cd686ffdf3
This change updates the TLS config used by all pinniped components. There are no configuration knobs associated with this change. Thus this change tightens our static defaults. There are four TLS config levels: 1. Secure (TLS 1.3 only) 2. Default (TLS 1.2+ best ciphers that are well supported) 3. Default LDAP (TLS 1.2+ with less good ciphers) 4. Legacy (currently unused, TLS 1.2+ with all non-broken ciphers) Highlights per component: 1. pinniped CLI - uses "secure" config against KAS - uses "default" for all other connections 2. concierge - uses "secure" config as an aggregated API server - uses "default" config as a impersonation proxy API server - uses "secure" config against KAS - uses "default" config for JWT authenticater (mostly, see code) - no changes to webhook authenticater (see code) 3. supervisor - uses "default" config as a server - uses "secure" config against KAS - uses "default" config against OIDC IDPs - uses "default LDAP" config against LDAP IDPs Signed-off-by: Monis Khan <mok@vmware.com>
45 lines
1.3 KiB
Go
45 lines
1.3 KiB
Go
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
// Package authenticator contains helper code for dealing with *Authenticator CRDs.
|
|
package authenticator
|
|
|
|
import (
|
|
"crypto/x509"
|
|
"encoding/base64"
|
|
"fmt"
|
|
|
|
"k8s.io/client-go/util/cert"
|
|
|
|
auth1alpha1 "go.pinniped.dev/generated/latest/apis/concierge/authentication/v1alpha1"
|
|
)
|
|
|
|
// Closer is a type that can be closed idempotently.
|
|
//
|
|
// This type is slightly different from io.Closer, because io.Closer can return an error and is not
|
|
// necessarily idempotent.
|
|
type Closer interface {
|
|
Close()
|
|
}
|
|
|
|
// CABundle returns a PEM-encoded CA bundle from the provided spec. If the provided spec is nil, a
|
|
// nil CA bundle will be returned. If the provided spec contains a CA bundle that is not properly
|
|
// encoded, an error will be returned.
|
|
func CABundle(spec *auth1alpha1.TLSSpec) (*x509.CertPool, []byte, error) {
|
|
if spec == nil || len(spec.CertificateAuthorityData) == 0 {
|
|
return nil, nil, nil
|
|
}
|
|
|
|
pem, err := base64.StdEncoding.DecodeString(spec.CertificateAuthorityData)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
rootCAs, err := cert.NewPoolFromBytes(pem)
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("certificateAuthorityData is not valid PEM: %w", err)
|
|
}
|
|
|
|
return rootCAs, pem, nil
|
|
}
|