Use a named location for authSignURL (#4859)
This commit is contained in:
parent
d83b83bc0d
commit
a0523c3c8a
6 changed files with 126 additions and 22 deletions
4
Makefile
4
Makefile
|
@ -16,7 +16,7 @@
|
||||||
all: all-container
|
all: all-container
|
||||||
|
|
||||||
# Use the 0.0 tag for testing, it shouldn't clobber any release builds
|
# Use the 0.0 tag for testing, it shouldn't clobber any release builds
|
||||||
TAG ?= 0.26.1
|
TAG ?= 0.26.2
|
||||||
REGISTRY ?= quay.io/kubernetes-ingress-controller
|
REGISTRY ?= quay.io/kubernetes-ingress-controller
|
||||||
DOCKER ?= docker
|
DOCKER ?= docker
|
||||||
SED_I ?= sed -i
|
SED_I ?= sed -i
|
||||||
|
@ -77,7 +77,7 @@ export E2E_CHECK_LEAKS
|
||||||
export SLOW_E2E_THRESHOLD
|
export SLOW_E2E_THRESHOLD
|
||||||
|
|
||||||
# Set default base image dynamically for each arch
|
# Set default base image dynamically for each arch
|
||||||
BASEIMAGE?=quay.io/kubernetes-ingress-controller/nginx-$(ARCH):870be3bcd88c267f14fd82da82303472f383cd14
|
BASEIMAGE?=quay.io/kubernetes-ingress-controller/nginx-$(ARCH):daf8634acf839708722cffc67a62e9316a2771c6
|
||||||
|
|
||||||
ifeq ($(ARCH),arm)
|
ifeq ($(ARCH),arm)
|
||||||
QEMUARCH=arm
|
QEMUARCH=arm
|
||||||
|
|
|
@ -18,7 +18,9 @@ package template
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
|
"crypto/sha1"
|
||||||
"encoding/base64"
|
"encoding/base64"
|
||||||
|
"encoding/hex"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
|
@ -164,6 +166,7 @@ var (
|
||||||
"isValidByteSize": isValidByteSize,
|
"isValidByteSize": isValidByteSize,
|
||||||
"buildForwardedFor": buildForwardedFor,
|
"buildForwardedFor": buildForwardedFor,
|
||||||
"buildAuthSignURL": buildAuthSignURL,
|
"buildAuthSignURL": buildAuthSignURL,
|
||||||
|
"buildAuthSignURLLocation": buildAuthSignURLLocation,
|
||||||
"buildOpentracing": buildOpentracing,
|
"buildOpentracing": buildOpentracing,
|
||||||
"proxySetHeader": proxySetHeader,
|
"proxySetHeader": proxySetHeader,
|
||||||
"buildInfluxDB": buildInfluxDB,
|
"buildInfluxDB": buildInfluxDB,
|
||||||
|
@ -883,24 +886,25 @@ func buildForwardedFor(input interface{}) string {
|
||||||
return fmt.Sprintf("$http_%v", ffh)
|
return fmt.Sprintf("$http_%v", ffh)
|
||||||
}
|
}
|
||||||
|
|
||||||
func buildAuthSignURL(input interface{}) string {
|
func buildAuthSignURL(authSignURL string) string {
|
||||||
s, ok := input.(string)
|
u, _ := url.Parse(authSignURL)
|
||||||
if !ok {
|
|
||||||
klog.Errorf("expected an 'string' type but %T was returned", input)
|
|
||||||
return ""
|
|
||||||
}
|
|
||||||
|
|
||||||
u, _ := url.Parse(s)
|
|
||||||
q := u.Query()
|
q := u.Query()
|
||||||
if len(q) == 0 {
|
if len(q) == 0 {
|
||||||
return fmt.Sprintf("%v?rd=$pass_access_scheme://$http_host$escaped_request_uri", s)
|
return fmt.Sprintf("%v?rd=$pass_access_scheme://$http_host$escaped_request_uri", authSignURL)
|
||||||
}
|
}
|
||||||
|
|
||||||
if q.Get("rd") != "" {
|
if q.Get("rd") != "" {
|
||||||
return s
|
return authSignURL
|
||||||
}
|
}
|
||||||
