EKS - Envoy 动态转发代理 CA 验证错误

EKS - Envoy dynamic forward proxy CA validation error

我正在尝试使用 envoy sidecar-containers 在 eks 中设置一个转发代理,它应该进行 TLS 发起; IE。特使从主容器获取 http 请求,执行 ssl 加密并使用文件 ca-certificates.crt 验证 ca。 envoy-configuration 基于官方文档(https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_filters/dynamic_forward_proxy_filter#config-http-filters-dynamic-forward-proxy).

特使将 ca 文件 ca-certificates.crt 从 aws secrets manager 挂载到 /etc/cert-volume/ca-certificates.crt,这似乎有效,因为该文件存在于容器中。

ca-certificates.crt 文件似乎也有效,因为来自我本地计算机 的以下命令 运行 给出了 HTTP 302找到(远程 wget 不支持 --ca-certificate 参数):

wget --ca-certificate=ca-certificates.crt  https://git.tech.rz.blub.de
--2021-04-26 11:03:16--  https://git.tech.rz.blub.de/
Loaded CA certificate 'ca-certificates.crt'
Resolving git.tech.rz.blub.de (git.tech.rz.blub.de)... 10.104.85.137, 10.104.84.192, 10.104.86.175
Connecting to git.tech.rz.blub.de (git.tech.rz.blub.de)|10.104.85.137|:443... connected.
HTTP request sent, awaiting response... 302 Found

当我在特使容器上打开 shell 并尝试通过代理发送 http 请求时,我收到 503 服务不可用:

export http_proxy="localhost:10000"
wget git.tech.rz.blub.de
Connecting to localhost:10000 (127.0.0.1:10000)
wget: server returned error: HTTP/1.1 503 Service Unavailable

如特使日志所示,请求已处理并且 DNS 解析成功,但是 ca 验证失败并出现错误 TLS 错误:268435581:SSL routines:OPENSSL_internal:CERTIFICATE_VERIFY_FAILED

可以在此处找到日志:https://pastebin.com/pUZZqhSA

完整的特使配置如下所示:

