2019-11-14 15:40:05 +00:00
|
|
|
package service
|
2018-11-14 09:18:03 +00:00
|
|
|
|
|
|
|
import (
|
2024-02-06 16:34:07 +00:00
|
|
|
"context"
|
2018-11-14 09:18:03 +00:00
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
2019-04-01 13:30:07 +00:00
|
|
|
"errors"
|
2020-09-11 13:40:03 +00:00
|
|
|
"fmt"
|
2018-11-14 09:18:03 +00:00
|
|
|
"net"
|
|
|
|
"net/http"
|
2020-09-11 13:40:03 +00:00
|
|
|
"reflect"
|
2024-02-06 16:34:07 +00:00
|
|
|
"strings"
|
2020-09-11 13:40:03 +00:00
|
|
|
"sync"
|
2018-11-14 09:18:03 +00:00
|
|
|
"time"
|
|
|
|
|
2022-11-21 17:36:05 +00:00
|
|
|
"github.com/rs/zerolog/log"
|
2022-10-14 15:16:08 +00:00
|
|
|
"github.com/spiffe/go-spiffe/v2/bundle/x509bundle"
|
|
|
|
"github.com/spiffe/go-spiffe/v2/spiffeid"
|
|
|
|
"github.com/spiffe/go-spiffe/v2/spiffetls/tlsconfig"
|
|
|
|
"github.com/spiffe/go-spiffe/v2/svid/x509svid"
|
2023-02-03 14:24:05 +00:00
|
|
|
"github.com/traefik/traefik/v3/pkg/config/dynamic"
|
|
|
|
traefiktls "github.com/traefik/traefik/v3/pkg/tls"
|
2024-01-11 16:06:06 +00:00
|
|
|
"github.com/traefik/traefik/v3/pkg/types"
|
2018-11-14 09:18:03 +00:00
|
|
|
"golang.org/x/net/http2"
|
|
|
|
)
|
|
|
|
|
|
|
|
type h2cTransportWrapper struct {
|
|
|
|
*http2.Transport
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *h2cTransportWrapper) RoundTrip(req *http.Request) (*http.Response, error) {
|
|
|
|
req.URL.Scheme = "http"
|
|
|
|
return t.Transport.RoundTrip(req)
|
|
|
|
}
|
|
|
|
|
2022-10-14 15:16:08 +00:00
|
|
|
// SpiffeX509Source allows to retrieve a x509 SVID and bundle.
|
|
|
|
type SpiffeX509Source interface {
|
|
|
|
x509svid.Source
|
|
|
|
x509bundle.Source
|
|
|
|
}
|
|
|
|
|
2020-09-11 13:40:03 +00:00
|
|
|
// NewRoundTripperManager creates a new RoundTripperManager.
|
2022-10-14 15:16:08 +00:00
|
|
|
func NewRoundTripperManager(spiffeX509Source SpiffeX509Source) *RoundTripperManager {
|
2020-09-11 13:40:03 +00:00
|
|
|
return &RoundTripperManager{
|
2022-10-14 15:16:08 +00:00
|
|
|
roundTrippers: make(map[string]http.RoundTripper),
|
|
|
|
configs: make(map[string]*dynamic.ServersTransport),
|
|
|
|
spiffeX509Source: spiffeX509Source,
|
2020-09-11 13:40:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// RoundTripperManager handles roundtripper for the reverse proxy.
|
|
|
|
type RoundTripperManager struct {
|
|
|
|
rtLock sync.RWMutex
|
|
|
|
roundTrippers map[string]http.RoundTripper
|
|
|
|
configs map[string]*dynamic.ServersTransport
|
2022-10-14 15:16:08 +00:00
|
|
|
|
|
|
|
spiffeX509Source SpiffeX509Source
|
2020-09-11 13:40:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Update updates the roundtrippers configurations.
