zrok/endpoints/proxy/frontend.go

247 lines
7.0 KiB
Go
Raw Normal View History

package proxy
import (
"context"
"fmt"
"github.com/openziti/sdk-golang/ziti"
"github.com/openziti/zrok/endpoints"
"github.com/openziti/zrok/endpoints/publicProxy/notFoundUi"
"github.com/openziti/zrok/environment"
2023-11-21 20:27:17 +01:00
"github.com/openziti/zrok/sdk/golang/sdk"
"github.com/openziti/zrok/util"
"github.com/pkg/errors"
"github.com/sirupsen/logrus"
2023-05-25 20:59:39 +02:00
"net"
"net/http"
"net/http/httputil"
"net/url"
"strings"
2023-05-25 20:59:39 +02:00
"time"
)
type FrontendConfig struct {
IdentityName string
ShrToken string
Address string
ResponseHeaders []string
Tls *endpoints.TlsConfig
RequestsChan chan *endpoints.Request
2023-04-17 19:55:35 +02:00
}
func DefaultFrontendConfig(identityName string) *FrontendConfig {
return &FrontendConfig{
2023-04-17 19:55:35 +02:00
IdentityName: identityName,
Address: "0.0.0.0:8080",
}
}
type Frontend struct {
cfg *FrontendConfig
zCtx ziti.Context
2023-01-04 20:42:58 +01:00
shrToken string
handler http.Handler
}
func NewFrontend(cfg *FrontendConfig) (*Frontend, error) {
env, err := environment.LoadRoot()
if err != nil {
return nil, errors.Wrap(err, "error loading environment root")
}
zCfgPath, err := env.ZitiIdentityNamed(cfg.IdentityName)
if err != nil {
2023-07-10 22:41:16 +02:00
return nil, errors.Wrapf(err, "error getting ziti identity '%v' from environment", cfg.IdentityName)
}
2023-05-25 17:50:38 +02:00
zCfg, err := ziti.NewConfigFromFile(zCfgPath)
if err != nil {
return nil, errors.Wrap(err, "error loading config")
}
zCfg.ConfigTypes = []string{sdk.ZrokProxyConfig}
2023-05-25 17:50:38 +02:00
zCtx, err := ziti.NewContext(zCfg)
if err != nil {
return nil, errors.Wrap(err, "error loading ziti context")
}
2023-01-04 20:42:58 +01:00
zDialCtx := zitiDialContext{ctx: zCtx, shrToken: cfg.ShrToken}
zTransport := http.DefaultTransport.(*http.Transport).Clone()
zTransport.DialContext = zDialCtx.Dial
proxy, err := newServiceProxy(cfg, zCtx)
if err != nil {
return nil, err
}
proxy.Transport = zTransport
2024-07-22 18:34:42 +02:00
handler := authHandler(cfg.ShrToken, util.NewRequestsWrapper(proxy), "zrok", cfg, zCtx)
return &Frontend{
cfg: cfg,
zCtx: zCtx,
handler: handler,
}, nil
}
func (h *Frontend) Run() error {
if h.cfg.Tls != nil {
return http.ListenAndServeTLS(h.cfg.Address, h.cfg.Tls.CertPath, h.cfg.Tls.KeyPath, h.handler)
}
return http.ListenAndServe(h.cfg.Address, h.handler)
}
type zitiDialContext struct {
ctx ziti.Context
2023-01-04 20:42:58 +01:00
shrToken string
}
func (zdc *zitiDialContext) Dial(_ context.Context, _ string, addr string) (net.Conn, error) {
conn, err := zdc.ctx.DialWithOptions(zdc.shrToken, &ziti.DialOptions{ConnectTimeout: 30 * time.Second})
if err != nil {
return conn, err
}
return conn, nil
}
func newServiceProxy(cfg *FrontendConfig, ctx ziti.Context) (*httputil.ReverseProxy, error) {
proxy := serviceTargetProxy(cfg, ctx)
director := proxy.Director
proxy.Director = func(req *http.Request) {
2023-01-10 22:38:53 +01:00
if cfg.RequestsChan != nil {
2023-01-10 23:40:20 +01:00
cfg.RequestsChan <- &endpoints.Request{
2023-01-10 22:38:53 +01:00
Stamp: time.Now(),
RemoteAddr: fmt.Sprintf("%v", req.Header["X-Real-Ip"]),
Method: req.Method,
Path: req.URL.String(),
}
}
director(req)
req.Header.Set("X-Proxy", "zrok")
}
proxy.ModifyResponse = func(resp *http.Response) error {
for _, responseHeader := range cfg.ResponseHeaders {
tokens := strings.Split(responseHeader, ":")
if len(tokens) == 2 {
resp.Header.Set(strings.TrimSpace(tokens[0]), strings.TrimSpace(tokens[1]))
} else {
logrus.Errorf("invalid response header '%v' (expecting header:value", responseHeader)
}
}
return nil
}
proxy.ErrorHandler = func(w http.ResponseWriter, r *http.Request, err error) {
logrus.Errorf("error proxying: %v", err)
2022-12-14 20:41:54 +01:00
notFoundUi.WriteNotFound(w)
}
return proxy, nil
}
func serviceTargetProxy(cfg *FrontendConfig, ctx ziti.Context) *httputil.ReverseProxy {
director := func(req *http.Request) {
2023-01-04 20:42:58 +01:00
targetShrToken := cfg.ShrToken
if svc, found := endpoints.GetRefreshedService(targetShrToken, ctx); found {
if cfg, found := svc.Config[sdk.ZrokProxyConfig]; found {
logrus.Debugf("auth model: %v", cfg)
} else {
logrus.Warn("no config!")
