Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: rate limit keycloak API access #354

Merged
merged 1 commit into from
Jan 18, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 8 additions & 4 deletions cmd/ssh-portal-api/serve.go
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,7 @@ type ServeCmd struct {
KeycloakBaseURL string `kong:"required,env='KEYCLOAK_BASE_URL',help='Keycloak Base URL'"`
KeycloakClientID string `kong:"default='service-api',env='KEYCLOAK_SERVICE_API_CLIENT_ID',help='Keycloak OAuth2 Client ID'"`
KeycloakClientSecret string `kong:"required,env='KEYCLOAK_SERVICE_API_CLIENT_SECRET',help='Keycloak OAuth2 Client Secret'"`
KeycloakRateLimit int `kong:"default=10,env='KEYCLOAK_RATE_LIMIT',help='Keycloak API Rate Limit (requests/second)'"`
NATSURL string `kong:"required,env='NATS_URL',help='NATS server URL (nats://... or tls://...)'"`
}

Expand Down Expand Up @@ -53,13 +54,16 @@ func (cmd *ServeCmd) Run(log *slog.Logger) error {
dbConf.User = cmd.APIDBUsername
l, err := lagoondb.NewClient(ctx, dbConf.FormatDSN())
if err != nil {
return fmt.Errorf("couldn't init lagoon DBClient: %v", err)
return fmt.Errorf("couldn't init lagoondb client: %v", err)
}
// init keycloak client
k, err := keycloak.NewClient(ctx, log, cmd.KeycloakBaseURL,
cmd.KeycloakClientID, cmd.KeycloakClientSecret)
k, err := keycloak.NewClient(ctx, log,
cmd.KeycloakBaseURL,
cmd.KeycloakClientID,
cmd.KeycloakClientSecret,
cmd.KeycloakRateLimit)
if err != nil {
return fmt.Errorf("couldn't init keycloak Client: %v", err)
return fmt.Errorf("couldn't init keycloak client: %v", err)
}
// start serving NATS requests
return sshportalapi.ServeNATS(ctx, stop, log, p, l, k, cmd.NATSURL)
Expand Down
15 changes: 11 additions & 4 deletions cmd/ssh-token/serve.go
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ type ServeCmd struct {
KeycloakBaseURL string `kong:"required,env='KEYCLOAK_BASE_URL',help='Keycloak Base URL'"`
KeycloakPermissionClientID string `kong:"default='service-api',env='KEYCLOAK_SERVICE_API_CLIENT_ID',help='Keycloak service-api OAuth2 Client ID'"`
KeycloakPermissionClientSecret string `kong:"env='KEYCLOAK_SERVICE_API_CLIENT_SECRET',help='Keycloak service-api OAuth2 Client Secret'"`
KeycloakRateLimit int `kong:"default=10,env='KEYCLOAK_RATE_LIMIT',help='Keycloak API Rate Limit (requests/second)'"`
KeycloakTokenClientID string `kong:"default='auth-server',env='KEYCLOAK_AUTH_SERVER_CLIENT_ID',help='Keycloak auth-server OAuth2 Client ID'"`
KeycloakTokenClientSecret string `kong:"required,env='KEYCLOAK_AUTH_SERVER_CLIENT_SECRET',help='Keycloak auth-server OAuth2 Client Secret'"`
SSHServerPort uint `kong:"default='2222',env='SSH_SERVER_PORT',help='Port the SSH server will listen on for SSH client connections'"`
Expand Down Expand Up @@ -62,14 +63,20 @@ func (cmd *ServeCmd) Run(log *slog.Logger) error {
return fmt.Errorf("couldn't init lagoonDB client: %v", err)
}
// init token / auth-server keycloak client
keycloakToken, err := keycloak.NewClient(ctx, log, cmd.KeycloakBaseURL,
cmd.KeycloakTokenClientID, cmd.KeycloakTokenClientSecret)
keycloakToken, err := keycloak.NewClient(ctx, log,
cmd.KeycloakBaseURL,
cmd.KeycloakTokenClientID,
cmd.KeycloakTokenClientSecret,
cmd.KeycloakRateLimit)
if err != nil {
return fmt.Errorf("couldn't init keycloak token client: %v", err)
}
// init permission / service-api keycloak client
keycloakPermission, err := keycloak.NewClient(ctx, log, cmd.KeycloakBaseURL,
cmd.KeycloakPermissionClientID, cmd.KeycloakPermissionClientSecret)
keycloakPermission, err := keycloak.NewClient(ctx, log,
cmd.KeycloakBaseURL,
cmd.KeycloakPermissionClientID,
cmd.KeycloakPermissionClientSecret,
cmd.KeycloakRateLimit)
if err != nil {
return fmt.Errorf("couldn't init keycloak permission client: %v", err)
}
Expand Down
2 changes: 1 addition & 1 deletion go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ require (
golang.org/x/exp v0.0.0-20230817173708-d852ddb80c63
golang.org/x/oauth2 v0.16.0
golang.org/x/sync v0.6.0
golang.org/x/time v0.3.0
k8s.io/api v0.29.0
k8s.io/apimachinery v0.29.0
k8s.io/client-go v0.29.0
Expand Down Expand Up @@ -71,7 +72,6 @@ require (
golang.org/x/sys v0.16.0 // indirect
golang.org/x/term v0.16.0 // indirect
golang.org/x/text v0.14.0 // indirect
golang.org/x/time v0.3.0 // indirect
google.golang.org/appengine v1.6.7 // indirect
google.golang.org/protobuf v1.31.0 // indirect
gopkg.in/inf.v0 v0.9.1 // indirect
Expand Down
5 changes: 4 additions & 1 deletion internal/keycloak/client.go
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,7 @@ import (
"github.com/MicahParks/keyfunc/v2"
oidcClient "github.com/zitadel/oidc/v3/pkg/client"
"github.com/zitadel/oidc/v3/pkg/oidc"
"golang.org/x/time/rate"
)

