Skip to content

Commit c279a53

Browse files
committed
Optimize random string generator to avoid multiple locks & use bitmasking
1 parent 0564d52 commit c279a53

File tree

2 files changed

+41
-16
lines changed

2 files changed

+41
-16
lines changed

pkg/controller/serviceaccount/tokens_controller_test.go

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ func tokenSecretReferences() []v1.ObjectReference {
7373

7474
// addTokenSecretReference adds a reference to the ServiceAccountToken that will be created
7575
func addTokenSecretReference(refs []v1.ObjectReference) []v1.ObjectReference {
76-
return addNamedTokenSecretReference(refs, "default-token-stdpg")
76+
return addNamedTokenSecretReference(refs, "default-token-xn8fg")
7777
}
7878

7979
// addNamedTokenSecretReference adds a reference to the named ServiceAccountToken
@@ -118,9 +118,9 @@ func opaqueSecret() *v1.Secret {
118118
}
119119

120120
// createdTokenSecret returns the ServiceAccountToken secret posted when creating a new token secret.
121-
// Named "default-token-stdpg", since that is the first generated name after rand.Seed(1)
121+
// Named "default-token-xn8fg", since that is the first generated name after rand.Seed(1)
122122
func createdTokenSecret(overrideName ...string) *v1.Secret {
123-
return namedCreatedTokenSecret("default-token-stdpg")
123+
return namedCreatedTokenSecret("default-token-xn8fg")
124124
}
125125

126126
// namedTokenSecret returns the ServiceAccountToken secret posted when creating a new token secret with the given name.
@@ -264,12 +264,12 @@ func TestTokenCreation(t *testing.T) {
264264

265265
// Attempt 2
266266
core.NewGetAction(schema.GroupVersionResource{Version: "v1", Resource: "serviceaccounts"}, metav1.NamespaceDefault, "default"),
267-
core.NewCreateAction(schema.GroupVersionResource{Version: "v1", Resource: "secrets"}, metav1.NamespaceDefault, namedCreatedTokenSecret("default-token-jk9rt")),
267+
core.NewCreateAction(schema.GroupVersionResource{Version: "v1", Resource: "secrets"}, metav1.NamespaceDefault, namedCreatedTokenSecret("default-token-txhzt")),
268268

269269
// Attempt 3
270270
core.NewGetAction(schema.GroupVersionResource{Version: "v1", Resource: "serviceaccounts"}, metav1.NamespaceDefault, "default"),
271-
core.NewCreateAction(schema.GroupVersionResource{Version: "v1", Resource: "secrets"}, metav1.NamespaceDefault, namedCreatedTokenSecret("default-token-684pg")),
272-
core.NewUpdateAction(schema.GroupVersionResource{Version: "v1", Resource: "serviceaccounts"}, metav1.NamespaceDefault, serviceAccount(addNamedTokenSecretReference(emptySecretReferences(), "default-token-684pg"))),
271+
core.NewCreateAction(schema.GroupVersionResource{Version: "v1", Resource: "secrets"}, metav1.NamespaceDefault, namedCreatedTokenSecret("default-token-vnmz7")),
272+
core.NewUpdateAction(schema.GroupVersionResource{Version: "v1", Resource: "serviceaccounts"}, metav1.NamespaceDefault, serviceAccount(addNamedTokenSecretReference(emptySecretReferences(), "default-token-vnmz7"))),
273273
},
274274
},
275275
"new serviceaccount with no secrets encountering unending create error": {
@@ -293,10 +293,10 @@ func TestTokenCreation(t *testing.T) {
293293
core.NewCreateAction(schema.GroupVersionResource{Version: "v1", Resource: "secrets"}, metav1.NamespaceDefault, createdTokenSecret()),
294294
// Retry 1
295295
core.NewGetAction(schema.GroupVersionResource{Version: "v1", Resource: "serviceaccounts"}, metav1.NamespaceDefault, "default"),
296-
core.NewCreateAction(schema.GroupVersionResource{Version: "v1", Resource: "secrets"}, metav1.NamespaceDefault, namedCreatedTokenSecret("default-token-jk9rt")),
296+
core.NewCreateAction(schema.GroupVersionResource{Version: "v1", Resource: "secrets"}, metav1.NamespaceDefault, namedCreatedTokenSecret("default-token-txhzt")),
297297
// Retry 2
298298
core.NewGetAction(schema.GroupVersionResource{Version: "v1", Resource: "serviceaccounts"}, metav1.NamespaceDefault, "default"),
299-
core.NewCreateAction(schema.GroupVersionResource{Version: "v1", Resource: "secrets"}, metav1.NamespaceDefault, namedCreatedTokenSecret("default-token-684pg")),
299+
core.NewCreateAction(schema.GroupVersionResource{Version: "v1", Resource: "secrets"}, metav1.NamespaceDefault, namedCreatedTokenSecret("default-token-vnmz7")),
300300
},
301301
},
302302
"new serviceaccount with missing secrets": {

staging/src/k8s.io/apimachinery/pkg/util/rand/rand.go

Lines changed: 33 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -70,24 +70,49 @@ func Perm(n int) []int {
7070
return rng.rand.Perm(n)
7171
}
7272

73-
// We omit vowels from the set of available characters to reduce the chances
74-
// of "bad words" being formed.
75-
var alphanums = []rune("bcdfghjklmnpqrstvwxz2456789")
73+
const (
74+
// We omit vowels from the set of available characters to reduce the chances
75+
// of "bad words" being formed.
76+
alphanums = "bcdfghjklmnpqrstvwxz2456789"
77+
// No. of bits required to index into alphanums string.
78+
alphanumsIdxBits = 5
79+
// Mask used to extract last alphanumsIdxBits of an int.
80+
alphanumsIdxMask = 1<<alphanumsIdxBits - 1
81+
// No. of random letters we can extract from a single int63.
82+
maxAlphanumsPerInt = 63 / alphanumsIdxBits
83+
)
7684

7785
// String generates a random alphanumeric string, without vowels, which is n
7886
// characters long. This will panic if n is less than zero.
79-
func String(length int) string {
80-
b := make([]rune, length)
81-
for i := range b {
82-
b[i] = alphanums[Intn(len(alphanums))]
87+
// How the random string is created:
88+
// - we generate random int63's
89+
// - from each int63, we are extracting multiple random letters by bit-shifting and masking
90+
// - if some index is out of range of alphanums we neglect it (unlikely to happen multiple times in a row)
91+
func String(n int) string {
92+
b := make([]byte, n)
93+
rng.Lock()
94+
defer rng.Unlock()
95+
96+
randomInt63 := rng.rand.Int63()
97+
remaining := maxAlphanumsPerInt
98+
for i := 0; i < n; {
99+
if remaining == 0 {
100+
randomInt63, remaining = rng.rand.Int63(), maxAlphanumsPerInt
101+
}
102+
if idx := int(randomInt63 & alphanumsIdxMask); idx < len(alphanums) {
103+
b[i] = alphanums[idx]
104+
i++
105+
}
106+
randomInt63 >>= alphanumsIdxBits
107+
remaining--
83108
}
84109
return string(b)
85110
}
86111

87112
// SafeEncodeString encodes s using the same characters as rand.String. This reduces the chances of bad words and
88113
// ensures that strings generated from hash functions appear consistent throughout the API.
89114
func SafeEncodeString(s string) string {
90-
r := make([]rune, len(s))
115+
r := make([]byte, len(s))
91116
for i, b := range []rune(s) {
92117
r[i] = alphanums[(int(b) % len(alphanums))]
93118
}

0 commit comments

Comments
 (0)