Compare commits
59 Commits
v2024.6.26
...
master
Author | SHA1 | Date | |
---|---|---|---|
9d10a69b0d | |||
8b6e75ae77 | |||
692523e54f | |||
59ecfa7b4e | |||
cc5cdcea96 | |||
1af7248a6f | |||
8b132dddd4 | |||
6a4a144c97 | |||
ac7b7e8189 | |||
2df74bad4f | |||
076a3d784e | |||
826edef358 | |||
ce7415af20 | |||
7cc9de180c | |||
74c2a2c055 | |||
239d4573c3 | |||
cffe3eca1b | |||
a686c52aed | |||
c0470ca623 | |||
c611705d45 | |||
16fa751dc7 | |||
8983a44d9e | |||
11375e546f | |||
69501f6302 | |||
382d17cc85 | |||
9bd1d0fbd7 | |||
ecacbb1cbd | |||
910f1f8ba2 | |||
be59be1795 | |||
4d6958e2f5 | |||
f3b553cb10 | |||
0ff9391a1b | |||
d4c28b80d7 | |||
590505e17a | |||
867e7c549f | |||
169578c25d | |||
b0a71fc599 | |||
eea51c6030 | |||
04b41baea3 | |||
cb9260ac2b | |||
5eac425fda | |||
0b032fccc9 | |||
fea0610346 | |||
f37425018b | |||
4801974ca3 | |||
bf15732935 | |||
8317ac5b9a | |||
f35384c0f3 | |||
c73fe8cca5 | |||
3c1939f418 | |||
3565618335 | |||
64ca8fe1e4 | |||
d5669a4eb5 | |||
f3aa8b9be6 | |||
2de5e285a3 | |||
87e1c65607 | |||
f092520ee4 | |||
9084b6e05f | |||
5494abded4 |
2
.gitignore
vendored
2
.gitignore
vendored
@ -10,4 +10,4 @@
|
|||||||
/out
|
/out
|
||||||
.dockerconfigjson
|
.dockerconfigjson
|
||||||
*.prof
|
*.prof
|
||||||
proxy.test
|
*.test
|
12
Dockerfile
12
Dockerfile
@ -1,4 +1,4 @@
|
|||||||
FROM reg.cadoles.com/proxy_cache/library/golang:1.22.0 AS BUILD
|
FROM reg.cadoles.com/proxy_cache/library/golang:1.24.2 AS build
|
||||||
|
|
||||||
RUN apt-get update \
|
RUN apt-get update \
|
||||||
&& apt-get install -y make
|
&& apt-get install -y make
|
||||||
@ -33,7 +33,7 @@ RUN /src/dist/bouncer_linux_amd64_v1/bouncer -c '' config dump > /src/dist/bounc
|
|||||||
&& yq -i '.bootstrap.lockTimeout = "30s"' /src/dist/bouncer_linux_amd64_v1/config.yml \
|
&& yq -i '.bootstrap.lockTimeout = "30s"' /src/dist/bouncer_linux_amd64_v1/config.yml \
|
||||||
&& yq -i '.integrations.kubernetes.lockTimeout = "30s"' /src/dist/bouncer_linux_amd64_v1/config.yml
|
&& yq -i '.integrations.kubernetes.lockTimeout = "30s"' /src/dist/bouncer_linux_amd64_v1/config.yml
|
||||||
|
|
||||||
FROM reg.cadoles.com/proxy_cache/library/alpine:3.19.1 AS RUNTIME
|
FROM reg.cadoles.com/proxy_cache/library/alpine:3.21 AS runtime
|
||||||
|
|
||||||
RUN apk add --no-cache ca-certificates dumb-init
|
RUN apk add --no-cache ca-certificates dumb-init
|
||||||
|
|
||||||
@ -41,10 +41,10 @@ ENTRYPOINT ["/usr/bin/dumb-init", "--"]
|
|||||||
|
|
||||||
RUN mkdir -p /usr/local/bin /usr/share/bouncer/bin /etc/bouncer
|
RUN mkdir -p /usr/local/bin /usr/share/bouncer/bin /etc/bouncer
|
||||||
|
|
||||||
COPY --from=BUILD /src/dist/bouncer_linux_amd64_v1/bouncer /usr/share/bouncer/bin/bouncer
|
COPY --from=build /src/dist/bouncer_linux_amd64_v1/bouncer /usr/share/bouncer/bin/bouncer
|
||||||
COPY --from=BUILD /src/layers /usr/share/bouncer/layers
|
COPY --from=build /src/layers /usr/share/bouncer/layers
|
||||||
COPY --from=BUILD /src/templates /usr/share/bouncer/templates
|
COPY --from=build /src/templates /usr/share/bouncer/templates
