2022-03-17 17:02:08 +00:00
package tcp
import (
"context"
"crypto/tls"
"errors"
"fmt"
"net/http"
2022-11-21 17:36:05 +00:00
"github.com/rs/zerolog/log"
2022-03-17 17:02:08 +00:00
"github.com/traefik/traefik/v2/pkg/config/runtime"
2022-11-21 17:36:05 +00:00
"github.com/traefik/traefik/v2/pkg/logs"
2022-03-17 17:02:08 +00:00
"github.com/traefik/traefik/v2/pkg/middlewares/snicheck"
httpmuxer "github.com/traefik/traefik/v2/pkg/muxer/http"
tcpmuxer "github.com/traefik/traefik/v2/pkg/muxer/tcp"
"github.com/traefik/traefik/v2/pkg/server/provider"
tcpservice "github.com/traefik/traefik/v2/pkg/server/service/tcp"
"github.com/traefik/traefik/v2/pkg/tcp"
traefiktls "github.com/traefik/traefik/v2/pkg/tls"
)
type middlewareBuilder interface {
BuildChain ( ctx context . Context , names [ ] string ) * tcp . Chain
}
// NewManager Creates a new Manager.
func NewManager ( conf * runtime . Configuration ,
serviceManager * tcpservice . Manager ,
middlewaresBuilder middlewareBuilder ,
httpHandlers map [ string ] http . Handler ,
httpsHandlers map [ string ] http . Handler ,
tlsManager * traefiktls . Manager ,
) * Manager {
return & Manager {
serviceManager : serviceManager ,
middlewaresBuilder : middlewaresBuilder ,
httpHandlers : httpHandlers ,
httpsHandlers : httpsHandlers ,
tlsManager : tlsManager ,
conf : conf ,
}
}
// Manager is a route/router manager.
type Manager struct {
serviceManager * tcpservice . Manager
middlewaresBuilder middlewareBuilder
httpHandlers map [ string ] http . Handler
httpsHandlers map [ string ] http . Handler
tlsManager * traefiktls . Manager
conf * runtime . Configuration
}
func ( m * Manager ) getTCPRouters ( ctx context . Context , entryPoints [ ] string ) map [ string ] map [ string ] * runtime . TCPRouterInfo {
if m . conf != nil {
return m . conf . GetTCPRoutersByEntryPoints ( ctx , entryPoints )
}
return make ( map [ string ] map [ string ] * runtime . TCPRouterInfo )
}
func ( m * Manager ) getHTTPRouters ( ctx context . Context , entryPoints [ ] string , tls bool ) map [ string ] map [ string ] * runtime . RouterInfo {
if m . conf != nil {
return m . conf . GetRoutersByEntryPoints ( ctx , entryPoints , tls )
}
return make ( map [ string ] map [ string ] * runtime . RouterInfo )
}
// BuildHandlers builds the handlers for the given entrypoints.
func ( m * Manager ) BuildHandlers ( rootCtx context . Context , entryPoints [ ] string ) map [ string ] * Router {
entryPointsRouters := m . getTCPRouters ( rootCtx , entryPoints )
entryPointsRoutersHTTP := m . getHTTPRouters ( rootCtx , entryPoints , true )
entryPointHandlers := make ( map [ string ] * Router )
for _ , entryPointName := range entryPoints {
entryPointName := entryPointName
routers := entryPointsRouters [ entryPointName ]
2022-11-21 17:36:05 +00:00
logger := log . Ctx ( rootCtx ) . With ( ) . Str ( logs . EntryPointName , entryPointName ) . Logger ( )
ctx := logger . WithContext ( rootCtx )
2022-03-17 17:02:08 +00:00
handler , err := m . buildEntryPointHandler ( ctx , routers , entryPointsRoutersHTTP [ entryPointName ] , m . httpHandlers [ entryPointName ] , m . httpsHandlers [ entryPointName ] )
if err != nil {
2022-11-21 17:36:05 +00:00
logger . Error ( ) . Err ( err ) . Send ( )
2022-03-17 17:02:08 +00:00
continue
}
entryPointHandlers [ entryPointName ] = handler
}
return entryPointHandlers
}
type nameAndConfig struct {
routerName string // just so we have it as additional information when logging
TLSConfig * tls . Config
}
func ( m * Manager ) buildEntryPointHandler ( ctx context . Context , configs map [ string ] * runtime . TCPRouterInfo , configsHTTP map [ string ] * runtime . RouterInfo , handlerHTTP , handlerHTTPS http . Handler ) ( * Router , error ) {
// Build a new Router.
router , err := NewRouter ( )
if err != nil {
return nil , err
}
router . SetHTTPHandler ( handlerHTTP )
2022-12-06 17:28:05 +00:00
// Even though the error is seemingly ignored (aside from logging it),
// we actually rely later on the fact that a tls config is nil (which happens when an error is returned) to take special steps
// when assigning a handler to a route.