|
|
|
|
func (r *RoundTripperManager) Update(newConfigs map[string]*dynamic.ServersTransport) {
|
|
|
|
r.rtLock.Lock()
|
|
|
|
defer r.rtLock.Unlock()
|
|
|
|
|
|
|
|
for configName, config := range r.configs {
|
|
|
|
newConfig, ok := newConfigs[configName]
|
|
|
|
if !ok {
|
|
|
|
delete(r.configs, configName)
|
|
|
|
delete(r.roundTrippers, configName)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if reflect.DeepEqual(newConfig, config) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
2022-10-14 15:16:08 +00:00
|
|
|
r.roundTrippers[configName], err = r.createRoundTripper(newConfig)
|
2020-09-11 13:40:03 +00:00
|
|
|
if err != nil {
|
2022-11-21 17:36:05 +00:00
|
|
|
log.Error().Err(err).Msgf("Could not configure HTTP Transport %s, fallback on default transport", configName)
|
2020-09-11 13:40:03 +00:00
|
|
|
r.roundTrippers[configName] = http.DefaultTransport
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for newConfigName, newConfig := range newConfigs {
|
|
|
|
if _, ok := r.configs[newConfigName]; ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
2022-10-14 15:16:08 +00:00
|
|
|
r.roundTrippers[newConfigName], err = r.createRoundTripper(newConfig)
|
2020-09-11 13:40:03 +00:00
|
|
|
if err != nil {
|
2022-11-21 17:36:05 +00:00
|
|
|
log.Error().Err(err).Msgf("Could not configure HTTP Transport %s, fallback on default transport", newConfigName)
|
2020-09-11 13:40:03 +00:00
|
|
|
r.roundTrippers[newConfigName] = http.DefaultTransport
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
r.configs = newConfigs
|
|
|
|
}
|
|
|
|
|
2022-11-21 17:36:05 +00:00
|
|
|
// Get gets a roundtripper by name.
|
2020-09-11 13:40:03 +00:00
|
|
|
func (r *RoundTripperManager) Get(name string) (http.RoundTripper, error) {
|
|
|
|
if len(name) == 0 {
|
|
|
|
name = "default@internal"
|
|
|
|
}
|
|
|
|
|
|
|
|
r.rtLock.RLock()
|
|
|
|
defer r.rtLock.RUnlock()
|
|
|
|
|
|
|
|
if rt, ok := r.roundTrippers[name]; ok {
|
|
|
|
return rt, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, fmt.Errorf("servers transport not found %s", name)
|
|
|
|
}
|
|
|
|
|
|
|
|
// createRoundTripper creates an http.RoundTripper configured with the Transport configuration settings.
|
2018-11-14 09:18:03 +00:00
|
|
|
// For the settings that can't be configured in Traefik it uses the default http.Transport settings.
|
2021-03-29 12:32:03 +00:00
|
|
|
// An exception to this is the MaxIdleConns setting as we only provide the option MaxIdleConnsPerHost in Traefik at this point in time.
|
2020-09-11 13:40:03 +00:00
|
|
|
// Setting this value to the default of 100 could lead to confusing behavior and backwards compatibility issues.