|
||||||
COPY --from=BUILD /src/dist/bouncer_linux_amd64_v1/config.yml /etc/bouncer/config.yml
|
COPY --from=build /src/dist/bouncer_linux_amd64_v1/config.yml /etc/bouncer/config.yml
|
||||||
|
|
||||||
RUN ln -s /usr/share/bouncer/bin/bouncer /usr/local/bin/bouncer
|
RUN ln -s /usr/share/bouncer/bin/bouncer /usr/local/bin/bouncer
|
||||||
|
|
||||||
|
11
Makefile
11
Makefile
@ -17,7 +17,8 @@ GOTEST_ARGS ?= -short
|
|||||||
OPENWRT_DEVICE ?= 192.168.1.1
|
OPENWRT_DEVICE ?= 192.168.1.1
|
||||||
|
|
||||||
SIEGE_URLS_FILE ?= misc/siege/urls.txt
|
SIEGE_URLS_FILE ?= misc/siege/urls.txt
|
||||||
SIEGE_CONCURRENCY ?= 100
|
SIEGE_CONCURRENCY ?= 200
|
||||||
|
SIEGE_DURATION ?= 5M
|
||||||
|
|
||||||
data/bootstrap.d/dummy.yml:
|
data/bootstrap.d/dummy.yml:
|
||||||
mkdir -p data/bootstrap.d
|
mkdir -p data/bootstrap.d
|
||||||
@ -81,7 +82,7 @@ finish-release:
|
|||||||
git push --tags
|
git push --tags
|
||||||
|
|
||||||
docker-build:
|
docker-build:
|
||||||
docker build -t $(DOCKER_IMAGE_NAME):$(DOCKER_IMAGE_TAG) .
|
docker build --pull -t $(DOCKER_IMAGE_NAME):$(DOCKER_IMAGE_TAG) .
|
||||||
docker tag $(DOCKER_IMAGE_NAME):$(DOCKER_IMAGE_TAG) $(DOCKER_IMAGE_NAME):latest
|
docker tag $(DOCKER_IMAGE_NAME):$(DOCKER_IMAGE_TAG) $(DOCKER_IMAGE_NAME):latest
|
||||||
|
|
||||||
docker-release:
|
docker-release:
|
||||||
@ -114,7 +115,7 @@ grafterm: tools/grafterm/bin/grafterm
|
|||||||
siege:
|
siege:
|
||||||
$(eval TMP := $(shell mktemp))
|
$(eval TMP := $(shell mktemp))
|
||||||
cat $(SIEGE_URLS_FILE) | envsubst > $(TMP)
|
cat $(SIEGE_URLS_FILE) | envsubst > $(TMP)
|
||||||
siege -i -b -c $(SIEGE_CONCURRENCY) -f $(TMP)
|
siege -R ./misc/siege/siege.conf -i -b -c $(SIEGE_CONCURRENCY) -t $(SIEGE_DURATION) -f $(TMP)
|
||||||
rm -rf $(TMP)
|
rm -rf $(TMP)
|
||||||
|
|
||||||
tools/gitea-release/bin/gitea-release.sh:
|
tools/gitea-release/bin/gitea-release.sh:
|
||||||
@ -131,7 +132,7 @@ tools/grafterm/bin/grafterm:
|
|||||||
GOBIN=$(PWD)/tools/grafterm/bin go install github.com/slok/grafterm/cmd/grafterm@v0.2.0
|
GOBIN=$(PWD)/tools/grafterm/bin go install github.com/slok/grafterm/cmd/grafterm@v0.2.0
|
||||||
|
|
||||||
bench:
|
bench:
|
||||||
go test -bench=. -run '^$$' -count=10 ./...
|
go test -bench=. -run '^$$' -benchtime=10s ./internal/bench
|
||||||
|
|
||||||
tools/benchstat/bin/benchstat:
|
tools/benchstat/bin/benchstat:
|
||||||
mkdir -p tools/benchstat/bin
|
mkdir -p tools/benchstat/bin
|
||||||
@ -150,7 +151,7 @@ run-redis:
|
|||||||
-v $(PWD)/data/redis:/data \
|
-v $(PWD)/data/redis:/data \
|
||||||
-p 6379:6379 \
|
-p 6379:6379 \
|
||||||
redis:alpine3.17 \
|
redis:alpine3.17 \
|
||||||
redis-server --save 60 1 --loglevel warning
|
redis-server --save 60 1 --loglevel debug
|
||||||
|
|
||||||
redis-shell:
|
redis-shell:
|
||||||
docker exec -it \
|
docker exec -it \
|
||||||
|
13
README.md
13
README.md
@ -4,7 +4,16 @@
|
|||||||
|
|
||||||
# Bouncer
|
# Bouncer
|
||||||
|
|
||||||
Serveur mandataire inverse (_"reverse proxy"_) filtrant avec gestion de files d'attente dynamiques.
