We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
When a 3rd party attempts to use client-certificate authentication, kube-rbac-proxy will panic if it does not have any client CAs configured.
The observed panic:
goroutine 7 [running]: net/http.(*conn).serve.func1(0xc00041e000) /usr/lib/golang/src/net/http/server.go:1824 +0x153 panic(0x1585460, 0x22749a0) /usr/lib/golang/src/runtime/panic.go:971 +0x499 k8s.io/apiserver/pkg/server/dynamiccertificates.(*DynamicFileCAContent).VerifyOptions(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ...) /go/src/github.com/brancz/kube-rbac-proxy/vendor/k8s.io/apiserver/pkg/server/dynamiccertificates/dynamic_cafile_content.go:220 +0x58 k8s.io/apiserver/pkg/authentication/request/x509.(*Authenticator).AuthenticateRequest(0xc000504738, 0xc00042c200, 0xa65, 0x418b00, 0x0, 0x0) /go/src/github.com/brancz/kube-rbac-proxy/vendor/k8s.io/apiserver/pkg/authentication/request/x509/x509.go:116 +0x87 k8s.io/apiserver/pkg/authentication/request/union.(*unionAuthRequestHandler).AuthenticateRequest(0xc00004bb60, 0xc00042c200, 0x414688, 0xc0000197c8, 0x249a006a, 0x31b6d74a11797403) /go/src/github.com/brancz/kube-rbac-proxy/vendor/k8s.io/apiserver/pkg/authentication/request/union/union.go:56 +0xa8 k8s.io/apiserver/pkg/authentication/group.(*AuthenticatedGroupAdder).AuthenticateRequest(0xc000631e80, 0xc00042c200, 0xc0000198e8, 0x14, 0x20, 0x1) /go/src/github.com/brancz/kube-rbac-proxy/vendor/k8s.io/apiserver/pkg/authentication/group/authenticated_group_adder.go:40 +0x55 github.com/brancz/kube-rbac-proxy/pkg/authn.(*DelegatingAuthenticator).AuthenticateRequest(0xc000504750, 0xc00042c200, 0xc0000198e8, 0xc0000198fb, 0xc0000198c0, 0xc0000198d0) /go/src/github.com/brancz/kube-rbac-proxy/pkg/authn/delegating.go:69 +0x3e github.com/brancz/kube-rbac-proxy/pkg/proxy.(*kubeRBACProxy).Handle(0xc000115780, 0x192dbb0, 0xc0005362a0, 0xc00042c200, 0x17ec5b8) /go/src/github.com/brancz/kube-rbac-proxy/pkg/proxy/proxy.go:71 +0xa3 main.main.func1(0x192dbb0, 0xc0005362a0, 0xc00042c200) /go/src/github.com/brancz/kube-rbac-proxy/main.go:250 +0x132 net/http.HandlerFunc.ServeHTTP(0xc00004bbe0, 0x192dbb0, 0xc0005362a0, 0xc00042c200) /usr/lib/golang/src/net/http/server.go:2069 +0x44 net/http.(*ServeMux).ServeHTTP(0xc0001157c0, 0x192dbb0, 0xc0005362a0, 0xc00042c200) /usr/lib/golang/src/net/http/server.go:2448 +0x1ad net/http.serverHandler.ServeHTTP(0xc0005369a0, 0x192dbb0, 0xc0005362a0, 0xc00042c200) /usr/lib/golang/src/net/http/server.go:2887 +0xa3 net/http.(*conn).serve(0xc00041e000, 0x1930020, 0xc000474d00) /usr/lib/golang/src/net/http/server.go:1952 +0x8cd created by net/http.(*Server).Serve /usr/lib/golang/src/net/http/server.go:3013 +0x39b 2021/07/14 10:05:45 http: panic serving 10.128.2.12:51994: runtime error: invalid memory address or nil pointer dereference
The text was updated successfully, but these errors were encountered:
Good catch! I came to the same conclusion while investigating the failures but you were faster :)
Sorry, something went wrong.
Successfully merging a pull request may close this issue.
When a 3rd party attempts to use client-certificate authentication, kube-rbac-proxy will panic if it does not have any client CAs configured.
The observed panic:
The text was updated successfully, but these errors were encountered: