allow an SNI cert to be used to respond for a particular IP
This commit is contained in:
		@@ -57,10 +57,12 @@ go_test(
 | 
				
			|||||||
        "cert_key_test.go",
 | 
					        "cert_key_test.go",
 | 
				
			||||||
        "client_ca_test.go",
 | 
					        "client_ca_test.go",
 | 
				
			||||||
        "named_certificates_test.go",
 | 
					        "named_certificates_test.go",
 | 
				
			||||||
 | 
					        "server_test.go",
 | 
				
			||||||
        "tlsconfig_test.go",
 | 
					        "tlsconfig_test.go",
 | 
				
			||||||
    ],
 | 
					    ],
 | 
				
			||||||
    embed = [":go_default_library"],
 | 
					    embed = [":go_default_library"],
 | 
				
			||||||
    deps = [
 | 
					    deps = [
 | 
				
			||||||
 | 
					        "//staging/src/k8s.io/client-go/util/cert:go_default_library",
 | 
				
			||||||
        "//vendor/github.com/davecgh/go-spew/spew:go_default_library",
 | 
					        "//vendor/github.com/davecgh/go-spew/spew:go_default_library",
 | 
				
			||||||
        "//vendor/github.com/stretchr/testify/assert:go_default_library",
 | 
					        "//vendor/github.com/stretchr/testify/assert:go_default_library",
 | 
				
			||||||
    ],
 | 
					    ],
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -20,6 +20,7 @@ import (
 | 
				
			|||||||
	"crypto/tls"
 | 
						"crypto/tls"
 | 
				
			||||||
	"crypto/x509"
 | 
						"crypto/x509"
 | 
				
			||||||
	"fmt"
 | 
						"fmt"
 | 
				
			||||||
 | 
						"net"
 | 
				
			||||||
	"strings"
 | 
						"strings"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
@@ -76,7 +77,10 @@ func getCertificateNames(cert *x509.Certificate) []string {
 | 
				
			|||||||
	var names []string
 | 
						var names []string
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	cn := cert.Subject.CommonName
 | 
						cn := cert.Subject.CommonName
 | 
				
			||||||
	if cn == "*" || len(validation.IsDNS1123Subdomain(strings.TrimPrefix(cn, "*."))) == 0 {
 | 
						cnIsIP := net.ParseIP(cn) != nil
 | 
				
			||||||
 | 
						cnIsValidDomain := cn == "*" || len(validation.IsDNS1123Subdomain(strings.TrimPrefix(cn, "*."))) == 0
 | 
				
			||||||
 | 
						// don't use the CN if it is a valid IP because our IP serving detection may unexpectedly use it to terminate the connection.
 | 
				
			||||||
 | 
						if !cnIsIP && cnIsValidDomain {
 | 
				
			||||||
		names = append(names, cn)
 | 
							names = append(names, cn)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	for _, san := range cert.DNSNames {
 | 
						for _, san := range cert.DNSNames {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -68,6 +68,20 @@ func TestBuiltNamedCertificates(t *testing.T) {
 | 
				
			|||||||
				"test.com": 0,
 | 
									"test.com": 0,
 | 
				
			||||||
			},
 | 
								},
 | 
				
			||||||
		},
 | 
							},
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								// ip as cns are ignored
 | 
				
			||||||
 | 
								certs: []namedtestCertSpec{
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
										testCertSpec: testCertSpec{
 | 
				
			||||||
 | 
											host:  "1.2.3.4",
 | 
				
			||||||
 | 
											names: []string{"test.com"},
 | 
				
			||||||
 | 
										},
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
								},
 | 
				
			||||||
 | 
								expected: map[string]int{
 | 
				
			||||||
 | 
									"test.com": 0,
 | 
				
			||||||
 | 
								},
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
			// ips are ignored
 | 
								// ips are ignored
 | 
				
			||||||
			certs: []namedtestCertSpec{
 | 
								certs: []namedtestCertSpec{
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -0,0 +1,218 @@
 | 
				
			|||||||
 | 
					/*
 | 
				
			||||||
 | 
					Copyright 2019 The Kubernetes Authors.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					You may obtain a copy of the License at
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					limitations under the License.
 | 
				
			||||||
 | 
					*/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					package dynamiccertificates
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					import (
 | 
				