|
Serveur mandataire inverse (_"reverse proxy"_) avec fonctionnalités avancées pilotable par API REST.
|
||||||
|
|
||||||
|
## Fonctionnalités
|
||||||
|
|
||||||
|
- Authentification unique basée sur entêtes HTTP ("Trusted headers SSO") avec:
|
||||||
|
- Fournisseur d'identité OpenID Connect ;
|
||||||
|
- Basic Auth ;
|
||||||
|
- Origine réseau ;
|
||||||
|
- Gestion de files d'attente dynamiques pour maîtriser la charge sur les services protégés ;
|
||||||
|
- Réécriture dynamique des attributs (notamment entêtes HTTP) des requêtes/réponses via un DSL.
|
||||||
|
|
||||||
## Documentation
|
## Documentation
|
||||||
|
|
||||||
@ -12,4 +21,4 @@ Serveur mandataire inverse (_"reverse proxy"_) filtrant avec gestion de files d'
|
|||||||
|
|
||||||
## Licence
|
## Licence
|
||||||
|
|
||||||
AGPL-3.0
|
AGPL-3.0
|
||||||
|
@ -1,7 +1,8 @@
|
|||||||
# Documentation
|
# Documentation
|
||||||
|
|
||||||
- [(FR) - Premiers pas](./fr/getting-started.md)
|
|
||||||
- [(FR) - Architecture générale](./fr/general-architecture.md)
|
- [(FR) - Architecture générale](./fr/general-architecture.md)
|
||||||
|
- [(FR) - Terminologie](./fr/terminology.md)
|
||||||
|
- [(FR) - Premiers pas](./fr/getting-started.md)
|
||||||
|
|
||||||
## Exemples
|
## Exemples
|
||||||
|
|
||||||
@ -11,19 +12,22 @@
|
|||||||
|
|
||||||
- [(FR) - Layers](./fr/references/layers/README.md)
|
- [(FR) - Layers](./fr/references/layers/README.md)
|
||||||
- [(FR) - Métriques](./fr/references/metrics.md)
|
- [(FR) - Métriques](./fr/references/metrics.md)
|
||||||
- [(FR) - Fichier de configuration](../misc/packaging/common/config.yml)
|
- [(FR) - Configuration](./fr/references/configuration.md)
|
||||||
- [(FR) - API d'administration](./fr/references/admin_api.md)
|
- [(FR) - API d'administration](./fr/references/admin_api.md)
|
||||||
|
|
||||||
## Tutoriels
|
## Tutoriels
|
||||||
|
|
||||||
### Utilisation
|
### Utilisation
|
||||||
|
|
||||||
|
- [(FR) - Le cas du "virtual hosting"](./fr/tutorials/virtual-hosting.md)
|
||||||
- [(FR) - Ajouter un layer de type "file d'attente"](./fr/tutorials/add-queue-layer.md)
|
- [(FR) - Ajouter un layer de type "file d'attente"](./fr/tutorials/add-queue-layer.md)
|
||||||
- [(FR) - Ajouter une authentification OpenID Connect](./fr/tutorials/add-oidc-authn-layer.md)
|
- [(FR) - Ajouter une authentification OpenID Connect](./fr/tutorials/add-oidc-authn-layer.md)
|
||||||
- [(FR) - Amorçage d'un serveur Bouncer via la configuration](./fr/tutorials/bootstrapping.md)
|
- [(FR) - Amorçage d'un serveur Bouncer via la configuration](./fr/tutorials/bootstrapping.md)
|
||||||
- [(FR) - Intégration avec Kubernetes](./fr/tutorials/kubernetes-integration.md)
|
- [(FR) - Intégration avec Kubernetes](./fr/tutorials/kubernetes-integration.md)
|
||||||
|
- [(FR) - Profilage](./fr/tutorials/profiling.md)
|
||||||
|
|
||||||
### Développement
|
### Développement
|
||||||
|
|
||||||
- [(FR) - Démarrer avec les sources](./fr/tutorials/getting-started-with-sources.md)
|
- [(FR) - Démarrer avec les sources](./fr/tutorials/getting-started-with-sources.md)
|
||||||
- [(FR) - Créer son propre layer](./fr/tutorials/create-custom-layer.md)
|
- [(FR) - Créer son propre layer](./fr/tutorials/create-custom-layer.md)
|
||||||
|
- [(FR) - Étudier les performances de Bouncer](./fr/tutorials/profiling.md)
|
||||||
|
@ -2,31 +2,6 @@
|
|||||||
|
|
||||||
## Modèles de déploiement
|
## Modèles de déploiement
|
||||||
|
|
||||||
### Déploiement mono-noeud
|
### Mode mono-noeud
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Terminologie
|
|
||||||
|
|
||||||
Voici une liste des termes utilisés dans le lexique Bouncer.
