zrok/endpoints/publicProxy/http.go

450 lines
15 KiB
Go
Raw Normal View History

package publicProxy
2022-07-19 22:15:54 +02:00
import (
2022-08-10 21:15:35 +02:00
"context"
"crypto/md5"
2022-08-10 21:15:35 +02:00
"fmt"
2024-02-07 20:39:34 +01:00
"github.com/gobwas/glob"
2023-09-05 18:50:41 +02:00
"github.com/golang-jwt/jwt/v5"
2022-07-20 20:16:01 +02:00
"github.com/openziti/sdk-golang/ziti"
"github.com/openziti/zrok/endpoints"
"github.com/openziti/zrok/endpoints/publicProxy/healthUi"
2024-07-23 19:39:17 +02:00
"github.com/openziti/zrok/endpoints/publicProxy/interstitialUi"
"github.com/openziti/zrok/endpoints/publicProxy/notFoundUi"
2023-09-05 18:50:41 +02:00
"github.com/openziti/zrok/endpoints/publicProxy/unauthorizedUi"
"github.com/openziti/zrok/environment"
2023-11-21 20:27:17 +01:00
"github.com/openziti/zrok/sdk/golang/sdk"
"github.com/openziti/zrok/util"
2022-07-20 20:16:01 +02:00
"github.com/pkg/errors"
"github.com/sirupsen/logrus"
"net"
"net/http"
"net/http/httputil"
"net/url"
"strings"
2023-09-05 16:55:55 +02:00
"time"
2022-07-19 22:15:54 +02:00
)
type HttpFrontend struct {
2022-08-18 22:57:38 +02:00
cfg *Config
zCtx ziti.Context
handler http.Handler
}
func NewHTTP(cfg *Config) (*HttpFrontend, error) {
var key []byte
if cfg.Oauth != nil {
hash := md5.New()
2023-10-05 19:34:27 +02:00
n, err := hash.Write([]byte(cfg.Oauth.HashKey))
if err != nil {
return nil, err
}
2023-10-05 19:34:27 +02:00
if n != len(cfg.Oauth.HashKey) {
return nil, errors.New("short hash")
}
key = hash.Sum(nil)
}
root, err := environment.LoadRoot()
if err != nil {
return nil, errors.Wrap(err, "error loading environment root")
}
zCfgPath, err := root.ZitiIdentityNamed(cfg.Identity)
if err != nil {
2023-07-10 22:41:16 +02:00
return nil, errors.Wrapf(err, "error getting ziti identity '%v' from environment", cfg.Identity)
}
2023-05-25 17:50:38 +02:00
zCfg, err := ziti.NewConfigFromFile(zCfgPath)
2022-07-20 20:16:01 +02:00
if err != nil {
2022-08-18 22:57:38 +02:00
return nil, errors.Wrap(err, "error loading config")
2022-07-20 20:16:01 +02:00
}
zCfg.ConfigTypes = []string{sdk.ZrokProxyConfig}
2023-05-25 17:50:38 +02:00
zCtx, err := ziti.NewContext(zCfg)
if err != nil {
return nil, errors.Wrap(err, "error loading ziti context")
}
zDialCtx := zitiDialContext{ctx: zCtx}
2022-07-21 21:26:44 +02:00
zTransport := http.DefaultTransport.(*http.Transport).Clone()
zTransport.DialContext = zDialCtx.Dial
2022-07-21 21:46:14 +02:00
proxy, err := newServiceProxy(cfg, zCtx)
2022-07-20 20:36:14 +02:00
if err != nil {
2022-08-18 22:57:38 +02:00
return nil, err
2022-07-20 20:36:14 +02:00
}
2022-07-21 21:46:14 +02:00
proxy.Transport = zTransport
if err := configureOauthHandlers(context.Background(), cfg, cfg.Tls != nil); err != nil {
2023-09-05 16:55:55 +02:00
return nil, err
}
2024-07-22 18:34:42 +02:00
handler := shareHandler(util.NewRequestsWrapper(proxy), cfg, key, zCtx)
return &HttpFrontend{
2022-08-18 22:57:38 +02:00
cfg: cfg,
zCtx: zCtx,
handler: handler,
}, nil
}
2023-10-05 19:34:27 +02:00
func (f *HttpFrontend) Run() error {
if f.cfg.Tls != nil {
return http.ListenAndServeTLS(f.cfg.Address, f.cfg.Tls.CertPath, f.cfg.Tls.KeyPath, f.handler)
}
2023-10-05 19:34:27 +02:00
return http.ListenAndServe(f.cfg.Address, f.handler)
}
