Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
30 changes: 30 additions & 0 deletions pkg/authz/requestlogger.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
package authz

import (
"net/http"
"strings"
)

func requestLogger(r *http.Request) string {
var sb strings.Builder

sb.WriteString(r.Method)
sb.WriteString(" ")
sb.WriteString(r.URL.String())

var bodyBytes []byte
if r.Body != nil {
defer func() {
_ = r.Body.Close()
}()
bodyBytes = make([]byte, r.ContentLength)
_, err := r.Body.Read(bodyBytes)
if err != nil {
sb.WriteString("Body: <unknown>")
} else {
sb.WriteString(" Body: " + string(bodyBytes))
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I know that this PR isn't changing this behavior, but the first thing I think when I see request body logging is whether it could leak anything sensitive. Are we worried about that in this case?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Body should contain Check request bodies, LR bodies, etc... which shouldn't contain PII. It's not like i'm logging headers 😅

}
}

return sb.String()
}
64 changes: 64 additions & 0 deletions pkg/authz/requestlogger_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,64 @@
package authz

import (
"io"
"net/http"
"strings"
"testing"

"github.com/stretchr/testify/require"
)

func TestRequestLogger(t *testing.T) {
tests := []struct {
name string
method string
url string
body string
expected string
}{
{
name: "GET request without query or body",
method: "GET",
url: "https://kubernetes.default.svc/api/v1/pods",
body: "",
expected: "GET https://kubernetes.default.svc/api/v1/pods",
},
{
name: "GET request with query parameters",
method: "GET",
url: "https://kubernetes.default.svc/api/v1/pods?labelSelector=app%3Dmyapp&limit=10",
body: "",
expected: "GET https://kubernetes.default.svc/api/v1/pods?labelSelector=app%3Dmyapp&limit=10",
},
{
name: "POST request with body",
method: "POST",
url: "https://kubernetes.default.svc/api/v1/namespaces/default/pods",
body: `{"apiVersion":"v1","kind":"Pod","metadata":{"name":"test"}}`,
expected: `POST https://kubernetes.default.svc/api/v1/namespaces/default/pods Body: {"apiVersion":"v1","kind":"Pod","metadata":{"name":"test"}}`,
},
{
name: "PUT request with query and body",
method: "PUT",
url: "https://kubernetes.default.svc/api/v1/namespaces/default/pods/test?dryRun=All",
body: `{"metadata":{"labels":{"env":"prod"}}}`,
expected: `PUT https://kubernetes.default.svc/api/v1/namespaces/default/pods/test?dryRun=All Body: {"metadata":{"labels":{"env":"prod"}}}`,
},
}

for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
var bodyReader io.Reader
if tt.body != "" {
bodyReader = strings.NewReader(tt.body)
}

req, err := http.NewRequest(tt.method, tt.url, bodyReader)
require.NoError(t, err)

result := requestLogger(req)
require.Equal(t, tt.expected, result)
})
}
}
8 changes: 4 additions & 4 deletions pkg/authz/responsefilterer.go
Original file line number Diff line number Diff line change
Expand Up @@ -126,7 +126,7 @@ func (rf *StandardResponseFilterer) RunPreFilters(req *http.Request) error {

prefilterRule, err := singlePreFilterRule(rf.filteredRules)
if err != nil {
klog.FromContext(req.Context()).V(2).Error(err, "error getting single pre-filter rule", "request", req)
klog.FromContext(req.Context()).V(2).Error(err, "error getting single pre-filter rule", "request", requestLogger(req))
return fmt.Errorf("error getting single pre-filter rule: %w", err)
}

Expand Down Expand Up @@ -163,17 +163,17 @@ func (rf *StandardResponseFilterer) RunPreFilters(req *http.Request) error {

// Run LookupResources for the prefilter rule and write the results to the channel.
go func() {
klog.FromContext(req.Context()).V(3).Info("running pre-filter", "request", req, "filter", filter)
klog.FromContext(req.Context()).V(3).Info("running pre-filter", "request", requestLogger(req), "filter", filter)

result, err := runLookupResources(req.Context(), rf.client, filter, rf.input)
if err != nil {
if status.Code(err) == codes.Canceled {
klog.FromContext(req.Context()).V(3).Info("pre-filter canceled", "request", req)
klog.FromContext(req.Context()).V(3).Info("pre-filter canceled", "request", requestLogger(req))
rf.preFilterCompleted <- prefilterResult{err: err}
return
}

klog.FromContext(req.Context()).Error(err, "error running pre-filter", "request", req)
klog.FromContext(req.Context()).Error(err, "error running pre-filter", "request", requestLogger(req))
rf.preFilterCompleted <- prefilterResult{
err: err,
}
Expand Down
Loading