|
|
||||||
|
|
||||||
### Proxy
|
|
||||||
|
|
||||||
Un "proxy" est une entité logique définissant le relation suivante:
|
|
||||||
|
|
||||||
- Un ou plusieurs patrons de filtrage sous la forme d'un patron d'URL avec le caractère `*` comme caractère générique. Ceux ci identifient le ou les domaines/chemins associés à l'entité;
|
|
||||||
- Une URL cible qui servira de base pour la réécriture des requêtes.
|
|
||||||
|
|
||||||
Un "proxy" peut avoir zéro ou plusieurs "layers" associés.
|
|
||||||
|
|
||||||
Un "proxy" peut être activé ou désactivé.
|
|
||||||
|
|
||||||
Un "proxy" a un poids qui définit son niveau de priorité dans la pile de traitement (plus son poids est élevé plus il est prioritaire).
|
|
||||||
|
|
||||||
### Layer
|
|
||||||
|
|
||||||
Un "layer" (calque) est une entité logique définissant un traitement à appliquer aux requêtes et/ou aux réponses transitant par un proxy.
|
|
||||||
|
|
||||||
Un "layer" peut être activé ou désactivé.
|
|
||||||
|
|
||||||
Un "layer" a un poids qui définit son niveau de priorité dans la pile de traitement (plus son poids est élevé plus il est prioritaire).
|
|
||||||
|
34
doc/fr/references/configuration.md
Normal file
34
doc/fr/references/configuration.md
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
# Configuration
|
||||||
|
|
||||||
|
## Référence
|
||||||
|
|
||||||
|
Vous trouverez ici un fichier de configuration de référence, complet et commenté:
|
||||||
|
|
||||||
|
[`misc/packaging/common/config.yml`](../../../misc/packaging/common/config.yml)
|
||||||
|
|
||||||
|
## Interpolation de variables
|
||||||
|
|
||||||
|
Il est possible d'utiliser de l'interpolation de variables d'environnement dans le fichier de configuration via la syntaxe `${var}`.
|
||||||
|
|
||||||
|
Les fonctions d'interpolation suivantes sont également disponibles:
|
||||||
|
|
||||||
|
- `${var^}`
|
||||||
|
- `${var^^}`
|
||||||
|
- `${var,}`
|
||||||
|
- `${var,,}`
|
||||||
|
- `${var:position}`
|
||||||
|
- `${var:position:length}`
|
||||||
|
- `${var#substring}`
|
||||||
|
- `${var##substring}`
|
||||||
|
- `${var%substring}`
|
||||||
|
- `${var%%substring}`
|
||||||
|
- `${var/substring/replacement}`
|
||||||
|
- `${var//substring/replacement}`
|
||||||
|
- `${var/#substring/replacement}`
|
||||||
|
- `${var/%substring/replacement}`
|
||||||
|
- `${#var}`
|
||||||
|
- `${var=default}`
|
||||||
|
- `${var:=default}`
|
||||||
|
- `${var:-default}`
|
||||||
|
|
||||||
|
_Voir le package [`github.com/drone/envsubst`](https://pkg.go.dev/github.com/drone/envsubst) pour plus de détails._
|
@ -27,8 +27,8 @@ Bouncer utilise le projet [`expr`](https://expr-lang.org/) comme DSL. En plus de
|
|||||||
Le comportement des règles par défaut est le suivant:
|
Le comportement des règles par défaut est le suivant:
|
||||||
|
|
||||||
1. L'ensemble des entêtes HTTP correspondant au patron `Remote-*` sont supprimés ;
|
1. L'ensemble des entêtes HTTP correspondant au patron `Remote-*` sont supprimés ;
|
||||||
2. L'identifiant de l'utilisateur identifié (`user.subject`) est exporté sous la forme de l'entête HTTP `Remote-User` ;
|
2. L'identifiant de l'utilisateur identifié (`vars.user.subject`) est exporté sous la forme de l'entête HTTP `Remote-User` ;
|
||||||
3. L'ensemble des attributs de l'utilisateur identifié (`user.attrs`) sont exportés sous la forme `Remote-User-Attr-<name>` où `<name>` est le nom de l'attribut en minuscule, avec les `_` transformés en `-`.