2022-08-10 21:15:35 +02:00
2022-08-18 23:09:38 +02:00
type zitiDialContext struct {
ctx ziti.Context
2022-08-10 21:15:35 +02:00
}
2023-10-05 19:34:27 +02:00
func (c *zitiDialContext) Dial(_ context.Context, _ string, addr string) (net.Conn, error) {
2023-01-04 20:42:58 +01:00
shrToken := strings.Split(addr, ":")[0] // ignore :port (we get passed 'host:port')
2023-10-05 19:34:27 +02:00
conn, err := c.ctx.Dial(shrToken)
if err != nil {
return conn, err
}
return conn, nil
2022-08-10 21:15:35 +02:00
}
func newServiceProxy(cfg *Config, ctx ziti.Context) (*httputil.ReverseProxy, error) {
proxy := hostTargetReverseProxy(cfg, ctx)
2022-08-10 21:15:35 +02:00
director := proxy.Director
proxy.Director = func(req *http.Request) {
director(req)
req.Header.Set("X-Proxy", "zrok")
}
proxy.ModifyResponse = func(resp *http.Response) error {
return nil
}
proxy.ErrorHandler = func(w http.ResponseWriter, r *http.Request, err error) {
logrus.Errorf("error proxying: %v", err)
2022-12-14 20:41:54 +01:00
notFoundUi.WriteNotFound(w)
2022-08-10 21:15:35 +02:00
}
return proxy, nil
}
func hostTargetReverseProxy(cfg *Config, ctx ziti.Context) *httputil.ReverseProxy {
2022-08-10 21:15:35 +02:00
director := func(req *http.Request) {
2023-01-04 20:42:58 +01:00
targetShrToken := resolveService(cfg.HostMatch, req.Host)
if svc, found := endpoints.GetRefreshedService(targetShrToken, ctx); found {
if cfg, found := svc.Config[sdk.ZrokProxyConfig]; found {
logrus.Debugf("auth model: %v", cfg)
2022-08-10 21:15:35 +02:00
} else {
2022-08-15 23:52:24 +02:00
logrus.Warn("no config!")
2022-08-10 21:15:35 +02:00
}
2023-01-04 20:42:58 +01:00
if target, err := url.Parse(fmt.Sprintf("http://%v", targetShrToken)); err == nil {
logrus.Infof("[%v] -> %v", targetShrToken, req.URL)
2022-08-15 23:52:24 +02:00
targetQuery := target.RawQuery
req.URL.Scheme = target.Scheme
req.URL.Host = target.Host
req.URL.Path, req.URL.RawPath = endpoints.JoinURLPath(target, req.URL)
2022-08-15 23:52:24 +02:00
if targetQuery == "" || req.URL.RawQuery == "" {
req.URL.RawQuery = targetQuery + req.URL.RawQuery
} else {
req.URL.RawQuery = targetQuery + "&" + req.URL.RawQuery
}
if _, ok := req.Header["User-Agent"]; !ok {
// explicitly disable User-Agent so it's not set to default value
req.Header.Set("User-Agent", "")
}
} else {
logrus.Errorf("error proxying: %v", err)
2022-08-10 21:15:35 +02:00
}
}
}
return &httputil.ReverseProxy{Director: director}
}
2024-07-22 18:34:42 +02:00
func shareHandler(handler http.Handler, pcfg *Config, key []byte, ctx ziti.Context) http.HandlerFunc {
2022-08-16 17:27:31 +02:00
return func(w http.ResponseWriter, r *http.Request) {
2023-09-05 16:55:55 +02:00
shrToken := resolveService(pcfg.HostMatch, r.Host)
2023-01-04 20:42:58 +01:00
if shrToken != "" {
if svc, found := endpoints.GetRefreshedService(shrToken, ctx); found {
if cfg, found := svc.Config[sdk.ZrokProxyConfig]; found {
if pcfg.Interstitial != nil && pcfg.Interstitial.Enabled {
sendInterstitial := true
if len(pcfg.Interstitial.UserAgentPrefixes) > 0 {
ua := r.Header.Get("User-Agent")
matched := false
for _, prefix := range pcfg.Interstitial.UserAgentPrefixes {
if strings.HasPrefix(ua, prefix) {
matched = true
break
}
}
if !matched {
sendInterstitial = false
}
}
if sendInterstitial {
