-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement AccessorID resolution and client ip propagation #19
base: main
Are you sure you want to change the base?
Conversation
Hi @ncode, awesome! This goes definitely in the right direction! Some thoughts so far but theses are things we also could stabilise later:
I'm also currently waiting for a recommendation from the OPA communityhow to model this there |
Hi @mxab,
I didn't think of it but it's a pretty nice idea to pass all the available information since we've already resolved it :)
Yes. Let's use
I agree that passing the context like you describe will make things a bit more flexible, specially with the extra metadata from the token it will be cleaner. I'm only in doubt about X-FORWARD-FOR and the NACP-Nomad-Accessor-ID, these would be useful to have available as readers without the need to parse the content. What do you think?
Nice! |
Sorry for the late response.
Ah so if I get you correctly your "validation" part in this case is solely on the Client IP Address + Accessor ID. Yeah I guess it makes sense. Regarding the OPA part, they recommended to create an input consisting out of the context and the job. So I guess we need to update this part here and create a input struct the consists out of a caller context (client ip addr, resolved token) and the job So for the remote hooks I think it make sense to use the same structure, we could still leave the headers as well so it works for your use case |
No worries!
Deal! I will start working on it this weekend! |
Hi @mxab,
I've started the patch last week and would like to double check the direction it's going so far :).
My idea here was to resolve the token as early as possible to propagate down. The upstream ip address is very cheap to propagate, so I thought about always passing it so we can have cidr based validators and mutators even when not resolving the token
Addresses #18
--- Copilot summary of changes
This pull request introduces several changes to the
admissionctrl
andcmd/nacp
packages to support token resolution and context headers. The most significant changes include adding a newresolveToken
field, modifying theJobHandler
to handle token resolution, and updating the mutators and validators to include context headers.Token Resolution and Context Headers:
admissionctrl/controller.go
: Added a newresolveToken
field to theJobHandler
struct and updated theNewJobHandler
function to accept this parameter. Introduced aResolveToken
method to check theresolveToken
flag. [1] [2]cmd/nacp/nacp.go
: Implemented a newgetClientIP
function andresolveTokenAccessor
function to support token resolution. Updated theNewProxyHandler
function to store context headers and resolve tokens if required. Modified thebuildServer
function to create mutators and validators with token resolution capabilities. [1] [2] [3] [4] [5]Mutator and Validator Updates:
admissionctrl/mutator/json_patch_webhook.go
,admissionctrl/mutator/webhook_mutator.go
,admissionctrl/validator/webhook_validator.go
: Added context headers to HTTP requests in theMutate
andValidate
methods. [1] [2] [3] [4] [5] [6]Configuration Changes:
config/config.go
: Added a newResolveToken
field to theValidator
andMutator
structs, and introduced aRequestContext
struct to store context information. [1] [2]Test Updates:
cmd/nacp/nacp_test.go
: Updated tests to include scenarios for token resolution and context headers. Modified existing tests to handle the newresolveToken
parameter and added new tests to verify token resolution functionality. [1] [2] [3] [4] [5] [6] [7] [8] [9]