|
3. L'ensemble des attributs de l'utilisateur identifié (`vars.user.attrs`) sont exportés sous la forme `Remote-User-Attr-<name>` où `<name>` est le nom de l'attribut en minuscule, avec les `_` transformés en `-`.
|
||||||
|
|
||||||
### Fonctions
|
### Fonctions
|
||||||
|
|
||||||
@ -36,25 +36,25 @@ Le comportement des règles par défaut est le suivant:
|
|||||||
|
|
||||||
Interdire l'accès à l'utilisateur.
|
Interdire l'accès à l'utilisateur.
|
||||||
|
|
||||||
##### `add_header(name string, value string)`
|
##### `add_header(ctx, name string, value string)`
|
||||||
|
|
||||||
Ajouter une valeur à un entête HTTP via son nom `name` et sa valeur `value`.
|
Ajouter une valeur à un entête HTTP via son nom `name` et sa valeur `value`.
|
||||||
|
|
||||||
##### `set_header(name string, value string)`
|
##### `set_header(ctx, name string, value string)`
|
||||||
|
|
||||||
Définir la valeur d'un entête HTTP via son nom `name` et sa valeur `value`. La valeur précédente est écrasée.
|
Définir la valeur d'un entête HTTP via son nom `name` et sa valeur `value`. La valeur précédente est écrasée.
|
||||||
|
|
||||||
##### `del_headers(pattern string)`
|
##### `del_headers(ctx, pattern string)`
|
||||||
|
|
||||||
Supprimer un ou plusieurs entêtes HTTP dont le nom correspond au patron `pattern`.
|
Supprimer un ou plusieurs entêtes HTTP dont le nom correspond au patron `pattern`.
|
||||||
|
|
||||||
Le patron est défini par une chaîne comprenant un ou plusieurs caractères `*`, signifiant un ou plusieurs caractères arbitraires.
|
Le patron est défini par une chaîne comprenant un ou plusieurs caractères `*`, signifiant un ou plusieurs caractères arbitraires.
|
||||||
|
|
||||||
##### `set_host(host string)`
|
##### `set_host(ctx, host string)`
|
||||||
|
|
||||||
Modifier la valeur de l'entête `Host` de la requête.
|
Modifier la valeur de l'entête `Host` de la requête.
|
||||||
|
|
||||||
##### `set_url(url string)`
|
##### `set_url(ctx, url string)`
|
||||||
|
|
||||||
Modifier l'URL du serveur cible.
|
Modifier l'URL du serveur cible.
|
||||||
|
|
||||||
@ -62,7 +62,7 @@ Modifier l'URL du serveur cible.
|
|||||||
|
|
||||||
Les règles ont accès aux variables suivantes pendant leur exécution.
|
Les règles ont accès aux variables suivantes pendant leur exécution.
|
||||||
|
|
||||||
#### `user`
|
#### `vars.user`
|
||||||
|
|
||||||
L'utilisateur identifié par le layer.
|
L'utilisateur identifié par le layer.
|
||||||
|
|
||||||
|
@ -14,12 +14,12 @@ Les options disponibles pour le layer sont décrites via un [schéma JSON](https
|
|||||||
|
|
||||||
En plus de ces options spécifiques le layer peut également être configuré via [les options communes aux layers `authn-*`](../../../../../internal/proxy/director/layer/authn/layer-options.json).
|
En plus de ces options spécifiques le layer peut également être configuré via [les options communes aux layers `authn-*`](../../../../../internal/proxy/director/layer/authn/layer-options.json).
|
||||||
|
|
||||||
## Objet `user` et attributs
|
## Objet `vars.user` et attributs
|
||||||
|
|
||||||
L'objet `user` exposé au moteur de règles sera construit de la manière suivante:
|
L'objet `user` exposé au moteur de règles sera construit de la manière suivante:
|
||||||
|
|
||||||
- `user.subject` sera initialisé avec le nom d'utilisateur identifié ;
|
- `vars.user.subject` sera initialisé avec le nom d'utilisateur identifié ;
|
||||||
- `user.attrs` sera composé des attributs associés à l'utilisation (voir les options).
|
- `vars.user.attrs` sera composé des attributs associés à l'utilisation (voir les options).