2022-03-17 17:02:08 +00:00
defaultTLSConf , err := m . tlsManager . Get ( traefiktls . DefaultTLSStoreName , traefiktls . DefaultTLSConfigName )
if err != nil {
2022-11-21 17:36:05 +00:00
log . Ctx ( ctx ) . Error ( ) . Err ( err ) . Msg ( "Error during the build of the default TLS configuration" )
2022-03-17 17:02:08 +00:00
}
2022-12-06 17:28:05 +00:00
// Keyed by domain. The source of truth for doing SNI checking (domain fronting).
2022-03-17 17:02:08 +00:00
// As soon as there's (at least) two different tlsOptions found for the same domain,
// we set the value to the default TLS conf.
tlsOptionsForHost := map [ string ] string { }
// Keyed by domain, then by options reference.
2022-12-06 17:28:05 +00:00
// The actual source of truth for what TLS options will actually be used for the connection.
2022-03-17 17:02:08 +00:00
// As opposed to tlsOptionsForHost, it keeps track of all the (different) TLS
// options that occur for a given host name, so that later on we can set relevant
// errors and logging for all the routers concerned (i.e. wrongly configured).
tlsOptionsForHostSNI := map [ string ] map [ string ] nameAndConfig { }
for routerHTTPName , routerHTTPConfig := range configsHTTP {
if routerHTTPConfig . TLS == nil {
continue
}
2022-11-21 17:36:05 +00:00
logger := log . Ctx ( ctx ) . With ( ) . Str ( logs . RouterName , routerHTTPName ) . Logger ( )
ctxRouter := logger . WithContext ( provider . AddInContext ( ctx , routerHTTPName ) )
2022-03-17 17:02:08 +00:00
tlsOptionsName := traefiktls . DefaultTLSConfigName
if len ( routerHTTPConfig . TLS . Options ) > 0 && routerHTTPConfig . TLS . Options != traefiktls . DefaultTLSConfigName {
tlsOptionsName = provider . GetQualifiedName ( ctxRouter , routerHTTPConfig . TLS . Options )
}
domains , err := httpmuxer . ParseDomains ( routerHTTPConfig . Rule )
if err != nil {
routerErr := fmt . Errorf ( "invalid rule %s, error: %w" , routerHTTPConfig . Rule , err )
routerHTTPConfig . AddError ( routerErr , true )
2022-11-21 17:36:05 +00:00
logger . Error ( ) . Err ( routerErr ) . Send ( )
2022-03-17 17:02:08 +00:00
continue
}
if len ( domains ) == 0 {
2022-12-06 17:28:05 +00:00
// Extra Host(*) rule, for HTTPS routers with no Host rule,
// and for requests for which the SNI does not match _any_ of the other existing routers Host.
// This is only about choosing the TLS configuration.
// The actual routing will be done further on by the HTTPS handler.
// See examples below.
2022-03-17 17:02:08 +00:00
router . AddHTTPTLSConfig ( "*" , defaultTLSConf )
2022-12-06 17:28:05 +00:00
// The server name (from a Host(SNI) rule) is the only parameter (available in HTTP routing rules) on which we can map a TLS config,
// because it is the only one accessible before decryption (we obtain it during the ClientHello).
// Therefore, when a router has no Host rule, it does not make any sense to specify some TLS options.
// Consequently, when it comes to deciding what TLS config will be used,
// for a request that will match an HTTPS router with no Host rule,
// the result will depend on the _others_ existing routers (their Host rule, to be precise), and the TLS options associated with them,
// even though they don't match the incoming request. Consider the following examples:
2022-03-17 17:02:08 +00:00
// # conf1
// httpRouter1:
// rule: PathPrefix("/foo")
// # Wherever the request comes from, the TLS config used will be the default one, because of the Host(*) fallback.
