315 lines
9.5 KiB
Go
315 lines
9.5 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package cache
|
|
|
|
import (
|
|
"context"
|
|
"crypto/hmac"
|
|
"crypto/rand"
|
|
"crypto/sha256"
|
|
"encoding/binary"
|
|
"errors"
|
|
"hash"
|
|
"io"
|
|
"runtime"
|
|
"sync"
|
|
"time"
|
|
"unsafe"
|
|
|
|
"golang.org/x/sync/singleflight"
|
|
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
"k8s.io/apiserver/pkg/audit"
|
|
"k8s.io/apiserver/pkg/authentication/authenticator"
|
|
"k8s.io/apiserver/pkg/warning"
|
|
"k8s.io/klog/v2"
|
|
"k8s.io/utils/clock"
|
|
)
|
|
|
|
var errAuthnCrash = apierrors.NewInternalError(errors.New("authentication failed unexpectedly"))
|
|
|
|
const sharedLookupTimeout = 30 * time.Second
|
|
|
|
// cacheRecord holds the three return values of the authenticator.Token AuthenticateToken method
|
|
type cacheRecord struct {
|
|
resp *authenticator.Response
|
|
ok bool
|
|
err error
|
|
|
|
// this cache assumes token authn has no side-effects or temporal dependence.
|
|
// neither of these are true for audit annotations set via AddAuditAnnotation.
|
|
//
|
|
// for audit annotations, the assumption is that for some period of time (cache TTL),
|
|
// all requests with the same API audiences and the same bearer token result in the
|
|
// same annotations. This may not be true if the authenticator sets an annotation
|
|
// based on the current time, but that may be okay since cache TTLs are generally
|
|
// small (seconds).
|
|
annotations map[string]string
|
|
warnings []*cacheWarning
|
|
}
|
|
|
|
type cacheWarning struct {
|
|
agent string
|
|
text string
|
|
}
|
|
|
|
type cachedTokenAuthenticator struct {
|
|
authenticator authenticator.Token
|
|
|
|
cacheErrs bool
|
|
successTTL time.Duration
|
|
failureTTL time.Duration
|
|
|
|
cache cache
|
|
group singleflight.Group
|
|
|
|
// hashPool is a per authenticator pool of hash.Hash (to avoid allocations from building the Hash)
|
|
// HMAC with SHA-256 and a random key is used to prevent precomputation and length extension attacks
|
|
// It also mitigates hash map DOS attacks via collisions (the inputs are supplied by untrusted users)
|
|
hashPool *sync.Pool
|
|
}
|
|
|
|
type cache interface {
|
|
// given a key, return the record, and whether or not it existed
|
|
get(key string) (value *cacheRecord, exists bool)
|
|
// caches the record for the key
|
|
set(key string, value *cacheRecord, ttl time.Duration)
|
|
// removes the record for the key
|
|
remove(key string)
|
|
}
|
|
|
|
// New returns a token authenticator that caches the results of the specified authenticator. A ttl of 0 bypasses the cache.
|
|
func New(authenticator authenticator.Token, cacheErrs bool, successTTL, failureTTL time.Duration) authenticator.Token {
|
|
return newWithClock(authenticator, cacheErrs, successTTL, failureTTL, clock.RealClock{})
|
|
}
|
|
|
|
func newWithClock(authenticator authenticator.Token, cacheErrs bool, successTTL, failureTTL time.Duration, clock clock.Clock) authenticator.Token {
|
|
randomCacheKey := make([]byte, 32)
|
|
if _, err := rand.Read(randomCacheKey); err != nil {
|
|
panic(err) // rand should never fail
|
|
}
|
|
|
|
return &cachedTokenAuthenticator{
|
|
authenticator: authenticator,
|
|
cacheErrs: cacheErrs,
|
|
successTTL: successTTL,
|
|
failureTTL: failureTTL,
|
|
// Cache performance degrades noticeably when the number of
|
|
// tokens in operation exceeds the size of the cache. It is
|
|
// cheap to make the cache big in the second dimension below,
|
|
// the memory is only consumed when that many tokens are being
|
|
// used. Currently we advertise support 5k nodes and 10k
|
|
// namespaces; a 32k entry cache is therefore a 2x safety
|
|
// margin.
|
|
cache: newStripedCache(32, fnvHashFunc, func() cache { return newSimpleCache(clock) }),
|
|
|
|
hashPool: &sync.Pool{
|
|
New: func() interface{} {
|
|
return hmac.New(sha256.New, randomCacheKey)
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
// AuthenticateToken implements authenticator.Token
|
|
func (a *cachedTokenAuthenticator) AuthenticateToken(ctx context.Context, token string) (*authenticator.Response, bool, error) {
|
|
record := a.doAuthenticateToken(ctx, token)
|
|
if !record.ok || record.err != nil {
|
|
return nil, false, record.err
|
|
}
|
|
for key, value := range record.annotations {
|
|
audit.AddAuditAnnotation(ctx, key, value)
|
|
}
|
|
for _, w := range record.warnings {
|
|
warning.AddWarning(ctx, w.agent, w.text)
|
|
}
|
|
return record.resp, true, nil
|
|
}
|
|
|
|
func (a *cachedTokenAuthenticator) doAuthenticateToken(ctx context.Context, token string) *cacheRecord {
|
|
doneAuthenticating := stats.authenticating(ctx)
|
|
|
|
auds, audsOk := authenticator.AudiencesFrom(ctx)
|
|
|
|
key := keyFunc(a.hashPool, auds, token)
|
|
if record, ok := a.cache.get(key); ok {
|
|
// Record cache hit
|
|
doneAuthenticating(true)
|
|
return record
|
|
}
|
|
|
|
// Record cache miss
|
|
doneBlocking := stats.blocking(ctx)
|
|
defer doneBlocking()
|
|
defer doneAuthenticating(false)
|
|
|
|
c := a.group.DoChan(key, func() (val interface{}, _ error) {
|
|
// always use one place to read and write the output of AuthenticateToken
|
|
record := &cacheRecord{}
|
|
|
|
doneFetching := stats.fetching(ctx)
|
|
// We're leaving the request handling stack so we need to handle crashes
|
|
// ourselves. Log a stack trace and return a 500 if something panics.
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
// make sure to always return a record
|
|
record.err = errAuthnCrash
|
|
val = record
|
|
|
|
// Same as stdlib http server code. Manually allocate stack
|
|
// trace buffer size to prevent excessively large logs
|
|
const size = 64 << 10
|
|
buf := make([]byte, size)
|
|
buf = buf[:runtime.Stack(buf, false)]
|
|
klog.Errorf("%v\n%s", r, buf)
|
|
}
|
|
doneFetching(record.err == nil)
|
|
}()
|
|
|
|
// Check again for a cached record. We may have raced with a fetch.
|
|
if record, ok := a.cache.get(key); ok {
|
|
return record, nil
|
|
}
|
|
|
|
// Detach the context because the lookup may be shared by multiple callers,
|
|
// however propagate the audience.
|
|
ctx, cancel := context.WithTimeout(context.Background(), sharedLookupTimeout)
|
|
defer cancel()
|
|
|
|
if audsOk {
|
|
ctx = authenticator.WithAudiences(ctx, auds)
|
|
}
|
|
recorder := &recorder{}
|
|
ctx = warning.WithWarningRecorder(ctx, recorder)
|
|
|
|
ctx = audit.WithAuditContext(ctx)
|
|
ac := audit.AuditContextFrom(ctx)
|
|
|
|
record.resp, record.ok, record.err = a.authenticator.AuthenticateToken(ctx, token)
|
|
record.annotations = ac.GetEventAnnotations()
|
|
record.warnings = recorder.extractWarnings()
|
|
|
|
if !a.cacheErrs && record.err != nil {
|
|
return record, nil
|
|
}
|
|
|
|
switch {
|
|
case record.ok && a.successTTL > 0:
|
|
a.cache.set(key, record, a.successTTL)
|
|
case !record.ok && a.failureTTL > 0:
|
|
a.cache.set(key, record, a.failureTTL)
|
|
}
|
|
|
|
return record, nil
|
|
})
|
|
|
|
select {
|
|
case result := <-c:
|
|
// we always set Val and never set Err
|
|
return result.Val.(*cacheRecord)
|
|
case <-ctx.Done():
|
|
// fake a record on context cancel
|
|
return &cacheRecord{err: ctx.Err()}
|
|
}
|
|
}
|
|
|
|
// keyFunc generates a string key by hashing the inputs.