|
||||||
|
|
||||||
## Métriques
|
## Métriques
|
||||||
|
|
||||||
|
@ -14,12 +14,12 @@ Les options disponibles pour le layer sont décrites via un [schéma JSON](https
|
|||||||
|
|
||||||
En plus de ces options spécifiques le layer peut également être configuré via [les options communes aux layers `authn-*`](../../../../../internal/proxy/director/layer/authn/layer-options.json).
|
En plus de ces options spécifiques le layer peut également être configuré via [les options communes aux layers `authn-*`](../../../../../internal/proxy/director/layer/authn/layer-options.json).
|
||||||
|
|
||||||
## Objet `user` et attributs
|
## Objet `vars.user` et attributs
|
||||||
|
|
||||||
L'objet `user` exposé au moteur de règles sera construit de la manière suivante:
|
L'objet `vars.user` exposé au moteur de règles sera construit de la manière suivante:
|
||||||
|
|
||||||
- `user.subject` sera initialisé avec le couple `<remote_address>:<remote_port>` ;
|
- `vars.user.subject` sera initialisé avec le couple `<remote_address>:<remote_port>` ;
|
||||||
- `user.attrs` sera vide.
|
- `vars.user.attrs` sera vide.
|
||||||
|
|
||||||
## Métriques
|
## Métriques
|
||||||
|
|
||||||
|
@ -16,18 +16,18 @@ Les options disponibles pour le layer sont décrites via un [schéma JSON](https
|
|||||||
|
|
||||||
En plus de ces options spécifiques le layer peut également être configuré via [les options communes aux layers `authn-*`](../../../../../internal/proxy/director/layer/authn/layer-options.json).
|
En plus de ces options spécifiques le layer peut également être configuré via [les options communes aux layers `authn-*`](../../../../../internal/proxy/director/layer/authn/layer-options.json).
|
||||||
|
|
||||||
## Objet `user` et attributs
|
## Objet `vars.user` et attributs
|
||||||
|
|
||||||
L'objet `user` exposé au moteur de règles sera construit de la manière suivante:
|
L'objet `vars.user` exposé au moteur de règles sera construit de la manière suivante:
|
||||||
|
|
||||||
- `user.subject` sera initialisé avec la valeur du [claim](https://openid.net/specs/openid-connect-core-1_0.html#Claims) `sub` extrait de l'`idToken` récupéré lors de l'authentification ;
|
- `vars.user.subject` sera initialisé avec la valeur du [claim](https://openid.net/specs/openid-connect-core-1_0.html#Claims) `sub` extrait de l'`idToken` récupéré lors de l'authentification ;
|
||||||
- `user.attrs` comportera les propriétés suivantes:
|
- `vars.user.attrs` comportera les propriétés suivantes:
|
||||||
|
|
||||||
- L'ensemble des `claims` provenant de l'`idToken` seront transposés en `claim_<name>` (ex: `idToken.iss` sera transposé en `user.attrs.claim_iss`) ;
|
- L'ensemble des `claims` provenant de l'`idToken` seront transposés en `claim_<name>` (ex: `idToken.iss` sera transposé en `vars.user.attrs.claim_iss`) ;
|
||||||
- `user.attrs.access_token`: le jeton d'accès associé à l'authentification ;
|
- `vars.user.attrs.access_token`: le jeton d'accès associé à l'authentification ;
|
||||||
- `user.attrs.refresh_token`: le jeton de rafraîchissement associé à l'authentification (si disponible, en fonction des `scopes` demandés par le client) ;
|
- `vars.user.attrs.refresh_token`: le jeton de rafraîchissement associé à l'authentification (si disponible, en fonction des `scopes` demandés par le client) ;
|
||||||
- `user.attrs.token_expiry`: Horodatage Unix (en secondes) associé à la date d'expiration du jeton d'accès ;
|
- `vars.user.attrs.token_expiry`: Horodatage Unix (en secondes) associé à la date d'expiration du jeton d'accès ;
|
||||||
- `user.attrs.logout_url`: URL de déconnexion pour la suppression de la session Bouncer.
|
- `vars.user.attrs.logout_url`: URL de déconnexion pour la suppression de la session Bouncer.
|
||||||
|
|
||||||
**Attention** Cette URL ne permet dans la plupart des cas que de supprimer la session côté Bouncer. La suppression de la session côté fournisseur d'identité est conditionné à la présence ou non de l'attribut [`end_session_endpoint`](https://openid.net/specs/openid-connect-session-1_0-17.html#OPMetadata) dans les données du point d'entrée de découverte de service (`.wellknown/openid-configuration`).
