Implement object deep inspector (#8456)
This commit is contained in:
parent
5737f16663
commit
89ed571d2a
15 changed files with 468 additions and 1 deletions
|
@ -201,6 +201,8 @@ Takes the form "<host>:port". If not provided, no admission controller is starte
|
||||||
shutdownGracePeriod = flags.Int("shutdown-grace-period", 0, "Seconds to wait after receiving the shutdown signal, before stopping the nginx process.")
|
shutdownGracePeriod = flags.Int("shutdown-grace-period", 0, "Seconds to wait after receiving the shutdown signal, before stopping the nginx process.")
|
||||||
|
|
||||||
postShutdownGracePeriod = flags.Int("post-shutdown-grace-period", 10, "Seconds to wait after the nginx process has stopped before controller exits.")
|
postShutdownGracePeriod = flags.Int("post-shutdown-grace-period", 10, "Seconds to wait after the nginx process has stopped before controller exits.")
|
||||||
|
|
||||||
|
deepInspector = flags.Bool("deep-inspect", true, "Enables ingress object security deep inspector")
|
||||||
)
|
)
|
||||||
|
|
||||||
flags.StringVar(&nginx.MaxmindMirror, "maxmind-mirror", "", `Maxmind mirror url (example: http://geoip.local/databases`)
|
flags.StringVar(&nginx.MaxmindMirror, "maxmind-mirror", "", `Maxmind mirror url (example: http://geoip.local/databases`)
|
||||||
|
@ -321,6 +323,7 @@ https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-g
|
||||||
UDPConfigMapName: *udpConfigMapName,
|
UDPConfigMapName: *udpConfigMapName,
|
||||||
DisableFullValidationTest: *disableFullValidationTest,
|
DisableFullValidationTest: *disableFullValidationTest,
|
||||||
DefaultSSLCertificate: *defSSLCertificate,
|
DefaultSSLCertificate: *defSSLCertificate,
|
||||||
|
DeepInspector: *deepInspector,
|
||||||
PublishService: *publishSvc,
|
PublishService: *publishSvc,
|
||||||
PublishStatusAddress: *publishStatusAddress,
|
PublishStatusAddress: *publishStatusAddress,
|
||||||
UpdateStatusOnShutdown: *updateStatusOnShutdown,
|
UpdateStatusOnShutdown: *updateStatusOnShutdown,
|
||||||
|
|
|
@ -12,6 +12,7 @@ They are set in the container spec of the `ingress-nginx-controller` Deployment
|
||||||
| `--apiserver-host` | Address of the Kubernetes API server. Takes the form "protocol://address:port". If not specified, it is assumed the program runs inside a Kubernetes cluster and local discovery is attempted. |
|
| `--apiserver-host` | Address of the Kubernetes API server. Takes the form "protocol://address:port". If not specified, it is assumed the program runs inside a Kubernetes cluster and local discovery is attempted. |
|
||||||
| `--certificate-authority` | Path to a cert file for the certificate authority. This certificate is used only when the flag --apiserver-host is specified. |
|
| `--certificate-authority` | Path to a cert file for the certificate authority. This certificate is used only when the flag --apiserver-host is specified. |
|
||||||
| `--configmap` | Name of the ConfigMap containing custom global configurations for the controller. |
|
| `--configmap` | Name of the ConfigMap containing custom global configurations for the controller. |
|
||||||
|
| `--deep-inspect` | Enables ingress object security deep inspector. (default true) |
|
||||||
| `--default-backend-service` | Service used to serve HTTP requests not matching any known server name (catch-all). Takes the form "namespace/name". The controller configures NGINX to forward requests to the first port of this Service. |
|
