a42d396ed2
Co-authored-by: Kevin Pollet <pollet.kevin@gmail.com>
272 lines
8.3 KiB
Go
272 lines
8.3 KiB
Go
package auth
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"net"
|
|
"net/http"
|
|
"regexp"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/opentracing/opentracing-go/ext"
|
|
"github.com/traefik/traefik/v2/pkg/config/dynamic"
|
|
"github.com/traefik/traefik/v2/pkg/log"
|
|
"github.com/traefik/traefik/v2/pkg/middlewares"
|
|
"github.com/traefik/traefik/v2/pkg/tracing"
|
|
"github.com/vulcand/oxy/v2/forward"
|
|
"github.com/vulcand/oxy/v2/utils"
|
|
)
|
|
|
|
const (
|
|
xForwardedURI = "X-Forwarded-Uri"
|
|
xForwardedMethod = "X-Forwarded-Method"
|
|
forwardedTypeName = "ForwardedAuthType"
|
|
)
|
|
|
|
// hopHeaders Hop-by-hop headers to be removed in the authentication request.
|
|
// http://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html
|
|
// Proxy-Authorization header is forwarded to the authentication server (see https://tools.ietf.org/html/rfc7235#section-4.4).
|
|
var hopHeaders = []string{
|
|
forward.Connection,
|
|
forward.KeepAlive,
|
|
forward.Te, // canonicalized version of "TE"
|
|
forward.Trailers,
|
|
forward.TransferEncoding,
|
|
forward.Upgrade,
|
|
}
|
|
|
|
type forwardAuth struct {
|
|
address string
|
|
authResponseHeaders []string
|
|
authResponseHeadersRegex *regexp.Regexp
|
|
next http.Handler
|
|
name string
|
|
client http.Client
|
|
trustForwardHeader bool
|
|
authRequestHeaders []string
|
|
}
|
|
|
|
// NewForward creates a forward auth middleware.
|
|
func NewForward(ctx context.Context, next http.Handler, config dynamic.ForwardAuth, name string) (http.Handler, error) {
|
|
log.FromContext(middlewares.GetLoggerCtx(ctx, name, forwardedTypeName)).Debug("Creating middleware")
|
|
|
|
fa := &forwardAuth{
|
|
address: config.Address,
|
|
authResponseHeaders: config.AuthResponseHeaders,
|
|
next: next,
|
|
name: name,
|
|
trustForwardHeader: config.TrustForwardHeader,
|
|
authRequestHeaders: config.AuthRequestHeaders,
|
|
}
|
|
|
|
// Ensure our request client does not follow redirects
|
|
fa.client = http.Client{
|
|
CheckRedirect: func(r *http.Request, via []*http.Request) error {
|
|
return http.ErrUseLastResponse
|
|
},
|
|
Timeout: 30 * time.Second,
|
|
}
|
|
|
|
if config.TLS != nil {
|
|
tlsConfig, err := config.TLS.CreateTLSConfig(ctx)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to create client TLS configuration: %w", err)
|
|
}
|
|
|
|
tr := http.DefaultTransport.(*http.Transport).Clone()
|
|
tr.TLSClientConfig = tlsConfig
|
|
fa.client.Transport = tr
|
|
}
|
|
|
|
if config.AuthResponseHeadersRegex != "" {
|
|
re, err := regexp.Compile(config.AuthResponseHeadersRegex)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error compiling regular expression %s: %w", config.AuthResponseHeadersRegex, err)
|
|
}
|
|
fa.authResponseHeadersRegex = re
|
|
}
|
|
|
|
return fa, nil
|
|
}
|
|
|
|
func (fa *forwardAuth) GetTracingInformation() (string, ext.SpanKindEnum) {
|
|
return fa.name, ext.SpanKindRPCClientEnum
|
|
}
|
|
|
|
func (fa *forwardAuth) ServeHTTP(rw http.ResponseWriter, req *http.Request) {
|
|
logger := log.FromContext(middlewares.GetLoggerCtx(req.Context(), fa.name, forwardedTypeName))
|
|
|
|
forwardReq, err := http.NewRequest(http.MethodGet, fa.address, nil)
|
|
tracing.LogRequest(tracing.GetSpan(req), forwardReq)
|
|
if err != nil {
|
|
logger.Debugf("Error calling %s. Cause %s", fa.address, err)
|
|
tracing.SetErrorWithEvent(req, "Error calling %s. Cause %s", fa.address, err)
|
|
|
|
rw.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
// Ensure tracing headers are in the request before we copy the headers to the
|
|
// forwardReq.
