mirror of
https://github.com/kubernetes/client-go.git
synced 2025-08-13 13:06:03 +00:00
This is a little more computationally expensive but reduces the likelihood of a potentially malicious cache collision. Signed-off-by: Nic Cope <nicc@rk0n.org> Kubernetes-commit: c5957c284e1d23bdadc98fbbe2bb481fc1f345d4
121 lines
3.9 KiB
Go
121 lines
3.9 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package disk
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/sha256"
|
|
"fmt"
|
|
"net/http"
|
|
"os"
|
|
"path/filepath"
|
|
|
|
"github.com/gregjones/httpcache"
|
|
"github.com/peterbourgon/diskv"
|
|
"k8s.io/klog/v2"
|
|
)
|
|
|
|
type cacheRoundTripper struct {
|
|
rt *httpcache.Transport
|
|
}
|
|
|
|
// newCacheRoundTripper creates a roundtripper that reads the ETag on
|
|
// response headers and send the If-None-Match header on subsequent
|
|
// corresponding requests.
|
|
func newCacheRoundTripper(cacheDir string, rt http.RoundTripper) http.RoundTripper {
|
|
d := diskv.New(diskv.Options{
|
|
PathPerm: os.FileMode(0750),
|
|
FilePerm: os.FileMode(0660),
|
|
BasePath: cacheDir,
|
|
TempDir: filepath.Join(cacheDir, ".diskv-temp"),
|
|
})
|
|
t := httpcache.NewTransport(&sumDiskCache{disk: d})
|
|
t.Transport = rt
|
|
|
|
return &cacheRoundTripper{rt: t}
|
|
}
|
|
|
|
func (rt *cacheRoundTripper) RoundTrip(req *http.Request) (*http.Response, error) {
|
|
return rt.rt.RoundTrip(req)
|
|
}
|
|
|
|
func (rt *cacheRoundTripper) CancelRequest(req *http.Request) {
|
|
type canceler interface {
|
|
CancelRequest(*http.Request)
|
|
}
|
|
if cr, ok := rt.rt.Transport.(canceler); ok {
|
|
cr.CancelRequest(req)
|
|
} else {
|
|
klog.Errorf("CancelRequest not implemented by %T", rt.rt.Transport)
|
|
}
|
|
}
|
|
|
|
func (rt *cacheRoundTripper) WrappedRoundTripper() http.RoundTripper { return rt.rt.Transport }
|
|
|
|
// A sumDiskCache is a cache backend for github.com/gregjones/httpcache. It is
|
|
// similar to httpcache's diskcache package, but uses SHA256 sums to ensure
|
|
// cache integrity at read time rather than fsyncing each cache entry to
|
|
// increase the likelihood they will be persisted at write time. This avoids
|
|
// significant performance degradation on MacOS.
|
|
//
|
|
// See https://github.com/kubernetes/kubernetes/issues/110753 for more.
|
|
type sumDiskCache struct {
|
|
disk *diskv.Diskv
|
|
}
|
|
|
|
// Get the requested key from the cache on disk. If Get encounters an error, or
|
|
// the returned value is not a SHA256 sum followed by bytes with a matching
|
|
// checksum it will return false to indicate a cache miss.
|
|
func (c *sumDiskCache) Get(key string) ([]byte, bool) {
|
|
b, err := c.disk.Read(sanitize(key))
|
|
if err != nil || len(b) < sha256.Size {
|
|
return []byte{}, false
|
|
}
|
|
|
|
response := b[sha256.Size:]
|
|
want := b[:sha256.Size] // The first 32 bytes of the file should be the SHA256 sum.
|
|
got := sha256.Sum256(response)
|
|
if !bytes.Equal(want, got[:]) {
|
|
return []byte{}, false
|
|
}
|
|
|
|
return response, true
|
|
}
|
|
|
|
// Set writes the response to a file on disk. The filename will be the SHA256
|
|
// sum of the key. The file will contain a SHA256 sum of the response bytes,
|
|
// followed by said response bytes.
|
|
func (c *sumDiskCache) Set(key string, response []byte) {
|
|
s := sha256.Sum256(response)
|
|
_ = c.disk.Write(sanitize(key), append(s[:], response...)) // Nothing we can do with this error.
|
|
}
|
|
|
|
func (c *sumDiskCache) Delete(key string) {
|
|
_ = c.disk.Erase(sanitize(key)) // Nothing we can do with this error.
|
|
}
|
|
|
|
// Sanitize an httpcache key such that it can be used as a diskv key, which must
|
|
// be a valid filename. The httpcache key will either be the requested URL (if
|
|
// the request method was GET) or "<method> <url>" for other methods, per the
|
|
// httpcache.cacheKey function.
|
|
func sanitize(key string) string {
|
|
// These keys are not sensitive. We use sha256 to avoid a (potentially
|
|
// malicious) collision causing the wrong cache data to be written or
|
|
// accessed.
|
|
return fmt.Sprintf("%x", sha256.Sum256([]byte(key)))
|
|
}
|