| `--default-backend-service` | Service used to serve HTTP requests not matching any known server name (catch-all). Takes the form "namespace/name". The controller configures NGINX to forward requests to the first port of this Service. |
|
||||||
| `--default-server-port` | Port to use for exposing the default server (catch-all). (default 8181) |
|
| `--default-server-port` | Port to use for exposing the default server (catch-all). (default 8181) |
|
||||||
| `--default-ssl-certificate` | Secret containing a SSL certificate to be used by the default HTTPS server (catch-all). Takes the form "namespace/name". |
|
| `--default-ssl-certificate` | Secret containing a SSL certificate to be used by the default HTTPS server (catch-all). Takes the form "namespace/name". |
|
||||||
|
|
|
@ -41,6 +41,7 @@ import (
|
||||||
"k8s.io/ingress-nginx/internal/ingress/controller/ingressclass"
|
"k8s.io/ingress-nginx/internal/ingress/controller/ingressclass"
|
||||||
"k8s.io/ingress-nginx/internal/ingress/controller/store"
|
"k8s.io/ingress-nginx/internal/ingress/controller/store"
|
||||||
"k8s.io/ingress-nginx/internal/ingress/errors"
|
"k8s.io/ingress-nginx/internal/ingress/errors"
|
||||||
|
"k8s.io/ingress-nginx/internal/ingress/inspector"
|
||||||
"k8s.io/ingress-nginx/internal/ingress/metric/collectors"
|
"k8s.io/ingress-nginx/internal/ingress/metric/collectors"
|
||||||
"k8s.io/ingress-nginx/internal/k8s"
|
"k8s.io/ingress-nginx/internal/k8s"
|
||||||
"k8s.io/ingress-nginx/internal/nginx"
|
"k8s.io/ingress-nginx/internal/nginx"
|
||||||
|
@ -123,6 +124,7 @@ type Configuration struct {
|
||||||
|
|
||||||
InternalLoggerAddress string
|
InternalLoggerAddress string
|
||||||
IsChroot bool
|
IsChroot bool
|
||||||
|
DeepInspector bool
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetPublishService returns the Service used to set the load-balancer status of Ingresses.
|
// GetPublishService returns the Service used to set the load-balancer status of Ingresses.
|
||||||
|
@ -237,7 +239,11 @@ func (n *NGINXController) CheckIngress(ing *networking.Ingress) error {
|
||||||
if !ing.DeletionTimestamp.IsZero() {
|
if !ing.DeletionTimestamp.IsZero() {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
if n.cfg.DeepInspector {
|
||||||
|
if err := inspector.DeepInspect(ing); err != nil {
|
||||||
|
return fmt.Errorf("invalid object: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
// Do not attempt to validate an ingress that's not meant to be controlled by the current instance of the controller.
|
// Do not attempt to validate an ingress that's not meant to be controlled by the current instance of the controller.
|
||||||
if ingressClass, err := n.store.GetIngressClass(ing, n.cfg.IngressClassConfiguration); ingressClass == "" {
|
if ingressClass, err := n.store.GetIngressClass(ing, n.cfg.IngressClassConfiguration); ingressClass == "" {
|
||||||
klog.Warningf("ignoring ingress %v in %v based on annotation %v: %v", ing.Name, ing.ObjectMeta.Namespace, ingressClass, err)
|
klog.Warningf("ignoring ingress %v in %v based on annotation %v: %v", ing.Name, ing.ObjectMeta.Namespace, ingressClass, err)
|
||||||
|
|
|
@ -2396,6 +2396,7 @@ func newNGINXController(t *testing.T) *NGINXController {
|
||||||
clientSet,
|
clientSet,
|
||||||
channels.NewRingChannel(10),
|
channels.NewRingChannel(10),
|
||||||
false,
|
false,
|
||||||
|
true,
|
||||||
&ingressclass.IngressClassConfiguration{
|
&ingressclass.IngressClassConfiguration{
|
||||||
Controller: "k8s.io/ingress-nginx",
|
Controller: "k8s.io/ingress-nginx",
|
||||||
AnnotationValue: "nginx",
|
AnnotationValue: "nginx",
