2016-08-19 14:51:40 +00:00
|
|
|
/*
|
|
|
|
Copyright 2015 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package authreq
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net/url"
|
2017-02-04 00:43:15 +00:00
|
|
|
"regexp"
|
2017-04-02 14:07:07 +00:00
|
|
|
"strings"
|
2016-08-19 14:51:40 +00:00
|
|
|
|
2017-07-16 19:19:59 +00:00
|
|
|
extensions "k8s.io/api/extensions/v1beta1"
|
2016-11-16 18:24:26 +00:00
|
|
|
|
2017-11-07 22:02:12 +00:00
|
|
|
"k8s.io/ingress-nginx/internal/ingress/annotations/parser"
|
|
|
|
ing_errors "k8s.io/ingress-nginx/internal/ingress/errors"
|
2017-11-08 20:58:57 +00:00
|
|
|
"k8s.io/ingress-nginx/internal/ingress/resolver"
|
2016-08-19 14:51:40 +00:00
|
|
|
)
|
|
|
|
|
2017-11-08 20:58:57 +00:00
|
|
|
// Config returns external authentication configuration for an Ingress rule
|
2017-11-07 16:36:51 +00:00
|
|
|
type Config struct {
|
2017-04-25 01:14:38 +00:00
|
|
|
URL string `json:"url"`
|
|
|
|
// Host contains the hostname defined in the URL
|
|
|
|
Host string `json:"host"`
|
2017-04-02 14:07:07 +00:00
|
|
|
SigninURL string `json:"signinUrl"`
|
|
|
|
Method string `json:"method"`
|
2018-03-12 10:36:35 +00:00
|
|
|
ResponseHeaders []string `json:"responseHeaders,omitempty"`
|
2018-01-28 00:32:08 +00:00
|
|
|
RequestRedirect string `json:"requestRedirect"`
|
2016-08-19 14:51:40 +00:00
|
|
|
}
|
|
|
|
|
2017-11-07 16:36:51 +00:00
|
|
|
// Equal tests for equality between two Config types
|
|
|
|
func (e1 *Config) Equal(e2 *Config) bool {
|
2017-06-14 21:33:12 +00:00
|
|
|
if e1 == e2 {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
if e1 == nil || e2 == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if e1.URL != e2.URL {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if e1.Host != e2.Host {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if e1.SigninURL != e2.SigninURL {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if e1.Method != e2.Method {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
for _, ep1 := range e1.ResponseHeaders {
|
|
|
|
found := false
|
|
|
|
for _, ep2 := range e2.ResponseHeaders {
|
|
|
|
if ep1 == ep2 {
|
|
|
|
found = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !found {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
2018-01-28 00:32:08 +00:00
|
|
|
if e1.RequestRedirect != e2.RequestRedirect {
|
|
|
|
return false
|
|
|
|
}
|
2017-06-14 21:33:12 +00:00
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2016-08-19 14:51:40 +00:00
|
|
|
var (
|
2017-04-02 14:07:07 +00:00
|
|
|
methods = []string{"GET", "HEAD", "POST", "PUT", "PATCH", "DELETE", "CONNECT", "OPTIONS", "TRACE"}
|
2017-02-04 00:43:15 +00:00
|
|
|
headerRegexp = regexp.MustCompile(`^[a-zA-Z\d\-_]+$`)
|
2016-08-19 14:51:40 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func validMethod(method string) bool {
|
|
|
|
if len(method) == 0 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, m := range methods {
|
|
|
|
if method == m {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2017-02-04 00:43:15 +00:00
|
|
|
func validHeader(header string) bool {
|
|
|
|
return headerRegexp.Match([]byte(header))
|
|
|
|
}
|
|
|
|
|
2016-12-29 20:02:06 +00:00
|
|
|
type authReq struct {
|
2017-11-08 20:58:57 +00:00
|
|
|
r resolver.Resolver
|
2016-12-29 20:02:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewParser creates a new authentication request annotation parser
