k3s/pkg/clientaccess/token.go

290 lines
8.1 KiB
Go
Raw Normal View History

2019-05-09 22:05:51 +00:00
package clientaccess
import (
"crypto/sha256"
"crypto/tls"
"crypto/x509"
"encoding/hex"
"fmt"
"io/ioutil"
"net/http"
"net/url"
"strings"
"time"
2019-05-09 22:05:51 +00:00
"github.com/pkg/errors"
"github.com/sirupsen/logrus"
2019-05-09 22:05:51 +00:00
)
var (
defaultClientTimeout = 10 * time.Second
defaultClient = &http.Client{
Timeout: defaultClientTimeout,
}
2019-05-09 22:05:51 +00:00
insecureClient = &http.Client{
Timeout: defaultClientTimeout,
2019-05-09 22:05:51 +00:00
Transport: &http.Transport{
TLSClientConfig: &tls.Config{
InsecureSkipVerify: true,
},
},
}
)
const (
tokenPrefix = "K10"
tokenFormat = "%s%s::%s:%s"
caHashLength = sha256.Size * 2
)
2019-05-09 22:05:51 +00:00
type OverrideURLCallback func(config []byte) (*url.URL, error)
2019-05-09 22:05:51 +00:00
type Info struct {
CACerts []byte `json:"cacerts,omitempty"`
BaseURL string `json:"baseurl,omitempty"`
Username string `json:"username,omitempty"`
Password string `json:"password,omitempty"`
caHash string
2019-05-09 22:05:51 +00:00
}
// String returns the token data, templated according to the token format
func (info *Info) String() string {
return fmt.Sprintf(tokenFormat, tokenPrefix, hashCA(info.CACerts), info.Username, info.Password)
}
// ParseAndValidateToken parses a token, downloads and validates the server's CA bundle,
// and validates it according to the caHash from the token if set.
func ParseAndValidateToken(server string, token string) (*Info, error) {
info, err := parseToken(token)
2019-05-09 22:05:51 +00:00
if err != nil {
return nil, err
2019-05-09 22:05:51 +00:00
}
if err := info.setAndValidateServer(server); err != nil {
return nil, err
2019-05-09 22:05:51 +00:00
}
return info, nil
}
2019-05-09 22:05:51 +00:00
// ParseAndValidateToken parses a token with user override, downloads and
// validates the server's CA bundle, and validates it according to the caHash from the token if set.
func ParseAndValidateTokenForUser(server string, token string, username string) (*Info, error) {
info, err := parseToken(token)
2019-05-09 22:05:51 +00:00
if err != nil {
return nil, err
}
info.Username = username
2019-05-09 22:05:51 +00:00
if err := info.setAndValidateServer(server); err != nil {
2019-05-09 22:05:51 +00:00
return nil, err
}
return info, nil
2019-05-09 22:05:51 +00:00
}
// setAndValidateServer updates the remote server's cert info, and validates it against the provided hash
func (info *Info) setAndValidateServer(server string) error {
if err := info.setServer(server); err != nil {
return err
}
return info.validateCAHash()
}
// validateCACerts returns a boolean indicating whether or not a CA bundle matches the provided hash,
// and a string containing the hash of the CA bundle.
func validateCACerts(cacerts []byte, hash string) (bool, string) {
newHash := hashCA(cacerts)
return hash == newHash, newHash
2019-05-09 22:05:51 +00:00
}
// hashCA returns the hex-encoded SHA256 digest of a byte array.
func hashCA(cacerts []byte) string {
digest := sha256.Sum256(cacerts)
return hex.EncodeToString(digest[:])
}
// ParseUsernamePassword returns the username and password portion of a token string,
// along with a bool indicating if the token was successfully parsed.
2019-05-09 22:05:51 +00:00
func ParseUsernamePassword(token string) (string, string, bool) {
info, err := parseToken(token)
2019-05-09 22:05:51 +00:00
if err != nil {
return "", "", false
}
return info.Username, info.Password, true
2019-05-09 22:05:51 +00:00
}
// parseToken parses a token into an Info struct
func parseToken(token string) (*Info, error) {
var info = &Info{}
2019-05-09 22:05:51 +00:00
if len(token) == 0 {
return nil, errors.New("token must not be empty")
}
if !strings.HasPrefix(token, tokenPrefix) {
token = fmt.Sprintf(tokenFormat, tokenPrefix, "", "", token)
2019-05-09 22:05:51 +00:00
}
// Strip off the prefix
token = token[len(tokenPrefix):]
2019-05-09 22:05:51 +00:00
parts := strings.SplitN(token, "::", 2)
token = parts[0]
if len(parts) > 1 {
hashLen := len(parts[0])
if hashLen > 0 && hashLen != caHashLength {
return nil, errors.New("invalid token CA hash length")
}
info.caHash = parts[0]
2019-05-09 22:05:51 +00:00
token = parts[1]
}
parts = strings.SplitN(token, ":", 2)
if len(parts) != 2 || len(parts[1]) == 0 {
return nil, errors.New("invalid token format")
2019-05-09 22:05:51 +00:00
}
info.Username = parts[0]
info.Password = parts[1]
2019-05-09 22:05:51 +00:00
return info, nil
2019-05-09 22:05:51 +00:00
}
// GetHTTPClient returns a http client that validates TLS server certificates using the provided CA bundle.
