-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix router reload errors for deleted certificates #18587
Changes from 1 commit
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -12,10 +12,25 @@ import ( | |
routeapi "github.com/openshift/origin/pkg/route/apis/route" | ||
) | ||
|
||
// certificateFile represents a certificate file. | ||
type certificateFile struct { | ||
CertDir string | ||
ID string | ||
Contents []byte | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Is there any reason to make these fields public (upper-case initial letter)? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. No particular reason (well other than did have it originally in |
||
} | ||
|
||
// certificateFileTag generates a certificate file tag/name. This is used to | ||
// index into the map of deleted certificates. | ||
func (cf certificateFile) Tag() string { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The first word in the comment should match the function name (just There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Good catch. |
||
return filepath.Join(cf.CertDir, cf.ID+".pem") | ||
} | ||
|
||
// simpleCertificateManager is the default implementation of a certificateManager | ||
type simpleCertificateManager struct { | ||
cfg *certificateManagerConfig | ||
w certificateWriter | ||
|
||
deletedCertificates map[string]certificateFile | ||
} | ||
|
||
// newSimpleCertificateManager should be used to create a new cert manager. It will return an error | ||
|
@@ -27,7 +42,7 @@ func newSimpleCertificateManager(cfg *certificateManagerConfig, w certificateWri | |
if w == nil { | ||
return nil, fmt.Errorf("certificate manager requires a certificate writer") | ||
} | ||
return &simpleCertificateManager{cfg, w}, nil | ||
return &simpleCertificateManager{cfg, w, make(map[string]certificateFile, 0)}, nil | ||
} | ||
|
||
// validateCertManagerConfig ensures that the key functions and directories are set as well as | ||
|
@@ -81,6 +96,8 @@ func (cm *simpleCertificateManager) WriteCertificatesForConfig(config *ServiceAl | |
buffer.Write([]byte(caCertObj.Contents)) | ||
} | ||
|
||
certFile := certificateFile{CertDir: cm.cfg.certDir, ID: certObj.ID} | ||
delete(cm.deletedCertificates, certFile.Tag()) | ||
if err := cm.w.WriteCertificate(cm.cfg.certDir, certObj.ID, buffer.Bytes()); err != nil { | ||
return err | ||
} | ||
|
@@ -92,6 +109,8 @@ func (cm *simpleCertificateManager) WriteCertificatesForConfig(config *ServiceAl | |
destCert, ok := config.Certificates[destCertKey] | ||
|
||
if ok { | ||
destCertFile := certificateFile{CertDir: cm.cfg.caCertDir, ID: destCert.ID} | ||
delete(cm.deletedCertificates, destCertFile.Tag()) | ||
if err := cm.w.WriteCertificate(cm.cfg.caCertDir, destCert.ID, []byte(destCert.Contents)); err != nil { | ||
return err | ||
} | ||
|
@@ -101,7 +120,7 @@ func (cm *simpleCertificateManager) WriteCertificatesForConfig(config *ServiceAl | |
return nil | ||
} | ||
|
||
// deleteCertificatesForConfig will delete all certificates for the ServiceAliasConfig | ||
// DeleteCertificatesForConfig will delete all certificates for the ServiceAliasConfig | ||
func (cm *simpleCertificateManager) DeleteCertificatesForConfig(config *ServiceAliasConfig) error { | ||
if config == nil { | ||
return nil | ||
|
@@ -112,10 +131,8 @@ func (cm *simpleCertificateManager) DeleteCertificatesForConfig(config *ServiceA | |
certObj, ok := config.Certificates[certKey] | ||
|
||
if ok { | ||
err := cm.w.DeleteCertificate(cm.cfg.certDir, certObj.ID) | ||
if err != nil { | ||
return err | ||
} | ||
certFile := certificateFile{CertDir: cm.cfg.certDir, ID: certObj.ID} | ||
cm.deletedCertificates[certFile.Tag()] = certFile | ||
} | ||
} | ||
|
||
|
@@ -124,16 +141,41 @@ func (cm *simpleCertificateManager) DeleteCertificatesForConfig(config *ServiceA | |
destCert, ok := config.Certificates[destCertKey] | ||
|
||
if ok { | ||
err := cm.w.DeleteCertificate(cm.cfg.caCertDir, destCert.ID) | ||
if err != nil { | ||
return err | ||
} | ||
|
||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Extra blank line. |
||
destCertFile := certificateFile{CertDir: cm.cfg.caCertDir, ID: destCert.ID} | ||
cm.deletedCertificates[destCertFile.Tag()] = destCertFile | ||
} | ||
} | ||
} | ||
return nil | ||
} | ||
|
||
// Commit applies any pending changes made to the certificateManager. | ||
func (cm *simpleCertificateManager) Commit() error { | ||
// Deletion of certificates that are being referenced in backends or | ||
// config is problematic in that the template router will not | ||
// reload because the config is invalid, so we _do_ need to "stage" | ||
// or commit the removals. Remove all the deleted certificates. | ||
for _, certFile := range cm.deletedCertificates { | ||
err := cm.w.DeleteCertificate(certFile.CertDir, certFile.ID) | ||
if err != nil { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I think we should log an error and ignore these certs. This will be same as what we do in cleanUpServiceAliasConfig() when DeleteCertificatesForConfig() fails. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I agree. There's no harm to having the stray cert around if the delete fails. Let's log loudly and keep going. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Will do. |
||
// TODO: Do we care if a file deletion failed? | ||
// Otherwise we will keep hitting this error on | ||
// every commit. Should we just ignore errors here? | ||
// Clean this up based on review comments. | ||
// FIXME: return err | ||
} | ||
} | ||
|
||
cm.deletedCertificates = make(map[string]certificateFile, 0) | ||
|
||
// If we decide to stage the certificate writes, we can flush the | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The only advantage is when a cert changes to make sure that a route version and a cert match. And it should only make a functional difference if there are multiple certs for the same domain (e.g. for different paths?). Is there any case where it would actually matter? I can't think of one... so I think writing them out immediately is fine. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Ok - will add a log message if the delete fails (and keep going). |
||
// write to the disk here. The tradeoff is storing a copy in memory | ||
// until we commit. | ||
|
||
return nil | ||
} | ||
|
||
// simpleCertificateWriter is the default implementation of a certificateWriter | ||
type simpleCertificateWriter struct{} | ||
|
||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It doesn't look like anything uses the
Contents
field.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For now its not used. I did have a comment re: staging the certificate writes as well - which is when we would have used it. But I think that's moot based on the call this morning, so will remove the
Contents
field.