Skip to content

Commit

Permalink
[release-4.7] Bug 2024614: Anonymize identity provider attributes in …
Browse files Browse the repository at this point in the history
…the (openshift#520) (openshift#527) (openshift#541)

* Anonymize identity provider attributes in the
authentication.operator.openshift.io definition

* More robust way....
  • Loading branch information
tremes committed Nov 18, 2021
1 parent 0497378 commit 0ba1ff5
Show file tree
Hide file tree
Showing 3 changed files with 86 additions and 22 deletions.
48 changes: 26 additions & 22 deletions pkg/gather/clusterconfig/operators.go
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,12 @@ package clusterconfig

import (
"context"
"encoding/json"
"fmt"
"regexp"
"strings"

"k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
"k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/klog/v2"

Expand All @@ -18,6 +17,8 @@ import (
"k8s.io/client-go/dynamic"

"github.com/openshift/insights-operator/pkg/record"
"github.com/openshift/insights-operator/pkg/utils"
"github.com/openshift/insights-operator/pkg/utils/anonymize"
)

const (
Expand Down Expand Up @@ -111,7 +112,7 @@ func clusterOperatorsRecords(ctx context.Context, items []configv1.ClusterOperat
}
records = append(records, record.Record{
Name: fmt.Sprintf("config/clusteroperator/%s/%s/%s", gv.Group, strings.ToLower(rr.Kind), rr.Name),
Item: ClusterOperatorResourceAnonymizer{rr},
Item: record.JSONMarshaller{Object: rr},
})
}
}
Expand Down Expand Up @@ -156,6 +157,7 @@ func collectClusterOperatorResources(ctx context.Context, dynamicClient dynamic.
if !ok {
klog.Warningf("Can't find spec for cluster operator resource %s", name)
}
anonymizeIdentityProviders(clusterResource.Object)
res = append(res, clusterOperatorResource{Spec: spec, Kind: kind, Name: name, APIVersion: apiVersion})
}
}
Expand Down Expand Up @@ -189,27 +191,29 @@ func getOperatorResourcesVersions(discoveryClient discovery.DiscoveryInterface)
return resourceVersionMap, nil
}

// ClusterOperatorResourceAnonymizer implements serialization of clusterOperatorResource
type ClusterOperatorResourceAnonymizer struct{ resource clusterOperatorResource }
// anonymizeIdentityProviders tries to get an array of identity providers defined in OAuth config
// and anonymize potentially sensitive data - e.g LDAP domain, url
func anonymizeIdentityProviders(obj map[string]interface{}) {
ips, err := utils.NestedSliceWrapper(obj, "spec", "observedConfig", "oauthServer", "oauthConfig", "identityProviders")

// Marshal serializes clusterOperatorResource with IP address anonymization
func (a ClusterOperatorResourceAnonymizer) Marshal(_ context.Context) ([]byte, error) {
bytes, err := json.Marshal(a.resource)
// most of the clusteroperator resources will not have any identity provider config so silence the error
if err != nil {
return nil, err
return
}
resStr := string(bytes)
//anonymize URLs
re := regexp.MustCompile(`"(https|http)://(.*?)"`)
urlMatches := re.FindAllString(resStr, -1)
for _, m := range urlMatches {
m = strings.ReplaceAll(m, "\"", "")
resStr = strings.ReplaceAll(resStr, m, anonymizeString(m))
sensittiveProviderAttributes := []string{"url", "bindDN", "hostname", "clientID", "hostedDomain", "issuer", "domainName"}
for _, ip := range ips {
ip, ok := ip.(map[string]interface{})
if !ok {
klog.Warningln("Failed to convert %v to map[string]interface{}", ip)
continue
}
for _, sensitiveVal := range sensittiveProviderAttributes {
// check if the sensitive value is in the provider definition under "provider" attribute
// and overwrite only if exists
if val, err := utils.NestedStringWrapper(ip, "provider", sensitiveVal); err == nil {
_ = unstructured.SetNestedField(ip, anonymize.String(val), "provider", sensitiveVal)
}
}
}
return []byte(resStr), nil
}

// GetExtension returns extension for anonymized cluster operator objects
func (a ClusterOperatorResourceAnonymizer) GetExtension() string {
return "json"
_ = unstructured.SetNestedSlice(obj, ips, "spec", "observedConfig", "oauthServer", "oauthConfig", "identityProviders")
}
7 changes: 7 additions & 0 deletions pkg/utils/anonymize/string.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
package anonymize

import "strings"

func String(s string) string {
return strings.Repeat("x", len(s))
}
53 changes: 53 additions & 0 deletions pkg/utils/unstructured_wrappers.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,53 @@
package utils

import (
"fmt"
"strings"

"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
)

func NestedStringWrapper(obj map[string]interface{}, fields ...string) (string, error) {
s, ok, err := unstructured.NestedString(obj, fields...)
if !ok {
return "", fmt.Errorf("can't find %s", formatSlice(fields...))
}
if err != nil {
return "", err
}

return s, nil
}

func NestedSliceWrapper(obj map[string]interface{}, fields ...string) ([]interface{}, error) {
s, ok, err := unstructured.NestedSlice(obj, fields...)
if !ok {
return nil, fmt.Errorf("can't find %s", formatSlice(fields...))
}
if err != nil {
return nil, err
}

return s, nil
}

func NestedInt64Wrapper(obj map[string]interface{}, fields ...string) (int64, error) {
i, ok, err := unstructured.NestedInt64(obj, fields...)
if !ok {
return 0, fmt.Errorf("can't find %s", formatSlice(fields...))
}
if err != nil {
return 0, err
}

return i, nil
}

func formatSlice(s ...string) string {
var str string
for _, f := range s {
str += fmt.Sprintf("%s.", f)
}
str = strings.TrimRight(str, ".")
return str
}

0 comments on commit 0ba1ff5

Please sign in to comment.