Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

agent: only enable TLS on gRPC if the HTTPS API port is enabled #5287

Merged
merged 2 commits into from
Feb 13, 2019
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 5 additions & 1 deletion agent/agent.go
Original file line number Diff line number Diff line change
Expand Up @@ -523,7 +523,11 @@ func (a *Agent) listenAndServeGRPC() error {
ResolveToken: a.resolveToken,
}
var err error
a.grpcServer, err = a.xdsServer.GRPCServer(a.config.CertFile, a.config.KeyFile)
if a.config.InsecureGRPC {
a.grpcServer, err = a.xdsServer.GRPCServer("", "")
} else {
a.grpcServer, err = a.xdsServer.GRPCServer(a.config.CertFile, a.config.KeyFile)
}
if err != nil {
return err
}
Expand Down
1 change: 1 addition & 0 deletions agent/config/builder.go
Original file line number Diff line number Diff line change
Expand Up @@ -801,6 +801,7 @@ func (b *Builder) Build() (rt RuntimeConfig, err error) {
EncryptVerifyOutgoing: b.boolVal(c.EncryptVerifyOutgoing),
GRPCPort: grpcPort,
GRPCAddrs: grpcAddrs,
InsecureGRPC: b.boolVal(c.InsecureGRPC),
KeyFile: b.stringVal(c.KeyFile),
LeaveDrainTime: b.durationVal("performance.leave_drain_time", c.Performance.LeaveDrainTime),
LeaveOnTerm: leaveOnTerm,
Expand Down
1 change: 1 addition & 0 deletions agent/config/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -211,6 +211,7 @@ type Config struct {
GossipLAN GossipLANConfig `json:"gossip_lan,omitempty" hcl:"gossip_lan" mapstructure:"gossip_lan"`
GossipWAN GossipWANConfig `json:"gossip_wan,omitempty" hcl:"gossip_wan" mapstructure:"gossip_wan"`
HTTPConfig HTTPConfig `json:"http_config,omitempty" hcl:"http_config" mapstructure:"http_config"`
InsecureGRPC *bool `json:"insecure_grpc,omitempty" hcl:"insecure_grpc" mapstructure:"insecure_grpc"`
KeyFile *string `json:"key_file,omitempty" hcl:"key_file" mapstructure:"key_file"`
LeaveOnTerm *bool `json:"leave_on_terminate,omitempty" hcl:"leave_on_terminate" mapstructure:"leave_on_terminate"`
Limits Limits `json:"limits,omitempty" hcl:"limits" mapstructure:"limits"`
Expand Down
6 changes: 6 additions & 0 deletions agent/config/runtime.go
Original file line number Diff line number Diff line change
Expand Up @@ -775,6 +775,12 @@ type RuntimeConfig struct {
// hcl: ports { https = int }
HTTPSPort int

// InsecureGRPC is used to disable TLS for localhost gRPC even if TLS
// certs are present for other reasons.
//
// hcl: insecure_grpc = (true|false)
InsecureGRPC bool

// KeyFile is used to provide a TLS key that is used for serving TLS
// connections. Must be provided to serve TLS connections.
//
Expand Down
4 changes: 4 additions & 0 deletions agent/config/runtime_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -3085,6 +3085,7 @@ func TestFullConfig(t *testing.T) {
"JRCrHZed": "rl0mTx81"
}
},
"insecure_grpc": true,
"key_file": "IEkkwgIA",
"leave_on_terminate": true,
"limits": {
Expand Down Expand Up @@ -3638,6 +3639,7 @@ func TestFullConfig(t *testing.T) {
"JRCrHZed" = "rl0mTx81"
}
}
insecure_grpc = true
key_file = "IEkkwgIA"
leave_on_terminate = true
limits {
Expand Down Expand Up @@ -4274,6 +4276,7 @@ func TestFullConfig(t *testing.T) {
GRPCAddrs: []net.Addr{tcpAddr("32.31.61.91:4881")},
HTTPAddrs: []net.Addr{tcpAddr("83.39.91.39:7999")},
HTTPBlockEndpoints: []string{"RBvAFcGD", "fWOWFznh"},
InsecureGRPC: true,
AllowWriteHTTPFrom: []*net.IPNet{cidr("127.0.0.0/8"), cidr("22.33.44.55/32"), cidr("0.0.0.0/0")},
HTTPPort: 7999,
HTTPResponseHeaders: map[string]string{"M6TKa9NP": "xjuxjOzQ", "JRCrHZed": "rl0mTx81"},
Expand Down Expand Up @@ -5075,6 +5078,7 @@ func TestSanitize(t *testing.T) {
"HTTPResponseHeaders": {},
"HTTPSAddrs": [],
"HTTPSPort": 0,
"InsecureGRPC": false,
"KeyFile": "hidden",
"LeaveDrainTime": "0s",
"LeaveOnTerm": false,
Expand Down
7 changes: 7 additions & 0 deletions website/source/docs/agent/options.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -1193,6 +1193,13 @@ default will automatically work with some tooling.
cluster before declaring it dead, giving that suspect node more time to refute if it is indeed still alive. The
default is 4.

* <a name="insecure_grpc"></a><a href="#insecure_grpc">`insecure_grpc`</a> If
set to `true` this setting will ensure the gRPC server does not use the
[`key_file`](#key_file) and [`cert_file`](#cert_file) settings to encrypt
communications with TLS. This should only be used if the gRPC server is bound
to a local address such as "127.0.0.1" where traffic interception is
unlikely.

* <a name="key_file"></a><a href="#key_file">`key_file`</a> This provides a the file path to a
PEM-encoded private key. The key is used with the certificate to verify the agent's authenticity.
This must be provided along with [`cert_file`](#cert_file).
Expand Down