// If the CA bundle is empty, it validates using the default http client using the OS CA bundle.
// If the CA bundle is not empty but does not contain any valid certs, it validates using
// an empty CA bundle (which will always fail).
2019-05-09 22:05:51 +00:00
func GetHTTPClient(cacerts []byte) *http.Client {
if len(cacerts) == 0 {
return defaultClient
2019-05-09 22:05:51 +00:00
}
pool := x509.NewCertPool()
pool.AppendCertsFromPEM(cacerts)
return &http.Client{
Timeout: defaultClientTimeout,
2019-05-09 22:05:51 +00:00
Transport: &http.Transport{
DisableKeepAlives: true,
TLSClientConfig: &tls.Config{
RootCAs: pool,
},
},
}
}
// Get makes a request to a subpath of info's BaseURL
2019-05-09 22:05:51 +00:00
func Get(path string, info *Info) ([]byte, error) {
u, err := url.Parse(info.BaseURL)
2019-05-09 22:05:51 +00:00
if err != nil {
return nil, err
}
u.Path = path
return get(u.String(), GetHTTPClient(info.CACerts), info.Username, info.Password)
}
// setServer sets the BaseURL and CACerts fields of the Info by connecting to the server
// and storing the CA bundle.
func (info *Info) setServer(server string) error {
url, err := url.Parse(server)
if err != nil {
return errors.Wrapf(err, "Invalid server url, failed to parse: %s", server)
}
if url.Scheme != "https" {
return fmt.Errorf("only https:// URLs are supported, invalid scheme: %s", server)
}
for strings.HasSuffix(url.Path, "/") {
url.Path = url.Path[:len(url.Path)-1]
}
cacerts, err := getCACerts(*url)
if err != nil {
return err
}
info.BaseURL = url.String()
info.CACerts = cacerts
return nil
}
// ValidateCAHash validates that info's caHash matches the CACerts hash.
func (info *Info) validateCAHash() error {
if len(info.caHash) > 0 && len(info.CACerts) == 0 {
// Warn if the user provided a CA hash but we're not going to validate because it's already trusted
logrus.Warn("Cluster CA certificate is trusted by the host CA bundle. " +
"Token CA hash will not be validated.")
} else if len(info.caHash) == 0 && len(info.CACerts) > 0 {
// Warn if the CA is self-signed but the user didn't provide a hash to validate it against
logrus.Warn("Cluster CA certificate is not trusted by the host CA bundle, but the token does not include a CA hash. " +
"Use the full token from the server's node-token file to enable Cluster CA validation.")
} else if len(info.CACerts) > 0 && len(info.caHash) > 0 {
// only verify CA hash if the server cert is not trusted by the OS CA bundle
if ok, serverHash := validateCACerts(info.CACerts, info.caHash); !ok {
return fmt.Errorf("token CA hash does not match the Cluster CA certificate hash: %s != %s", info.caHash, serverHash)
}
}
return nil
2019-05-09 22:05:51 +00:00
}
// getCACerts retrieves the CA bundle from a server.
// An error is raised if the CA bundle cannot be retrieved,
// or if the server's cert is not signed by the returned bundle.
func getCACerts(u url.URL) ([]byte, error) {
2019-05-09 22:05:51 +00:00
u.Path = "/cacerts"
url := u.String()
// This first request is expected to fail. If the server has
// a cert that can be validated using the default CA bundle, return
// success with no CA certs.
_, err := get(url, defaultClient, "", "")
2019-05-09 22:05:51 +00:00
if err == nil {
return nil, nil
}
// Download the CA bundle using a client that does not validate certs.
2019-05-09 22:05:51 +00:00
cacerts, err := get(url, insecureClient, "", "")
if err != nil {
return nil, errors.Wrap(err, "failed to get CA certs")
2019-05-09 22:05:51 +00:00
}
// Request the CA bundle again, validating that the CA bundle can be loaded
// and used to validate the server certificate. This should only fail if we somehow
// get an empty CA bundle. or if the dynamiclistener cert is incorrectly signed.
2019-05-09 22:05:51 +00:00
_, err = get(url, GetHTTPClient(cacerts), "", "")
if err != nil {
return nil, errors.Wrap(err, "CA cert validation failed")
2019-05-09 22:05:51 +00:00
}
return cacerts, nil
}
// get makes a request to a url using a provided client, username, and password,
// returning the response body.
2019-05-09 22:05:51 +00:00
func get(u string, client *http.Client, username, password string) ([]byte, error) {
req, err := http.NewRequest(http.MethodGet, u, nil)
if err != nil {
return nil, err
}
if username != "" {
req.SetBasicAuth(username, password)
}
resp, err := client.Do(req)
if err != nil {
return nil, err
}
defer resp.Body.Close()
if resp.StatusCode != http.StatusOK {
return nil, fmt.Errorf("%s: %s", u, resp.Status)
}
return ioutil.ReadAll(resp.Body)
}