Skip to content

SDN-5342: Signer username validation #2560

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
58 changes: 34 additions & 24 deletions pkg/controller/signer/signer-controller.go
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,6 @@ import (
corev1 "k8s.io/api/core/v1"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"

"k8s.io/client-go/kubernetes"

"k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/types"

Expand All @@ -30,22 +28,17 @@ import (
const signerName = "network.openshift.io/signer"

// Add controller and start it when the Manager is started.
func Add(mgr manager.Manager, status *statusmanager.StatusManager, _ cnoclient.Client) error {
reconciler, err := newReconciler(mgr, status)
func Add(mgr manager.Manager, status *statusmanager.StatusManager, client cnoclient.Client) error {
reconciler, err := newReconciler(client, mgr, status)
if err != nil {
return err
}
return add(mgr, reconciler)
}

// newReconciler returns a new reconcile.Reconciler
func newReconciler(mgr manager.Manager, status *statusmanager.StatusManager) (reconcile.Reconciler, error) {
// We need a clientset in order to UpdateApproval() of the CertificateSigningRequest
clientset, err := kubernetes.NewForConfig(mgr.GetConfig())
if err != nil {
return nil, err
}
return &ReconcileCSR{client: mgr.GetClient(), scheme: mgr.GetScheme(), status: status, clientset: clientset}, nil
func newReconciler(client cnoclient.Client, mgr manager.Manager, status *statusmanager.StatusManager) (reconcile.Reconciler, error) {
return &ReconcileCSR{client: client, scheme: mgr.GetScheme(), status: status}, nil
}

// add adds a new Controller to mgr with r as the reconcile.Reconciler
Expand Down Expand Up @@ -82,23 +75,16 @@ var _ reconcile.Reconciler = &ReconcileCSR{}
type ReconcileCSR struct {
// This client, initialized using mgr.GetClient() above, is a split client
// that reads objects from the cache and writes to the apiserver
client crclient.Client
client cnoclient.Client
scheme *runtime.Scheme
status *statusmanager.StatusManager

// Note: We need a Clientset as the controller-runtime client does not
// support non-CRUD subresources (see
// https://github.com/kubernetes-sigs/controller-runtime/issues/452)
// This may risk invalidating the cache but in our case, this is not a
// problem as we only use this to update the approval status of the csr.
clientset *kubernetes.Clientset
}

// Reconcile CSR
func (r *ReconcileCSR) Reconcile(ctx context.Context, request reconcile.Request) (reconcile.Result, error) {
defer utilruntime.HandleCrash(r.status.SetDegradedOnPanicAndCrash)
csr := &csrv1.CertificateSigningRequest{}
err := r.client.Get(ctx, request.NamespacedName, csr)
err := r.client.Default().CRClient().Get(ctx, request.NamespacedName, csr)
if err != nil {
if apierrors.IsNotFound(err) {
// Request object not found, could have been deleted after reconcile request.
Expand All @@ -118,6 +104,17 @@ func (r *ReconcileCSR) Reconcile(ctx context.Context, request reconcile.Request)
return reconcile.Result{}, nil
}

isValid, err := r.isValidUserName(ctx, csr.Spec.Username)
if err != nil {
return reconcile.Result{}, fmt.Errorf("error occurred while validating CSR %s: %w", csr.Name, err)
}
if !isValid {
// Update CSR status condition with Failed condition.
updateCSRStatusConditions(r, csr, "CSRInvalidUser",
"Certificate Signing Request is set with invalid user name, can't sign it")
return reconcile.Result{}, nil
}

if len(csr.Status.Certificate) != 0 {
// Request already has a certificate. There is nothing
// to do as we will, currently, not re-certify or handle any updates to
Expand All @@ -136,7 +133,7 @@ func (r *ReconcileCSR) Reconcile(ctx context.Context, request reconcile.Request)
Reason: "AutoApproved",
Message: "Automatically approved by " + signerName})
// Update status to "Approved"
_, err = r.clientset.CertificatesV1().CertificateSigningRequests().UpdateApproval(ctx, request.Name, csr, metav1.UpdateOptions{})
_, err = r.client.Default().Kubernetes().CertificatesV1().CertificateSigningRequests().UpdateApproval(ctx, request.Name, csr, metav1.UpdateOptions{})
if err != nil {
log.Printf("Unable to approve certificate for %v and signer %v: %v", request.Name, signerName, err)
return reconcile.Result{}, err
Expand All @@ -151,7 +148,7 @@ func (r *ReconcileCSR) Reconcile(ctx context.Context, request reconcile.Request)

// Get our CA that was created by the operatorpki.
caSecret := &corev1.Secret{}
err = r.client.Get(ctx, types.NamespacedName{Namespace: "openshift-ovn-kubernetes", Name: "signer-ca"}, caSecret)
err = r.client.Default().CRClient().Get(ctx, types.NamespacedName{Namespace: "openshift-ovn-kubernetes", Name: "signer-ca"}, caSecret)
if err != nil {
signerFailure(r, csr, "CAFailure",
fmt.Sprintf("Could not get CA certificate and key: %v", err))
Expand Down Expand Up @@ -201,7 +198,7 @@ func (r *ReconcileCSR) Reconcile(ctx context.Context, request reconcile.Request)
return reconcile.Result{}, nil
}

err = r.client.Status().Update(ctx, csr)
err = r.client.Default().CRClient().Status().Update(ctx, csr)
if err != nil {
log.Printf("Unable to update signed certificate for %v and signer %v: %v", request.Name, signerName, err)
return reconcile.Result{}, err
Expand All @@ -212,6 +209,19 @@ func (r *ReconcileCSR) Reconcile(ctx context.Context, request reconcile.Request)
return reconcile.Result{}, nil
}

func (r *ReconcileCSR) isValidUserName(ctx context.Context, csrUserName string) (bool, error) {
nodeList, err := r.client.Default().Kubernetes().CoreV1().Nodes().List(ctx, metav1.ListOptions{})
if err != nil {
return false, fmt.Errorf("failed to list nodes: %v", err)
}
for _, node := range nodeList.Items {
if fmt.Sprintf("system:ovn-node:%s", node.Name) == csrUserName {
return true, nil
}
}
return false, nil
}

// isCertificateRequestApproved returns true if a certificate request has the
// "Approved" condition and no "Denied" conditions; false otherwise.
func isCertificateRequestApproved(csr *csrv1.CertificateSigningRequest) bool {
Expand Down Expand Up @@ -247,7 +257,7 @@ func updateCSRStatusConditions(r *ReconcileCSR, csr *csrv1.CertificateSigningReq
Reason: reason,
Message: message})

err := r.client.Status().Update(context.TODO(), csr)
err := r.client.Default().CRClient().Status().Update(context.TODO(), csr)
if err != nil {
log.Printf("Could not update CSR status: %v", err)
r.status.SetDegraded(statusmanager.CertificateSigner, "UpdateFailure",
Expand Down
238 changes: 238 additions & 0 deletions pkg/controller/signer/signer_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,238 @@
package signer

import (
"bytes"
"context"
"crypto/rand"
"crypto/rsa"
"crypto/x509"
"encoding/pem"
"fmt"
"testing"
"time"

. "github.com/onsi/gomega"
configv1 "github.com/openshift/api/config/v1"
operv1 "github.com/openshift/api/operator/v1"
cnoclient "github.com/openshift/cluster-network-operator/pkg/client"
"github.com/openshift/cluster-network-operator/pkg/client/fake"
"github.com/openshift/cluster-network-operator/pkg/controller/statusmanager"
"github.com/openshift/cluster-network-operator/pkg/names"
"github.com/openshift/library-go/pkg/crypto"
certificatev1 "k8s.io/api/certificates/v1"
corev1 "k8s.io/api/core/v1"
apierrors "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
"k8s.io/client-go/kubernetes/scheme"
"sigs.k8s.io/controller-runtime/pkg/reconcile"
)

var (
csrName = "ipsec-csr"
nodeName = "testnode"
coName = "testing"
)