// # conf2
// httpRouter1:
// rule: PathPrefix("/foo")
//
// httpRouter2:
// rule: Host("foo.com") && PathPrefix("/bar")
// tlsoptions: myTLSOptions
2022-12-06 17:28:05 +00:00
// # When a request for "/foo" comes, even though it won't be routed by httpRouter2,
// # if its SNI is set to foo.com, myTLSOptions will be used for the TLS connection.
// # Otherwise, it will fallback to the default TLS config.
2022-11-21 17:36:05 +00:00
logger . Warn ( ) . Msgf ( "No domain found in rule %v, the TLS options applied for this router will depend on the SNI of each request" , routerHTTPConfig . Rule )
2022-03-17 17:02:08 +00:00
}
2022-12-06 17:28:05 +00:00
// Even though the error is seemingly ignored (aside from logging it),
// we actually rely later on the fact that a tls config is nil (which happens when an error is returned) to take special steps
// when assigning a handler to a route.
tlsConf , tlsConfErr := m . tlsManager . Get ( traefiktls . DefaultTLSStoreName , tlsOptionsName )
if tlsConfErr != nil {
// Note: we do not call AddError here because we already did so when buildRouterHandler errored for the same reason.
2022-12-07 14:33:51 +00:00
logger . Error ( ) . Err ( tlsConfErr ) . Send ( )
2022-03-17 17:02:08 +00:00
}
for _ , domain := range domains {
// domain is already in lower case thanks to the domain parsing
if tlsOptionsForHostSNI [ domain ] == nil {
tlsOptionsForHostSNI [ domain ] = make ( map [ string ] nameAndConfig )
}
tlsOptionsForHostSNI [ domain ] [ tlsOptionsName ] = nameAndConfig {
routerName : routerHTTPName ,
TLSConfig : tlsConf ,
}
if name , ok := tlsOptionsForHost [ domain ] ; ok && name != tlsOptionsName {
// Different tlsOptions on the same domain, so fallback to default
tlsOptionsForHost [ domain ] = traefiktls . DefaultTLSConfigName
} else {
tlsOptionsForHost [ domain ] = tlsOptionsName
}
}
}
sniCheck := snicheck . New ( tlsOptionsForHost , handlerHTTPS )
2022-12-06 17:28:05 +00:00
// Keep in mind that defaultTLSConf might be nil here.
2022-03-17 17:02:08 +00:00
router . SetHTTPSHandler ( sniCheck , defaultTLSConf )
2022-11-21 17:36:05 +00:00
logger := log . Ctx ( ctx )
2022-03-17 17:02:08 +00:00
for hostSNI , tlsConfigs := range tlsOptionsForHostSNI {
if len ( tlsConfigs ) == 1 {
var optionsName string
var config * tls . Config
for k , v := range tlsConfigs {
optionsName = k
config = v . TLSConfig
break
}
2022-12-06 17:28:05 +00:00
if config == nil {
// we use nil config as a signal to insert a handler
// that enforces that TLS connection attempts to the corresponding (broken) router should fail.
2022-12-07 14:33:51 +00:00
logger . Debug ( ) . Msgf ( "Adding special closing route for %s because broken TLS options %s" , hostSNI , optionsName )
2022-12-06 17:28:05 +00:00
router . AddHTTPTLSConfig ( hostSNI , nil )
continue
}
2022-03-17 17:02:08 +00:00
2022-12-07 14:33:51 +00:00
logger . Debug ( ) . Msgf ( "Adding route for %s with TLS options %s" , hostSNI , optionsName )
2022-03-17 17:02:08 +00:00
router . AddHTTPTLSConfig ( hostSNI , config )
2022-12-06 17:28:05 +00:00
continue
}
// multiple tlsConfigs
2022-03-17 17:02:08 +00:00
2022-12-06 17:28:05 +00:00
routers := make ( [ ] string , 0 , len ( tlsConfigs ) )
for _ , v := range tlsConfigs {
configsHTTP [ v . routerName ] . AddError ( fmt . Errorf ( "found different TLS options for routers on the same host %v, so using the default TLS options instead" , hostSNI ) , false )
routers = append ( routers , v . routerName )
}
2022-03-17 17:02:08 +00:00
2022-12-07 14:33:51 +00:00
logger . Warn ( ) . Msgf ( "Found different TLS options for routers on the same host %v, so using the default TLS options instead for these routers: %#v" , hostSNI , routers )
2022-12-06 17:28:05 +00:00
if defaultTLSConf == nil {
2022-12-07 14:33:51 +00:00
logger . Debug ( ) . Msgf ( "Adding special closing route for %s because broken default TLS options" , hostSNI )
2022-03-17 17:02:08 +00:00
}
2022-12-06 17:28:05 +00:00
router . AddHTTPTLSConfig ( hostSNI , defaultTLSConf )
2022-03-17 17:02:08 +00:00
}
2022-12-06 17:28:05 +00:00
m . addTCPHandlers ( ctx , configs , router )
return router , nil
}
// addTCPHandlers creates the TCP handlers defined in configs, and adds them to router.