  admin:
  access_log_path: /dev/stdout
  address: 
    socket_address: {​ address: 127.0.0.1, port_value: 9901, protocol: TCP }​
static_resources:
  secrets:
  - name: server_cert
    tls_certificate:
      certificate_chain:
        filename: /etc/cert-volume/server.crt
      private_key:
        filename: /etc/cert-volume/server.key
  - name: validation_context
    validation_context:
      trusted_ca:
        filename: /etc/cert-volume/ca-certificates.crt
  listeners:
    - name: listener_incoming
      address:
        socket_address: {​ address: 0.0.0.0, port_value: 8443 }​
      filter_chains:
        filters:
          - name: envoy.filters.network.http_connection_manager
            typed_config:
              "@type": type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager
              stat_prefix: ingress_http
              route_config:
                name: local_route
                virtual_hosts:
                  - name: local_service
                    domains: ["*"]
                    routes:
                      - match: {​ prefix: "/config/" }​
                        route: {​ cluster: local_config }​
                      - match: {​ prefix: "/basic/" }​
                        route: {​ cluster: local }​
                      - match: {​ prefix: "/" }​
                        route: {​ cluster: local }​
              access_log:
              - name: envoy.access_loggers.file
                typed_config:
                  "@type": type.googleapis.com/envoy.extensions.access_loggers.file.v3.FileAccessLog
                  path: /dev/stdout
                  log_format:
                    json_format:
                      protocol: "%PROTOCOL%"
                      response_code: "%RESPONSE_CODE%"
                      response_code_details: "%RESPONSE_CODE_DETAILS%"
                      connection_termination_details: "%CONNECTION_TERMINATION_DETAILS%"
                      message: "%LOCAL_REPLY_BODY%"
                      response_flags: "%RESPONSE_FLAGS%"
                      local_reply_body: "%LOCAL_REPLY_BODY%"
              http_filters:
                  - name: envoy.filters.http.router
        transport_socket:
          name: envoy.transport_sockets.tls
          typed_config:
            "@type": type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.DownstreamTlsContext
            common_tls_context:
              tls_certificate_sds_secret_configs:
              - name: server_cert
    - name: listener_outgoing
      address:
        socket_address:
          address: 0.0.0.0
          port_value: 10000
      filter_chains:
      - filters:
        - name: envoy.filters.network.http_connection_manager
          typed_config:
            "@type": type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager
            codec_type: AUTO
            stat_prefix: http_to_https
            route_config:
              name: local_route
              virtual_hosts:
              - name: app
                domains:
                - "*"
                routes:
                - match:
                    prefix: "/"
                  route:
                    cluster: dynamic_forward_proxy_cluster
            http_filters:
            - name: envoy.filters.http.dynamic_forward_proxy
              typed_config:
                "@type": type.googleapis.com/envoy.extensions.filters.http.dynamic_forward_proxy.v3.FilterConfig
                dns_cache_config:
                  name: dynamic_forward_proxy_cache_config
                  dns_lookup_family: V4_ONLY
            - name: envoy.filters.http.router
              typed_config:
                "@type": type.googleapis.com/envoy.extensions.filters.http.router.v3.Router
  clusters:
  - name: local
    connect_timeout: 0.25s
    type: STATIC
    load_assignment:
      cluster_name: local
      endpoints:
        - lb_endpoints:
          - endpoint:
              address:
                socket_address:
                  address: 127.0.0.1
                  port_value: 8080
  - name: local_config
    connect_timeout: 0.25s
    type: STATIC
    load_assignment:
      cluster_name: local_config
      endpoints:
        - lb_endpoints:
          - endpoint:
              address:
                socket_address:
                  address: 127.0.0.1
                  port_value: 8081
  - name: dynamic_forward_proxy_cluster
    connect_timeout: 1s
    lb_policy: CLUSTER_PROVIDED
    cluster_type:
      name: envoy.clusters.dynamic_forward_proxy
      typed_config:
        "@type": type.googleapis.com/envoy.extensions.clusters.dynamic_forward_proxy.v3.ClusterConfig
        dns_cache_config:
          name: dynamic_forward_proxy_cache_config
          dns_lookup_family: V4_ONLY
    transport_socket:
      name: envoy.transport_sockets.tls
      typed_config:
        "@type": type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.UpstreamTlsContext
        common_tls_context:
          validation_context_sds_secret_config:
            name: validation_context

envoy-admin 端点显示,使用了正确的证书:

wget localhost:9901/certs
Connecting to localhost:9901 (127.0.0.1:9901)
saving to 'certs'
certs                100% |*********************************************|   710  0:00:00 ETA
'certs' saved
/ # cat certs
{​
 "certificates": [
  {​
   "ca_cert": [
    {​
     "path": "/etc/cert-volume/ca-certificates.crt",
     "serial_number": "612a55dd000000000002",
     "subject_alt_names": [],
     "days_until_expiration": "1305",
     "valid_from": "2013-11-21T15:40:58Z",
     "expiration_time": "2024-11-21T15:50:58Z"
    }​
   ],
   "cert_chain": []
  }​,
  {​
   "ca_cert": [],
   "cert_chain": [
    {​
     "path": "/etc/cert-volume/server.crt",
     "serial_number": "74af53b8463a1714",
     "subject_alt_names": [
      {​
       "dns": "*.test.comp.blub.de"
      }​
     ],
     "days_until_expiration": "173",
     "valid_from": "2019-10-18T07:10:38Z",
     "expiration_time": "2021-10-17T07:10:38Z"
    }​
   ]
  }​
 ]
}​

有没有人知道,这里出了什么问题?

问题已解决。 ca-certificates.crt 缺少必需的 CA。我不知道为什么 wget 没有抛出异常,但是 openssl 抛出异常...