|
|
tracing.InjectRequestHeaders(req)
|
|
|
|
writeHeader(req, forwardReq, fa.trustForwardHeader, fa.authRequestHeaders)
|
|
|
|
forwardResponse, forwardErr := fa.client.Do(forwardReq)
|
|
if forwardErr != nil {
|
|
logger.Debugf("Error calling %s. Cause: %s", fa.address, forwardErr)
|
|
tracing.SetErrorWithEvent(req, "Error calling %s. Cause: %s", fa.address, forwardErr)
|
|
|
|
rw.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
defer forwardResponse.Body.Close()
|
|
|
|
body, readError := io.ReadAll(forwardResponse.Body)
|
|
if readError != nil {
|
|
logger.Debugf("Error reading body %s. Cause: %s", fa.address, readError)
|
|
tracing.SetErrorWithEvent(req, "Error reading body %s. Cause: %s", fa.address, readError)
|
|
|
|
rw.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
// Pass the forward response's body and selected headers if it
|
|
// didn't return a response within the range of [200, 300).
|
|
if forwardResponse.StatusCode < http.StatusOK || forwardResponse.StatusCode >= http.StatusMultipleChoices {
|
|
logger.Debugf("Remote error %s. StatusCode: %d", fa.address, forwardResponse.StatusCode)
|
|
|
|
utils.CopyHeaders(rw.Header(), forwardResponse.Header)
|
|
utils.RemoveHeaders(rw.Header(), hopHeaders...)
|
|
|
|
// Grab the location header, if any.
|
|
redirectURL, err := forwardResponse.Location()
|
|
|
|
if err != nil {
|
|
if !errors.Is(err, http.ErrNoLocation) {
|
|
logger.Debugf("Error reading response location header %s. Cause: %s", fa.address, err)
|
|
tracing.SetErrorWithEvent(req, "Error reading response location header %s. Cause: %s", fa.address, err)
|
|
|
|
rw.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
} else if redirectURL.String() != "" {
|
|
// Set the location in our response if one was sent back.
|
|
rw.Header().Set("Location", redirectURL.String())
|
|
}
|
|
|
|
tracing.LogResponseCode(tracing.GetSpan(req), forwardResponse.StatusCode)
|
|
rw.WriteHeader(forwardResponse.StatusCode)
|
|
|
|
if _, err = rw.Write(body); err != nil {
|
|
logger.Error(err)
|
|
}
|
|
return
|
|
}
|
|
|
|
for _, headerName := range fa.authResponseHeaders {
|
|
headerKey := http.CanonicalHeaderKey(headerName)
|
|
req.Header.Del(headerKey)
|
|
if len(forwardResponse.Header[headerKey]) > 0 {
|
|
req.Header[headerKey] = append([]string(nil), forwardResponse.Header[headerKey]...)
|
|
}
|
|
}
|
|
|
|
if fa.authResponseHeadersRegex != nil {
|
|
for headerKey := range req.Header {
|
|
if fa.authResponseHeadersRegex.MatchString(headerKey) {
|
|
req.Header.Del(headerKey)
|
|
}
|
|
}
|
|
|
|
for headerKey, headerValues := range forwardResponse.Header {
|
|
if fa.authResponseHeadersRegex.MatchString(headerKey) {
|
|
req.Header[headerKey] = append([]string(nil), headerValues...)