func ( m * Manager ) addTCPHandlers ( ctx context . Context , configs map [ string ] * runtime . TCPRouterInfo , router * Router ) {
2022-03-17 17:02:08 +00:00
for routerName , routerConfig := range configs {
2022-11-21 17:36:05 +00:00
logger := log . Ctx ( ctx ) . With ( ) . Str ( logs . RouterName , routerName ) . Logger ( )
ctxRouter := logger . WithContext ( provider . AddInContext ( ctx , routerName ) )
2022-03-17 17:02:08 +00:00
if routerConfig . Service == "" {
err := errors . New ( "the service is missing on the router" )
routerConfig . AddError ( err , true )
2022-11-21 17:36:05 +00:00
logger . Error ( ) . Err ( err ) . Send ( )
2022-03-17 17:02:08 +00:00
continue
}
if routerConfig . Rule == "" {
err := errors . New ( "router has no rule" )
routerConfig . AddError ( err , true )
2022-11-21 17:36:05 +00:00
logger . Error ( ) . Err ( err ) . Send ( )
2022-03-17 17:02:08 +00:00
continue
}
domains , err := tcpmuxer . ParseHostSNI ( routerConfig . Rule )
if err != nil {
routerErr := fmt . Errorf ( "invalid rule: %q , %w" , routerConfig . Rule , err )
routerConfig . AddError ( routerErr , true )
2022-11-21 17:36:05 +00:00
logger . Error ( ) . Err ( routerErr ) . Send ( )
2022-03-17 17:02:08 +00:00
continue
}
// HostSNI Rule, but TLS not set on the router, which is an error.
// However, we allow the HostSNI(*) exception.
if len ( domains ) > 0 && routerConfig . TLS == nil && domains [ 0 ] != "*" {
routerErr := fmt . Errorf ( "invalid rule: %q , has HostSNI matcher, but no TLS on router" , routerConfig . Rule )
routerConfig . AddError ( routerErr , true )
2022-11-21 17:36:05 +00:00
logger . Error ( ) . Err ( routerErr ) . Send ( )
2022-03-17 17:02:08 +00:00
}
2022-12-06 17:28:05 +00:00
var handler tcp . Handler
if routerConfig . TLS == nil || routerConfig . TLS . Passthrough {
handler , err = m . buildTCPHandler ( ctxRouter , routerConfig )
if err != nil {
routerConfig . AddError ( err , true )
2022-12-07 14:33:51 +00:00
logger . Error ( ) . Err ( err ) . Send ( )
2022-12-06 17:28:05 +00:00
continue
}
}
2022-03-17 17:02:08 +00:00
if routerConfig . TLS == nil {
2022-11-21 17:36:05 +00:00
logger . Debug ( ) . Msgf ( "Adding route for %q" , routerConfig . Rule )
2022-03-17 17:02:08 +00:00
if err := router . AddRoute ( routerConfig . Rule , routerConfig . Priority , handler ) ; err != nil {
routerConfig . AddError ( err , true )
2022-11-21 17:36:05 +00:00
logger . Error ( ) . Err ( err ) . Send ( )
2022-03-17 17:02:08 +00:00
}
continue
}
if routerConfig . TLS . Passthrough {
2022-11-21 17:36:05 +00:00
logger . Debug ( ) . Msgf ( "Adding Passthrough route for %q" , routerConfig . Rule )
2022-12-06 17:28:05 +00:00
if err := router . muxerTCPTLS . AddRoute ( routerConfig . Rule , routerConfig . Priority , handler ) ; err != nil {
2022-03-17 17:02:08 +00:00
routerConfig . AddError ( err , true )
2022-11-21 17:36:05 +00:00
logger . Error ( ) . Err ( err ) . Send ( )
2022-03-17 17:02:08 +00:00
}
continue
}
for _ , domain := range domains {
if httpmuxer . IsASCII ( domain ) {
continue
}
asciiError := fmt . Errorf ( "invalid domain name value %q, non-ASCII characters are not allowed" , domain )
routerConfig . AddError ( asciiError , true )
2022-11-21 17:36:05 +00:00