|
||||||
|
@ -2460,6 +2461,7 @@ func newDynamicNginxController(t *testing.T, setConfigMap func(string) *v1.Confi
|
||||||
clientSet,
|
clientSet,
|
||||||
channels.NewRingChannel(10),
|
channels.NewRingChannel(10),
|
||||||
false,
|
false,
|
||||||
|
true,
|
||||||
&ingressclass.IngressClassConfiguration{
|
&ingressclass.IngressClassConfiguration{
|
||||||
Controller: "k8s.io/ingress-nginx",
|
Controller: "k8s.io/ingress-nginx",
|
||||||
AnnotationValue: "nginx",
|
AnnotationValue: "nginx",
|
||||||
|
|
|
@ -131,6 +131,7 @@ func NewNGINXController(config *Configuration, mc metric.Collector) *NGINXContro
|
||||||
config.Client,
|
config.Client,
|
||||||
n.updateCh,
|
n.updateCh,
|
||||||
config.DisableCatchAll,
|
config.DisableCatchAll,
|
||||||
|
config.DeepInspector,
|
||||||
config.IngressClassConfiguration)
|
config.IngressClassConfiguration)
|
||||||
|
|
||||||
n.syncQueue = task.NewTaskQueue(n.syncIngress)
|
n.syncQueue = task.NewTaskQueue(n.syncIngress)
|
||||||
|
|
|
@ -42,6 +42,7 @@ import (
|
||||||
clientcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
|
clientcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
|
||||||
"k8s.io/client-go/tools/cache"
|
"k8s.io/client-go/tools/cache"
|
||||||
"k8s.io/client-go/tools/record"
|
"k8s.io/client-go/tools/record"
|
||||||
|
"k8s.io/ingress-nginx/internal/ingress/inspector"
|
||||||
"k8s.io/klog/v2"
|
"k8s.io/klog/v2"
|
||||||
|
|
||||||
"k8s.io/ingress-nginx/internal/file"
|
"k8s.io/ingress-nginx/internal/file"
|
||||||
|
@ -247,6 +248,7 @@ func New(
|
||||||
client clientset.Interface,
|
client clientset.Interface,
|
||||||
updateCh *channels.RingChannel,
|
updateCh *channels.RingChannel,
|
||||||
disableCatchAll bool,
|
disableCatchAll bool,
|
||||||
|
deepInspector bool,
|
||||||
icConfig *ingressclass.IngressClassConfiguration) Storer {
|
icConfig *ingressclass.IngressClassConfiguration) Storer {
|
||||||
|
|
||||||
store := &k8sStore{
|
store := &k8sStore{
|
||||||
|
@ -426,6 +428,12 @@ func New(
|
||||||
|
|
||||||
klog.InfoS("Found valid IngressClass", "ingress", klog.KObj(ing), "ingressclass", ic)
|
klog.InfoS("Found valid IngressClass", "ingress", klog.KObj(ing), "ingressclass", ic)
|
||||||
|
|
||||||
|
if deepInspector {
|
||||||
|
if err := inspector.DeepInspect(ing); err != nil {
|
||||||
|
klog.ErrorS(err, "received invalid ingress", "ingress", klog.KObj(ing))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
if hasCatchAllIngressRule(ing.Spec) && disableCatchAll {
|
if hasCatchAllIngressRule(ing.Spec) && disableCatchAll {
|
||||||
klog.InfoS("Ignoring add for catch-all ingress because of --disable-catch-all", "ingress", klog.KObj(ing))
|
klog.InfoS("Ignoring add for catch-all ingress because of --disable-catch-all", "ingress", klog.KObj(ing))
|
||||||
return
|
return
|
||||||
|
@ -482,6 +490,13 @@ func New(
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if deepInspector {
|
||||||
|
if err := inspector.DeepInspect(curIng); err != nil {
|
||||||
|
klog.ErrorS(err, "received invalid ingress", "ingress", klog.KObj(curIng))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
store.syncIngress(curIng)
|
store.syncIngress(curIng)
|
||||||
store.updateSecretIngressMap(curIng)
|
store.updateSecretIngressMap(curIng)
|
||||||
store.syncSecrets(curIng)
|
store.syncSecrets(curIng)
|
||||||
|
|
|
@ -124,6 +124,7 @@ func TestStore(t *testing.T) {
|
||||||
clientSet,
|
clientSet,
|
||||||
updateCh,
|
updateCh,
|
||||||
false,
|
false,
|
||||||
|
true,
|
||||||
DefaultClassConfig)
|
DefaultClassConfig)
|
||||||
|
|
||||||
storer.Run(stopCh)
|
storer.Run(stopCh)
|
||||||
|
@ -204,6 +205,7 @@ func TestStore(t *testing.T) {
|
||||||
clientSet,
|
clientSet,
|
||||||
updateCh,
|
updateCh,
|
||||||
false,
|
false,
|
||||||
|
true,
|
||||||
DefaultClassConfig)
|
DefaultClassConfig)
|
||||||
|
|
||||||
storer.Run(stopCh)
|
storer.Run(stopCh)
|
||||||
|
@ -307,6 +309,7 @@ func TestStore(t *testing.T) {
|
||||||
clientSet,
|
clientSet,
|
||||||
updateCh,
|
updateCh,
|
||||||
false,
|
false,
|
||||||
|
true,
|
||||||
DefaultClassConfig)
|
DefaultClassConfig)
|
||||||
|
|
||||||
storer.Run(stopCh)
|
storer.Run(stopCh)
|
||||||
|
@ -422,6 +425,7 @@ func TestStore(t *testing.T) {
|
||||||
clientSet,
|
clientSet,
|
||||||
updateCh,
|
updateCh,
|
||||||
false,
|
false,
|
||||||
|
true,
|
||||||
ingressClassconfig)
|
ingressClassconfig)
|
||||||
|
|
||||||
storer.Run(stopCh)
|
storer.Run(stopCh)
|
||||||
|
@ -551,6 +555,7 @@ func TestStore(t *testing.T) {
|
||||||
clientSet,
|
clientSet,
|
||||||
updateCh,
|
updateCh,
|
||||||
false,
|
false,
|
||||||
|
true,
|
||||||
ingressClassconfig)
|
ingressClassconfig)
|
||||||
|
|
||||||
storer.Run(stopCh)
|
storer.Run(stopCh)
|
||||||
|
@ -650,6 +655,7 @@ func TestStore(t *testing.T) {
|
||||||
clientSet,
|
clientSet,
|
||||||
updateCh,
|
updateCh,
|
||||||
false,
|
false,
|
||||||
|
true,
|
||||||
DefaultClassConfig)
|
DefaultClassConfig)
|
||||||
|
|
||||||
storer.Run(stopCh)
|
storer.Run(stopCh)
|
||||||
|
@ -743,6 +749,7 @@ func TestStore(t *testing.T) {
|
||||||
clientSet,
|
clientSet,
|
||||||
updateCh,
|
updateCh,
|
||||||
false,
|
false,
|
||||||
|
true,
|
||||||
DefaultClassConfig)
|
DefaultClassConfig)
|
||||||
|
|
||||||
storer.Run(stopCh)
|
storer.Run(stopCh)
|
||||||
|
@ -828,6 +835,7 @@ func TestStore(t *testing.T) {
|
||||||
clientSet,
|
clientSet,
|
||||||
updateCh,
|
updateCh,
|
||||||
false,
|
false,
|
||||||
|
true,
|
||||||
DefaultClassConfig)
|
DefaultClassConfig)
|
||||||
|
|
||||||
storer.Run(stopCh)
|
storer.Run(stopCh)
|
||||||
|
@ -923,6 +931,7 @@ func TestStore(t *testing.T) {
|
||||||
clientSet,
|
clientSet,
|
||||||
updateCh,
|
updateCh,
|
||||||
false,
|
false,
|
||||||
|
true,
|
||||||
DefaultClassConfig)
|
DefaultClassConfig)
|
||||||
|
|
||||||
storer.Run(stopCh)
|
storer.Run(stopCh)
|
||||||
|
@ -1046,6 +1055,7 @@ func TestStore(t *testing.T) {
|
||||||
clientSet,
|
clientSet,
|
||||||
updateCh,
|
updateCh,
|
||||||
false,
|
false,
|
||||||
|
true,
|
||||||
DefaultClassConfig)
|
DefaultClassConfig)
|
||||||
|
|
||||||
storer.Run(stopCh)
|
storer.Run(stopCh)
|
||||||
|
@ -1166,6 +1176,7 @@ func TestStore(t *testing.T) {
|
||||||
clientSet,
|
clientSet,
|
||||||
updateCh,
|
updateCh,
|
||||||
false,
|
false,
|
||||||
|
true,
|
||||||
DefaultClassConfig)
|
DefaultClassConfig)
|
||||||
|
|
||||||
storer.Run(stopCh)
|
storer.Run(stopCh)
|
||||||
|
|
62
internal/ingress/inspector/ingress.go
Normal file
62
internal/ingress/inspector/ingress.go
Normal file
|
@ -0,0 +1,62 @@
|
||||||
|
/*
|
||||||
|
Copyright 2022 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package inspector
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
networking "k8s.io/api/networking/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
// InspectIngress is used to do the deep inspection of an ingress object, walking through all
|
||||||
|
// of the spec fields and checking for matching strings and configurations that may represent
|
||||||
|
// an attempt to escape configs
|
||||||
|
func InspectIngress(ingress *networking.Ingress) error {
