@ type JWTAuthenticator struct {
420
427
// username represents an option for the username attribute.
421
428
// Claim must be a singular string claim.
422
429
// TODO: decide whether to support a distributed claim for username (what are we required to correlate between the data retrieved for distributed claims? sub? something else?). Limit distributed claim support to OIDC things with clientID validation?
423
-
// Expression must produce a string value.
430
+
// Expression must produce a string value that must be non-empty.
424
431
// Possible prefixes based on the config:
425
432
// (1) if userName.prefix = "-", no prefix will be added to the username
426
433
// (2) if userName.prefix = "" and userName.claim != "email", prefix will be "<issuer.url>#"
@@ -432,6 +439,21 @@ type JWTAuthenticator struct {
432
439
// Expression must produce a string or string array value.
433
440
// "", [], missing, and null values are treated as having no groups.
434
441
// TODO: investigate if you could make a single expression to construct groups from multiple claims. If not, maybe []PrefixedClaimOrExpression?
- For claim names containing `.`, we can reference using `claims["foo.bar"]`
586
+
- TODO: can we implement a CELtype resolver so that a cel expression `claims.foo` gets resolved via a distributed claim the first time it is used?
587
+
- this seems likely and preferable so we only resolve the things we need (in case an early validation rule fails and short-circuits).
588
+
547
589
### CEL
548
590
549
591
* CEL runtime should be compiled only once if structured authentication config option is enabled.
@@ -552,14 +594,26 @@ type JWTAuthenticator struct {
552
594
* `claims`forJWTclaims (payload)
553
595
* One variable will be available to use in `userInfoValidationRules`:
554
596
* `userInfo` with the same schema as [authentication.k8s.io/v1, Kind=UserInfo](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#userinfo-v1-authentication-k8s-io)
555
-
* To make working with strings more convenient, `strings` and `encoding`
556
-
[CEL extensions](https://github.com/google/cel-go/tree/v0.9.0/ext) will be enabled,
557
-
e.g, to be able to split a string with comma separated fields and use them as a single array.
597
+
* The standard KubernetesCEL environment, including extension libraries, will be used.
* The encoding library needs to be added to the environment since it's currently not used. Doing so will help keep CEL consistent across the API.
558
602
* Benchmarks are required to see how different CEL expressions affects authentication time.
603
+
* There will be a upper bound of 5s for the CEL expression evaluation.
559
604
* Caching will be used to prevent having to execute the CEL expressions on every request.
560
605
- TODO decide what the behavior of the token cache will be on config reload
561
606
- TODO should the token expiration cache know about the `exp` field instead of hard coding `10` seconds?
562
607
this requires awareness of key rotation to implement safely
608
+
* TODO: decide how to safe guard access to fields that might not exist or stop existing at any moment.
609
+
* Using `has()` to guard access to fields.
610
+
* Could we do some kind of defaulting for fields that don't exist?
611
+
612
+
> Notes from PRreview (jpbetz):
613
+
>
614
+
> You can pass a context to CEL and cancel runtime evaluation if the context is canceled. This causes the CEL expression to halt execution promptly and evaluate to an error.
615
+
> You can also put a runtime limit (measured in abstract cost units that are hardware and wall clock independent) on CEL expressions to bound running time.
616
+
> (There is also a way to set a limit for the estimated cost, which is computed statically on compiled CEL programs if you know the worst case size of the input data, but this might be overkill for this feature)
563
617
564
618
### Flags
565
619
@@ -711,11 +765,11 @@ No.
711
765
712
766
###### Can the feature be disabled once it has been enabled (i.e. can we roll back the enablement)?
713
767
714
-
Yes.
768
+
Yes.Note that if the `--oidc-*` flags were previously in use, they must be restored forOIDC authentication to function correctly.
715
769
716
770
###### What happens if we reenable the feature if it was previously rolled back?
717
771
718
-
No impact.
772
+
No impact (generally speaking, authentication does not cause persisted state in the cluster).
719
773
720
774
###### Are there any tests for feature enablement/disablement?
721
775
@@ -732,6 +786,7 @@ It cannot fail until a bug in kube-apiserver connected to parsing structured con
732
786
Possible consequences are:
733
787
* A cluster administrator rolls out the feature with the addition of some validation rules that may allow access to previously restricted users.
734
788
* Other cluster components can depend on claim validations. Rolling back would mean losing validation functionality.
789
+
* If the cluster admin fails to restore any previously in-use `--oidc-*` flags on a rollback, OIDC authentication will not function.
735
790
736
791
###### What specific metrics should inform a rollback?
737
792
@@ -760,6 +815,7 @@ TBA
760
815
761
816
* There will be a corresponding message in kube-apiserver logs.
762
817
* By checking the kube-apiserver flags.
818
+
* By checking the metrics emitted by the kube-apiserver.
763
819
764
820
###### How can someone using this feature know that it is working for their instance?
765
821
@@ -796,7 +852,7 @@ These goals will help you determine what you need to measure (SLIs) in the next
796
852
question.
797
853
-->
798
854
799
-
The feature should work 99.9% of the time (SLOs for actual requests should not change in any way compared to the flag-based OIDC configuration).
855
+
SLOs for actual requests should not change in any way compared to the flag-based OIDC configuration.
800
856
801
857
###### What are the SLIs (Service Level Indicators) an operator can use to determine the health of the service?
0 commit comments