mirror of
https://github.com/pomerium/pomerium.git
synced 2025-07-19 17:50:17 +02:00
Merge remote-tracking branch 'origin/main' into feature/zero
This commit is contained in:
commit
88664a78b0
8 changed files with 176 additions and 2 deletions
|
@ -117,7 +117,7 @@ func newPolicyEvaluator(opts *config.Options, store *store.Store) (*evaluator.Ev
|
||||||
// It is important to add an invalid_client_certificate rule even when the
|
// It is important to add an invalid_client_certificate rule even when the
|
||||||
// mTLS enforcement behavior is set to reject connections at the listener
|
// mTLS enforcement behavior is set to reject connections at the listener
|
||||||
// level, because of the per-route TLSDownstreamClientCA setting.
|
// level, because of the per-route TLSDownstreamClientCA setting.
|
||||||
addDefaultClientCertificateRule :=
|
addDefaultClientCertificateRule := opts.HasAnyDownstreamMTLSClientCA() &&
|
||||||
opts.DownstreamMTLS.GetEnforcement() != config.MTLSEnforcementPolicy
|
opts.DownstreamMTLS.GetEnforcement() != config.MTLSEnforcementPolicy
|
||||||
|
|
||||||
clientCertConstraints, err := evaluator.ClientCertConstraintsFromConfig(&opts.DownstreamMTLS)
|
clientCertConstraints, err := evaluator.ClientCertConstraintsFromConfig(&opts.DownstreamMTLS)
|
||||||
|
|
|
@ -7,7 +7,10 @@ import (
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/pomerium/pomerium/authorize/evaluator"
|
||||||
|
"github.com/pomerium/pomerium/authorize/internal/store"
|
||||||
"github.com/pomerium/pomerium/config"
|
"github.com/pomerium/pomerium/config"
|
||||||
|
"github.com/pomerium/pomerium/pkg/policy/criteria"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestNew(t *testing.T) {
|
func TestNew(t *testing.T) {
|
||||||
|
@ -138,3 +141,53 @@ func testPolicies(t *testing.T) []config.Policy {
|
||||||
}
|
}
|
||||||
return policies
|
return policies
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestNewPolicyEvaluator_addDefaultClientCertificateRule(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
resultFalse := evaluator.NewRuleResult(false) // no mention of client certificates
|
||||||
|
resultClientCertificateRequired := evaluator.NewRuleResult(true,
|
||||||
|
criteria.ReasonClientCertificateRequired)
|
||||||
|
|
||||||
|
cases := []struct {
|
||||||
|
label string
|
||||||
|
opts *config.Options
|
||||||
|
expected evaluator.RuleResult
|
||||||
|
}{
|
||||||
|
{"zero", &config.Options{}, resultFalse},
|
||||||
|
{"default", config.NewDefaultOptions(), resultFalse},
|
||||||
|
{"client CA, default enforcement", &config.Options{
|
||||||
|
DownstreamMTLS: config.DownstreamMTLSSettings{CA: "ZmFrZSBDQQ=="},
|
||||||
|
}, resultClientCertificateRequired},
|
||||||
|
{"client CA, reject connection", &config.Options{
|
||||||
|
DownstreamMTLS: config.DownstreamMTLSSettings{
|
||||||
|
CA: "ZmFrZSBDQQ==",
|
||||||
|
Enforcement: config.MTLSEnforcementRejectConnection,
|
||||||
|
},
|
||||||
|
}, resultClientCertificateRequired},
|
||||||
|
{"client CA, policy", &config.Options{
|
||||||
|
DownstreamMTLS: config.DownstreamMTLSSettings{
|
||||||
|
CA: "ZmFrZSBDQQ==",
|
||||||
|
Enforcement: config.MTLSEnforcementPolicy,
|
||||||
|
},
|
||||||
|
}, resultFalse},
|
||||||
|
}
|
||||||
|
for i := range cases {
|
||||||
|
c := &cases[i]
|
||||||
|
t.Run(c.label, func(t *testing.T) {
|
||||||
|
store := store.New()
|
||||||
|
c.opts.Policies = []config.Policy{{
|
||||||
|
To: mustParseWeightedURLs(t, "http://example.com"),
|
||||||
|
}}
|
||||||
|
e, err := newPolicyEvaluator(c.opts, store)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
r, err := e.Evaluate(context.Background(), &evaluator.Request{
|
||||||
|
Policy: &c.opts.Policies[0],
|
||||||
|
HTTP: evaluator.RequestHTTP{},
|
||||||
|
})
|
||||||
|
require.NoError(t, err)
|
||||||
|
assert.Equal(t, c.expected, r.Deny)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -38,4 +38,5 @@ var ViperPolicyHooks = viper.DecodeHook(mapstructure.ComposeDecodeHookFunc(
|
||||||
decodeJWTClaimHeadersHookFunc(),
|
decodeJWTClaimHeadersHookFunc(),
|
||||||
decodeCodecTypeHookFunc(),
|
decodeCodecTypeHookFunc(),
|
||||||
decodePPLPolicyHookFunc(),
|
decodePPLPolicyHookFunc(),
|
||||||
|
decodeSANMatcherHookFunc(),
|
||||||
))
|
))
|
||||||
|
|
|
@ -508,6 +508,26 @@ func parseJSONPB(src map[string]interface{}, dst proto.Message, opts protojson.U
|
||||||
return opts.Unmarshal(data, dst)
|
return opts.Unmarshal(data, dst)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// decodeSANMatcherHookFunc returns a decode hook for the SANMatcher type.