|
|
}
|
|
}
|
|
}
|
|
|
|
req.RequestURI = req.URL.RequestURI()
|
|
fa.next.ServeHTTP(rw, req)
|
|
}
|
|
|
|
func writeHeader(req, forwardReq *http.Request, trustForwardHeader bool, allowedHeaders []string) {
|
|
utils.CopyHeaders(forwardReq.Header, req.Header)
|
|
|
|
RemoveConnectionHeaders(forwardReq)
|
|
utils.RemoveHeaders(forwardReq.Header, hopHeaders...)
|
|
|
|
forwardReq.Header = filterForwardRequestHeaders(forwardReq.Header, allowedHeaders)
|
|
|
|
if clientIP, _, err := net.SplitHostPort(req.RemoteAddr); err == nil {
|
|
if trustForwardHeader {
|
|
if prior, ok := req.Header[forward.XForwardedFor]; ok {
|
|
clientIP = strings.Join(prior, ", ") + ", " + clientIP
|
|
}
|
|
}
|
|
forwardReq.Header.Set(forward.XForwardedFor, clientIP)
|
|
}
|
|
|
|
xMethod := req.Header.Get(xForwardedMethod)
|
|
switch {
|
|
case xMethod != "" && trustForwardHeader:
|
|
forwardReq.Header.Set(xForwardedMethod, xMethod)
|
|
case req.Method != "":
|
|
forwardReq.Header.Set(xForwardedMethod, req.Method)
|
|
default:
|
|
forwardReq.Header.Del(xForwardedMethod)
|
|
}
|
|
|
|
xfp := req.Header.Get(forward.XForwardedProto)
|
|
switch {
|
|
case xfp != "" && trustForwardHeader:
|
|
forwardReq.Header.Set(forward.XForwardedProto, xfp)
|
|
case req.TLS != nil:
|
|
forwardReq.Header.Set(forward.XForwardedProto, "https")
|
|
default:
|
|
forwardReq.Header.Set(forward.XForwardedProto, "http")
|
|
}
|
|
|
|
if xfp := req.Header.Get(forward.XForwardedPort); xfp != "" && trustForwardHeader {
|
|
forwardReq.Header.Set(forward.XForwardedPort, xfp)
|
|
}
|
|
|
|
xfh := req.Header.Get(forward.XForwardedHost)
|
|
switch {
|
|
case xfh != "" && trustForwardHeader:
|
|
forwardReq.Header.Set(forward.XForwardedHost, xfh)
|
|
case req.Host != "":
|
|
forwardReq.Header.Set(forward.XForwardedHost, req.Host)
|
|
default:
|
|
forwardReq.Header.Del(forward.XForwardedHost)
|
|
}
|
|
|
|
xfURI := req.Header.Get(xForwardedURI)
|
|
switch {
|
|
case xfURI != "" && trustForwardHeader:
|
|
forwardReq.Header.Set(xForwardedURI, xfURI)
|
|
case req.URL.RequestURI() != "":
|
|
forwardReq.Header.Set(xForwardedURI, req.URL.RequestURI())
|
|
default:
|
|
forwardReq.Header.Del(xForwardedURI)
|
|
}
|
|
}
|
|
|
|
func filterForwardRequestHeaders(forwardRequestHeaders http.Header, allowedHeaders []string) http.Header {
|
|
if len(allowedHeaders) == 0 {
|
|
return forwardRequestHeaders
|
|
}
|
|
|
|
filteredHeaders := http.Header{}
|
|
for _, headerName := range allowedHeaders {
|
|
values := forwardRequestHeaders.Values(headerName)
|
|
if len(values) > 0 {
|
|
filteredHeaders[http.CanonicalHeaderKey(headerName)] = append([]string(nil), values...)
|
|
}
|
|
}
|
|
|
|
return filteredHeaders
|
|
}
|