-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update http.Transport if it already exists in ExecProvider #66395
Update http.Transport if it already exists in ExecProvider #66395
Conversation
/assign @mikedanese |
/hold |
5262e8e
to
4471282
Compare
@liggitt good point, not sure how i forgot about that :| Changed to handle existing Transport in ExecProvider and use stdlib |
cert, err := getCert() | ||
if err != nil { | ||
return nil, err | ||
if t, ok := c.Transport.(*http.Transport); ok && t != nil { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what does this do when run with --v=6
? might need a func TransportFor(transport http.RoundTripper) (*http.Transport, error)
helper in pkg/util/net to unwrap nested debugging transports (see DialerFor
as an example)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just tested, --v=6
works fine.
But I agree with your point, someone can introduce a wrapper eventually, breaking this.
Added a TransportFor
helper.
} | ||
getCert := t.TLSClientConfig.GetClientCertificate | ||
t.TLSClientConfig.GetClientCertificate = func(hi *tls.CertificateRequestInfo) (*tls.Certificate, error) { | ||
// If previous GetCert is present and returns a valid non-nil |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
trying to think through the implications if you use client cert rotation and an exec plugin... the client cert rotation code would always win. does that make sense?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
where are we checking if the returned cert is valid?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
where are we checking if the returned cert is valid?
refreshCredsLocked
does validation. It fetches the actual certificate, validates and caches it. GetClientCertificate
returns the cached copy.
I added cert expiry validation too in this PR, just in case.
trying to think through the implications if you use client cert rotation and an exec plugin... the client cert rotation code would always win. does that make sense?
Is cert rotation and exec plugin a valid configuration? Does it mean "fetch initial cert via plugin but then rotate manually"?
Our use case relies on exec plugin to bootstrap a fresh cert whenever needed and cert rotation in kubelet is disabled.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
refreshCredsLocked does validation.
I was referring to what the previous GetCert was returning ("If previous GetCert is present and returns a valid non-nil..."), not what the exec plugin returned
Is cert rotation and exec plugin a valid configuration?
I don't know, but this is allowing it :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I was referring to what the previous GetCert was returning ("If previous GetCert is present and returns a valid non-nil..."), not what the exec plugin returned
Ah, gotcha. I don't think it's this plugin's job to check that. If something returns a certificate here, it better be valid. Otherwise it's a bug.
I'd rather leave it as is, WDYT?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For the sanity of the next person who tries to debug this, I think it would be better to return an error if GetClientCertificate is not nil. That would effectively disallow client cert rotation to be used with the exec plugin, right? I'd be happy to avoid this complexity.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it would be better to return an error if GetClientCertificate is not nil. That would effectively disallow client cert rotation to be used with the exec plugin, right? I'd be happy to avoid this complexity.
that seems like a reasonable starting point. mixing the two gets weird.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
SGTM, made it an error in both cases
if getCert != nil { | ||
cert, err := getCert(hi) | ||
if err != nil { | ||
return nil, err |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
would we want to check the exec plugin in an error case? (I know this is pre-existing, just trying to understand the implications and whether they are different if we're dealing with an existing transport vs a GetCert func)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Makes sense to me, added.
It's an unlikely configuration, but doesn't hurt.
@liggitt thanks for the comments, PTAL |
FYI, I'd like to cherry-pick this into 1.11.2. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The rest client keeps on giving. What if we added a WrapDialer field to the restclient.Config and used that to add the connection tracker? Would that be simpler?
|
||
// TransportFor returns the root *http.Transport behind all wrapper | ||
// RoundTrippers. Wrappers must implement RoundTripperWrapper. | ||
func TransportFor(transport http.RoundTripper) (*http.Transport, error) { | ||
if transport == nil { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
when does this happen?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This shifts the nil check from every caller to here. transport.Config.Transport
can be nil with valid config, afaik (just not in kubelet)
} | ||
getCert := t.TLSClientConfig.GetClientCertificate | ||
t.TLSClientConfig.GetClientCertificate = func(hi *tls.CertificateRequestInfo) (*tls.Certificate, error) { | ||
// If previous GetCert is present and returns a valid non-nil |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For the sanity of the next person who tries to debug this, I think it would be better to return an error if GetClientCertificate is not nil. That would effectively disallow client cert rotation to be used with the exec plugin, right? I'd be happy to avoid this complexity.
if certBlock == nil { | ||
return errors.New("can't parse client certificate returned by exec plugin as PEM block") | ||
} | ||
x509Cert, err := x509.ParseCertificate(certBlock.Bytes) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Use the cert on line 402 so you don't have to parse the pem twice.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You mean manually parse ClientKeyData
and build tls.Certificate
via a literal?
It feels like more work and easy to miss some validations that tls.X509KeyPair
does
if err != nil { | ||
return fmt.Errorf("failed parsing x509 client certificate returned by exec plugin: %v", err) | ||
} | ||
if time.Now().After(x509Cert.NotAfter) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
are we already checking time client-side elsewhere? this makes us vulnerable to client clock skew
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't know if we're checking it elsewhere. It should be kube-apiserver's responsibility to verify cert validity on incoming requests. Could you clarify how this makes us vulnerable?
97ab95f
to
527b23b
Compare
@liggitt @mikedanese PTAL. Turns out we can just set |
} | ||
return a.cert() | ||
if c.TLS.GetCert != nil { | ||
return errors.New("can't add TLC certificate callback: transport.Config.TLS.GetCert already set") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
s/TLC/TLS/?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
e619672
to
7293fab
Compare
Instead of Transport. This fixes ExecPlugin, which fails if restclient.Config.Transport is set.
7293fab
to
3357b5e
Compare
I'm reasonably happy with this. /lgtm |
Moved cert expiry check out to #66632 |
/retest |
1 similar comment
/retest |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: awly, liggitt, mikedanese The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/test all [submit-queue is verifying that this PR is safe to merge] |
Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions here. |
/sig cli |
What this PR does / why we need it:
This unbreaks ExecPlugin. Without the change, we hit this error
https://github.com/kubernetes/kubernetes/blob/master/staging/src/k8s.io/client-go/transport/transport.go#L32
Release note: