|
| 1 | +package origin |
| 2 | + |
| 3 | +import ( |
| 4 | + "bufio" |
| 5 | + "encoding/base64" |
| 6 | + "errors" |
| 7 | + "fmt" |
| 8 | + "io" |
| 9 | + "net" |
| 10 | + "net/http" |
| 11 | + "strings" |
| 12 | + "time" |
| 13 | + |
| 14 | + "github.com/golang/glog" |
| 15 | + "github.com/pborman/uuid" |
| 16 | + |
| 17 | + utilnet "k8s.io/apimachinery/pkg/util/net" |
| 18 | + apiresponsewriters "k8s.io/apiserver/pkg/endpoints/handlers/responsewriters" |
| 19 | + apirequest "k8s.io/apiserver/pkg/endpoints/request" |
| 20 | +) |
| 21 | + |
| 22 | +const AuditTriggered = "audit-triggered" |
| 23 | + |
| 24 | +var _ http.ResponseWriter = &auditResponseWriter{} |
| 25 | + |
| 26 | +// auditResponseWriter is responsible for serving as a fallback audit, responsible |
| 27 | +// for logging failed authn events. |
| 28 | +type auditResponseWriter struct { |
| 29 | + http.ResponseWriter |
| 30 | + contextMapper apirequest.RequestContextMapper |
| 31 | + req *http.Request |
| 32 | + out io.Writer |
| 33 | +} |
| 34 | + |
| 35 | +func (a *auditResponseWriter) WriteHeader(code int) { |
| 36 | + ctx, ok := a.contextMapper.Get(a.req) |
| 37 | + if !ok { |
| 38 | + apiresponsewriters.InternalError(a.ResponseWriter, a.req, errors.New("no context found for request")) |
| 39 | + return |
| 40 | + } |
| 41 | + // if the original audit handler triggered there's no need to do anything |
| 42 | + triggeredValue := ctx.Value(AuditTriggered) |
| 43 | + if triggered, ok := triggeredValue.(bool); ok && triggered { |
| 44 | + a.ResponseWriter.WriteHeader(code) |
| 45 | + return |
| 46 | + } |
| 47 | + id := uuid.NewRandom().String() |
| 48 | + line := fmt.Sprintf("%s AUDIT: id=%q ip=%q method=%q user=%q uri=%q\n", |
| 49 | + time.Now().Format(time.RFC3339Nano), id, utilnet.GetClientIP(a.req), a.req.Method, getUsername(a.req), a.req.URL) |
| 50 | + if _, err := fmt.Fprint(a.out, line); err != nil { |
| 51 | + glog.Errorf("Unable to write audit log: %s, the error is: %v", line, err) |
| 52 | + } |
| 53 | + line = fmt.Sprintf("%s AUDIT: id=%q response=\"%d\"\n", time.Now().Format(time.RFC3339Nano), id, code) |
| 54 | + if _, err := fmt.Fprint(a.out, line); err != nil { |
| 55 | + glog.Errorf("Unable to write audit log: %s, the error is: %v", line, err) |
| 56 | + } |
| 57 | + |
| 58 | + a.ResponseWriter.WriteHeader(code) |
| 59 | +} |
| 60 | + |
| 61 | +// fancyResponseWriterDelegator implements http.CloseNotifier, http.Flusher and |
| 62 | +// http.Hijacker which are needed to make certain http operation (e.g. watch, rsh, etc) |
| 63 | +// working. |
| 64 | +type fancyResponseWriterDelegator struct { |
| 65 | + *auditResponseWriter |
| 66 | +} |
| 67 | + |
| 68 | +func (f *fancyResponseWriterDelegator) CloseNotify() <-chan bool { |
| 69 | + return f.ResponseWriter.(http.CloseNotifier).CloseNotify() |
| 70 | +} |
| 71 | + |
| 72 | +func (f *fancyResponseWriterDelegator) Flush() { |
| 73 | + f.ResponseWriter.(http.Flusher).Flush() |
| 74 | +} |
| 75 | + |
| 76 | +func (f *fancyResponseWriterDelegator) Hijack() (net.Conn, *bufio.ReadWriter, error) { |
| 77 | + return f.ResponseWriter.(http.Hijacker).Hijack() |
| 78 | +} |
| 79 | + |
| 80 | +var _ http.CloseNotifier = &fancyResponseWriterDelegator{} |
| 81 | +var _ http.Flusher = &fancyResponseWriterDelegator{} |
| 82 | +var _ http.Hijacker = &fancyResponseWriterDelegator{} |
| 83 | + |
| 84 | +// WithAuditTriggeredMarker is responsible for marking that the audit did actually |
| 85 | +// took place and fallback audit should not trigger. |
| 86 | +func WithAuditTriggeredMarker(handler http.Handler, contextMapper apirequest.RequestContextMapper, out io.Writer) http.Handler { |