			||||||
 | 
						"bytes"
 | 
				
			||||||
 | 
						"crypto/tls"
 | 
				
			||||||
 | 
						"crypto/x509"
 | 
				
			||||||
 | 
						"fmt"
 | 
				
			||||||
 | 
						"net"
 | 
				
			||||||
 | 
						"net/http"
 | 
				
			||||||
 | 
						"strings"
 | 
				
			||||||
 | 
						"testing"
 | 
				
			||||||
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						"k8s.io/client-go/util/cert"
 | 
				
			||||||
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func TestServingCert(t *testing.T) {
 | 
				
			||||||
 | 
						tlsConfig := &tls.Config{
 | 
				
			||||||
 | 
							// Can't use SSLv3 because of POODLE and BEAST
 | 
				
			||||||
 | 
							// Can't use TLSv1.0 because of POODLE and BEAST using CBC cipher
 | 
				
			||||||
 | 
							// Can't use TLSv1.1 because of RC4 cipher usage
 | 
				
			||||||
 | 
							MinVersion: tls.VersionTLS12,
 | 
				
			||||||
 | 
							// enable HTTP2 for go's 1.7 HTTP Server
 | 
				
			||||||
 | 
							NextProtos: []string{"h2", "http/1.1"},
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						defaultCertProvider, err := createTestTLSCerts(testCertSpec{
 | 
				
			||||||
 | 
							host:  "172.30.0.1",
 | 
				
			||||||
 | 
							ips:   []string{"172.30.0.1"},
 | 
				
			||||||
 | 
							names: []string{"kubernetes", "kubernetes.default.svc.cluster.local"},
 | 
				
			||||||
 | 
						}, nil)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							t.Fatal(err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						var sniCerts []SNICertKeyContentProvider
 | 
				
			||||||
 | 
						certSpecs := []testCertSpec{
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								host:  "172.30.0.1",
 | 
				
			||||||
 | 
								ips:   []string{"172.30.0.1"},
 | 
				
			||||||
 | 
								names: []string{"openshift", "openshift.default.svc.cluster.local"},
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								host:  "127.0.0.1",
 | 
				
			||||||
 | 
								ips:   []string{"127.0.0.1"},
 | 
				
			||||||
 | 
								names: []string{"localhost"},
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								host:  "2001:abcd:bcda::1",
 | 
				
			||||||
 | 
								ips:   []string{"2001:abcd:bcda::1"},
 | 
				
			||||||
 | 
								names: []string{"openshiftv6", "openshiftv6.default.svc.cluster.local"},
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						for _, certSpec := range certSpecs {
 | 
				
			||||||
 | 
							names := append([]string{}, certSpec.ips...)
 | 
				
			||||||
 | 
							names = append(names, certSpec.names...)
 | 
				
			||||||
 | 
							certProvider, err := createTestTLSCerts(certSpec, names)
 | 
				
			||||||
 | 
							if err != nil {
 | 
				
			||||||
 | 
								t.Fatal(err)
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							sniCerts = append(sniCerts, certProvider)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						dynamicCertificateController := NewDynamicServingCertificateController(
 | 
				
			||||||
 | 
							*tlsConfig,
 | 
				
			||||||
 | 
							&nullCAContent{name: "client-ca"},
 | 
				
			||||||
 | 
							defaultCertProvider,
 | 
				
			||||||
 | 
							sniCerts,
 | 
				
			||||||
 | 
							nil, // TODO see how to plumb an event recorder down in here. For now this results in simply klog messages.
 | 
				
			||||||
 | 
						)
 | 
				
			||||||
 | 
						if err := dynamicCertificateController.RunOnce(); err != nil {
 | 
				
			||||||
 | 
							t.Fatal(err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						tlsConfig.GetConfigForClient = dynamicCertificateController.GetConfigForClient
 | 
				
			||||||
 | 
						tlsConfig.GetCertificate = func(*tls.ClientHelloInfo) (*tls.Certificate, error) { return nil, fmt.Errorf("positive failure") }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						stopCh := make(chan struct{})
 | 
				
			||||||
 | 
						defer close(stopCh)
 | 
				
			||||||
 | 
						server := &http.Server{
 | 
				
			||||||
 | 
							Handler: http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
 | 
				
			||||||
 | 
								w.WriteHeader(http.StatusOK)
 | 
				
			||||||
 | 
							}),
 | 
				
			||||||
 | 
							MaxHeaderBytes: 1 << 20,
 | 
				
			||||||
 | 
							TLSConfig:      tlsConfig,
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						listener, _, err := createListener("tcp", "127.0.0.1:0")
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							t.Fatal(err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						apiPort := listener.Addr().String()
 | 
				
