2018-11-14 09:18:03 +00:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
2019-04-01 13:30:07 +00:00
|
|
|
"errors"
|
2018-11-14 09:18:03 +00:00
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"time"
|
|
|
|
|
2019-03-15 08:42:03 +00:00
|
|
|
"github.com/containous/traefik/pkg/config/static"
|
|
|
|
"github.com/containous/traefik/pkg/log"
|
|
|
|
traefiktls "github.com/containous/traefik/pkg/tls"
|
2018-11-14 09:18:03 +00:00
|
|
|
"golang.org/x/net/http2"
|
|
|
|
)
|
|
|
|
|
|
|
|
type h2cTransportWrapper struct {
|
|
|
|
*http2.Transport
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *h2cTransportWrapper) RoundTrip(req *http.Request) (*http.Response, error) {
|
|
|
|
req.URL.Scheme = "http"
|
|
|
|
return t.Transport.RoundTrip(req)
|
|
|
|
}
|
|
|
|
|
2018-11-27 16:42:04 +00:00
|
|
|
// createHTTPTransport creates an http.Transport configured with the Transport configuration settings.
|
2018-11-14 09:18:03 +00:00
|
|
|
// For the settings that can't be configured in Traefik it uses the default http.Transport settings.
|
|
|
|
// An exception to this is the MaxIdleConns setting as we only provide the option MaxIdleConnsPerHost
|
|
|
|
// in Traefik at this point in time. Setting this value to the default of 100 could lead to confusing
|
|
|
|
// behavior and backwards compatibility issues.
|
2018-11-27 16:42:04 +00:00
|
|
|
func createHTTPTransport(transportConfiguration *static.ServersTransport) (*http.Transport, error) {
|
|
|
|
if transportConfiguration == nil {
|
|
|
|
return nil, errors.New("no transport configuration given")
|
|
|
|
}
|
|
|
|
|
2018-11-14 09:18:03 +00:00
|
|
|
dialer := &net.Dialer{
|
2019-03-18 10:30:07 +00:00
|
|
|
Timeout: 30 * time.Second,
|
2018-11-14 09:18:03 +00:00
|
|
|
KeepAlive: 30 * time.Second,
|
|
|
|
DualStack: true,
|
|
|
|
}
|
|
|
|
|
2018-11-27 16:42:04 +00:00
|
|
|
if transportConfiguration.ForwardingTimeouts != nil {
|
|
|
|
dialer.Timeout = time.Duration(transportConfiguration.ForwardingTimeouts.DialTimeout)
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
transport := &http.Transport{
|
|
|
|
Proxy: http.ProxyFromEnvironment,
|
|
|
|
DialContext: dialer.DialContext,
|
2018-11-27 16:42:04 +00:00
|
|
|
MaxIdleConnsPerHost: transportConfiguration.MaxIdleConnsPerHost,
|
2018-11-14 09:18:03 +00:00
|
|
|
IdleConnTimeout: 90 * time.Second,
|
|
|
|
TLSHandshakeTimeout: 10 * time.Second,
|
|
|
|
ExpectContinueTimeout: 1 * time.Second,
|
|
|
|
}
|
|
|
|
|
|
|
|
transport.RegisterProtocol("h2c", &h2cTransportWrapper{
|
|
|
|
Transport: &http2.Transport{
|
|
|
|
DialTLS: func(netw, addr string, cfg *tls.Config) (net.Conn, error) {
|
|
|
|
return net.Dial(netw, addr)
|
|
|
|
},
|
|
|
|
AllowHTTP: true,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
2018-11-27 16:42:04 +00:00
|
|
|
if transportConfiguration.ForwardingTimeouts != nil {
|
|
|
|
transport.ResponseHeaderTimeout = time.Duration(transportConfiguration.ForwardingTimeouts.ResponseHeaderTimeout)
|
2019-06-27 22:36:04 +00:00
|
|
|
transport.IdleConnTimeout = time.Duration(transportConfiguration.ForwardingTimeouts.IdleConnTimeout)
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2018-11-27 16:42:04 +00:00
|
|
|
if transportConfiguration.InsecureSkipVerify {
|
2018-11-14 09:18:03 +00:00
|
|
|
transport.TLSClientConfig = &tls.Config{InsecureSkipVerify: true}
|
|
|
|
}
|
|
|
|
|
2018-11-27 16:42:04 +00:00
|
|
|
if len(transportConfiguration.RootCAs) > 0 {
|
2018-11-14 09:18:03 +00:00
|
|
|
transport.TLSClientConfig = &tls.Config{
|
2018-11-27 16:42:04 +00:00
|
|
|
RootCAs: createRootCACertPool(transportConfiguration.RootCAs),
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
err := http2.ConfigureTransport(transport)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return transport, nil
|
|
|
|
}
|
|
|
|
|
2019-06-17 09:48:05 +00:00
|
|
|
func createRootCACertPool(rootCAs []traefiktls.FileOrContent) *x509.CertPool {
|
2018-11-14 09:18:03 +00:00
|
|
|
roots := x509.NewCertPool()
|
|
|
|
|
|
|
|
for _, cert := range rootCAs {
|
|
|
|
certContent, err := cert.Read()
|
|
|
|
if err != nil {
|
|
|
|
log.WithoutContext().Error("Error while read RootCAs", err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
roots.AppendCertsFromPEM(certContent)
|
|
|
|
}
|
|
|
|
|
|
|
|
return roots
|
|
|
|
}
|