Skip to content

Commit a008a21

Browse files
committed
Add audit filter that will be able to catch authn failures
1 parent a68db68 commit a008a21

File tree

2 files changed

+186
-1
lines changed

2 files changed

+186
-1
lines changed

pkg/cmd/server/origin/audit.go

+179
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,179 @@
1+
package origin
2+
3+
import (
4+
"bufio"
5+
"encoding/base64"
6+
"errors"
7+
"fmt"
8+
"io"
9+
"net"
10+
"net/http"
11+
"strings"
12+
"time"
13+
14+
"github.com/golang/glog"
15+
"github.com/pborman/uuid"
16+
17+
utilnet "k8s.io/apimachinery/pkg/util/net"
18+
apiresponsewriters "k8s.io/apiserver/pkg/endpoints/handlers/responsewriters"
19+
apirequest "k8s.io/apiserver/pkg/endpoints/request"
20+
)
21+
22+
const AuditTriggered = "audit-triggered"
23+
24+
var _ http.ResponseWriter = &auditResponseWriter{}
25+
26+
// auditResponseWriter is responsible for serving as a fallback audit, responsible
27+
// for logging failed authn events.
28+
type auditResponseWriter struct {
29+
http.ResponseWriter
30+
contextMapper apirequest.RequestContextMapper
31+
req *http.Request
32+
out io.Writer
33+
}
34+
35+
func (a *auditResponseWriter) WriteHeader(code int) {
36+
ctx, ok := a.contextMapper.Get(a.req)
37+
if !ok {
38+
apiresponsewriters.InternalError(a.ResponseWriter, a.req, errors.New("no context found for request"))
39+
return
40+
}
41+
// if the original audit handler triggered there's no need to do anything
42+
triggeredValue := ctx.Value(AuditTriggered)
43+
if triggered, ok := triggeredValue.(bool); ok && triggered {
44+
a.ResponseWriter.WriteHeader(code)
45+
return
46+
}
47+
id := uuid.NewRandom().String()
48+
line := fmt.Sprintf("%s AUDIT: id=%q ip=%q method=%q user=%q uri=%q\n",
49+
time.Now().Format(time.RFC3339Nano), id, utilnet.GetClientIP(a.req), a.req.Method, getUsername(a.req), a.req.URL)
50+
if _, err := fmt.Fprint(a.out, line); err != nil {
51+
glog.Errorf("Unable to write audit log: %s, the error is: %v", line, err)
52+
}
53+
line = fmt.Sprintf("%s AUDIT: id=%q response=\"%d\"\n", time.Now().Format(time.RFC3339Nano), id, code)
54+
if _, err := fmt.Fprint(a.out, line); err != nil {
55+
glog.Errorf("Unable to write audit log: %s, the error is: %v", line, err)
56+
}
57+
58+
a.ResponseWriter.WriteHeader(code)
59+
}
60+
61+
// fancyResponseWriterDelegator implements http.CloseNotifier, http.Flusher and
62+
// http.Hijacker which are needed to make certain http operation (e.g. watch, rsh, etc)
63+
// working.
64+
type fancyResponseWriterDelegator struct {
65+
*auditResponseWriter
66+
}
67+
68+
func (f *fancyResponseWriterDelegator) CloseNotify() <-chan bool {
69+
return f.ResponseWriter.(http.CloseNotifier).CloseNotify()
70+
}
71+
72+
func (f *fancyResponseWriterDelegator) Flush() {
73+
f.ResponseWriter.(http.Flusher).Flush()
74+
}
75+
76+
func (f *fancyResponseWriterDelegator) Hijack() (net.Conn, *bufio.ReadWriter, error) {
77+
return f.ResponseWriter.(http.Hijacker).Hijack()
78+
}
79+
80+
var _ http.CloseNotifier = &fancyResponseWriterDelegator{}
81+
var _ http.Flusher = &fancyResponseWriterDelegator{}
82+
var _ http.Hijacker = &fancyResponseWriterDelegator{}
83+
84+
// WithAuditTriggeredMarker is responsible for marking that the audit did actually
85+
// took place and fallback audit should not trigger.
86+
func WithAuditTriggeredMarker(handler http.Handler, contextMapper apirequest.RequestContextMapper, out io.Writer) http.Handler {
87+
if out == nil {
88+
return handler
89+
}
90+
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
91+
ctx, ok := contextMapper.Get(req)
92+
if !ok {
93+
apiresponsewriters.InternalError(w, req, errors.New("no context found for request"))
94+
return
95+
}
96+
contextMapper.Update(req, apirequest.WithValue(ctx, AuditTriggered, true))
97+
handler.ServeHTTP(w, req)
98+
})
99+
}
100+
101+
// WithAuthFallbackAudit decorates a http.Handler with a fallback audit, logging
102+
// information only when the original one did was not triggered.
103+
// This needs to be used with WithAuditTriggeredMarker, which wraps the original
104+
// audit filter.
105+
func WithAuthFallbackAudit(handler http.Handler, contextMapper apirequest.RequestContextMapper, out io.Writer) http.Handler {
106+
if out == nil {
107+
return handler
108+
}
109+
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
110+
respWriter := decorateResponseWriter(w, req, contextMapper, out)
111+
handler.ServeHTTP(respWriter, req)
112+
})
113+
}
114+
115+
// decorateResponseWriter is a copy method from the upstream audit, adapted
116+
// to work with the fallback audit mechanism.
117+
func decorateResponseWriter(responseWriter http.ResponseWriter, req *http.Request,
118+
contextMapper apirequest.RequestContextMapper, out io.Writer) http.ResponseWriter {
119+
delegate := &auditResponseWriter{
120+
ResponseWriter: responseWriter,
121+
req: req,
122+
contextMapper: contextMapper,
123+
out: out,
124+
}
125+
// check if the ResponseWriter we're wrapping is the fancy one we need
126+
// or if the basic is sufficient
127+
_, cn := responseWriter.(http.CloseNotifier)
128+
_, fl := responseWriter.(http.Flusher)
129+
_, hj := responseWriter.(http.Hijacker)
130+
if cn && fl && hj {
131+
return &fancyResponseWriterDelegator{delegate}
132+
}
133+
return delegate
134+
}
135+
136+
// getUsername returns username or information on the authn method being used.
137+
func getUsername(req *http.Request) string {
138+
auth := strings.TrimSpace(req.Header.Get("Authorization"))
139+
if auth == "" {
140+
return "<none>"
141+
}
142+
143+
// check basic auth
144+
const basicScheme string = "Basic "
145+
if strings.HasPrefix(auth, basicScheme) {
146+
const basicInvalid = "<basic_invalid>"
147+
str, err := base64.StdEncoding.DecodeString(auth[len(basicScheme):])
148+
if err != nil {
149+
return basicInvalid
150+
}
151+
152+
cred := strings.SplitN(string(str), ":", 2)
153+
if len(cred) < 2 {
154+
return basicInvalid
155+
}
156+
157+
return cred[0]
158+
}
159+
160+
// check bearer token
161+
parts := strings.Split(auth, " ")
162+
if len(parts) > 1 && strings.ToLower(parts[0]) == "bearer" {
163+
token := parts[1]
164+
// Empty bearer tokens aren't valid
165+
if len(token) == 0 {
166+
return "<bearer_invalid>"
167+
}
168+
169+
return "<bearer>"
170+
}
171+
172+
// other tokens
173+
token := strings.TrimSpace(req.URL.Query().Get("access_token"))
174+
if len(token) > 0 {
175+
return "<token>"
176+
}
177+
178+
return "<unknown>"
179+
}