|
||||||
|
for _, rule := range ingress.Spec.Rules {
|
||||||
|
if rule.Host != "" {
|
||||||
|
if err := CheckRegex(rule.Host); err != nil {
|
||||||
|
return fmt.Errorf("invalid host in ingress %s/%s: %s", ingress.Namespace, ingress.Name, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if rule.HTTP != nil {
|
||||||
|
if err := inspectIngressRule(rule.HTTP); err != nil {
|
||||||
|
return fmt.Errorf("invalid rule in ingress %s/%s: %s", ingress.Namespace, ingress.Name, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tls := range ingress.Spec.TLS {
|
||||||
|
if err := CheckRegex(tls.SecretName); err != nil {
|
||||||
|
return fmt.Errorf("invalid secret in ingress %s/%s: %s", ingress.Namespace, ingress.Name, err)
|
||||||
|
}
|
||||||
|
for _, host := range tls.Hosts {
|
||||||
|
if err := CheckRegex(host); err != nil {
|
||||||
|
return fmt.Errorf("invalid host in ingress tls config %s/%s: %s", ingress.Namespace, ingress.Name, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func inspectIngressRule(httprule *networking.HTTPIngressRuleValue) error {
|
||||||
|
for _, path := range httprule.Paths {
|
||||||
|
if err := CheckRegex(path.Path); err != nil {
|
||||||
|
return fmt.Errorf("invalid http path: %s", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
99
internal/ingress/inspector/ingress_test.go
Normal file
99
internal/ingress/inspector/ingress_test.go
Normal file
|
@ -0,0 +1,99 @@
|
||||||
|
/*
|
||||||
|
Copyright 2022 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package inspector
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
networking "k8s.io/api/networking/v1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
func makeSimpleIngress(hostname string, paths ...string) *networking.Ingress {
|
||||||
|
|
||||||
|
newIngress := networking.Ingress{
|
||||||
|
ObjectMeta: v1.ObjectMeta{
|
||||||
|
Name: "test1",
|
||||||
|
Namespace: "default",
|
||||||
|
},
|
||||||
|
Spec: networking.IngressSpec{
|
||||||
|
Rules: []networking.IngressRule{
|
||||||
|
{
|
||||||
|
Host: hostname,
|
||||||
|
IngressRuleValue: networking.IngressRuleValue{
|
||||||
|
HTTP: &networking.HTTPIngressRuleValue{
|
||||||
|
Paths: []networking.HTTPIngressPath{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
prefix := networking.PathTypePrefix
|
||||||
|
for _, path := range paths {
|
||||||
|
newPath := networking.HTTPIngressPath{
|
||||||
|
Path: path,
|
||||||
|
PathType: &prefix,
|
||||||
|
}
|
||||||
|
newIngress.Spec.Rules[0].IngressRuleValue.HTTP.Paths = append(newIngress.Spec.Rules[0].IngressRuleValue.HTTP.Paths, newPath)
|
||||||
|
}
|
||||||
|
return &newIngress
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestInspectIngress(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
hostname string
|
||||||
|
path []string
|
||||||
|
wantErr bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "invalid-path-etc",
|
||||||
|
hostname: "invalid.etc.com",
|
||||||
|
path: []string{
|
||||||
|
"/var/run/secrets",
|
||||||
|
"/mypage",
|
||||||
|
},
|
||||||
|
wantErr: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "invalid-path-etc",
|
||||||
|
hostname: "invalid.etc.com",
|
||||||
|
path: []string{
|
||||||
|
"/etc/nginx",
|
||||||
|
},
|
||||||
|
wantErr: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "invalid-path-etc",
|
||||||
|
hostname: "invalid.etc.com",
|
||||||
|
path: []string{
|
||||||
|
"/mypage",
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
ingress := makeSimpleIngress(tt.hostname, tt.path...)