| 87 | + if out == nil { |
| 88 | + return handler |
| 89 | + } |
| 90 | + return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) { |
| 91 | + ctx, ok := contextMapper.Get(req) |
| 92 | + if !ok { |
| 93 | + apiresponsewriters.InternalError(w, req, errors.New("no context found for request")) |
| 94 | + return |
| 95 | + } |
| 96 | + contextMapper.Update(req, apirequest.WithValue(ctx, AuditTriggered, true)) |
| 97 | + handler.ServeHTTP(w, req) |
| 98 | + }) |
| 99 | +} |
| 100 | + |
| 101 | +// WithAuthFallbackAudit decorates a http.Handler with a fallback audit, logging |
| 102 | +// information only when the original one did was not triggered. |
| 103 | +// This needs to be used with WithAuditTriggeredMarker, which wraps the original |
| 104 | +// audit filter. |
| 105 | +func WithAuthFallbackAudit(handler http.Handler, contextMapper apirequest.RequestContextMapper, out io.Writer) http.Handler { |
| 106 | + if out == nil { |
| 107 | + return handler |
| 108 | + } |
| 109 | + return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) { |
| 110 | + respWriter := decorateResponseWriter(w, req, contextMapper, out) |
| 111 | + handler.ServeHTTP(respWriter, req) |
| 112 | + }) |
| 113 | +} |
| 114 | + |
| 115 | +// decorateResponseWriter is a copy method from the upstream audit, adapted |
| 116 | +// to work with the fallback audit mechanism. |
| 117 | +func decorateResponseWriter(responseWriter http.ResponseWriter, req *http.Request, |
| 118 | + contextMapper apirequest.RequestContextMapper, out io.Writer) http.ResponseWriter { |
| 119 | + delegate := &auditResponseWriter{ |
| 120 | + ResponseWriter: responseWriter, |
| 121 | + req: req, |
| 122 | + contextMapper: contextMapper, |
| 123 | + out: out, |
| 124 | + } |
| 125 | + // check if the ResponseWriter we're wrapping is the fancy one we need |
| 126 | + // or if the basic is sufficient |
| 127 | + _, cn := responseWriter.(http.CloseNotifier) |
| 128 | + _, fl := responseWriter.(http.Flusher) |
| 129 | + _, hj := responseWriter.(http.Hijacker) |
| 130 | + if cn && fl && hj { |
| 131 | + return &fancyResponseWriterDelegator{delegate} |
| 132 | + } |
| 133 | + return delegate |
| 134 | +} |
| 135 | + |
| 136 | +// getUsername returns username or information on the authn method being used. |
| 137 | +func getUsername(req *http.Request) string { |
| 138 | + auth := strings.TrimSpace(req.Header.Get("Authorization")) |
| 139 | + if auth == "" { |
| 140 | + return "<none>" |
| 141 | + } |
| 142 | + |
| 143 | + // check basic auth |
| 144 | + const basicScheme string = "Basic " |
| 145 | + if strings.HasPrefix(auth, basicScheme) { |
| 146 | + const basicInvalid = "<basic_invalid>" |
| 147 | + str, err := base64.StdEncoding.DecodeString(auth[len(basicScheme):]) |
| 148 | + if err != nil { |
| 149 | + return basicInvalid |
| 150 | + } |
| 151 | + |
| 152 | + cred := strings.SplitN(string(str), ":", 2) |
| 153 | + if len(cred) < 2 { |
| 154 | + return basicInvalid |
| 155 | + } |
| 156 | + |
| 157 | + return cred[0] |
| 158 | + } |
| 159 | + |
| 160 | + // check bearer token |
| 161 | + parts := strings.Split(auth, " ") |
| 162 | + if len(parts) > 1 && strings.ToLower(parts[0]) == "bearer" { |
| 163 | + token := parts[1] |
| 164 | + // Empty bearer tokens aren't valid |
| 165 | + if len(token) == 0 { |
| 166 | + return "<bearer_invalid>" |
| 167 | + } |
| 168 | + |
| 169 | + return "<bearer>" |
| 170 | + } |
| 171 | + |
| 172 | + // other tokens |
| 173 | + token := strings.TrimSpace(req.URL.Query().Get("access_token")) |
| 174 | + if len(token) > 0 { |
| 175 | + return "<token>" |
| 176 | + } |
| 177 | + |
| 178 | + return "<unknown>" |
| 179 | +} |
0 commit comments