|
2022-10-14 15:16:08 +00:00
|
|
|
func (r *RoundTripperManager) createRoundTripper(cfg *dynamic.ServersTransport) (http.RoundTripper, error) {
|
2020-09-11 13:40:03 +00:00
|
|
|
if cfg == nil {
|
2018-11-27 16:42:04 +00:00
|
|
|
return nil, errors.New("no transport configuration given")
|
|
|
|
}
|
|
|
|
|
2018-11-14 09:18:03 +00:00
|
|
|
dialer := &net.Dialer{
|
2019-03-18 10:30:07 +00:00
|
|
|
Timeout: 30 * time.Second,
|
2018-11-14 09:18:03 +00:00
|
|
|
KeepAlive: 30 * time.Second,
|
|
|
|
}
|
|
|
|
|
2020-09-11 13:40:03 +00:00
|
|
|
if cfg.ForwardingTimeouts != nil {
|
|
|
|
dialer.Timeout = time.Duration(cfg.ForwardingTimeouts.DialTimeout)
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
transport := &http.Transport{
|
|
|
|
Proxy: http.ProxyFromEnvironment,
|
|
|
|
DialContext: dialer.DialContext,
|
2020-09-11 13:40:03 +00:00
|
|
|
MaxIdleConnsPerHost: cfg.MaxIdleConnsPerHost,
|
2018-11-14 09:18:03 +00:00
|
|
|
IdleConnTimeout: 90 * time.Second,
|
|
|
|
TLSHandshakeTimeout: 10 * time.Second,
|
|
|
|
ExpectContinueTimeout: 1 * time.Second,
|
2021-03-05 13:30:04 +00:00
|
|
|
ReadBufferSize: 64 * 1024,
|
|
|
|
WriteBufferSize: 64 * 1024,
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2020-09-11 13:40:03 +00:00
|
|
|
if cfg.ForwardingTimeouts != nil {
|
|
|
|
transport.ResponseHeaderTimeout = time.Duration(cfg.ForwardingTimeouts.ResponseHeaderTimeout)
|
|
|
|
transport.IdleConnTimeout = time.Duration(cfg.ForwardingTimeouts.IdleConnTimeout)
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2022-10-14 15:16:08 +00:00
|
|
|
if cfg.Spiffe != nil {
|
|
|
|
if r.spiffeX509Source == nil {
|
|
|
|
return nil, errors.New("SPIFFE is enabled for this transport, but not configured")
|
|
|
|
}
|
|
|
|
|
|
|
|
spiffeAuthorizer, err := buildSpiffeAuthorizer(cfg.Spiffe)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to build SPIFFE authorizer: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
transport.TLSClientConfig = tlsconfig.MTLSClientConfig(r.spiffeX509Source, r.spiffeX509Source, spiffeAuthorizer)
|
|
|
|
}
|
|
|
|
|
2021-07-15 12:02:11 +00:00
|
|
|
if cfg.InsecureSkipVerify || len(cfg.RootCAs) > 0 || len(cfg.ServerName) > 0 || len(cfg.Certificates) > 0 || cfg.PeerCertURI != "" {
|
2022-10-14 15:16:08 +00:00
|
|
|
if transport.TLSClientConfig != nil {
|
|
|
|
return nil, errors.New("TLS and SPIFFE configuration cannot be defined at the same time")
|
|
|
|
}
|
|
|
|
|
2018-11-14 09:18:03 +00:00
|
|
|
transport.TLSClientConfig = &tls.Config{
|
2020-09-11 13:40:03 +00:00
|
|
|
ServerName: cfg.ServerName,
|
|
|
|
InsecureSkipVerify: cfg.InsecureSkipVerify,
|
|
|
|
RootCAs: createRootCACertPool(cfg.RootCAs),
|
|
|
|
Certificates: cfg.Certificates.GetCertificates(),
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
2021-07-15 12:02:11 +00:00
|
|
|
|
|
|
|
if cfg.PeerCertURI != "" {
|
|
|
|
transport.TLSClientConfig.VerifyPeerCertificate = func(rawCerts [][]byte, _ [][]*x509.Certificate) error {
|
|
|
|
return traefiktls.VerifyPeerCertificate(cfg.PeerCertURI, transport.TLSClientConfig, rawCerts)
|
|
|
|
}
|
|
|
|
}
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2021-03-29 12:32:03 +00:00
|
|
|
// Return directly HTTP/1.1 transport when HTTP/2 is disabled
|
|
|
|
if cfg.DisableHTTP2 {
|
2024-02-06 16:34:07 +00:00
|
|
|
return &KerberosRoundTripper{
|
|
|
|
OriginalRoundTripper: transport,
|
|
|
|
new: func() http.RoundTripper {
|
|
|
|
return transport.Clone()
|
|
|
|
},
|
|
|
|
}, nil
|
2021-03-29 12:32:03 +00:00
|
|
|
}
|
|
|
|
|
2024-02-06 16:34:07 +00:00
