Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

rustls + rustls-pemfile upgrade #1418

Closed
wants to merge 2 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions kube-client/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -51,8 +51,8 @@ thiserror = "1.0.29"
futures = { version = "0.3.17", optional = true }
pem = { version = "3.0.1", optional = true }
openssl = { version = "0.10.36", optional = true }
rustls = { version = "0.21.4", features = ["dangerous_configuration"], optional = true }
rustls-pemfile = { version = "1.0.0", optional = true }
rustls = { version = "0.23.1", optional = true }
rustls-pemfile = { version = "2.1.1", optional = true }
bytes = { version = "1.1.0", optional = true }
tokio = { version = "1.14.0", features = ["time", "signal", "sync"], optional = true }
kube-core = { path = "../kube-core", version = "=0.88.1" }
Expand Down
50 changes: 30 additions & 20 deletions kube-client/src/client/tls.rs
Original file line number Diff line number Diff line change
@@ -1,10 +1,11 @@
#[cfg(feature = "rustls-tls")]
pub mod rustls_tls {
use hyper_rustls::ConfigBuilderExt;

Check warning on line 3 in kube-client/src/client/tls.rs

View workflow job for this annotation

GitHub Actions / clippy

unused import: `hyper_rustls::ConfigBuilderExt`

warning: unused import: `hyper_rustls::ConfigBuilderExt` --> kube-client/src/client/tls.rs:3:9 | 3 | use hyper_rustls::ConfigBuilderExt; | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Check warning on line 3 in kube-client/src/client/tls.rs

View workflow job for this annotation

GitHub Actions / msrv

unused import: `hyper_rustls::ConfigBuilderExt`
use rustls::{
self,
client::{HandshakeSignatureValid, ServerCertVerified, ServerCertVerifier},
Certificate, ClientConfig, DigitallySignedStruct, PrivateKey,
client::danger::{HandshakeSignatureValid, ServerCertVerified, ServerCertVerifier},
pki_types::{CertificateDer, PrivateKeyDer, ServerName, UnixTime},
ClientConfig, DigitallySignedStruct, SignatureScheme,
};
use thiserror::Error;

Expand All @@ -27,6 +28,10 @@
#[error("invalid private key: {0}")]
InvalidPrivateKey(#[source] rustls::Error),

/// Invalid native roots
#[error("invalid native roots: {0}")]
InvalidNativeRoots(#[source] std::io::Error),

/// Unknown private key format
#[error("unknown private key format")]
UnknownPrivateKeyFormat,
Expand All @@ -44,11 +49,11 @@
accept_invalid: bool,
) -> Result<ClientConfig, Error> {
let config_builder = if let Some(certs) = root_certs {
ClientConfig::builder()
.with_safe_defaults()
.with_root_certificates(root_store(certs)?)
ClientConfig::builder().with_root_certificates(root_store(certs)?)
} else {
ClientConfig::builder().with_safe_defaults().with_native_roots()
ClientConfig::builder()
.with_native_roots()

Check failure on line 55 in kube-client/src/client/tls.rs

View workflow job for this annotation

GitHub Actions / clippy

no method named `with_native_roots` found for struct `rustls::ConfigBuilder` in the current scope

error[E0599]: no method named `with_native_roots` found for struct `rustls::ConfigBuilder` in the current scope --> kube-client/src/client/tls.rs:55:18 | 54 | / ClientConfig::builder() 55 | | .with_native_roots() | | -^^^^^^^^^^^^^^^^^ method not found in `ConfigBuilder<ClientConfig, WantsVerifier>` | |_________________| |

Check failure on line 55 in kube-client/src/client/tls.rs

View workflow job for this annotation

GitHub Actions / msrv

no method named `with_native_roots` found for struct `ConfigBuilder` in the current scope
.map_err(Error::InvalidNativeRoots)?
};

let mut client_config = if let Some((chain, pkey)) = identity_pem.map(client_auth).transpose()? {
Expand All @@ -71,26 +76,27 @@
let mut root_store = rustls::RootCertStore::empty();
for der in root_certs {
root_store
.add(&Certificate(der.clone()))
.add(CertificateDer::from(der.clone()))
.map_err(|e| Error::AddRootCertificate(Box::new(e)))?;
}
Ok(root_store)
}

fn client_auth(data: &[u8]) -> Result<(Vec<Certificate>, PrivateKey), Error> {
fn client_auth(data: &[u8]) -> Result<(Vec<CertificateDer>, PrivateKeyDer), Error> {
use rustls_pemfile::Item;

let mut cert_chain = Vec::new();
let mut pkcs8_key = None;
let mut rsa_key = None;
let mut ec_key = None;
let mut reader = std::io::Cursor::new(data);
for item in rustls_pemfile::read_all(&mut reader).map_err(Error::InvalidIdentityPem)? {
for res in rustls_pemfile::read_all(&mut reader) {
let item = res.map_err(Error::InvalidIdentityPem)?;
match item {
Item::X509Certificate(cert) => cert_chain.push(Certificate(cert)),
Item::PKCS8Key(key) => pkcs8_key = Some(PrivateKey(key)),
Item::RSAKey(key) => rsa_key = Some(PrivateKey(key)),
Item::ECKey(key) => ec_key = Some(PrivateKey(key)),
Item::X509Certificate(cert) => cert_chain.push(CertificateDer::from(cert)),
Item::Pkcs8Key(key) => pkcs8_key = Some(PrivateKeyDer::Pkcs8(key)),
Item::Pkcs1Key(key) => rsa_key = Some(PrivateKeyDer::Pkcs1(key)),
Item::Sec1Key(key) => ec_key = Some(PrivateKeyDer::Sec1(key)),
_ => return Err(Error::UnknownPrivateKeyFormat),
}
}
Expand All @@ -102,17 +108,17 @@
Ok((cert_chain, private_key))
}

#[derive(Debug)]
struct NoCertificateVerification {}

impl ServerCertVerifier for NoCertificateVerification {
fn verify_server_cert(
&self,
_end_entity: &Certificate,
_intermediates: &[Certificate],
_server_name: &rustls::client::ServerName,
_scts: &mut dyn Iterator<Item = &[u8]>,
_end_entity: &CertificateDer<'_>,
_intermediates: &[CertificateDer<'_>],
_server_name: &ServerName,
_ocsp_response: &[u8],
_now: std::time::SystemTime,
_now: UnixTime,
) -> Result<ServerCertVerified, rustls::Error> {
tracing::warn!("Server cert bypassed");
Ok(ServerCertVerified::assertion())
Expand All @@ -121,7 +127,7 @@
fn verify_tls13_signature(
&self,
_message: &[u8],
_cert: &Certificate,
_cert: &CertificateDer,
_dss: &DigitallySignedStruct,
) -> Result<HandshakeSignatureValid, rustls::Error> {
Ok(HandshakeSignatureValid::assertion())
Expand All @@ -130,11 +136,15 @@
fn verify_tls12_signature(
&self,
_message: &[u8],
_cert: &Certificate,
_cert: &CertificateDer,
_dss: &DigitallySignedStruct,
) -> Result<HandshakeSignatureValid, rustls::Error> {
Ok(HandshakeSignatureValid::assertion())
}

fn supported_verify_schemes(&self) -> Vec<SignatureScheme> {
vec![]
}
}
}

Expand Down
Loading