//nolint:errcheck
func init() {
certificatev1.AddToScheme(scheme.Scheme)
corev1.AddToScheme(scheme.Scheme)
}

func TestSigner_reconciler(t *testing.T) {
g := NewGomegaWithT(t)
client := fake.NewFakeClient()
status := statusmanager.New(client, coName, names.StandAloneClusterName)
signer := ReconcileCSR{client: client, status: status}

co := &configv1.ClusterOperator{ObjectMeta: metav1.ObjectMeta{Name: coName}}
setCO(t, client, co)
no := &operv1.Network{ObjectMeta: metav1.ObjectMeta{Name: names.OPERATOR_CONFIG}}
setOC(t, client, no)

csr, err := generateCSR()
g.Expect(err).NotTo(HaveOccurred())
csrObj := &certificatev1.CertificateSigningRequest{}
csrObj.Name = csrName
csrObj.Spec.Request = []byte(csr)
csrObj.Spec.SignerName = signerName
csrObj.Spec.Usages = []certificatev1.KeyUsage{"ipsec tunnel"}
csrObj.Spec.Username = fmt.Sprintf("system:ovn-node:%s", nodeName)
csrObj.Status.Conditions = append(csrObj.Status.Conditions, certificatev1.CertificateSigningRequestCondition{
Type: certificatev1.CertificateApproved,
Status: "True",
Reason: "AutoApproved",
Message: "Automatically approved by " + signerName})

err = client.Default().CRClient().Create(context.TODO(), csrObj)
g.Expect(err).NotTo(HaveOccurred())
_, err = client.Default().Kubernetes().CertificatesV1().CertificateSigningRequests().Create(context.TODO(), csrObj, metav1.CreateOptions{})
g.Expect(err).NotTo(HaveOccurred())

node := &corev1.Node{}
node.Name = nodeName
_, err = client.Default().Kubernetes().CoreV1().Nodes().Create(context.TODO(), node, metav1.CreateOptions{})
g.Expect(err).NotTo(HaveOccurred())

ca, err := crypto.MakeSelfSignedCAConfigForDuration(signerName, 10*time.Minute)
g.Expect(err).NotTo(HaveOccurred())
certBytes := &bytes.Buffer{}
keyBytes := &bytes.Buffer{}
err = ca.WriteCertConfig(certBytes, keyBytes)
g.Expect(err).NotTo(HaveOccurred())
caSecret := &corev1.Secret{}
caSecret.Name = "signer-ca"
caSecret.Namespace = "openshift-ovn-kubernetes"
caSecret.Data = make(map[string][]byte)
caSecret.Data["tls.crt"] = certBytes.Bytes()
caSecret.Data["tls.key"] = keyBytes.Bytes()
err = client.Default().CRClient().Create(context.TODO(), caSecret)
g.Expect(err).NotTo(HaveOccurred())

_, err = signer.Reconcile(context.TODO(),
reconcile.Request{NamespacedName: types.NamespacedName{Name: csrName}})
g.Expect(err).NotTo(HaveOccurred())

err = client.Default().CRClient().Get(context.TODO(), types.NamespacedName{Name: csrName}, csrObj)
g.Expect(err).NotTo(HaveOccurred())
g.Expect(csrObj.Status.Certificate).ShouldNot(BeEmpty())

co, _, err = getStatuses(client, "testing")
if err != nil {
t.Fatalf("error getting network.operator: %v", err)
}
g.Expect(err).NotTo(HaveOccurred())
g.Expect(conditionsInclude(co.Status.Conditions, []configv1.ClusterOperatorStatusCondition{
{
Type: configv1.OperatorDegraded,
Status: configv1.ConditionFalse,
},
})).To(BeTrue())
g.Expect(conditionsInclude(co.Status.Conditions, []configv1.ClusterOperatorStatusCondition{
{
Type: configv1.OperatorUpgradeable,
Status: configv1.ConditionTrue,
},
})).To(BeTrue())
}

func TestSigner_reconciler_withInvalidUserName(t *testing.T) {
g := NewGomegaWithT(t)
client := fake.NewFakeClient()
status := statusmanager.New(client, coName, names.StandAloneClusterName)
signer := ReconcileCSR{client: client, status: status}

co := &configv1.ClusterOperator{ObjectMeta: metav1.ObjectMeta{Name: coName}}
setCO(t, client, co)
no := &operv1.Network{ObjectMeta: metav1.ObjectMeta{Name: names.OPERATOR_CONFIG}}
setOC(t, client, no)

csr, err := generateCSR()
g.Expect(err).NotTo(HaveOccurred())
csrObj := &certificatev1.CertificateSigningRequest{}
csrObj.Name = csrName
csrObj.Spec.Request = []byte(csr)
csrObj.Spec.SignerName = signerName
csrObj.Spec.Usages = []certificatev1.KeyUsage{"ipsec tunnel"}
csrObj.Spec.Username = fmt.Sprintf("system:ovn-node:%s", "suspicious-node")