|
**Attention** Cette URL ne permet dans la plupart des cas que de supprimer la session côté Bouncer. La suppression de la session côté fournisseur d'identité est conditionné à la présence ou non de l'attribut [`end_session_endpoint`](https://openid.net/specs/openid-connect-session-1_0-17.html#OPMetadata) dans les données du point d'entrée de découverte de service (`.wellknown/openid-configuration`).
|
||||||
|
|
||||||
|
@ -24,30 +24,63 @@ Bouncer utilise le projet [`expr`](https://expr-lang.org/) comme DSL. En plus de
|
|||||||
|
|
||||||
#### Communes
|
#### Communes
|
||||||
|
|
||||||
##### `add_header(name string, value string)`
|
##### `add_header(ctx, name string, value string)`
|
||||||
|
|
||||||
Ajouter une valeur à un entête HTTP via son nom `name` et sa valeur `value`.
|
Ajouter une valeur à un entête HTTP via son nom `name` et sa valeur `value`.
|
||||||
|
|
||||||
##### `set_header(name string, value string)`
|
##### `set_header(ctx, name string, value string)`
|
||||||
|
|
||||||
Définir la valeur d'un entête HTTP via son nom `name` et sa valeur `value`. La valeur précédente est écrasée.
|
Définir la valeur d'un entête HTTP via son nom `name` et sa valeur `value`. La valeur précédente est écrasée.
|
||||||
|
|
||||||
##### `del_headers(pattern string)`
|
##### `del_headers(ctx, pattern string)`
|
||||||
|
|
||||||
Supprimer un ou plusieurs entêtes HTTP dont le nom correspond au patron `pattern`.
|
Supprimer un ou plusieurs entêtes HTTP dont le nom correspond au patron `pattern`.
|
||||||
|
|
||||||
Le patron est défini par une chaîne comprenant un ou plusieurs caractères `*`, signifiant un ou plusieurs caractères arbitraires.
|
Le patron est défini par une chaîne comprenant un ou plusieurs caractères `*`, signifiant un ou plusieurs caractères arbitraires.
|
||||||
|
|
||||||
|
##### `get_cookie(ctx, name string) Cookie`
|
||||||
|
|
||||||
|
Récupère un cookie depuis la requête/réponse (en fonction du contexte d'utilisation).
|
||||||
|
Retourne `nil` si le cookie n'existe pas.
|
||||||
|
|
||||||
|
**Cookie**
|
||||||
|
|
||||||
|
```js
|
||||||
|
// Plus d'informations sur https://pkg.go.dev/net/http#Cookie
|
||||||
|
{
|
||||||
|
name: "string", // Nom du cookie
|
||||||
|
value: "string", // Valeur associée au cookie
|
||||||
|
path: "string", // Chemin associé au cookie (présent uniquement dans un contexte de réponse)
|
||||||
|
domain: "string", // Domaine associé au cookie (présent uniquement dans un contexte de réponse)
|
||||||
|
expires: "string", // Date d'expiration du cookie (présent uniquement dans un contexte de réponse)
|
||||||
|
max_age: "string", // Age maximum du cookie (présent uniquement dans un contexte de réponse)
|
||||||
|
secure: "boolean", // Le cookie doit-il être présent uniquement en HTTPS ? (présent uniquement dans un contexte de réponse)
|
||||||
|
http_only: "boolean", // Le cookie est il accessible en Javascript ? (présent uniquement dans un contexte de réponse)
|
||||||
|
same_site: "int" // Voir https://pkg.go.dev/net/http#SameSite (présent uniquement dans un contexte de réponse)
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
##### `add_cookie(ctx, cookie Cookie)`
|
||||||
|
|
||||||
|
Définit un cookie sur la requête/réponse (en fonction du contexte d'utilisation).
|
||||||
|
Voir la méthode `get_cookie()` pour voir les attributs potentiels.
|
||||||
|
|
||||||
#### Requête
|
#### Requête
|
||||||
|
|
||||||
##### `set_host(host string)`
|
##### `set_host(ctx, host string)`
|
||||||
|
|
||||||
Modifier la valeur de l'entête `Host` de la requête.
|
Modifier la valeur de l'entête `Host` de la requête.
|
||||||
|
|
||||||
##### `set_url(url string)`
|
##### `set_url(ctx, url string)`
|
||||||
|
|
||||||
Modifier l'URL du serveur cible.
|
Modifier l'URL du serveur cible.
|
||||||
|
|
||||||
|
##### `redirect(ctx, statusCode int, url string)`
|
||||||
|
|
||||||
|
Interrompt la requête et retourne une redirection HTTP au client.
