Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix router reload errors for deleted certificates #18587

Merged
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
62 changes: 52 additions & 10 deletions pkg/router/template/certmanager.go
Original file line number Diff line number Diff line change
Expand Up @@ -12,10 +12,25 @@ import (
routeapi "github.com/openshift/origin/pkg/route/apis/route"
)

// certificateFile represents a certificate file.
type certificateFile struct {
CertDir string
ID string
Contents []byte
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It doesn't look like anything uses the Contents field.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For now its not used. I did have a comment re: staging the certificate writes as well - which is when we would have used it. But I think that's moot based on the call this morning, so will remove the Contents field.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there any reason to make these fields public (upper-case initial letter)?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No particular reason (well other than did have it originally in types.go with an uppercase CertificateFile name) - will change to lower case.

}

// certificateFileTag generates a certificate file tag/name. This is used to
// index into the map of deleted certificates.
func (cf certificateFile) Tag() string {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The first word in the comment should match the function name (just Tag).

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good catch.

return filepath.Join(cf.CertDir, cf.ID+".pem")
}

// simpleCertificateManager is the default implementation of a certificateManager
type simpleCertificateManager struct {
cfg *certificateManagerConfig
w certificateWriter

deletedCertificates map[string]certificateFile
}

// newSimpleCertificateManager should be used to create a new cert manager. It will return an error
Expand All @@ -27,7 +42,7 @@ func newSimpleCertificateManager(cfg *certificateManagerConfig, w certificateWri
if w == nil {
return nil, fmt.Errorf("certificate manager requires a certificate writer")
}
return &simpleCertificateManager{cfg, w}, nil
return &simpleCertificateManager{cfg, w, make(map[string]certificateFile, 0)}, nil
}

// validateCertManagerConfig ensures that the key functions and directories are set as well as
Expand Down Expand Up @@ -81,6 +96,8 @@ func (cm *simpleCertificateManager) WriteCertificatesForConfig(config *ServiceAl
buffer.Write([]byte(caCertObj.Contents))
}

certFile := certificateFile{CertDir: cm.cfg.certDir, ID: certObj.ID}
delete(cm.deletedCertificates, certFile.Tag())
if err := cm.w.WriteCertificate(cm.cfg.certDir, certObj.ID, buffer.Bytes()); err != nil {
return err
}
Expand All @@ -92,6 +109,8 @@ func (cm *simpleCertificateManager) WriteCertificatesForConfig(config *ServiceAl
destCert, ok := config.Certificates[destCertKey]

if ok {
destCertFile := certificateFile{CertDir: cm.cfg.caCertDir, ID: destCert.ID}
delete(cm.deletedCertificates, destCertFile.Tag())
if err := cm.w.WriteCertificate(cm.cfg.caCertDir, destCert.ID, []byte(destCert.Contents)); err != nil {
return err
}
Expand All @@ -101,7 +120,7 @@ func (cm *simpleCertificateManager) WriteCertificatesForConfig(config *ServiceAl
return nil
}

// deleteCertificatesForConfig will delete all certificates for the ServiceAliasConfig
// DeleteCertificatesForConfig will delete all certificates for the ServiceAliasConfig
func (cm *simpleCertificateManager) DeleteCertificatesForConfig(config *ServiceAliasConfig) error {
if config == nil {
return nil
Expand All @@ -112,10 +131,8 @@ func (cm *simpleCertificateManager) DeleteCertificatesForConfig(config *ServiceA
certObj, ok := config.Certificates[certKey]

if ok {
err := cm.w.DeleteCertificate(cm.cfg.certDir, certObj.ID)
if err != nil {
return err
}
certFile := certificateFile{CertDir: cm.cfg.certDir, ID: certObj.ID}
cm.deletedCertificates[certFile.Tag()] = certFile
}
}

Expand All @@ -124,16 +141,41 @@ func (cm *simpleCertificateManager) DeleteCertificatesForConfig(config *ServiceA
destCert, ok := config.Certificates[destCertKey]

if ok {
err := cm.w.DeleteCertificate(cm.cfg.caCertDir, destCert.ID)
if err != nil {
return err
}

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Extra blank line.

destCertFile := certificateFile{CertDir: cm.cfg.caCertDir, ID: destCert.ID}
cm.deletedCertificates[destCertFile.Tag()] = destCertFile
}
}
}
return nil
}

// Commit applies any pending changes made to the certificateManager.
func (cm *simpleCertificateManager) Commit() error {
// Deletion of certificates that are being referenced in backends or
// config is problematic in that the template router will not
// reload because the config is invalid, so we _do_ need to "stage"
// or commit the removals. Remove all the deleted certificates.
for _, certFile := range cm.deletedCertificates {
err := cm.w.DeleteCertificate(certFile.CertDir, certFile.ID)
if err != nil {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we should log an error and ignore these certs. This will be same as what we do in cleanUpServiceAliasConfig() when DeleteCertificatesForConfig() fails.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree. There's no harm to having the stray cert around if the delete fails. Let's log loudly and keep going.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Will do.