|
||||||
|
if err := InspectIngress(ingress); (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("InspectIngress() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
38
internal/ingress/inspector/inspector.go
Normal file
38
internal/ingress/inspector/inspector.go
Normal file
|
@ -0,0 +1,38 @@
|
||||||
|
/*
|
||||||
|
Copyright 2022 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package inspector
|
||||||
|
|
||||||
|
import (
|
||||||
|
corev1 "k8s.io/api/core/v1"
|
||||||
|
networking "k8s.io/api/networking/v1"
|
||||||
|
"k8s.io/klog/v2"
|
||||||
|
)
|
||||||
|
|
||||||
|
// DeepInspect is the function called by admissionwebhook and store syncer to check
|
||||||
|
// if an object contains invalid configurations that may represent a security risk,
|
||||||
|
// and returning an error in this case
|
||||||
|
func DeepInspect(obj interface{}) error {
|
||||||
|
switch obj.(type) {
|
||||||
|
case *networking.Ingress:
|
||||||
|
return InspectIngress(obj.(*networking.Ingress))
|
||||||
|
case *corev1.Service:
|
||||||
|
return InspectService(obj.(*corev1.Service))
|
||||||
|
default:
|
||||||
|
klog.Warningf("received invalid object to inspect: %T", obj)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
53
internal/ingress/inspector/rules.go
Normal file
53
internal/ingress/inspector/rules.go
Normal file
|
@ -0,0 +1,53 @@
|
||||||
|
/*
|
||||||
|
Copyright 2022 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package inspector
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"regexp"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
invalidAliasDirective = regexp.MustCompile(`\s*alias\s*.*;`)
|
||||||
|
invalidRootDirective = regexp.MustCompile(`\s*root\s*.*;`)
|
||||||
|
invalidEtcDir = regexp.MustCompile(`/etc/(passwd|shadow|group|nginx|ingress-controller)`)
|
||||||
|
invalidSecretsDir = regexp.MustCompile(`/var/run/secrets`)
|
||||||
|
invalidByLuaDirective = regexp.MustCompile(`.*_by_lua.*`)
|
||||||
|
|
||||||
|
invalidRegex = []regexp.Regexp{}
|
||||||
|
)
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
invalidRegex = []regexp.Regexp{
|
||||||
|
*invalidAliasDirective,
|
||||||
|
*invalidRootDirective,
|
||||||
|
*invalidEtcDir,
|
||||||
|
*invalidSecretsDir,
|
||||||
|
*invalidByLuaDirective,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// CheckRegex receives a value/configuration and validates if it matches with one of the
|
||||||
|
// forbidden regexes.
|
||||||
|
func CheckRegex(value string) error {
|
||||||
|
for _, regex := range invalidRegex {
|
||||||
|
if regex.MatchString(value) {
|
||||||
|
return fmt.Errorf("invalid value found: %s", value)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
66
internal/ingress/inspector/rules_test.go
Normal file
66
internal/ingress/inspector/rules_test.go
Normal file
|
@ -0,0 +1,66 @@
|
||||||
|
/*
|
||||||
|
Copyright 2022 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package inspector
|
||||||
|
|
||||||
|
import "testing"
|
||||||
|
|
||||||
|
func TestCheckRegex(t *testing.T) {
|
||||||
|
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
value string
|
||||||
|
wantErr bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "must refuse invalid root",
|
||||||
|
wantErr: true,
|
||||||
|
value: " root blabla/lala ;",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "must refuse invalid alias",
|
||||||
|
wantErr: true,
|
||||||
|
value: " alias blabla/lala ;",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "must refuse invalid attempt to call /etc",
|
||||||
|
wantErr: true,
|
||||||
|
value: "location /etc/nginx/lalala",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "must refuse invalid attempt to call k8s secret",
|
||||||
|
wantErr: true,
|
||||||
|
value: "ssl_cert /var/run/secrets/kubernetes.io/lalala; xpto",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "must refuse invalid attempt to call lua directives",
|
||||||
|
wantErr: true,
|
||||||
|
value: "set_by_lua lala",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "must pass with valid configuration",
|
||||||
|
wantErr: false,
|
||||||
|
value: "/test/mypage1",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
if err := CheckRegex(tt.value); (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("CheckRegex() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