if v, istlFound := cfg["interstitial"]; istlFound {
if istlEnabled, ok := v.(bool); ok && istlEnabled {
skip := r.Header.Get("skip_zrok_interstitial")
_, zrokOkErr := r.Cookie("zrok_interstitial")
if skip == "" && zrokOkErr != nil {
logrus.Debugf("forcing interstitial for '%v'", r.URL)
interstitialUi.WriteInterstitialAnnounce(w, pcfg.Interstitial.HtmlPath)
return
}
2024-07-24 16:47:12 +02:00
}
}
}
2024-07-23 19:39:17 +02:00
}
if scheme, found := cfg["auth_scheme"]; found {
switch scheme {
case string(sdk.None):
2023-01-04 20:42:58 +01:00
logrus.Debugf("auth scheme none '%v'", shrToken)
// ensure cookies from other shares are not sent to this share, in case it's malicious
deleteZrokCookies(w, r)
handler.ServeHTTP(w, r)
return
case string(sdk.Basic):
2023-01-04 20:42:58 +01:00
logrus.Debugf("auth scheme basic '%v", shrToken)
inUser, inPass, ok := r.BasicAuth()
if !ok {
basicAuthRequired(w, shrToken)
return
}
authed := false
if v, found := cfg["basic_auth"]; found {
if basicAuth, ok := v.(map[string]interface{}); ok {
if v, found := basicAuth["users"]; found {
if arr, ok := v.([]interface{}); ok {
for _, v := range arr {
if um, ok := v.(map[string]interface{}); ok {
username := ""
if v, found := um["username"]; found {
if un, ok := v.(string); ok {
username = un
}
}
password := ""
if v, found := um["password"]; found {
if pw, ok := v.(string); ok {
password = pw
}
}
if username == inUser && password == inPass {
authed = true
break
}
}
}
}
}
}
}
if !authed {
basicAuthRequired(w, shrToken)
return
}
2022-09-07 18:22:22 +02:00
// ensure cookies from other shares are not sent to this share, in case it's malicious
deleteZrokCookies(w, r)
handler.ServeHTTP(w, r)
2023-09-05 17:10:25 +02:00
case string(sdk.Oauth):
logrus.Debugf("auth scheme oauth '%v'", shrToken)
2023-09-05 16:55:55 +02:00
if oauthCfg, found := cfg["oauth"]; found {
if provider, found := oauthCfg.(map[string]interface{})["provider"]; found {
2023-09-05 18:50:41 +02:00
var authCheckInterval time.Duration
if checkInterval, found := oauthCfg.(map[string]interface{})["authorization_check_interval"]; !found {
2023-12-15 18:15:40 +01:00
logrus.Errorf("missing authorization check interval in share config. Defaulting to 3 hours")
2023-09-05 18:50:41 +02:00
authCheckInterval = 3 * time.Hour
} else {
i, err := time.ParseDuration(checkInterval.(string))
if err != nil {
logrus.Errorf("unable to parse authorization check interval in share config (%v). Defaulting to 3 hours", checkInterval)
authCheckInterval = 3 * time.Hour
} else {
authCheckInterval = i
}
}
target := fmt.Sprintf("%s%s", r.Host, r.URL.Path)
2023-09-05 16:55:55 +02:00
cookie, err := r.Cookie("zrok-access")
if err != nil {
logrus.Errorf("unable to get 'zrok-access' cookie: %v", err)
oauthLoginRequired(w, r, pcfg.Oauth, provider.(string), target, authCheckInterval)
2023-09-05 16:55:55 +02:00
return
}
tkn, err := jwt.ParseWithClaims(cookie.Value, &ZrokClaims{}, func(t *jwt.Token) (interface{}, error) {
if pcfg.Oauth == nil {
return nil, fmt.Errorf("missing oauth configuration for access point; unable to parse jwt")
2023-09-05 16:55:55 +02:00
}
return key, nil
2023-09-05 16:55:55 +02:00
})
if err != nil {
logrus.Errorf("unable to parse jwt: %v", err)
