2020-12-24 16:39:12 +00:00
|
|
|
/*
|
|
|
|
Copyright 2020 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package globalratelimit
|
|
|
|
|
|
|
|
import (
|
2022-01-10 00:29:12 +00:00
|
|
|
"fmt"
|
2020-12-24 16:39:12 +00:00
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2021-08-21 20:42:00 +00:00
|
|
|
networking "k8s.io/api/networking/v1"
|
2023-07-22 03:32:07 +00:00
|
|
|
"k8s.io/klog/v2"
|
2020-12-24 16:39:12 +00:00
|
|
|
|
|
|
|
"k8s.io/ingress-nginx/internal/ingress/annotations/parser"
|
|
|
|
ing_errors "k8s.io/ingress-nginx/internal/ingress/errors"
|
|
|
|
"k8s.io/ingress-nginx/internal/ingress/resolver"
|
|
|
|
"k8s.io/ingress-nginx/internal/net"
|
2022-07-20 21:15:03 +00:00
|
|
|
"k8s.io/ingress-nginx/pkg/util/sets"
|
2020-12-24 16:39:12 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const defaultKey = "$remote_addr"
|
|
|
|
|
2023-07-22 03:32:07 +00:00
|
|
|
const (
|
|
|
|
globalRateLimitAnnotation = "global-rate-limit"
|
|
|
|
globalRateLimitWindowAnnotation = "global-rate-limit-window"
|
|
|
|
globalRateLimitKeyAnnotation = "global-rate-limit-key"
|
|
|
|
globalRateLimitIgnoredCidrsAnnotation = "global-rate-limit-ignored-cidrs"
|
|
|
|
)
|
|
|
|
|
|
|
|
var globalRateLimitAnnotationConfig = parser.Annotation{
|
|
|
|
Group: "ratelimit",
|
|
|
|
Annotations: parser.AnnotationFields{
|
|
|
|
globalRateLimitAnnotation: {
|
|
|
|
Validator: parser.ValidateInt,
|
|
|
|
Scope: parser.AnnotationScopeIngress,
|
|
|
|
Risk: parser.AnnotationRiskLow,
|
|
|
|
Documentation: `This annotation configures maximum allowed number of requests per window`,
|
|
|
|
},
|
|
|
|
globalRateLimitWindowAnnotation: {
|
|
|
|
Validator: parser.ValidateDuration,
|
|
|
|
Scope: parser.AnnotationScopeIngress,
|
|
|
|
Risk: parser.AnnotationRiskLow,
|
|
|
|
Documentation: `Configures a time window (i.e 1m) that the limit is applied`,
|
|
|
|
},
|
|
|
|
globalRateLimitKeyAnnotation: {
|
2023-08-31 07:36:48 +00:00
|
|
|
Validator: parser.ValidateRegex(parser.NGINXVariable, true),
|
2023-07-22 03:32:07 +00:00
|
|
|
Scope: parser.AnnotationScopeIngress,
|
|
|
|
Risk: parser.AnnotationRiskHigh,
|
|
|
|
Documentation: `This annotation Configures a key for counting the samples. Defaults to $remote_addr.
|
|
|
|
You can also combine multiple NGINX variables here, like ${remote_addr}-${http_x_api_client} which would mean the limit will be applied to
|
|
|
|
requests coming from the same API client (indicated by X-API-Client HTTP request header) with the same source IP address`,
|
|
|
|
},
|
|
|
|
globalRateLimitIgnoredCidrsAnnotation: {
|
|
|
|
Validator: parser.ValidateCIDRs,
|
|
|
|
Scope: parser.AnnotationScopeIngress,
|
|
|
|
Risk: parser.AnnotationRiskMedium,
|
|
|
|
Documentation: `This annotation defines a comma separated list of IPs and CIDRs to match client IP against.