			||||||
 | 
						go func() {
 | 
				
			||||||
 | 
							t.Logf("listening on %s", listener.Addr().String())
 | 
				
			||||||
 | 
							listener = tls.NewListener(listener, server.TLSConfig)
 | 
				
			||||||
 | 
							if err := server.ServeTLS(listener, "", ""); err != nil {
 | 
				
			||||||
 | 
								t.Error(err)
 | 
				
			||||||
 | 
								panic(err)
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							<-stopCh
 | 
				
			||||||
 | 
							server.Close()
 | 
				
			||||||
 | 
							t.Logf("stopped listening on %s", listener.Addr().String())
 | 
				
			||||||
 | 
						}()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						time.Sleep(1 * time.Second)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						expectedDefaultCertBytes, _ := defaultCertProvider.CurrentCertKeyContent()
 | 
				
			||||||
 | 
						expectedServiceCertBytes, _ := sniCerts[0].CurrentCertKeyContent()
 | 
				
			||||||
 | 
						expectedLocalhostCertBytes, _ := sniCerts[1].CurrentCertKeyContent()
 | 
				
			||||||
 | 
						expectedServiceV6CertBytes, _ := sniCerts[2].CurrentCertKeyContent()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						tests := []struct {
 | 
				
			||||||
 | 
							name       string
 | 
				
			||||||
 | 
							serverName string
 | 
				
			||||||
 | 
							expected   []byte
 | 
				
			||||||
 | 
						}{
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								name:       "default", // the no server name hits 127.0.0.1, which we hope matches by IP
 | 
				
			||||||
 | 
								serverName: "",
 | 
				
			||||||
 | 
								expected:   []byte(strings.TrimSpace(string(expectedLocalhostCertBytes))),
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								name:       "invalid",
 | 
				
			||||||
 | 
								serverName: "not-marked",
 | 
				
			||||||
 | 
								expected:   []byte(strings.TrimSpace(string(expectedDefaultCertBytes))),
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								name:       "service by dns",
 | 
				
			||||||
 | 
								serverName: "openshift",
 | 
				
			||||||
 | 
								expected:   []byte(strings.TrimSpace(string(expectedServiceCertBytes))),
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								name:       "service v6 by dns",
 | 
				
			||||||
 | 
								serverName: "openshiftv6",
 | 
				
			||||||
 | 
								expected:   []byte(strings.TrimSpace(string(expectedServiceV6CertBytes))),
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								name:       "localhost by dns",
 | 
				
			||||||
 | 
								serverName: "localhost",
 | 
				
			||||||
 | 
								expected:   []byte(strings.TrimSpace(string(expectedLocalhostCertBytes))),
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								name:       "localhost by IP",
 | 
				
			||||||
 | 
								serverName: "127.0.0.1", // this can never actually happen, but let's see
 | 
				
			||||||
 | 
								expected:   []byte(strings.TrimSpace(string(expectedLocalhostCertBytes))),
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						for _, test := range tests {
 | 
				
			||||||
 | 
							t.Run(test.name, func(t *testing.T) {
 | 
				
			||||||
 | 
								_, actualDefaultCertBytes, err := cert.GetServingCertificates(apiPort, test.serverName)
 | 
				
			||||||
 | 
								if err != nil {
 | 
				
			||||||
 | 
									t.Fatal(err)
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								if e, a := test.expected, actualDefaultCertBytes[0]; !bytes.Equal(e, a) {
 | 
				
			||||||
 | 
									eCert, _ := cert.ParseCertsPEM(e)
 | 
				
			||||||
 | 
									aCert, _ := cert.ParseCertsPEM(a)
 | 
				
			||||||
 | 
									t.Fatalf("expected %v\n, got %v", GetHumanCertDetail(eCert[0]), GetHumanCertDetail(aCert[0]))
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func createListener(network, addr string) (net.Listener, int, error) {
 | 
				
			||||||
 | 
						if len(network) == 0 {
 | 
				
			||||||
 | 
							network = "tcp"
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						ln, err := net.Listen(network, addr)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, 0, fmt.Errorf("failed to listen on %v: %v", addr, err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// get port
 | 
				
			||||||
 | 
						tcpAddr, ok := ln.Addr().(*net.TCPAddr)
 | 
				
			||||||
 | 
						if !ok {
 | 
				
			||||||
 | 
							ln.Close()
 | 
				
			||||||
 | 
							return nil, 0, fmt.Errorf("invalid listen address: %q", ln.Addr().String())
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return ln, tcpAddr.Port, nil
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					type nullCAContent struct {
 | 
				