26
internal/ingress/inspector/service.go
Normal file
26
internal/ingress/inspector/service.go
Normal file
|
@ -0,0 +1,26 @@
|
||||||
|
/*
|
||||||
|
Copyright 2022 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package inspector
|
||||||
|
|
||||||
|
import (
|
||||||
|
corev1 "k8s.io/api/core/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
// InspectService will be used to inspect service objects for possible invalid configurations
|
||||||
|
func InspectService(svc *corev1.Service) error {
|
||||||
|
return nil
|
||||||
|
}
|
|
@ -110,6 +110,23 @@ var _ = framework.IngressNginxDescribe("[Serial] admission controller", func() {
|
||||||
assert.Nil(ginkgo.GinkgoT(), err, "creating an ingress with the same host and path should not return an error using a canary annotation")
|
assert.Nil(ginkgo.GinkgoT(), err, "creating an ingress with the same host and path should not return an error using a canary annotation")
|
||||||
})
|
})
|
||||||
|
|
||||||
|
ginkgo.It("should block ingress with invalid path", func() {
|
||||||
|
host := "invalid-path"
|
||||||
|
|
||||||
|
firstIngress := framework.NewSingleIngress("valid-path", "/mypage", host, f.Namespace, framework.EchoService, 80, nil)
|
||||||
|
_, err := f.KubeClientSet.NetworkingV1().Ingresses(f.Namespace).Create(context.TODO(), firstIngress, metav1.CreateOptions{})
|
||||||
|
assert.Nil(ginkgo.GinkgoT(), err, "creating ingress")
|
||||||
|
|
||||||
|
f.WaitForNginxServer(host,
|
||||||
|
func(server string) bool {
|
||||||
|
return strings.Contains(server, fmt.Sprintf("server_name %v", host))
|
||||||
|
})
|
||||||
|
|
||||||
|
secondIngress := framework.NewSingleIngress("second-ingress", "/etc/nginx", host, f.Namespace, framework.EchoService, 80, nil)
|
||||||
|
_, err = f.KubeClientSet.NetworkingV1().Ingresses(f.Namespace).Create(context.TODO(), secondIngress, metav1.CreateOptions{})
|
||||||
|
assert.NotNil(ginkgo.GinkgoT(), err, "creating an ingress with invalid path should return an error")
|
||||||
|
})
|
||||||
|
|
||||||
ginkgo.It("should return an error if there is an error validating the ingress definition", func() {
|
ginkgo.It("should return an error if there is an error validating the ingress definition", func() {
|
||||||
host := "admission-test"
|
host := "admission-test"
|
||||||
|
|
||||||
|
|
67
test/e2e/ingress/deep_inspection.go
Normal file
67
test/e2e/ingress/deep_inspection.go
Normal file
|
@ -0,0 +1,67 @@
|
||||||
|
/*
|
||||||
|
Copyright 2022 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package ingress
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/onsi/ginkgo"
|
||||||
|
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||||
|
)
|
||||||
|
|
||||||
|
var _ = framework.IngressNginxDescribe("[Ingress] DeepInspection", func() {
|
||||||
|
f := framework.NewDefaultFramework("deep-inspection")
|
||||||
|
|
||||||
|
ginkgo.BeforeEach(func() {
|
||||||
|
f.NewEchoDeployment()
|
||||||
|
})
|
||||||
|
|
||||||
|
ginkgo.It("should drop whole ingress if one path matches invalid regex", func() {
|
||||||
|
host := "inspection123.com"
|
||||||
|
|
||||||
|
ingInvalid := framework.NewSingleIngress("invalidregex", "/bla{alias /var/run/secrets/;}location ~* ^/abcd", host, f.Namespace, framework.EchoService, 80, nil)
|
||||||
|
f.EnsureIngress(ingInvalid)
|
||||||
|
ingValid := framework.NewSingleIngress("valid", "/xpto", host, f.Namespace, framework.EchoService, 80, nil)
|
||||||
|
f.EnsureIngress(ingValid)
|
||||||
|
|
||||||
|
f.WaitForNginxServer(host,
|
||||||
|
func(server string) bool {
|
||||||
|
return strings.Contains(server, host) &&
|
||||||
|
strings.Contains(server, "location /xpto") &&
|
||||||
|
!strings.Contains(server, "location /bla")
|
||||||
|
})
|
||||||
|
|
||||||
|
f.HTTPTestClient().
|
||||||
|
GET("/xpto").
|
||||||
|
WithHeader("Host", host).
|
||||||
|
Expect().
|
||||||
|
Status(http.StatusOK)
|
||||||
|
|
||||||
|
f.HTTPTestClient().
|
||||||
|
GET("/bla").
|
||||||
|
WithHeader("Host", host).
|
||||||
|
Expect().
|
||||||
|
Status(http.StatusNotFound)
|
||||||
|
|
||||||
|
f.HTTPTestClient().
|
||||||
|
GET("/abcd/").
|
||||||
|
WithHeader("Host", host).
|
||||||
|
Expect().
|
||||||
|
Status(http.StatusNotFound)
|
||||||
|
})
|
||||||
|
})
|
Loading…
Reference in a new issue