|
|
|
|
When there's a match request is not considered for rate limiting.`,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2020-12-24 16:39:12 +00:00
|
|
|
// Config encapsulates all global rate limit attributes
|
|
|
|
type Config struct {
|
|
|
|
Namespace string `json:"namespace"`
|
|
|
|
Limit int `json:"limit"`
|
|
|
|
WindowSize int `json:"window-size"`
|
|
|
|
Key string `json:"key"`
|
|
|
|
IgnoredCIDRs []string `json:"ignored-cidrs"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Equal tests for equality between two Config types
|
|
|
|
func (l *Config) Equal(r *Config) bool {
|
|
|
|
if l.Namespace != r.Namespace {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if l.Limit != r.Limit {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if l.WindowSize != r.WindowSize {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if l.Key != r.Key {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if len(l.IgnoredCIDRs) != len(r.IgnoredCIDRs) || !sets.StringElementsMatch(l.IgnoredCIDRs, r.IgnoredCIDRs) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
type globalratelimit struct {
|
2023-07-22 03:32:07 +00:00
|
|
|
r resolver.Resolver
|
|
|
|
annotationConfig parser.Annotation
|
2020-12-24 16:39:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewParser creates a new globalratelimit annotation parser
|
|
|
|
func NewParser(r resolver.Resolver) parser.IngressAnnotation {
|
2023-07-22 03:32:07 +00:00
|
|
|
return globalratelimit{
|
|
|
|
r: r,
|
|
|
|
annotationConfig: globalRateLimitAnnotationConfig,
|
|
|
|
}
|
2020-12-24 16:39:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Parse extracts globalratelimit annotations from the given ingress
|
|
|
|
// and returns them structured as Config type
|
|
|
|
func (a globalratelimit) Parse(ing *networking.Ingress) (interface{}, error) {
|
|
|
|
config := &Config{}
|
|
|
|
|
2023-07-22 03:32:07 +00:00
|
|
|
limit, err := parser.GetIntAnnotation(globalRateLimitAnnotation, ing, a.annotationConfig.Annotations)
|
2023-08-31 07:36:48 +00:00
|
|
|
if err != nil && ing_errors.IsInvalidContent(err) {
|
2023-07-22 03:32:07 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
rawWindowSize, err := parser.GetStringAnnotation(globalRateLimitWindowAnnotation, ing, a.annotationConfig.Annotations)
|
2023-08-31 07:36:48 +00:00
|
|
|
if err != nil && ing_errors.IsValidationError(err) {
|
|
|
|
return config, ing_errors.LocationDeniedError{
|
2023-07-22 03:32:07 +00:00
|
|
|
Reason: fmt.Errorf("failed to parse 'global-rate-limit-window' value: %w", err),
|
|
|
|
}
|
|
|
|
}
|
2020-12-24 16:39:12 +00:00
|
|
|
|
2023-08-31 07:36:48 +00:00
|
|
|
if limit == 0 || rawWindowSize == "" {
|
2020-12-24 16:39:12 +00:00
|
|
|
return config, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
windowSize, err := time.ParseDuration(rawWindowSize)
|
|
|
|
if err != nil {
|
2023-08-31 07:36:48 +00:00
|
|
|
return config, ing_errors.LocationDeniedError{
|
2022-01-10 00:29:12 +00:00
|
|
|
Reason: fmt.Errorf("failed to parse 'global-rate-limit-window' value: %w", err),
|
2020-12-24 16:39:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-07-22 03:32:07 +00:00
|
|
|
key, err := parser.GetStringAnnotation(globalRateLimitKeyAnnotation, ing, a.annotationConfig.Annotations)
|
|
|
|
if err != nil {
|
|
|
|
klog.Warningf("invalid %s, defaulting to %s", globalRateLimitKeyAnnotation, defaultKey)
|
|
|
|
}
|
2023-08-31 07:36:48 +00:00
|
|
|
if key == "" {
|
2020-12-24 16:39:12 +00:00
|
|
|
key = defaultKey
|
|
|
|
}
|
|
|
|
|
2023-07-22 03:32:07 +00:00
|
|
|
rawIgnoredCIDRs, err := parser.GetStringAnnotation(globalRateLimitIgnoredCidrsAnnotation, ing, a.annotationConfig.Annotations)
|
2023-08-31 07:36:48 +00:00
|
|
|
if err != nil && ing_errors.IsInvalidContent(err) {
|
2023-07-22 03:32:07 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2020-12-24 16:39:12 +00:00
|
|
|
ignoredCIDRs, err := net.ParseCIDRs(rawIgnoredCIDRs)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-08-31 07:36:48 +00:00
|
|
|
config.Namespace = strings.ReplaceAll(string(ing.UID), "-", "")
|
2020-12-24 16:39:12 +00:00
|
|
|
config.Limit = limit
|
|
|
|
config.WindowSize = int(windowSize.Seconds())
|
|
|
|
config.Key = key
|
|
|
|
config.IgnoredCIDRs = ignoredCIDRs
|
|
|
|
|
|
|
|
return config, nil
|
|
|
|
}
|
2023-07-22 03:32:07 +00:00
|
|
|
|
|
|
|
func (a globalratelimit) GetDocumentation() parser.AnnotationFields {
|
|
|
|
return a.annotationConfig.Annotations
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a globalratelimit) Validate(anns map[string]string) error {
|
|
|
|
maxrisk := parser.StringRiskToRisk(a.r.GetSecurityConfiguration().AnnotationsRiskLevel)
|
|
|
|
return parser.CheckAnnotationRisk(anns, maxrisk, globalRateLimitAnnotationConfig.Annotations)
|
|
|
|
}
|