|
|
|
rt, err := newSmartRoundTripper(transport, cfg.ForwardingTimeouts)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return &KerberosRoundTripper{
|
|
|
|
OriginalRoundTripper: rt,
|
|
|
|
new: func() http.RoundTripper {
|
|
|
|
return rt.Clone()
|
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type KerberosRoundTripper struct {
|
|
|
|
new func() http.RoundTripper
|
|
|
|
OriginalRoundTripper http.RoundTripper
|
|
|
|
}
|
|
|
|
|
|
|
|
type stickyRoundTripper struct {
|
|
|
|
RoundTripper http.RoundTripper
|
|
|
|
}
|
|
|
|
|
|
|
|
type transportKeyType string
|
|
|
|
|
|
|
|
var transportKey transportKeyType = "transport"
|
|
|
|
|
|
|
|
func AddTransportOnContext(ctx context.Context) context.Context {
|
|
|
|
return context.WithValue(ctx, transportKey, &stickyRoundTripper{})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (k *KerberosRoundTripper) RoundTrip(request *http.Request) (*http.Response, error) {
|
|
|
|
value, ok := request.Context().Value(transportKey).(*stickyRoundTripper)
|
|
|
|
if !ok {
|
|
|
|
return k.OriginalRoundTripper.RoundTrip(request)
|
|
|
|
}
|
|
|
|
|
|
|
|
if value.RoundTripper != nil {
|
|
|
|
return value.RoundTripper.RoundTrip(request)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := k.OriginalRoundTripper.RoundTrip(request)
|
|
|
|
|
|
|
|
// If we found that we are authenticating with Kerberos (Negotiate) or NTLM.
|
|
|
|
// We put a dedicated roundTripper in the ConnContext.
|
|
|
|
// This will stick the next calls to the same connection with the backend.
|
|
|
|
if err == nil && containsNTLMorNegotiate(resp.Header.Values("WWW-Authenticate")) {
|
|
|
|
value.RoundTripper = k.new()
|
|
|
|
}
|
|
|
|
return resp, err
|
|
|
|
}
|
|
|
|
|
|
|
|
func containsNTLMorNegotiate(h []string) bool {
|
|
|
|
for _, s := range h {
|
|
|
|
if strings.HasPrefix(s, "NTLM") || strings.HasPrefix(s, "Negotiate") {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2024-01-11 16:06:06 +00:00
|
|
|
func createRootCACertPool(rootCAs []types.FileOrContent) *x509.CertPool {
|
2020-03-23 15:48:06 +00:00
|
|
|
if len(rootCAs) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-11-14 09:18:03 +00:00
|
|
|
roots := x509.NewCertPool()
|
|
|
|
|
|
|
|
for _, cert := range rootCAs {
|
|
|
|
certContent, err := cert.Read()
|
|
|
|
if err != nil {
|
2022-11-21 17:36:05 +00:00
|
|
|
log.Error().Err(err).Msg("Error while read RootCAs")
|
2018-11-14 09:18:03 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
roots.AppendCertsFromPEM(certContent)
|
|
|
|
}
|
|
|
|
|
|
|
|
return roots
|
|
|
|
}
|
2022-10-14 15:16:08 +00:00
|
|
|
|
|
|
|
func buildSpiffeAuthorizer(cfg *dynamic.Spiffe) (tlsconfig.Authorizer, error) {
|
|
|
|
switch {
|
|
|
|
case len(cfg.IDs) > 0:
|
|
|
|
spiffeIDs := make([]spiffeid.ID, 0, len(cfg.IDs))
|
|
|
|
for _, rawID := range cfg.IDs {
|
|
|
|
id, err := spiffeid.FromString(rawID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("invalid SPIFFE ID: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
spiffeIDs = append(spiffeIDs, id)
|
|
|
|
}
|
|
|
|
|
|
|
|
return tlsconfig.AuthorizeOneOf(spiffeIDs...), nil
|
|
|
|
|
|
|
|
case cfg.TrustDomain != "":
|
|
|
|
trustDomain, err := spiffeid.TrustDomainFromString(cfg.TrustDomain)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("invalid SPIFFE trust domain: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return tlsconfig.AuthorizeMemberOf(trustDomain), nil
|
|
|
|
|
|
|
|
default:
|
|
|
|
return tlsconfig.AuthorizeAny(), nil
|
|
|
|
}
|
|
|
|
}
|