}
2023-01-04 20:42:58 +01:00
if target, err := url.Parse(fmt.Sprintf("http://%v", targetShrToken)); err == nil {
2023-01-10 22:38:53 +01:00
logrus.Debugf("[%v] -> %v", targetShrToken, req.URL)
targetQuery := target.RawQuery
req.URL.Scheme = target.Scheme
req.URL.Host = target.Host
req.URL.Path, req.URL.RawPath = endpoints.JoinURLPath(target, req.URL)
if targetQuery == "" || req.URL.RawQuery == "" {
req.URL.RawQuery = targetQuery + req.URL.RawQuery
} else {
req.URL.RawQuery = targetQuery + "&" + req.URL.RawQuery
}
if _, ok := req.Header["User-Agent"]; !ok {
// explicitly disable User-Agent so it's not set to default value
req.Header.Set("User-Agent", "")
}
} else {
logrus.Errorf("error proxying: %v", err)
}
}
}
return &httputil.ReverseProxy{Director: director}
}
func authHandler(shrToken string, handler http.Handler, realm string, cfg *FrontendConfig, ctx ziti.Context) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
2023-01-04 20:42:58 +01:00
if svc, found := endpoints.GetRefreshedService(shrToken, ctx); found {
if cfg, found := svc.Config[sdk.ZrokProxyConfig]; found {
if scheme, found := cfg["auth_scheme"]; found {
switch scheme {
case string(sdk.None):
2023-01-04 20:42:58 +01:00
logrus.Debugf("auth scheme none '%v'", shrToken)
handler.ServeHTTP(w, r)
return
case string(sdk.Basic):
2023-01-04 20:42:58 +01:00
logrus.Debugf("auth scheme basic '%v", shrToken)
inUser, inPass, ok := r.BasicAuth()
if !ok {
writeUnauthorizedResponse(w, realm)
return
}
authed := false
if v, found := cfg["basic_auth"]; found {
if basicAuth, ok := v.(map[string]interface{}); ok {
if v, found := basicAuth["users"]; found {
if arr, ok := v.([]interface{}); ok {
for _, v := range arr {
if um, ok := v.(map[string]interface{}); ok {
username := ""
if v, found := um["username"]; found {
if un, ok := v.(string); ok {
username = un
}
}
password := ""
if v, found := um["password"]; found {
if pw, ok := v.(string); ok {
password = pw
}
}
if username == inUser && password == inPass {
authed = true
break
}
}
}
}
}
}
}
if !authed {
writeUnauthorizedResponse(w, realm)
return
}
handler.ServeHTTP(w, r)
default:
logrus.Infof("invalid auth scheme '%v'", scheme)
writeUnauthorizedResponse(w, realm)
return
}
} else {
2023-01-04 20:42:58 +01:00
logrus.Warnf("%v -> no auth scheme for '%v'", r.RemoteAddr, shrToken)
2022-12-14 20:41:54 +01:00
notFoundUi.WriteNotFound(w)
}
} else {
2023-01-04 20:42:58 +01:00
logrus.Warnf("%v -> no proxy config for '%v'", r.RemoteAddr, shrToken)
2022-12-14 20:41:54 +01:00
notFoundUi.WriteNotFound(w)
}
} else {
2023-01-04 20:42:58 +01:00
logrus.Warnf("%v -> service '%v' not found", r.RemoteAddr, shrToken)
2022-12-14 20:41:54 +01:00
notFoundUi.WriteNotFound(w)
}
}
}
func writeUnauthorizedResponse(w http.ResponseWriter, realm string) {
w.Header().Set("WWW-Authenticate", `Basic realm="`+realm+`"`)
w.WriteHeader(401)
w.Write([]byte("No Authorization\n"))
}