|
|
||||||
return fmt.Sprintf("%v&rd=$pass_access_scheme://$http_host$escaped_request_uri", s)
|
return fmt.Sprintf("%v&rd=$pass_access_scheme://$http_host$escaped_request_uri", authSignURL)
|
||||||
|
}
|
||||||
|
|
||||||
|
func buildAuthSignURLLocation(location, authSignURL string) string {
|
||||||
|
hasher := sha1.New()
|
||||||
|
hasher.Write([]byte(location))
|
||||||
|
hasher.Write([]byte(authSignURL))
|
||||||
|
return "@" + hex.EncodeToString(hasher.Sum(nil))
|
||||||
}
|
}
|
||||||
|
|
||||||
var letters = []rune("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ")
|
var letters = []rune("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ")
|
||||||
|
|
|
@ -763,14 +763,6 @@ func TestFilterRateLimits(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestBuildAuthSignURL(t *testing.T) {
|
func TestBuildAuthSignURL(t *testing.T) {
|
||||||
invalidType := &ingress.Ingress{}
|
|
||||||
expected := ""
|
|
||||||
actual := buildAuthSignURL(invalidType)
|
|
||||||
|
|
||||||
if expected != actual {
|
|
||||||
t.Errorf("Expected '%v' but returned '%v'", expected, actual)
|
|
||||||
}
|
|
||||||
|
|
||||||
cases := map[string]struct {
|
cases := map[string]struct {
|
||||||
Input, Output string
|
Input, Output string
|
||||||
}{
|
}{
|
||||||
|
|
|
@ -952,6 +952,14 @@ stream {
|
||||||
{{ end }}
|
{{ end }}
|
||||||
|
|
||||||
|
|
||||||
|
{{ if $externalAuth.SigninURL }}
|
||||||
|
location {{ buildAuthSignURLLocation $location.Path $externalAuth.SigninURL }} {
|
||||||
|
internal;
|
||||||
|
|
||||||
|
return 302 {{ buildAuthSignURL $externalAuth.SigninURL }};
|
||||||
|
}
|
||||||
|
{{ end }}
|
||||||
|
|
||||||
location {{ $path }} {
|
location {{ $path }} {
|
||||||
{{ $ing := (getIngressInformation $location.Ingress $server.Hostname $location.Path) }}
|
{{ $ing := (getIngressInformation $location.Ingress $server.Hostname $location.Path) }}
|
||||||
set $namespace {{ $ing.Namespace | quote}};
|
set $namespace {{ $ing.Namespace | quote}};
|
||||||
|
@ -1071,7 +1079,7 @@ stream {
|
||||||
|
|
||||||
{{ if $externalAuth.SigninURL }}
|
{{ if $externalAuth.SigninURL }}
|
||||||
set_escape_uri $escaped_request_uri $request_uri;
|
set_escape_uri $escaped_request_uri $request_uri;
|
||||||
error_page 401 = {{ buildAuthSignURL $externalAuth.SigninURL }};
|
error_page 401 = {{ buildAuthSignURLLocation $location.Path $externalAuth.SigninURL }};
|
||||||
{{ end }}
|
{{ end }}
|
||||||
|
|
||||||
{{ if $location.BasicDigestAuth.Secured }}
|
{{ if $location.BasicDigestAuth.Secured }}
|
||||||
|
|
|
@ -38,6 +38,7 @@ import (
|
||||||
_ "k8s.io/ingress-nginx/test/e2e/leaks"
|
_ "k8s.io/ingress-nginx/test/e2e/leaks"
|
||||||
_ "k8s.io/ingress-nginx/test/e2e/loadbalance"
|
_ "k8s.io/ingress-nginx/test/e2e/loadbalance"
|
||||||
_ "k8s.io/ingress-nginx/test/e2e/lua"
|
_ "k8s.io/ingress-nginx/test/e2e/lua"
|
||||||
|
_ "k8s.io/ingress-nginx/test/e2e/security"
|
||||||
_ "k8s.io/ingress-nginx/test/e2e/servicebackend"
|
_ "k8s.io/ingress-nginx/test/e2e/servicebackend"
