From 1190a1b41d436de4dab7a622d78217baba44a9ef Mon Sep 17 00:00:00 2001
From: Christian Heimes <cheimes@redhat.com>
Date: Fri, 17 Mar 2017 10:44:38 +0100
Subject: [PATCH] Simplify KRA transport cert cache
In-memory cache causes problem in forking servers. A file based cache is
good enough. It's easier to understand and avoids performance regression
and synchronization issues when cert becomes out-of-date.
https://pagure.io/freeipa/issue/6787
Signed-off-by: Christian Heimes <cheimes@redhat.com>
Reviewed-By: Jan Cholasta <jcholast@redhat.com>
---
ipaclient/plugins/vault.py | 103 ++++++++++++++++++++++++---------------------
1 file changed, 55 insertions(+), 48 deletions(-)
diff --git a/ipaclient/plugins/vault.py b/ipaclient/plugins/vault.py
index d677ec0287d6b37cfd63820a919c0726d3a4ae9f..3fb4900d9cf90e6902c40e1c3d8cfdafec2e28b8 100644
--- a/ipaclient/plugins/vault.py
+++ b/ipaclient/plugins/vault.py
@@ -20,7 +20,6 @@
from __future__ import print_function
import base64
-import collections
import errno
import getpass
import io
@@ -558,74 +557,79 @@ class vault_mod(Local):
return response
-class _TransportCertCache(collections.MutableMapping):
+class _TransportCertCache(object):
def __init__(self):
self._dirname = os.path.join(
- USER_CACHE_PATH, 'ipa', 'kra-transport-certs')
- self._transport_certs = {}
+ USER_CACHE_PATH, 'ipa', 'kra-transport-certs'
+ )
def _get_filename(self, domain):
basename = DNSName(domain).ToASCII() + '.pem'
return os.path.join(self._dirname, basename)
- def __getitem__(self, domain):
- try:
- transport_cert = self._transport_certs[domain]
- except KeyError:
- transport_cert = None
+ def load_cert(self, domain):
+ """Load cert from cache
- filename = self._get_filename(domain)
+ :param domain: IPA domain
+ :return: cryptography.x509.Certificate or None
+ """
+ filename = self._get_filename(domain)
+ try:
try:
- try:
- transport_cert = x509.load_certificate_from_file(filename)
- except EnvironmentError as e:
- if e.errno != errno.ENOENT:
- raise
- except Exception:
- logger.warning("Failed to load %s: %s", filename,
- exc_info=True)
-
- if transport_cert is None:
- raise KeyError(domain)
-
- self._transport_certs[domain] = transport_cert
+ return x509.load_certificate_from_file(filename)
+ except EnvironmentError as e:
+ if e.errno != errno.ENOENT:
+ raise
+ except Exception:
+ logger.warning("Failed to load %s", filename, exc_info=True)
- return transport_cert
+ def store_cert(self, domain, transport_cert):
+ """Store a new cert or override existing cert
- def __setitem__(self, domain, transport_cert):
+ :param domain: IPA domain
+ :param transport_cert: cryptography.x509.Certificate
+ :return: True if cert was stored successfully
+ """
filename = self._get_filename(domain)
- transport_cert_der = (
- transport_cert.public_bytes(serialization.Encoding.DER))
+ pem = transport_cert.public_bytes(serialization.Encoding.PEM)
try:
try:
os.makedirs(self._dirname)
except EnvironmentError as e:
if e.errno != errno.EEXIST:
raise
- fd, tmpfilename = tempfile.mkstemp(dir=self._dirname)
- os.close(fd)
- x509.write_certificate(transport_cert_der, tmpfilename)
- os.rename(tmpfilename, filename)
+ with tempfile.NamedTemporaryFile(dir=self._dirname, delete=False,
+ mode='wb') as f:
+ try:
+ f.write(pem)
+ f.flush()
+ os.fdatasync(f.fileno())
+ f.close()
+ os.rename(f.name, filename)
+ except Exception:
+ os.unlink(f.name)
+ raise
except Exception:
logger.warning("Failed to save %s", filename, exc_info=True)
+ return False
+ else:
+ return True
- self._transport_certs[domain] = transport_cert
+ def remove_cert(self, domain):
+ """Remove a cert from cache, ignores errors
- def __delitem__(self, domain):
+ :param domain: IPA domain
+ :return: True if cert was found and removed
+ """
filename = self._get_filename(domain)
try:
os.unlink(filename)
except EnvironmentError as e:
if e.errno != errno.ENOENT:
logger.warning("Failed to remove %s", filename, exc_info=True)
-
- del self._transport_certs[domain]
-
- def __len__(self):
- return len(self._transport_certs)
-
- def __iter__(self):
- return iter(self._transport_certs)
+ return False
+ else:
+ return True
_transport_cert_cache = _TransportCertCache()
@@ -646,7 +650,10 @@ class vaultconfig_show(MethodOverride):
# cache transport certificate
transport_cert = x509.load_certificate(
response['result']['transport_cert'], x509.DER)
- _transport_cert_cache[self.api.env.domain] = transport_cert
+
+ _transport_cert_cache.store_cert(
+ self.api.env.domain, transport_cert
+ )
if file:
with open(file, 'w') as f:
@@ -680,7 +687,7 @@ class ModVaultData(Local):
except (errors.InternalError,
errors.ExecutionError,
errors.GenericError):
- _transport_cert_cache.pop(self.api.env.domain, None)
+ _transport_cert_cache.remove_cert(self.api.env.domain)
if raise_unexpected:
raise
@@ -691,17 +698,17 @@ class ModVaultData(Local):
domain = self.api.env.domain
# try call with cached transport certificate
- transport_cert = _transport_cert_cache.get(domain)
+ transport_cert = _transport_cert_cache.load_cert(domain)
if transport_cert is not None:
result = self._do_internal(algo, transport_cert, False,
*args, **options)
if result is not None:
return result
- # retrieve and cache transport certificate
- self.api.Command.vaultconfig_show()
- transport_cert = _transport_cert_cache[domain]
-
+ # retrieve transport certificate (cached by vaultconfig_show)
+ response = self.api.Command.vaultconfig_show()
+ transport_cert = x509.load_certificate(
+ response['result']['transport_cert'], x509.DER)
# call with the retrieved transport certificate
return self._do_internal(algo, transport_cert, True,
*args, **options)
--
2.12.1