Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

VTGate: Set immediate caller id from gRPC static auth username #12050

Conversation

brendar
Copy link
Contributor

@brendar brendar commented Jan 6, 2023

Signed-off-by: Brendan Dougherty brendan.dougherty@shopify.com

Description

Currently, when using gRPC static auth on VTGate, the immediate caller id is always set to unsecure_grpc_client, rather than the username provided by the client. This means that table ACLs on VTTablet will reject the client's queries.

The problem appears to have been discussed when static auth was originally added here, but was not changed in a followup.

This PR takes a similar approach to what was suggested and sets the authenticated username in the Context. This allows the VTGate server to retrieve the username in a similar manner to how it retrieves the certificate common name as the immediate caller id when using mTLS (source).

Related Issue(s)

Fixes #12049

Checklist

  • "Backport to:" labels have been added if this change should be back-ported
  • Tests were added or are not required
  • Documentation was added or is not required

Deployment Notes

Signed-off-by: Brendan Dougherty <brendan.dougherty@shopify.com>
@vitess-bot
Copy link
Contributor

vitess-bot bot commented Jan 6, 2023

Review Checklist

Hello reviewers! 👋 Please follow this checklist when reviewing this Pull Request.

General

  • Ensure that the Pull Request has a descriptive title.
  • If this is a change that users need to know about, please apply the release notes (needs details) label so that merging is blocked unless the summary release notes document is included.
  • If a test is added or modified, there should be a documentation on top of the test to explain what the expected behavior is what the test does.

If a new flag is being introduced:

  • Is it really necessary to add this flag?
  • Flag names should be clear and intuitive (as far as possible)
  • Help text should be descriptive.
  • Flag names should use dashes (-) as word separators rather than underscores (_).

If a workflow is added or modified:

  • Each item in Jobs should be named in order to mark it as required.
  • If the workflow should be required, the maintainer team should be notified.

Bug fixes

  • There should be at least one unit or end-to-end test.
  • The Pull Request description should include a link to an issue that describes the bug.

Non-trivial changes

  • There should be some code comments as to why things are implemented the way they are.

New/Existing features

  • Should be documented, either by modifying the existing documentation or creating new documentation.
  • New features should have a link to a feature request issue or an RFC that documents the use cases, corner cases and test cases.

Backward compatibility

  • Protobuf changes should be wire-compatible.
  • Changes to _vt tables and RPCs need to be backward compatible.
  • vtctl command output order should be stable and awk-able.
  • RPC changes should be compatible with vitess-operator
  • If a flag is removed, then it should also be removed from VTop, if used there.

"Args": ["vitess.io/vitess/go/test/endtoend/vtgate/grpc_server_auth_static"],
"Command": [],
"Manual": false,
"Shard": "vtgate_general_heavy",
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure if this is the right shard to use. Any guidance would be appreciated.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This shard looks as good as any. I checked the run of this shard as well. It takes about 13 minutes with this new test, so there is no risk of flakiness because of timeouts. It should be okay.

@deepthi deepthi added Type: Enhancement Logical improvement (somewhere between a bug and feature) Component: Authn/z Authentication / Authorization / Certificates Component: Query Serving labels Jan 9, 2023
@deepthi deepthi requested review from aquarapid and Phanatic and removed request for deepthi, mattlord, ajm188 and rohit-nayak-ps January 9, 2023 17:44
Copy link
Member

@GuptaManan100 GuptaManan100 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Other than this, I like the changes and the tests too.

Comment on lines +142 to +143
func TestAuthenticatedUserWithAccess(t *testing.T) {
ctx, cancel := context.WithCancel(context.Background())
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

To me the tests feel self-explanatory, but could you add a couple of lines to each describing what its testing.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done

Signed-off-by: Brendan Dougherty <brendan.dougherty@shopify.com>
Copy link

@Phanatic Phanatic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👋🏾 I work at PlanetScale and built out our Service-to-service authentication story and custom ACLs for PlanetScale databases.

PlanetScale's usage of vtgate static auth and ACLs system is a bit unique in that we don't handle authentication for user queries in vtgate. We do that in our own query front-end service.
VTGate static authentication is configured for service-to-service authentication between the query front-end and vtgate, ACL system is configured to pass through user roles from our credential store to vtgate.

We do this by setting the effectiveCallerID on requests made to the vtgate gRPC service and having the same names reflected in the acl config file for a given vttablet.

immediate, securityGroups := immediateCallerID(ctx)
if immediate == "" && useEffective && effectiveCallerID != nil {
immediate = effectiveCallerID.Principal
if useEffectiveGroups && len(effectiveCallerID.Groups) > 0 {
securityGroups = effectiveCallerID.Groups
}
}

Given ☝🏾 , this change looks good to me. Since the caller identity is still the EffectiveCallerId from the context and not request identity used for service-to-service communication.

@brendar
Copy link
Contributor Author

brendar commented Jan 23, 2023

Thank you both for the reviews. Is there anything else needed or would it be possible for you to merge the PR?

@deepthi
Copy link
Member

deepthi commented Apr 25, 2023

@brendar we are planning to effectively revert this PR and backport the change to release-16.0 branch as well. See discussion #12961 (comment)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Component: Authn/z Authentication / Authorization / Certificates Component: Query Serving Type: Enhancement Logical improvement (somewhere between a bug and feature)
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Bug Report: VTGate does not set immediate caller id from gRPC static auth username
5 participants