err = client.Default().CRClient().Create(context.TODO(), csrObj)
g.Expect(err).NotTo(HaveOccurred())
_, err = client.Default().Kubernetes().CertificatesV1().CertificateSigningRequests().Create(context.TODO(), csrObj, metav1.CreateOptions{})
g.Expect(err).NotTo(HaveOccurred())

node := &corev1.Node{}
node.Name = nodeName
_, err = client.Default().Kubernetes().CoreV1().Nodes().Create(context.TODO(), node, metav1.CreateOptions{})
g.Expect(err).NotTo(HaveOccurred())

_, err = signer.Reconcile(context.TODO(),
reconcile.Request{NamespacedName: types.NamespacedName{Name: csrName}})
g.Expect(err).NotTo(HaveOccurred())

err = client.Default().CRClient().Get(context.TODO(), types.NamespacedName{Name: csrName}, csrObj)
g.Expect(err).NotTo(HaveOccurred())
g.Expect(csrObj.Status.Certificate).Should(BeEmpty())
csrConditions := csrObj.Status.Conditions
g.Expect(len(csrConditions)).To(Equal(1))
g.Expect(csrConditions[0].Reason).To(Equal("CSRInvalidUser"))
g.Expect(csrConditions[0].Type).To(Equal(certificatev1.CertificateFailed))
}

func generateCSR() (string, error) {
// Create private key.
csrKey, err := rsa.GenerateKey(rand.Reader, 2048)
if err != nil {
return "", fmt.Errorf("failed to generate private key: %v", err)
}
// Create CSR with private key.
csrBytes, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{}, csrKey)
if err != nil {
return "", err
}
// Encode CSR in PEM format.
csrPEM := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE REQUEST", Bytes: csrBytes})
if csrPEM == nil {
return "", fmt.Errorf("failed to encode CSR in PEM format")
}
return string(csrPEM), nil
}

func setOC(t *testing.T, client cnoclient.Client, oc *operv1.Network) {
t.Helper()
g := NewGomegaWithT(t)
_, err := client.Default().OpenshiftOperatorClient().OperatorV1().Networks().Update(context.TODO(), oc, metav1.UpdateOptions{})
if apierrors.IsNotFound(err) {
_, err = client.Default().OpenshiftOperatorClient().OperatorV1().Networks().Create(context.TODO(), oc, metav1.CreateOptions{})
}
g.Expect(err).NotTo(HaveOccurred())
}

func setCO(t *testing.T, client cnoclient.Client, co *configv1.ClusterOperator) {
t.Helper()
g := NewGomegaWithT(t)
err := client.Default().CRClient().Update(context.TODO(), co)
if apierrors.IsNotFound(err) {
err = client.Default().CRClient().Create(context.TODO(), co)
}
g.Expect(err).NotTo(HaveOccurred())
}

func getStatuses(client cnoclient.Client, name string) (*configv1.ClusterOperator, *operv1.Network, error) {
co := &configv1.ClusterOperator{ObjectMeta: metav1.ObjectMeta{Name: name}}
err := client.ClientFor("").CRClient().Get(context.TODO(), types.NamespacedName{Name: name}, co)
if err != nil {
return nil, nil, err
}
oc, err := client.Default().OpenshiftOperatorClient().OperatorV1().Networks().Get(context.TODO(), names.OPERATOR_CONFIG, metav1.GetOptions{})
return co, oc, err
}

// Tests that the parts of newConditions that are set match what's in oldConditions (but
// doesn't look at anything else in oldConditions)
func conditionsInclude(oldConditions, newConditions []configv1.ClusterOperatorStatusCondition) bool {
for _, newCondition := range newConditions {
foundMatchingCondition := false

for _, oldCondition := range oldConditions {
if newCondition.Type != oldCondition.Type || newCondition.Status != oldCondition.Status {
continue
}
if newCondition.Reason != "" && newCondition.Reason != oldCondition.Reason {
return false
}
if newCondition.Message != "" && newCondition.Message != oldCondition.Message {
return false
}
foundMatchingCondition = true
break
}

if !foundMatchingCondition {
return false
}
}

return true
}