oauthLoginRequired(w, r, pcfg.Oauth, provider.(string), target, authCheckInterval)
2023-09-05 16:55:55 +02:00
return
}
claims := tkn.Claims.(*ZrokClaims)
if claims.Provider != provider {
logrus.Error("provider mismatch; restarting auth flow")
oauthLoginRequired(w, r, pcfg.Oauth, provider.(string), target, authCheckInterval)
2023-09-05 16:55:55 +02:00
return
}
if claims.AuthorizationCheckInterval != authCheckInterval {
logrus.Error("authorization check interval mismatch; restarting auth flow")
oauthLoginRequired(w, r, pcfg.Oauth, provider.(string), target, authCheckInterval)
2023-09-05 16:55:55 +02:00
return
}
if claims.Audience != r.Host {
logrus.Errorf("audience claim '%s' does not match requested host '%s'; restarting auth flow", claims.Audience, r.Host)
oauthLoginRequired(w, r, pcfg.Oauth, provider.(string), target, authCheckInterval)
return
}
if validEmailAddressPatterns, found := oauthCfg.(map[string]interface{})["email_domains"]; found {
if castedPatterns, ok := validEmailAddressPatterns.([]interface{}); !ok {
logrus.Error("invalid email pattern array format")
2023-09-05 16:55:55 +02:00
return
} else {
if len(castedPatterns) > 0 {
2023-09-05 16:55:55 +02:00
found := false
for _, pattern := range castedPatterns {
if castedPattern, ok := pattern.(string); ok {
match, err := glob.Compile(castedPattern)
if err != nil {
logrus.Errorf("invalid email address pattern glob '%v': %v", pattern.(string), err)
unauthorizedUi.WriteUnauthorized(w)
return
}
if match.Match(claims.Email) {
found = true
break
}
} else {
logrus.Errorf("invalid email address pattern '%v'", pattern)
unauthorizedUi.WriteUnauthorized(w)
return
}
2023-09-05 16:55:55 +02:00
}
if !found {
logrus.Warnf("unauthorized email '%v' for '%v'", claims.Email, shrToken)
2023-09-05 16:55:55 +02:00
unauthorizedUi.WriteUnauthorized(w)
return
}
}
}
}
handler.ServeHTTP(w, r)
return
2023-09-05 16:55:55 +02:00
} else {
logrus.Warnf("%v -> no provider for '%v'", r.RemoteAddr, provider)
notFoundUi.WriteNotFound(w)
}
} else {
logrus.Warnf("%v -> no oauth cfg for '%v'", r.RemoteAddr, shrToken)
notFoundUi.WriteNotFound(w)
}
default:
logrus.Infof("invalid auth scheme '%v'", scheme)
basicAuthRequired(w, shrToken)
return
}
} else {
2023-01-04 20:42:58 +01:00
logrus.Warnf("%v -> no auth scheme for '%v'", r.RemoteAddr, shrToken)
2022-12-14 20:41:54 +01:00
notFoundUi.WriteNotFound(w)
}
} else {
2023-01-04 20:42:58 +01:00
logrus.Warnf("%v -> no proxy config for '%v'", r.RemoteAddr, shrToken)
2022-12-14 20:41:54 +01:00
notFoundUi.WriteNotFound(w)
}
} else {
2023-01-04 20:42:58 +01:00
logrus.Warnf("%v -> service '%v' not found", r.RemoteAddr, shrToken)
2022-12-14 20:41:54 +01:00
notFoundUi.WriteNotFound(w)
2022-08-16 17:27:31 +02:00
}
} else {
2022-09-09 16:01:24 +02:00
logrus.Debugf("host '%v' did not match host match, returning health check", r.Host)
2022-12-14 20:41:54 +01:00
healthUi.WriteHealthOk(w)
2022-08-16 17:27:31 +02:00
}
}
}
2023-09-05 16:55:55 +02:00
type ZrokClaims struct {
Email string `json:"email"`
AccessToken string `json:"accessToken"`
Provider string `json:"provider"`
Audience string `json:"aud"`
2023-09-05 16:55:55 +02:00
AuthorizationCheckInterval time.Duration `json:"authorizationCheckInterval"`
jwt.RegisteredClaims
}