|
||||||
|
func decodeSANMatcherHookFunc() mapstructure.DecodeHookFunc {
|
||||||
|
return func(f, t reflect.Type, data interface{}) (interface{}, error) {
|
||||||
|
if t != reflect.TypeOf(SANMatcher{}) {
|
||||||
|
return data, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
b, err := json.Marshal(data)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
var m SANMatcher
|
||||||
|
if err := json.Unmarshal(b, &m); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return m, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// serializable converts mapstructure nested map into map[string]interface{} that is serializable to JSON
|
// serializable converts mapstructure nested map into map[string]interface{} that is serializable to JSON
|
||||||
func serializable(in interface{}) (interface{}, error) {
|
func serializable(in interface{}) (interface{}, error) {
|
||||||
switch typed := in.(type) {
|
switch typed := in.(type) {
|
||||||
|
|
|
@ -1,6 +1,9 @@
|
||||||
function envoy_on_request(request_handle)
|
function envoy_on_request(request_handle)
|
||||||
local metadata = request_handle:streamInfo():dynamicMetadata()
|
local metadata = request_handle:streamInfo():dynamicMetadata()
|
||||||
local ssl = request_handle:streamInfo():downstreamSslConnection()
|
local ssl = request_handle:streamInfo():downstreamSslConnection()
|
||||||
|
if ssl == nil then
|
||||||
|
return
|
||||||
|
end
|
||||||
metadata:set("com.pomerium.client-certificate-info", "presented",
|
metadata:set("com.pomerium.client-certificate-info", "presented",
|
||||||
ssl:peerCertificatePresented())
|
ssl:peerCertificatePresented())
|
||||||
metadata:set("com.pomerium.client-certificate-info", "chain",
|
metadata:set("com.pomerium.client-certificate-info", "chain",
|
||||||
|
|
|
@ -38,7 +38,7 @@
|
||||||
"typedConfig": {
|
"typedConfig": {
|
||||||
"@type": "type.googleapis.com/envoy.extensions.filters.http.lua.v3.Lua",
|
"@type": "type.googleapis.com/envoy.extensions.filters.http.lua.v3.Lua",
|
||||||
"defaultSourceCode": {
|
"defaultSourceCode": {
|
||||||
"inlineString": "function envoy_on_request(request_handle)\n local metadata = request_handle:streamInfo():dynamicMetadata()\n local ssl = request_handle:streamInfo():downstreamSslConnection()\n metadata:set(\"com.pomerium.client-certificate-info\", \"presented\",\n ssl:peerCertificatePresented())\n metadata:set(\"com.pomerium.client-certificate-info\", \"chain\",\n ssl:urlEncodedPemEncodedPeerCertificateChain())\nend\n\nfunction envoy_on_response(response_handle) end\n"
|
"inlineString": "function envoy_on_request(request_handle)\n local metadata = request_handle:streamInfo():dynamicMetadata()\n local ssl = request_handle:streamInfo():downstreamSslConnection()\n if ssl == nil then\n return\n end\n metadata:set(\"com.pomerium.client-certificate-info\", \"presented\",\n ssl:peerCertificatePresented())\n metadata:set(\"com.pomerium.client-certificate-info\", \"chain\",\n ssl:urlEncodedPemEncodedPeerCertificateChain())\nend\n\nfunction envoy_on_response(response_handle) end\n"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
|
|
@ -976,6 +976,26 @@ func (o *Options) GetMetricsBasicAuth() (username, password string, ok bool) {
|
||||||
return string(bs[:idx]), string(bs[idx+1:]), true
|
return string(bs[:idx]), string(bs[idx+1:]), true
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// HasAnyDownstreamMTLSClientCA returns true if there is a global downstream
|
||||||
|
// client CA or there are any per-route downstream client CAs.
|
||||||
|
func (o *Options) HasAnyDownstreamMTLSClientCA() bool {
|
||||||
|
// All the CA settings should already have been validated.
