
Add v1beta4.ClusterConfiguration.EncryptionAlgorithm field (string) and allow the user to configure the cluster asymetric encryption algorithm to be either "RSA" (default, 2048 pkey size) or "ECDSA" (P-256). Add validation and fuzzing. Conversion from v1beta3 is not required because an empty field value is accepted and defaulted to RSA if needed. Leverage the existing configuration option (feature gate) PublicKeysECDSA but rename the backend fields, arguments, function names to be more generic - EncryptionAlgorithm instead of PublicKeyAlgorithm. That is because once the feature gate is enabled the algorithm configuration also applies to private keys. It also uses the kubeadm API type (string) instead of the x509.PublicKeyAlgorithm enum (int). Deprecate the PublicKeysECDSA feature gate with a message. It should be removed with the release of v1beta4 or maximum one release later (it is an alpha FG).
139 lines
3.0 KiB
Go
139 lines
3.0 KiB
Go
/*
|
|
Copyright 2021 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package testing
|
|
|
|
import (
|
|
"crypto"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"regexp"
|
|
"runtime"
|
|
"runtime/debug"
|
|
"strings"
|
|
"sync"
|
|
"testing"
|
|
|
|
kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm"
|
|
"k8s.io/kubernetes/cmd/kubeadm/app/util/pkiutil"
|
|
)
|
|
|
|
// RunWithPrivateKeyFixtureDirectory overrides NewPrivateKey to return private key fixtures
|
|
// while executing tests in m.
|
|
func RunWithPrivateKeyFixtureDirectory(m *testing.M) {
|
|
defer install()()
|
|
os.Exit(m.Run())
|
|
}
|
|
|
|
// Reset indicates a new test is starting and previously returned private key fixtures may be reused.
|
|
func Reset() {
|
|
lock.Lock()
|
|
defer lock.Unlock()
|
|
ecdsa = 0
|
|
rsa = 0
|
|
}
|
|
|
|
var (
|
|
testFunction = regexp.MustCompile(`.*\.Test[^./]+(.func\d*)?$`)
|
|
|
|
lock = sync.Mutex{}
|
|
fixtureDir = ""
|
|
lastTest = ""
|
|
ecdsa = 0
|
|
rsa = 0
|
|
)
|
|
|
|
func install() (cleanup func()) {
|
|
lock.Lock()
|
|
defer lock.Unlock()
|
|
|
|
_, filename, _, ok := runtime.Caller(1)
|
|
if !ok {
|
|
fmt.Println("Could not determine testdata location, skipping private key fixture installation")
|
|
return func() {}
|
|
}
|
|
fixtureDir = filepath.Join(filepath.Dir(filename), "testdata")
|
|
|
|
originalNewPrivateKey := pkiutil.NewPrivateKey
|
|
pkiutil.NewPrivateKey = newPrivateKey
|
|
return func() {
|
|
pkiutil.NewPrivateKey = originalNewPrivateKey
|
|
}
|
|
}
|
|
|
|
func newPrivateKey(keyType kubeadmapi.EncryptionAlgorithmType) (crypto.Signer, error) {
|
|
lock.Lock()
|
|
defer lock.Unlock()
|
|
|
|
var pcs [50]uintptr
|
|
nCallers := runtime.Callers(2, pcs[:])
|
|
frames := runtime.CallersFrames(pcs[:nCallers])
|
|
thisTest := ""
|
|
for {
|
|
frame, more := frames.Next()
|
|
if strings.HasSuffix(frame.File, "_test.go") && testFunction.MatchString(frame.Function) {
|
|
thisTest = frame.Function
|
|
break
|
|
}
|
|
if !more {
|
|
break
|
|
}
|
|
}
|
|
|
|
if len(thisTest) == 0 {
|
|
fmt.Println("could not determine test for private key fixture")
|
|
debug.PrintStack()
|
|
return pkiutil.GeneratePrivateKey(keyType)
|
|
}
|
|
|
|
if thisTest != lastTest {
|
|
rsa = 0
|
|
ecdsa = 0
|
|
lastTest = thisTest
|
|
}
|
|
|
|
keyName := ""
|
|
switch keyType {
|
|
case kubeadmapi.EncryptionAlgorithmECDSA:
|
|
ecdsa++
|
|
keyName = fmt.Sprintf("%d.ecdsa", ecdsa)
|
|
default:
|
|
rsa++
|
|
keyName = fmt.Sprintf("%d.rsa", rsa)
|
|
}
|
|
|
|
if len(keyName) > 0 {
|
|
privKey, err := pkiutil.TryLoadKeyFromDisk(fixtureDir, keyName)
|
|
if err == nil {
|
|
return privKey, nil
|
|
}
|
|
}
|
|
|
|
fmt.Println("GeneratePrivateKey " + keyName + " for " + thisTest)
|
|
|
|
signer, err := pkiutil.GeneratePrivateKey(keyType)
|
|
if err != nil {
|
|
return signer, err
|
|
}
|
|
|
|
if len(keyName) > 0 {
|
|
pkiutil.WriteKey(fixtureDir, keyName, signer)
|
|
}
|
|
|
|
return signer, err
|
|
}
|