logger . Error ( ) . Err ( asciiError ) . Send ( )
2022-03-17 17:02:08 +00:00
}
tlsOptionsName := routerConfig . TLS . Options
if len ( tlsOptionsName ) == 0 {
tlsOptionsName = traefiktls . DefaultTLSConfigName
}
if tlsOptionsName != traefiktls . DefaultTLSConfigName {
tlsOptionsName = provider . GetQualifiedName ( ctxRouter , tlsOptionsName )
}
tlsConf , err := m . tlsManager . Get ( traefiktls . DefaultTLSStoreName , tlsOptionsName )
if err != nil {
routerConfig . AddError ( err , true )
2022-11-21 17:36:05 +00:00
logger . Error ( ) . Err ( err ) . Send ( )
2022-12-06 17:28:05 +00:00
2022-12-07 14:33:51 +00:00
logger . Debug ( ) . Msgf ( "Adding special TLS closing route for %q because broken TLS options %s" , routerConfig . Rule , tlsOptionsName )
2022-12-06 17:28:05 +00:00
err = router . muxerTCPTLS . AddRoute ( routerConfig . Rule , routerConfig . Priority , & brokenTLSRouter { } )
if err != nil {
routerConfig . AddError ( err , true )
2022-12-07 14:33:51 +00:00
logger . Error ( ) . Err ( err ) . Send ( )
2022-12-06 17:28:05 +00:00
}
2022-03-17 17:02:08 +00:00
continue
}
// Now that the Rule is not just about the Host, we could theoretically have a config like:
// router1:
// rule: HostSNI(foo.com) && ClientIP(IP1)
// tlsOption: tlsOne
// router2:
// rule: HostSNI(foo.com) && ClientIP(IP2)
// tlsOption: tlsTwo
// i.e. same HostSNI but different tlsOptions
2022-12-06 17:28:05 +00:00
// This is only applicable if the muxer can decide about the routing _before_ telling the client about the tlsConf (i.e. before the TLS HandShake).
// This seems to be the case so far with the existing matchers (HostSNI, and ClientIP), so it's all good.
// Otherwise, we would have to do as for HTTPS, i.e. disallow different TLS configs for the same HostSNIs.
handler , err = m . buildTCPHandler ( ctxRouter , routerConfig )
if err != nil {
routerConfig . AddError ( err , true )
2022-12-07 14:33:51 +00:00
logger . Error ( ) . Err ( err ) . Send ( )
2022-12-06 17:28:05 +00:00
continue
}
handler = & tcp . TLSHandler {
Next : handler ,
Config : tlsConf ,
}
2022-03-17 17:02:08 +00:00
2022-11-21 17:36:05 +00:00
logger . Debug ( ) . Msgf ( "Adding TLS route for %q" , routerConfig . Rule )
2022-12-06 17:28:05 +00:00
err = router . muxerTCPTLS . AddRoute ( routerConfig . Rule , routerConfig . Priority , handler )
if err != nil {
2022-03-17 17:02:08 +00:00
routerConfig . AddError ( err , true )
2022-11-21 17:36:05 +00:00
logger . Error ( ) . Err ( err ) . Send ( )
2022-03-17 17:02:08 +00:00
}
}
}
func ( m * Manager ) buildTCPHandler ( ctx context . Context , router * runtime . TCPRouterInfo ) ( tcp . Handler , error ) {
var qualifiedNames [ ] string
for _ , name := range router . Middlewares {
qualifiedNames = append ( qualifiedNames , provider . GetQualifiedName ( ctx , name ) )
}
router . Middlewares = qualifiedNames
if router . Service == "" {
return nil , errors . New ( "the service is missing on the router" )
}
sHandler , err := m . serviceManager . BuildTCP ( ctx , router . Service )
if err != nil {
return nil , err
}
mHandler := m . middlewaresBuilder . BuildChain ( ctx , router . Middlewares )
return tcp . NewChain ( ) . Extend ( * mHandler ) . Then ( sHandler )
}