|
||||||
|
ca, _ := o.DownstreamMTLS.GetCA()
|
||||||
|
if len(ca) > 0 {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
allPolicies := o.GetAllPolicies()
|
||||||
|
for i := range allPolicies {
|
||||||
|
// We don't need to check TLSDownstreamClientCAFile here because
|
||||||
|
// Policy.Validate() will populate TLSDownstreamClientCA when
|
||||||
|
// TLSDownstreamClientCAFile is set.
|
||||||
|
if allPolicies[i].TLSDownstreamClientCA != "" {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
// GetDataBrokerCertificate gets the optional databroker certificate. This method will return nil if no certificate is
|
// GetDataBrokerCertificate gets the optional databroker certificate. This method will return nil if no certificate is
|
||||||
// specified.
|
// specified.
|
||||||
func (o *Options) GetDataBrokerCertificate() (*tls.Certificate, error) {
|
func (o *Options) GetDataBrokerCertificate() (*tls.Certificate, error) {
|
||||||
|
|
|
@ -341,6 +341,27 @@ func Test_parsePolicyFile(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func Test_decodeSANMatcher(t *testing.T) {
|
||||||
|
// Verify that config file parsing will decode the SANMatcher type.
|
||||||
|
const yaml = `
|
||||||
|
downstream_mtls:
|
||||||
|
match_subject_alt_names:
|
||||||
|
- dns: 'example-1\..*'
|
||||||
|
- dns: '.*\.example-2'
|
||||||
|
`
|
||||||
|
cfg := filepath.Join(t.TempDir(), "config.yaml")
|
||||||
|
err := os.WriteFile(cfg, []byte(yaml), 0644)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
o, err := optionsFromViper(cfg)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
assert.Equal(t, []SANMatcher{
|
||||||
|
{Type: SANTypeDNS, Pattern: `example-1\..*`},
|
||||||
|
{Type: SANTypeDNS, Pattern: `.*\.example-2`},
|
||||||
|
}, o.DownstreamMTLS.MatchSubjectAltNames)
|
||||||
|
}
|
||||||
|
|
||||||
func Test_Checksum(t *testing.T) {
|
func Test_Checksum(t *testing.T) {
|
||||||
o := NewDefaultOptions()
|
o := NewDefaultOptions()
|
||||||
|
|
||||||
|
@ -738,6 +759,62 @@ func TestDeprecatedClientCAOptions(t *testing.T) {
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestHasAnyDownstreamMTLSClientCA(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
cases := []struct {
|
||||||
|
label string
|
||||||
|
opts *Options
|
||||||
|
expected bool
|
||||||
|
}{
|
||||||
|
{"zero", &Options{}, false},
|
||||||
|
{"default", NewDefaultOptions(), false},
|
||||||
|
{"no client CAs", &Options{
|
||||||
|
Policies: []Policy{
|
||||||
|
{From: "https://example.com/one"},
|
||||||
|
{From: "https://example.com/two"},
|
||||||
|
{From: "https://example.com/three"},
|
||||||
|
},
|
||||||
|
}, false},
|
||||||
|
{"global client CA only", &Options{
|
||||||
|
DownstreamMTLS: DownstreamMTLSSettings{CA: "ZmFrZSBDQQ=="},
|
||||||
|
Policies: []Policy{
|
||||||
|
{From: "https://example.com/one"},
|
||||||
|
{From: "https://example.com/two"},
|
||||||
|
{From: "https://example.com/three"},
|
||||||
|
},
|
||||||
|
}, true},
|
||||||
|
{"per-route CA only", &Options{
|
||||||
|
Policies: []Policy{
|
||||||
|
{From: "https://example.com/one"},
|
||||||
|
{
|
||||||
|
From: "https://example.com/two",
|
||||||
|
TLSDownstreamClientCA: "ZmFrZSBDQQ==",
|
||||||
|
},
|
||||||
|
{From: "https://example.com/three"},
|
||||||
|
},
|
||||||
|
}, true},
|
||||||
|
{"both global and per-route client CAs", &Options{
|
||||||
|
DownstreamMTLS: DownstreamMTLSSettings{CA: "ZmFrZSBDQQ=="},
|
||||||
|
Policies: []Policy{
|
||||||
|
{From: "https://example.com/one"},
|
||||||
|
{
|
||||||
|
From: "https://example.com/two",
|
||||||
|
TLSDownstreamClientCA: "ZmFrZSBDQQ==",
|
||||||
|
},
|
||||||
|
{From: "https://example.com/three"},
|
||||||
|
},
|
||||||
|
}, true},
|
||||||
|
}
|
||||||
|
for i := range cases {
|
||||||
|
c := &cases[i]
|
||||||
|
t.Run(c.label, func(t *testing.T) {
|
||||||
|
actual := c.opts.HasAnyDownstreamMTLSClientCA()
|
||||||
|
assert.Equal(t, c.expected, actual)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func TestOptions_DefaultURL(t *testing.T) {
|
func TestOptions_DefaultURL(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue