Skip to content

Commit 33007d2

Browse files
committed
Add audit filter that will be able to catch authn failures
1 parent a68db68 commit 33007d2

File tree

2 files changed

+180
-1
lines changed

2 files changed

+180
-1
lines changed

pkg/cmd/server/origin/audit.go

+173
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,173 @@
1+
package origin
2+
3+
import (
4+
"bufio"
5+
"encoding/base64"
6+
"errors"
7+
"fmt"
8+
"io"
9+
"net"
10+
"net/http"
11+
"strings"
12+
"time"
13+
14+
"github.com/golang/glog"
15+
"github.com/pborman/uuid"
16+
17+
utilnet "k8s.io/apimachinery/pkg/util/net"
18+
apiresponsewriters "k8s.io/apiserver/pkg/endpoints/handlers/responsewriters"
19+
apirequest "k8s.io/apiserver/pkg/endpoints/request"
20+
)
21+
22+
const AuditTriggered = "audit-triggered"
23+
24+
var _ http.ResponseWriter = &auditResponseWriter{}
25+
26+
// auditResponseWriter is responsible for serving as a fallback audit, responsible
27+
// for logging failed authn events.
28+
type auditResponseWriter struct {
29+
http.ResponseWriter
30+
contextMapper apirequest.RequestContextMapper
31+
req *http.Request
32+
out io.Writer
33+
}
34+
35+
func (a *auditResponseWriter) WriteHeader(code int) {
36+
ctx, ok := a.contextMapper.Get(a.req)
37+
if !ok {
38+
apiresponsewriters.InternalError(a.ResponseWriter, a.req, errors.New("no context found for request"))
39+
return
40+
}
41+
// if the original audit handler triggered there's no need to do anything
42+
triggeredValue := ctx.Value(AuditTriggered)
43+
if triggered, ok := triggeredValue.(bool); ok && triggered {
44+
a.ResponseWriter.WriteHeader(code)
45+
return
46+
}
47+
id := uuid.NewRandom().String()
48+
line := fmt.Sprintf("%s AUDIT: id=%q ip=%q method=%q user=%q uri=%q\n",
49+
time.Now().Format(time.RFC3339Nano), id, utilnet.GetClientIP(a.req), a.req.Method, getUsername(a.req), a.req.URL)
50+
if _, err := fmt.Fprint(a.out, line); err != nil {
51+
glog.Errorf("Unable to write audit log: %s, the error is: %v", line, err)
52+
}
53+
line = fmt.Sprintf("%s AUDIT: id=%q response=\"%d\"\n", time.Now().Format(time.RFC3339Nano), id, code)
54+
if _, err := fmt.Fprint(a.out, line); err != nil {
55+
glog.Errorf("Unable to write audit log: %s, the error is: %v", line, err)
56+
}
57+
58+
a.ResponseWriter.WriteHeader(code)
59+
}
60+
61+
// fancyResponseWriterDelegator implements http.CloseNotifier, http.Flusher and
62+
// http.Hijacker which are needed to make certain http operation (e.g. watch, rsh, etc)
63+
// working.
64+
type fancyResponseWriterDelegator struct {
65+
*auditResponseWriter
66+
}
67+
68+
func (f *fancyResponseWriterDelegator) CloseNotify() <-chan bool {
69+
return f.ResponseWriter.(http.CloseNotifier).CloseNotify()
70+
}
71+
72+
func (f *fancyResponseWriterDelegator) Flush() {
73+
f.ResponseWriter.(http.Flusher).Flush()
74+
}
75+
76+
func (f *fancyResponseWriterDelegator) Hijack() (net.Conn, *bufio.ReadWriter, error) {
77+
return f.ResponseWriter.(http.Hijacker).Hijack()
78+
}
79+
80+
var _ http.CloseNotifier = &fancyResponseWriterDelegator{}
81+
var _ http.Flusher = &fancyResponseWriterDelegator{}
82+
var _ http.Hijacker = &fancyResponseWriterDelegator{}
83+
84+
// WithAuditTriggeredMarker is responsible for marking that the audit did actually
85+
// took place and fallback audit should not trigger.
86+
func WithAuditTriggeredMarker(handler http.Handler, contextMapper apirequest.RequestContextMapper, out io.Writer) http.Handler {
87+
if out == nil {
88+
return handler
89+
}
90+
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
91+
ctx, ok := contextMapper.Get(req)
92+
if !ok {
93+
apiresponsewriters.InternalError(w, req, errors.New("no context found for request"))
94+
return
95+
}
96+
contextMapper.Update(req, apirequest.WithValue(ctx, AuditTriggered, true))
97+
handler.ServeHTTP(w, req)
98+
})
99+
}
100+
101+
// WithAuthFallbackAudit decorates a http.Handler with a fallback audit, logging
102+
// information only when the original one did was not triggered.
103+
// This needs to be used with WithAuditTriggeredMarker, which wraps the original
104+
// audit filter.
105+
func WithAuthFallbackAudit(handler http.Handler, contextMapper apirequest.RequestContextMapper, out io.Writer) http.Handler {
106+
if out == nil {
107+
return handler
108+
}
109+
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
110+
respWriter := decorateResponseWriter(w, req, contextMapper, out)
111+
handler.ServeHTTP(respWriter, req)
112+
})
113+
}
114+
115+
// decorateResponseWriter is a copy method from the upstream audit, adapted
116+
// to work with the fallback audit mechanism.
117+
func decorateResponseWriter(responseWriter http.ResponseWriter, req *http.Request,
118+
contextMapper apirequest.RequestContextMapper, out io.Writer) http.ResponseWriter {
119+
delegate := &auditResponseWriter{
120+
ResponseWriter: responseWriter,
121+
req: req,
122+
contextMapper: contextMapper,
123+
out: out,
124+
}
125+
// check if the ResponseWriter we're wrapping is the fancy one we need
126+
// or if the basic is sufficient
127+
_, cn := responseWriter.(http.CloseNotifier)
128+
_, fl := responseWriter.(http.Flusher)
129+
_, hj := responseWriter.(http.Hijacker)
130+
if cn && fl && hj {
131+
return &fancyResponseWriterDelegator{delegate}
132+
}
133+
return delegate
134+
}
135+
136+
// getUsername returns username or information on the authn method being used.
137+
func getUsername(req *http.Request) string {
138+
auth := strings.TrimSpace(req.Header.Get("Authorization"))
139+
140+
// check basic auth
141+
const basicScheme string = "Basic "
142+
if strings.HasPrefix(auth, basicScheme) {
143+
const basic = "<basic>"
144+
str, err := base64.StdEncoding.DecodeString(auth[len(basicScheme):])
145+
if err != nil {
146+
return basic
147+
}
148+
cred := strings.SplitN(string(str), ":", 2)
149+
if len(cred) < 2 {
150+
return basic
151+
}
152+
return cred[0]
153+
}
154+
155+
// check bearer token
156+
parts := strings.Split(auth, " ")
157+
if len(parts) > 1 && strings.ToLower(parts[0]) == "bearer" {
158+
return "<bearer>"
159+
}
160+
161+
// other tokens
162+
token := strings.TrimSpace(req.URL.Query().Get("access_token"))
163+
if len(token) > 0 {
164+
return "<token>"
165+
}
166+
167+
// cert authn
168+
if req.TLS != nil && len(req.TLS.PeerCertificates) > 0 {
169+
return "<x509>"
170+
}
171+
172+
return "<none>"
173+
}

pkg/cmd/server/origin/master.go

+7-1
Original file line numberDiff line numberDiff line change
@@ -186,8 +186,8 @@ func (c *MasterConfig) buildHandlerChain(assetConfig *AssetConfig) (func(http.Ha
186186
handler = serverhandlers.ImpersonationFilter(handler, c.Authorizer, c.GroupCache, contextMapper)
187187

188188
// audit handler must comes before the impersonationFilter to read the original user
189+
var writer io.Writer
189190
if c.Options.AuditConfig.Enabled {
190-
var writer io.Writer
191191
if len(c.Options.AuditConfig.AuditFilePath) > 0 {
192192
writer = &lumberjack.Logger{
193193
Filename: c.Options.AuditConfig.AuditFilePath,
@@ -200,7 +200,9 @@ func (c *MasterConfig) buildHandlerChain(assetConfig *AssetConfig) (func(http.Ha
200200
writer = cmdutil.NewGLogWriterV(0)
201201
}
202202
handler = apifilters.WithAudit(handler, contextMapper, writer)
203+
handler = WithAuditTriggeredMarker(handler, contextMapper, writer)
203204
}
205+
204206
handler = serverhandlers.AuthenticationHandlerFilter(handler, c.Authenticator, contextMapper)
205207
handler = namespacingFilter(handler, contextMapper)
206208
handler = cacheControlFilter(handler, "no-store") // protected endpoints should not be cached
@@ -216,6 +218,10 @@ func (c *MasterConfig) buildHandlerChain(assetConfig *AssetConfig) (func(http.Ha
216218
}
217219
}
218220

221+
if c.Options.AuditConfig.Enabled {
222+
handler = WithAuthFallbackAudit(handler, contextMapper, writer)
223+
}
224+
219225
handler, err := assetConfig.WithAssets(handler)
220226
if err != nil {
221227
glog.Fatalf("Failed to setup serving of assets: %v", err)

0 commit comments

Comments
 (0)