func SetZrokCookie(w http.ResponseWriter, cookieDomain, email, accessToken, provider string, checkInterval time.Duration, key []byte, targetHost string) {
targetHost = strings.TrimSpace(targetHost)
if targetHost == "" {
logrus.Error("host claim must not be empty")
http.Error(w, "host claim must not be empty", http.StatusBadRequest)
return
}
targetHost = strings.Split(targetHost, "/")[0]
logrus.Debugf("setting zrok-access cookie JWT audience '%s'", targetHost)
2023-09-05 16:55:55 +02:00
tkn := jwt.NewWithClaims(jwt.SigningMethodHS256, ZrokClaims{
Email: email,
AccessToken: accessToken,
Provider: provider,
Audience: targetHost,
2023-09-05 16:55:55 +02:00
AuthorizationCheckInterval: checkInterval,
})
sTkn, err := tkn.SignedString(key)
if err != nil {
http.Error(w, fmt.Sprintf("after signing cookie token: %v", err.Error()), http.StatusInternalServerError)
2023-09-05 16:55:55 +02:00
return
}
http.SetCookie(w, &http.Cookie{
Name: "zrok-access",
Value: sTkn,
2023-09-05 18:50:41 +02:00
MaxAge: int(checkInterval.Seconds()),
Domain: cookieDomain,
2023-09-05 16:55:55 +02:00
Path: "/",
Expires: time.Now().Add(checkInterval),
// Secure: true, // pending server tls feature https://github.com/openziti/zrok/issues/24
HttpOnly: true, // enabled because zrok frontend is the only intended consumer of this cookie, not client-side scripts
SameSite: http.SameSiteLaxMode, // explicitly set to the default Lax mode which allows the zrok share to be navigated to from another site and receive the cookie
2023-09-05 16:55:55 +02:00
})
}
func deleteZrokCookies(w http.ResponseWriter, r *http.Request) {
// Get all cookies from the request
cookies := r.Cookies()
2024-01-09 22:30:47 +01:00
// Clear the Cookie header
r.Header.Del("Cookie")
// Save cookies not in the list of cookies to delete, the pkce cookie might be okay to pass along to the HTTP
// backend, but zrok-access is not because it can contain the accessToken from any other OAuth enabled shares, so we
// delete it here when the current share is not OAuth-enabled. OAuth-enabled shares check the audience claim in the
// JWT to ensure it matches the requested share and will send the client back to the OAuth provider if it does not
// match.
for _, cookie := range cookies {
2024-01-09 22:46:22 +01:00
if cookie.Name != "zrok-access" && cookie.Name != "pkce" {
2024-01-09 22:30:47 +01:00
r.AddCookie(cookie)
}
}
}
func basicAuthRequired(w http.ResponseWriter, realm string) {
2022-08-16 17:27:31 +02:00
w.Header().Set("WWW-Authenticate", `Basic realm="`+realm+`"`)
w.WriteHeader(401)
2023-10-05 19:34:27 +02:00
_, _ = w.Write([]byte("No Authorization\n"))
2022-08-16 17:27:31 +02:00
}
2022-08-18 22:57:38 +02:00
func oauthLoginRequired(w http.ResponseWriter, r *http.Request, cfg *OauthConfig, provider, target string, authCheckInterval time.Duration) {
http.Redirect(w, r, fmt.Sprintf("%s/%s/login?targethost=%s&checkInterval=%s", cfg.RedirectUrl, provider, url.QueryEscape(target), authCheckInterval.String()), http.StatusFound)
}
func resolveService(hostMatch string, host string) string {
2022-09-07 18:22:22 +02:00
if hostMatch == "" || strings.Contains(host, hostMatch) {
tokens := strings.Split(host, ".")
if len(tokens) > 0 {
return tokens[0]
}
2022-08-18 22:57:38 +02:00
}
return ""
2022-08-18 22:57:38 +02:00
}