|
|
// This lowers the memory requirement of the cache and keeps tokens out of memory.
|
|
func keyFunc(hashPool *sync.Pool, auds []string, token string) string {
|
|
h := hashPool.Get().(hash.Hash)
|
|
|
|
h.Reset()
|
|
|
|
// try to force stack allocation
|
|
var a [4]byte
|
|
b := a[:]
|
|
|
|
writeLengthPrefixedString(h, b, token)
|
|
// encode the length of audiences to avoid ambiguities
|
|
writeLength(h, b, len(auds))
|
|
for _, aud := range auds {
|
|
writeLengthPrefixedString(h, b, aud)
|
|
}
|
|
|
|
key := toString(h.Sum(nil)) // skip base64 encoding to save an allocation
|
|
|
|
hashPool.Put(h)
|
|
|
|
return key
|
|
}
|
|
|
|
// writeLengthPrefixedString writes s with a length prefix to prevent ambiguities, i.e. "xy" + "z" == "x" + "yz"
|
|
// the length of b is assumed to be 4 (b is mutated by this function to store the length of s)
|
|
func writeLengthPrefixedString(w io.Writer, b []byte, s string) {
|
|
writeLength(w, b, len(s))
|
|
if _, err := w.Write(toBytes(s)); err != nil {
|
|
panic(err) // Write() on hash never fails
|
|
}
|
|
}
|
|
|
|
// writeLength encodes length into b and then writes it via the given writer
|
|
// the length of b is assumed to be 4
|
|
func writeLength(w io.Writer, b []byte, length int) {
|
|
binary.BigEndian.PutUint32(b, uint32(length))
|
|
if _, err := w.Write(b); err != nil {
|
|
panic(err) // Write() on hash never fails
|
|
}
|
|
}
|
|
|
|
// toBytes performs unholy acts to avoid allocations
|
|
func toBytes(s string) []byte {
|
|
// unsafe.StringData is unspecified for the empty string, so we provide a strict interpretation
|
|
if len(s) == 0 {
|
|
return nil
|
|
}
|
|
// Copied from go 1.20.1 os.File.WriteString
|
|
// https://github.com/golang/go/blob/202a1a57064127c3f19d96df57b9f9586145e21c/src/os/file.go#L246
|
|
return unsafe.Slice(unsafe.StringData(s), len(s))
|
|
}
|
|
|
|
// toString performs unholy acts to avoid allocations
|
|
func toString(b []byte) string {
|
|
// unsafe.SliceData relies on cap whereas we want to rely on len
|
|
if len(b) == 0 {
|
|
return ""
|
|
}
|
|
// Copied from go 1.20.1 strings.Builder.String
|
|
// https://github.com/golang/go/blob/202a1a57064127c3f19d96df57b9f9586145e21c/src/strings/builder.go#L48
|
|
return unsafe.String(unsafe.SliceData(b), len(b))
|
|
}
|
|
|
|
// simple recorder that only appends warning
|
|
type recorder struct {
|
|
mu sync.Mutex
|
|
warnings []*cacheWarning
|
|
}
|
|
|
|
// AddWarning adds a warning to recorder.
|
|
func (r *recorder) AddWarning(agent, text string) {
|
|
r.mu.Lock()
|
|
defer r.mu.Unlock()
|
|
r.warnings = append(r.warnings, &cacheWarning{agent: agent, text: text})
|
|
}
|
|
|
|
func (r *recorder) extractWarnings() []*cacheWarning {
|
|
r.mu.Lock()
|
|
defer r.mu.Unlock()
|
|
warnings := r.warnings
|
|
r.warnings = nil
|
|
return warnings
|
|
}
|