Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix router reload errors for deleted certificates #18587

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
58 changes: 48 additions & 10 deletions pkg/router/template/certmanager.go
Original file line number Diff line number Diff line change
Expand Up @@ -12,10 +12,24 @@ import (
routeapi "github.com/openshift/origin/pkg/route/apis/route"
)

// certificateFile represents a certificate file.
type certificateFile struct {
certDir string
id string
}

// Tag generates a certificate file tag/name. This is used to index into the
// the map of deleted certificates.
func (cf certificateFile) Tag() string {
return filepath.Join(cf.certDir, cf.id+".pem")
}

// simpleCertificateManager is the default implementation of a certificateManager
type simpleCertificateManager struct {
cfg *certificateManagerConfig
w certificateWriter

deletedCertificates map[string]certificateFile
}

// newSimpleCertificateManager should be used to create a new cert manager. It will return an error
Expand All @@ -27,7 +41,7 @@ func newSimpleCertificateManager(cfg *certificateManagerConfig, w certificateWri
if w == nil {
return nil, fmt.Errorf("certificate manager requires a certificate writer")
}
return &simpleCertificateManager{cfg, w}, nil
return &simpleCertificateManager{cfg, w, make(map[string]certificateFile, 0)}, nil
}

// validateCertManagerConfig ensures that the key functions and directories are set as well as
Expand Down Expand Up @@ -81,6 +95,8 @@ func (cm *simpleCertificateManager) WriteCertificatesForConfig(config *ServiceAl
buffer.Write([]byte(caCertObj.Contents))
}

certFile := certificateFile{certDir: cm.cfg.certDir, id: certObj.ID}
delete(cm.deletedCertificates, certFile.Tag())
if err := cm.w.WriteCertificate(cm.cfg.certDir, certObj.ID, buffer.Bytes()); err != nil {
return err
}
Expand All @@ -92,6 +108,8 @@ func (cm *simpleCertificateManager) WriteCertificatesForConfig(config *ServiceAl
destCert, ok := config.Certificates[destCertKey]

if ok {
destCertFile := certificateFile{certDir: cm.cfg.caCertDir, id: destCert.ID}
delete(cm.deletedCertificates, destCertFile.Tag())
if err := cm.w.WriteCertificate(cm.cfg.caCertDir, destCert.ID, []byte(destCert.Contents)); err != nil {
return err
}
Expand All @@ -101,7 +119,7 @@ func (cm *simpleCertificateManager) WriteCertificatesForConfig(config *ServiceAl
return nil
}

// deleteCertificatesForConfig will delete all certificates for the ServiceAliasConfig
// DeleteCertificatesForConfig will delete all certificates for the ServiceAliasConfig
func (cm *simpleCertificateManager) DeleteCertificatesForConfig(config *ServiceAliasConfig) error {
if config == nil {
return nil
Expand All @@ -112,10 +130,8 @@ func (cm *simpleCertificateManager) DeleteCertificatesForConfig(config *ServiceA
certObj, ok := config.Certificates[certKey]

if ok {
err := cm.w.DeleteCertificate(cm.cfg.certDir, certObj.ID)
if err != nil {
return err
}
certFile := certificateFile{certDir: cm.cfg.certDir, id: certObj.ID}
cm.deletedCertificates[certFile.Tag()] = certFile
}
}

Expand All @@ -124,16 +140,38 @@ func (cm *simpleCertificateManager) DeleteCertificatesForConfig(config *ServiceA
destCert, ok := config.Certificates[destCertKey]

if ok {
err := cm.w.DeleteCertificate(cm.cfg.caCertDir, destCert.ID)
if err != nil {
return err
}
destCertFile := certificateFile{certDir: cm.cfg.caCertDir, id: destCert.ID}
cm.deletedCertificates[destCertFile.Tag()] = destCertFile
}
}
}
return nil
}

// Commit applies any pending changes made to the certificateManager.
func (cm *simpleCertificateManager) Commit() error {
// Deletion of certificates that are being referenced in backends or
// config is problematic in that the template router will not
// reload because the config is invalid, so we _do_ need to "stage"
// or commit the removals. Remove all the deleted certificates.
for _, certFile := range cm.deletedCertificates {
err := cm.w.DeleteCertificate(certFile.certDir, certFile.id)
if err != nil {
// Log a warning if the delete fails but proceed on.
glog.Warningf("Ignoring error deleting certificate file %v: %v", certFile.Tag(), err)
}
}

cm.deletedCertificates = make(map[string]certificateFile, 0)

// If we decide to stage the certificate writes, we can flush the
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The only advantage is when a cert changes to make sure that a route version and a cert match. And it should only make a functional difference if there are multiple certs for the same domain (e.g. for different paths?). Is there any case where it would actually matter? I can't think of one... so I think writing them out immediately is fine.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ok - will add a log message if the delete fails (and keep going).
Yeah, writing the certificates out immediately is ok as those are processed via the crt directive which is only read at haproxy startup.