const pkgName = "github.com/uselagoon/ssh-portal/internal/keycloak"
Expand All @@ -25,11 +26,12 @@ type Client struct {
jwks *keyfunc.JWKS
log *slog.Logger
oidcConfig *oidc.DiscoveryConfiguration
limiter *rate.Limiter
}

// NewClient creates a new keycloak client for the lagoon realm.
func NewClient(ctx context.Context, log *slog.Logger, keycloakURL, clientID,
clientSecret string) (*Client, error) {
clientSecret string, rateLimit int) (*Client, error) {
// discover OIDC config
issuerURL, err := url.Parse(keycloakURL)
if err != nil {
Expand All @@ -53,5 +55,6 @@ func NewClient(ctx context.Context, log *slog.Logger, keycloakURL, clientID,
jwks: jwks,
log: log,
oidcConfig: oidcConfig,
limiter: rate.NewLimiter(rate.Limit(rateLimit), rateLimit),
}, nil
}
2 changes: 1 addition & 1 deletion internal/keycloak/jwt_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -261,7 +261,7 @@ func TestValidateTokenClaims(t *testing.T) {
// NOTE: client secret is empty because it isn't used in this test, but
// client ID is checked against azp in the token.
k, err := keycloak.NewClient(context.Background(), log, ts.URL,
"auth-server", "")
"auth-server", "", 10)
if err != nil {
tt.Fatal(err)
}
Expand Down
8 changes: 8 additions & 0 deletions internal/keycloak/useraccesstoken.go
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,10 @@ func (c *Client) UserAccessTokenResponse(ctx context.Context,
// set up tracing
ctx, span := otel.Tracer(pkgName).Start(ctx, "UserAccessToken")
defer span.End()
// rate limit keycloak API access
if err := c.limiter.Wait(ctx); err != nil {
return "", fmt.Errorf("couldn't wait for limiter: %v", err)
}
// get user token
userToken, err := c.getUserToken(ctx, userUUID)
if err != nil {
Expand All @@ -74,6 +78,10 @@ func (c *Client) UserAccessToken(ctx context.Context,
// set up tracing
ctx, span := otel.Tracer(pkgName).Start(ctx, "UserAccessToken")
defer span.End()
// rate limit keycloak API access
if err := c.limiter.Wait(ctx); err != nil {
return "", fmt.Errorf("couldn't wait for limiter: %v", err)
}
// get user token
userToken, err := c.getUserToken(ctx, userUUID)
if err != nil {
Expand Down
4 changes: 4 additions & 0 deletions internal/keycloak/userrolesandgroups.go
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,10 @@ func (c *Client) UserRolesAndGroups(ctx context.Context,
// set up tracing
ctx, span := otel.Tracer(pkgName).Start(ctx, "UserRolesAndGroups")
defer span.End()
// rate limit keycloak API access
if err := c.limiter.Wait(ctx); err != nil {
return nil, nil, nil, fmt.Errorf("couldn't wait for limiter: %v", err)
}
// get user token
userConfig := oauth2.Config{
ClientID: c.clientID,
Expand Down
Loading