|
||||||
_ "k8s.io/ingress-nginx/test/e2e/settings"
|
_ "k8s.io/ingress-nginx/test/e2e/settings"
|
||||||
_ "k8s.io/ingress-nginx/test/e2e/ssl"
|
_ "k8s.io/ingress-nginx/test/e2e/ssl"
|
||||||
|
|
99
test/e2e/security/request_smuggling.go
Normal file
99
test/e2e/security/request_smuggling.go
Normal file
|
@ -0,0 +1,99 @@
|
||||||
|
/*
|
||||||
|
Copyright 2019 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package security
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
. "github.com/onsi/ginkgo"
|
||||||
|
. "github.com/onsi/gomega"
|
||||||
|
|
||||||
|
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||||
|
)
|
||||||
|
|
||||||
|
var _ = framework.IngressNginxDescribe("Request smuggling", func() {
|
||||||
|
f := framework.NewDefaultFramework("request-smuggling")
|
||||||
|
|
||||||
|
BeforeEach(func() {
|
||||||
|
f.NewEchoDeployment()
|
||||||
|
})
|
||||||
|
|
||||||
|
AfterEach(func() {
|
||||||
|
})
|
||||||
|
|
||||||
|
It("should not return body content from error_page", func() {
|
||||||
|
host := "foo.bar.com"
|
||||||
|
|
||||||
|
snippet := `
|
||||||
|
server {
|
||||||
|
listen 80;
|
||||||
|
server_name notlocalhost;
|
||||||
|
location /_hidden/index.html {
|
||||||
|
return 200 'This should be hidden!';
|
||||||
|
}
|
||||||
|
}`
|
||||||
|
|
||||||
|
f.UpdateNginxConfigMapData("http-snippet", snippet)
|
||||||
|
|
||||||
|
ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, map[string]string{
|
||||||
|
"nginx.ingress.kubernetes.io/auth-signin": "https://httpbin.org/uuid",
|
||||||
|
"nginx.ingress.kubernetes.io/auth-url": "https://httpbin.org/basic-auth/user/passwd",
|
||||||
|
})
|
||||||
|
f.EnsureIngress(ing)
|
||||||
|
|
||||||
|
f.WaitForNginxServer(host,
|
||||||
|
func(server string) bool {
|
||||||
|
return strings.Contains(server, fmt.Sprintf("server_name %v", host))
|
||||||
|
})
|
||||||
|
|
||||||
|
out, err := smugglingRequest(host, f.GetNginxIP(), 80)
|
||||||
|
Expect(err).NotTo(HaveOccurred(), "obtaining response of request smuggling check")
|
||||||
|
Expect(out).ShouldNot(ContainSubstring("This should be hidden!"))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
func smugglingRequest(host, addr string, port int) (string, error) {
|
||||||
|
conn, err := net.Dial("tcp", fmt.Sprintf("%v:%v", addr, port))
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
defer conn.Close()
|
||||||
|
|
||||||
|
conn.SetDeadline(time.Now().Add(time.Second * 10))
|
||||||
|
|
||||||
|
_, err = fmt.Fprintf(conn, "GET /echo HTTP/1.1\r\nHost: %v\r\nContent-Length: 56\r\n\r\nGET /_hidden/index.html HTTP/1.1\r\nHost: notlocalhost\r\n\r\n", host)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
// wait for /_hidden/index.html response
|
||||||
|
time.Sleep(1 * time.Second)
|
||||||
|
|
||||||
|
var buf = make([]byte, 1024)
|
||||||
|
r := bufio.NewReader(conn)
|
||||||
|
_, err = r.Read(buf)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
return string(buf), nil
|
||||||
|
}
|
Loading…
Reference in a new issue