			||||||
 | 
						name string
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					var _ CAContentProvider = &nullCAContent{}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// Name is just an identifier
 | 
				
			||||||
 | 
					func (c *nullCAContent) Name() string {
 | 
				
			||||||
 | 
						return c.name
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// CurrentCABundleContent provides ca bundle byte content
 | 
				
			||||||
 | 
					func (c *nullCAContent) CurrentCABundleContent() (cabundle []byte) {
 | 
				
			||||||
 | 
						return nil
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (c *nullCAContent) VerifyOptions() (x509.VerifyOptions, bool) {
 | 
				
			||||||
 | 
						return x509.VerifyOptions{}, false
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
@@ -21,6 +21,7 @@ import (
 | 
				
			|||||||
	"crypto/x509"
 | 
						"crypto/x509"
 | 
				
			||||||
	"errors"
 | 
						"errors"
 | 
				
			||||||
	"fmt"
 | 
						"fmt"
 | 
				
			||||||
 | 
						"net"
 | 
				
			||||||
	"sync/atomic"
 | 
						"sync/atomic"
 | 
				
			||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -94,7 +95,28 @@ func (c *DynamicServingCertificateController) GetConfigForClient(clientHello *tl
 | 
				
			|||||||
		return nil, errors.New("dynamiccertificates: unexpected config type")
 | 
							return nil, errors.New("dynamiccertificates: unexpected config type")
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return tlsConfig.Clone(), nil
 | 
						tlsConfigCopy := tlsConfig.Clone()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// if the client set SNI information, just use our "normal" SNI flow
 | 
				
			||||||
 | 
						if len(clientHello.ServerName) > 0 {
 | 
				
			||||||
 | 
							return tlsConfigCopy, nil
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// if the client didn't set SNI, then we need to inspect the requested IP so that we can choose
 | 
				
			||||||
 | 
						// a certificate from our list if we specifically handle that IP.  This can happen when an IP is specifically mapped by name.
 | 
				
			||||||
 | 
						host, _, err := net.SplitHostPort(clientHello.Conn.LocalAddr().String())
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return tlsConfigCopy, nil
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ipCert, ok := tlsConfigCopy.NameToCertificate[host]
 | 
				
			||||||
 | 
						if !ok {
 | 
				
			||||||
 | 
							return tlsConfigCopy, nil
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						tlsConfigCopy.Certificates = []tls.Certificate{*ipCert}
 | 
				
			||||||
 | 
						tlsConfigCopy.NameToCertificate = nil
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return tlsConfigCopy, nil
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// newTLSContent determines the next set of content for overriding the baseTLSConfig.
 | 
					// newTLSContent determines the next set of content for overriding the baseTLSConfig.
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -180,7 +180,9 @@ func (s *SecureServingOptions) AddFlags(fs *pflag.FlagSet) {
 | 
				
			|||||||
	fs.Var(cliflag.NewNamedCertKeyArray(&s.SNICertKeys), "tls-sni-cert-key", ""+
 | 
						fs.Var(cliflag.NewNamedCertKeyArray(&s.SNICertKeys), "tls-sni-cert-key", ""+
 | 
				
			||||||
		"A pair of x509 certificate and private key file paths, optionally suffixed with a list of "+
 | 
							"A pair of x509 certificate and private key file paths, optionally suffixed with a list of "+
 | 
				
			||||||
		"domain patterns which are fully qualified domain names, possibly with prefixed wildcard "+
 | 
							"domain patterns which are fully qualified domain names, possibly with prefixed wildcard "+
 | 
				
			||||||
		"segments. If no domain patterns are provided, the names of the certificate are "+
 | 
							"segments. The domain patterns also allow IP addresses, but IPs should only be used if "+
 | 
				
			||||||
 | 
							"the apiserver has visibility to the IP address requested by a client. "+
 | 
				
			||||||
 | 
							"If no domain patterns are provided, the names of the certificate are "+
 | 
				
			||||||
		"extracted. Non-wildcard matches trump over wildcard matches, explicit domain patterns "+
 | 
							"extracted. Non-wildcard matches trump over wildcard matches, explicit domain patterns "+
 | 
				
			||||||
		"trump over extracted names. For multiple key/certificate pairs, use the "+
 | 
							"trump over extracted names. For multiple key/certificate pairs, use the "+
 | 
				
			||||||
		"--tls-sni-cert-key multiple times. "+
 | 
							"--tls-sni-cert-key multiple times. "+
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user