pkg/cmd/server/origin/master.go

+7-1
Original file line numberDiff line numberDiff line change
@@ -186,8 +186,8 @@ func (c *MasterConfig) buildHandlerChain(assetConfig *AssetConfig) (func(http.Ha
186186
handler = serverhandlers.ImpersonationFilter(handler, c.Authorizer, c.GroupCache, contextMapper)
187187

188188
// audit handler must comes before the impersonationFilter to read the original user
189+
var writer io.Writer
189190
if c.Options.AuditConfig.Enabled {
190-
var writer io.Writer
191191
if len(c.Options.AuditConfig.AuditFilePath) > 0 {
192192
writer = &lumberjack.Logger{
193193
Filename: c.Options.AuditConfig.AuditFilePath,
@@ -200,7 +200,9 @@ func (c *MasterConfig) buildHandlerChain(assetConfig *AssetConfig) (func(http.Ha
200200
writer = cmdutil.NewGLogWriterV(0)
201201
}
202202
handler = apifilters.WithAudit(handler, contextMapper, writer)
203+
handler = WithAuditTriggeredMarker(handler, contextMapper, writer)
203204
}
205+
204206
handler = serverhandlers.AuthenticationHandlerFilter(handler, c.Authenticator, contextMapper)
205207
handler = namespacingFilter(handler, contextMapper)
206208
handler = cacheControlFilter(handler, "no-store") // protected endpoints should not be cached
@@ -216,6 +218,10 @@ func (c *MasterConfig) buildHandlerChain(assetConfig *AssetConfig) (func(http.Ha
216218
}
217219
}
218220

221+
if c.Options.AuditConfig.Enabled {
222+
handler = WithAuthFallbackAudit(handler, contextMapper, writer)
223+
}
224+
219225
handler, err := assetConfig.WithAssets(handler)
220226
if err != nil {
221227
glog.Fatalf("Failed to setup serving of assets: %v", err)

0 commit comments

Comments
 (0)