|
2017-11-08 20:58:57 +00:00
|
|
|
func NewParser(r resolver.Resolver) parser.IngressAnnotation {
|
|
|
|
return authReq{r}
|
2016-12-29 20:02:06 +00:00
|
|
|
}
|
|
|
|
|
2016-08-19 14:51:40 +00:00
|
|
|
// ParseAnnotations parses the annotations contained in the ingress
|
2017-11-07 16:36:51 +00:00
|
|
|
// rule used to use an Config URL as source for authentication
|
2016-12-29 20:02:06 +00:00
|
|
|
func (a authReq) Parse(ing *extensions.Ingress) (interface{}, error) {
|
2018-01-28 00:32:08 +00:00
|
|
|
// Required Parameters
|
|
|
|
urlString, err := parser.GetStringAnnotation("auth-url", ing)
|
2016-08-19 14:51:40 +00:00
|
|
|
if err != nil {
|
2016-12-29 20:02:06 +00:00
|
|
|
return nil, err
|
2016-08-19 14:51:40 +00:00
|
|
|
}
|
2018-01-28 00:32:08 +00:00
|
|
|
if urlString == "" {
|
2016-12-29 20:02:06 +00:00
|
|
|
return nil, ing_errors.NewLocationDenied("an empty string is not a valid URL")
|
2016-08-19 14:51:40 +00:00
|
|
|
}
|
|
|
|
|
2018-04-25 21:53:49 +00:00
|
|
|
authURL, err := url.Parse(urlString)
|
2016-08-19 14:51:40 +00:00
|
|
|
if err != nil {
|
2016-12-29 20:02:06 +00:00
|
|
|
return nil, err
|
2016-08-19 14:51:40 +00:00
|
|
|
}
|
2018-04-25 21:53:49 +00:00
|
|
|
if authURL.Scheme == "" {
|
2016-12-29 20:02:06 +00:00
|
|
|
return nil, ing_errors.NewLocationDenied("url scheme is empty")
|
2016-08-19 14:51:40 +00:00
|
|
|
}
|
2018-04-25 21:53:49 +00:00
|
|
|
if authURL.Host == "" {
|
2016-12-29 20:02:06 +00:00
|
|
|
return nil, ing_errors.NewLocationDenied("url host is empty")
|
2016-08-19 14:51:40 +00:00
|
|
|
}
|
2018-04-25 21:53:49 +00:00
|
|
|
if strings.Contains(authURL.Host, "..") {
|
2016-12-29 20:02:06 +00:00
|
|
|
return nil, ing_errors.NewLocationDenied("invalid url host")
|
2016-08-19 14:51:40 +00:00
|
|
|
}
|
|
|
|
|
2018-01-28 00:32:08 +00:00
|
|
|
authMethod, _ := parser.GetStringAnnotation("auth-method", ing)
|
|
|
|
if len(authMethod) != 0 && !validMethod(authMethod) {
|
2016-12-29 20:02:06 +00:00
|
|
|
return nil, ing_errors.NewLocationDenied("invalid HTTP method")
|
2016-08-19 14:51:40 +00:00
|
|
|
}
|
|
|
|
|
2018-01-28 00:32:08 +00:00
|
|
|
// Optional Parameters
|
|
|
|
signIn, _ := parser.GetStringAnnotation("auth-signin", ing)
|
|
|
|
|
|
|
|
responseHeaders := []string{}
|
2017-11-23 16:46:23 +00:00
|
|
|
hstr, _ := parser.GetStringAnnotation("auth-response-headers", ing)
|
2017-02-04 00:43:15 +00:00
|
|
|
if len(hstr) != 0 {
|
|
|
|
harr := strings.Split(hstr, ",")
|
|
|
|
for _, header := range harr {
|
2017-08-23 18:40:57 +00:00
|
|
|
header = strings.TrimSpace(header)
|
2017-02-04 00:43:15 +00:00
|
|
|
if len(header) > 0 {
|
|
|
|
if !validHeader(header) {
|
|
|
|
return nil, ing_errors.NewLocationDenied("invalid headers list")
|
|
|
|
}
|
2018-01-28 00:32:08 +00:00
|
|
|
responseHeaders = append(responseHeaders, header)
|
2017-02-04 00:43:15 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-28 00:32:08 +00:00
|
|
|
requestRedirect, _ := parser.GetStringAnnotation("auth-request-redirect", ing)
|
|
|
|
|
2017-11-07 16:36:51 +00:00
|
|
|
return &Config{
|
2018-01-28 00:32:08 +00:00
|
|
|
URL: urlString,
|
2018-04-25 21:53:49 +00:00
|
|
|
Host: authURL.Hostname(),
|
2018-01-28 00:32:08 +00:00
|
|
|
SigninURL: signIn,
|
|
|
|
Method: authMethod,
|
|
|
|
ResponseHeaders: responseHeaders,
|
|
|
|
RequestRedirect: requestRedirect,
|
2016-08-19 14:51:40 +00:00
|
|
|
}, nil
|
|
|
|
}
|