// write to the disk here. Today, the certificate writes are done
// just before this function is called. The tradeoff is storing a
// copy in memory until we commit.

return nil
}

// simpleCertificateWriter is the default implementation of a certificateWriter
type simpleCertificateWriter struct{}

Expand Down
19 changes: 19 additions & 0 deletions pkg/router/template/certmanager_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@ package templaterouter

import (
"reflect"
"sort"
"testing"

routeapi "github.com/openshift/origin/pkg/route/apis/route"
Expand Down Expand Up @@ -119,6 +120,7 @@ func TestCertManager(t *testing.T) {
}

for k, tc := range testCases {
certManager.Commit()
fakeCertWriter.clear()
err := certManager.WriteCertificatesForConfig(tc.cfg)
if err != nil {
Expand All @@ -133,14 +135,31 @@ func TestCertManager(t *testing.T) {
t.Errorf("Unexpected number of adds for %s occurred. Expected: %d Got: %d", k, len(tc.expectedAdds), len(fakeCertWriter.addedCerts))
}

if 0 != len(fakeCertWriter.deletedCerts) {
t.Errorf("Unexpected number of deletes prior to certManager.Commit() for %s occurred. Expected: 0 Got: %d", k, len(fakeCertWriter.deletedCerts))
}

err = certManager.Commit()
if err != nil {
t.Fatalf("Unexpected error committing certs for service alias config for %s. Config: %v, err: %v", k, tc.cfg, err)
}

if len(tc.expectedAdds) != len(fakeCertWriter.addedCerts) {
t.Errorf("Unexpected number of adds for %s occurred. Expected: %d Got: %d", k, len(tc.expectedAdds), len(fakeCertWriter.addedCerts))
}

if len(tc.expectedDeletes) != len(fakeCertWriter.deletedCerts) {
t.Errorf("Unexpected number of deletes for %s occurred. Expected: %d Got: %d", k, len(tc.expectedDeletes), len(fakeCertWriter.deletedCerts))
}

sort.Strings(tc.expectedAdds)
sort.Strings(fakeCertWriter.addedCerts)
if !reflect.DeepEqual(tc.expectedAdds, fakeCertWriter.addedCerts) {
t.Errorf("Unexpected adds for %s, wanted: %v, got %v", k, tc.expectedAdds, fakeCertWriter.addedCerts)
}

sort.Strings(tc.expectedDeletes)
sort.Strings(fakeCertWriter.deletedCerts)
if !reflect.DeepEqual(tc.expectedDeletes, fakeCertWriter.deletedCerts) {
t.Errorf("Unexpected deletes for %s, wanted: %v, got %v", k, tc.expectedDeletes, fakeCertWriter.deletedCerts)
}
Expand Down
7 changes: 7 additions & 0 deletions pkg/router/template/router.go
Original file line number Diff line number Diff line change
Expand Up @@ -394,6 +394,13 @@ func (r *templateRouter) writeConfig() error {
r.state[k] = cfg
}

glog.V(4).Infof("Committing router certificate manager changes...")
if err := r.certManager.Commit(); err != nil {
return fmt.Errorf("error committing certificate changes: %v", err)
}

glog.V(4).Infof("Router certificate manager config committed")

for path, template := range r.templates {
file, err := os.Create(path)
if err != nil {
Expand Down
2 changes: 2 additions & 0 deletions pkg/router/template/types.go
Original file line number Diff line number Diff line change
Expand Up @@ -103,6 +103,8 @@ type certificateManager interface {
WriteCertificatesForConfig(config *ServiceAliasConfig) error
// DeleteCertificatesForConfig deletes all certificates for all ServiceAliasConfigs in config
DeleteCertificatesForConfig(config *ServiceAliasConfig) error
// Commit commits all the changes made to the certificateManager.
Commit() error
// CertificateWriter provides direct access to the underlying writer if required
CertificateWriter() certificateWriter
}
Expand Down