cert-manager/design/20210203.certificate-request-identity.md
joshvanl ceede2ccbe Change user info field design satus to implemented
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-03-15 09:39:47 +00:00

7.8 KiB

title authors reviewers approvers editor creation-date last-updated status
Certificate Request Identity
@joshvanl
@joshvanl
@joshvanl
@joshvanl 2021-02-03 2021-02-03 implemented

Identity

Table of Contents

Summary

In order to implement policy and improve auditing introspection of certificates requested and signed by cert-manager, cert-manager must implement a better identity framework. Identity in this context is a user or machine which requests a signed certificate from cert-manager. This identity will be managed and enforced on CertificateRequest resources by cert-manager.

Motivation

The identity of a requester forms a large part of an automated policy system that needs to decide whether a certificate should or shouldn't be signed. By creating a trusted source of identity for CertificateRequests, a policy engine is able to determine whether that identity is allowed to request that certificate, given some policy configuration setup by a cluster administrator.

Although auditing exists in Kubernetes and exposes the identity of the requester, its configuration is not always exposed to end users, such as when using managed Kubernetes (GKE, EKS etc). In scenarios where configuring auditing is available, it is often not preferable and an anti-pattern to make runtime decisions on historical audit logs.

The upstream Kubernetes certificates CertificateSigningRequest API has the identity of the requesting Kubernetes user. As the project intends to transition to this resource as part of the project, the CertificateRequest should strive to match 1:1 wherever possible. This means extensions or additions to cert-manager (policy, auditing) can have the same guarantees about what information is available from both resources, while this transition takes place.

Goals

  • Introduce identity to the CertificateRequest resource which is securely enforced by cert-manager
  • Ensure the identity exposed in CertificateRequests has parity with the upstream Kubernetes CertificateSigningRequest resource
  • Enable external tooling or additions to cert-manager that can make use of this identity in a useful way

Non-Goals

  • Dictate any kind of means through which identity or policy evaluation should be performed (rather, only the building blocks to enable others to build evaluation systems is a goal)
  • Make changes to upstream Kubernetes to implement identity in cert-manager
  • Although considered below, "passed down" identity is not part of this design

Proposal

Kubernetes does not currently support immutable fields for CRDs. The cert-manager webhook will be responsible for populating and enforcing user info fields which are present on the spec of CertificateRequest resources.

The webhook will be responsible for enforcing the following during a CREATE operation. We will not reject requests which populate these fields, but instead simply override them.

The webhook will also responsible for enforcing the following during an UPDATE operation. Any attempt to changes these fields will result in a rejected request.

  • No changes to user info fields are allowed to be made

API Changes

In order to expose the user info of who created CertificateRequest resources, these resources must be updated to have parity with the upstream Kubernetes certificates API. This means that the CertificateRequest API type be updated to include the following fields in spec, for all API versions:

type CertificateRequestSpec {
  // EXISTING FIELDS
  // ...

  // NEW FIELDS

	// Username contains the name of the user that created the CertificateRequest.
	// Populated by the cert-manager webhook on creation and immutable.
	// +optional
	Username string `json:"username,omitempty"`
	// UID contains the uid of the user that created the CertificateRequest.
	// Populated by the cert-manager webhook on creation and immutable.
	// +optional
	UID string `json:"uid,omitempty"`
	// Groups contains group membership of the user that created the CertificateRequest.
	// Populated by the cert-manager webhook on creation and immutable.
	// +listType=atomic
	// +optional
	Groups []string `json:"groups,omitempty"`
	// Extra contains extra attributes of the user that created the CertificateRequest.
	// Populated by the cert-manager webhook on creation and immutable.
	// +optional
	Extra map[string][]string `json:"extra,omitempty"`

All new fields here are marked as optional. It is likely for a number of them to be empty for a given request, depending on the requester's identity. It is up to any component consuming the user info fields to make appropriate decisions about fields which are not populated.

Upgrading

Any CertificateRequests that are present in the cluster at the time of upgrade, won't and will never have their user info fields populated. This should be acceptable.

All subsequent CertificateRequests created after this upgrade will have their identities populated.

When the CRDs are upgraded, there will be a brief period where the user info fields will not be populated until the webhook is also upgraded.

Test Plan

Unit tests will be created is ensure that the properties are enforced.

End to end tests will ensure that different users creating CertificateRequest resources have their respective identities populated in the fields.

Risks and Mitigations

There are large security implications if the user info fields that other components rely on are wrong, or could be made fraudulent. Special care when testing needs to be given to ensure the properties described above are correct and enforced.

If the validating or mutating webhooks were not installed properly, either by being out of date or deleted, then this would invalidate the security guarantees of the user info fields.

Certificate Identity Pass Down

CertificateRequests created and managed via Certificate resources will have the user info of the cert-manager controller. Though this design doesn't provide a solution to components that need to traverse the user info to the original user who created the Certificate resource, some possible further design options are;

  • cert-manager would override the user info fields with the of the identity that created the Certificate resource, if cert-manager is the creator.
  • Consumers of the identity will need to be aware that the CertificateRequest may be managed by a Certificate resource if it is created by cert-manager, and should look at the identity of the Certificate.
  • cert-manager manages some signing key pair and populates the annotation of the CertificateRequest with a JWT containing the original identity. Consumers can then validate that JWT using a distributed public key, and make use of the identity it contains.