// TODO: Do we care if a file deletion failed?
// Otherwise we will keep hitting this error on
// every commit. Should we just ignore errors here?
// Clean this up based on review comments.
// FIXME: return err
}
}

cm.deletedCertificates = make(map[string]certificateFile, 0)

// If we decide to stage the certificate writes, we can flush the
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The only advantage is when a cert changes to make sure that a route version and a cert match. And it should only make a functional difference if there are multiple certs for the same domain (e.g. for different paths?). Is there any case where it would actually matter? I can't think of one... so I think writing them out immediately is fine.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ok - will add a log message if the delete fails (and keep going).
Yeah, writing the certificates out immediately is ok as those are processed via the crt directive which is only read at haproxy startup.

// write to the disk here. The tradeoff is storing a copy in memory
// until we commit.

return nil
}

// simpleCertificateWriter is the default implementation of a certificateWriter
type simpleCertificateWriter struct{}

Expand Down
19 changes: 19 additions & 0 deletions pkg/router/template/certmanager_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@ package templaterouter

import (
"reflect"
"sort"
"testing"

routeapi "github.com/openshift/origin/pkg/route/apis/route"
Expand Down Expand Up @@ -119,6 +120,7 @@ func TestCertManager(t *testing.T) {
}

for k, tc := range testCases {
certManager.Commit()
fakeCertWriter.clear()
err := certManager.WriteCertificatesForConfig(tc.cfg)
if err != nil {
Expand All @@ -133,14 +135,31 @@ func TestCertManager(t *testing.T) {
t.Errorf("Unexpected number of adds for %s occurred. Expected: %d Got: %d", k, len(tc.expectedAdds), len(fakeCertWriter.addedCerts))
}

if 0 != len(fakeCertWriter.deletedCerts) {
t.Errorf("Unexpected number of deletes prior to certManager.Commit() for %s occurred. Expected: 0 Got: %d", k, len(fakeCertWriter.deletedCerts))
}

err = certManager.Commit()
if err != nil {
t.Fatalf("Unexpected error committing certs for service alias config for %s. Config: %v, err: %v", k, tc.cfg, err)
}

if len(tc.expectedAdds) != len(fakeCertWriter.addedCerts) {
t.Errorf("Unexpected number of adds for %s occurred. Expected: %d Got: %d", k, len(tc.expectedAdds), len(fakeCertWriter.addedCerts))
}

if len(tc.expectedDeletes) != len(fakeCertWriter.deletedCerts) {
t.Errorf("Unexpected number of deletes for %s occurred. Expected: %d Got: %d", k, len(tc.expectedDeletes), len(fakeCertWriter.deletedCerts))
}

sort.Strings(tc.expectedAdds)
sort.Strings(fakeCertWriter.addedCerts)
if !reflect.DeepEqual(tc.expectedAdds, fakeCertWriter.addedCerts) {
t.Errorf("Unexpected adds for %s, wanted: %v, got %v", k, tc.expectedAdds, fakeCertWriter.addedCerts)
}

sort.Strings(tc.expectedDeletes)
sort.Strings(fakeCertWriter.deletedCerts)
if !reflect.DeepEqual(tc.expectedDeletes, fakeCertWriter.deletedCerts) {
t.Errorf("Unexpected deletes for %s, wanted: %v, got %v", k, tc.expectedDeletes, fakeCertWriter.deletedCerts)
}
Expand Down
7 changes: 7 additions & 0 deletions pkg/router/template/router.go
Original file line number Diff line number Diff line change
Expand Up @@ -394,6 +394,13 @@ func (r *templateRouter) writeConfig() error {
r.state[k] = cfg
}

glog.V(4).Infof("Committing router certificate manager changes...")
if err := r.certManager.Commit(); err != nil {
return fmt.Errorf("error committing certificate changes: %v", err)
}

glog.V(4).Infof("Router certificate manager config committed")

for path, template := range r.templates {
file, err := os.Create(path)
if err != nil {
Expand Down
2 changes: 2 additions & 0 deletions pkg/router/template/types.go
Original file line number Diff line number Diff line change
Expand Up @@ -103,6 +103,8 @@ type certificateManager interface {
WriteCertificatesForConfig(config *ServiceAliasConfig) error
// DeleteCertificatesForConfig deletes all certificates for all ServiceAliasConfigs in config
DeleteCertificatesForConfig(config *ServiceAliasConfig) error
// Commit commits all the changes made to the certificateManager.
Commit() error
// CertificateWriter provides direct access to the underlying writer if required
CertificateWriter() certificateWriter
}
Expand Down