|
||||||
|
|
||||||
|
Le code HTTP utilisé doit être supérieur ou égale à `300` et inférieur à `400` (non inclus).
|
||||||
|
|
||||||
#### Réponse
|
#### Réponse
|
||||||
|
|
||||||
_Pas de fonctions spécifiques._
|
_Pas de fonctions spécifiques._
|
||||||
@ -58,7 +91,28 @@ Les règles ont accès aux variables suivantes pendant leur exécution. **Ces do
|
|||||||
|
|
||||||
#### Requête
|
#### Requête
|
||||||
|
|
||||||
##### `request`
|
##### `vars.original_url`
|
||||||
|
|
||||||
|
L'URL originale, avant réécriture du `Host` par Bouncer.
|
||||||
|
|
||||||
|
```js
|
||||||
|
{
|
||||||
|
scheme: "string", // Schéma HTTP de l'URL
|
||||||
|
opaque: "string", // Données opaque de l'URL
|
||||||
|
user: { // Identifiants d'URL (Basic Auth)
|
||||||
|
username: "",
|
||||||
|
password: ""
|
||||||
|
},
|
||||||
|
host: "string", // Nom d'hôte (<domaine>:<port>) de l'URL
|
||||||
|
path: "string", // Chemin de l'URL (format assaini)
|
||||||
|
raw_path: "string", // Chemin de l'URL (format brut)
|
||||||
|
raw_query: "string", // Variables d'URL (format brut)
|
||||||
|
fragment : "string", // Fragment d'URL (format assaini)
|
||||||
|
raw_fragment : "string" // Fragment d'URL (format brut)
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
##### `vars.request`
|
||||||
|
|
||||||
La requête en cours de traitement.
|
La requête en cours de traitement.
|
||||||
|
|
||||||
@ -66,48 +120,66 @@ La requête en cours de traitement.
|
|||||||
{
|
{
|
||||||
method: "string", // Méthode HTTP
|
method: "string", // Méthode HTTP
|
||||||
host: "string", // Nom d'hôte (`Host`) associé à la requête
|
host: "string", // Nom d'hôte (`Host`) associé à la requête
|
||||||
url: "string", // URL associée à la requête
|
url: { // URL associée à la requête sous sa forme structurée
|
||||||
|
scheme: "string", // Schéma HTTP de l'URL
|
||||||
|
opaque: "string", // Données opaque de l'URL
|
||||||
|
user: { // Identifiants d'URL (Basic Auth)
|
||||||
|
username: "",
|
||||||
|
password: ""
|
||||||
|
},
|
||||||
|
host: "string", // Nom d'hôte (<domaine>:<port>) de l'URL
|
||||||
|
path: "string", // Chemin de l'URL (format assaini)
|
||||||
|
raw_path: "string", // Chemin de l'URL (format brut)
|
||||||
|
raw_query: "string", // Variables d'URL (format brut)
|
||||||
|
fragment : "string", // Fragment d'URL (format assaini)
|
||||||
|
raw_fragment : "string" // Fragment d'URL (format brut)
|
||||||
|
},
|
||||||
|
raw_url: "string", // URL associée à la requête (format assaini)
|
||||||
proto: "string", // Numéro de version du protocole utilisé
|
proto: "string", // Numéro de version du protocole utilisé
|
||||||
protoMajor: "int", // Numéro de version majeure du protocole utilisé
|
proto_major: "int", // Numéro de version majeure du protocole utilisé
|
||||||
protoMinor: "int", // Numéro de version mineur du protocole utilisé
|
proto_minor: "int", // Numéro de version mineur du protocole utilisé
|
||||||
header: { // Table associative des entêtes HTTP associés à la requête
|
header: { // Table associative des entêtes HTTP associés à la requête
|
||||||
"string": ["string"]
|
"string": ["string"]
|
||||||
},
|
},
|
||||||
contentLength: "int", // Taille du corps de la requête
|
content_length: "int", // Taille du corps de la requête
|
||||||
transferEncoding: ["string"], // MIME-Type(s) d'encodage du corps de la requête
|
transfer_encoding: ["string"], // MIME-Type(s) d'encodage du corps de la requête
|
||||||
trailer: { // Table associative des entêtes HTTP associés à la requête, transmises après le corps de la requête
|
trailer: { // Table associative des entêtes HTTP associés à la requête, transmises après le corps de la requête
|
||||||
"string": ["string"]
|
"string": ["string"]
|
||||||
},
|
},
|
||||||
remoteAddr: "string", // Adresse du client HTTP à l'origine de la requête
|
remote_addr: "string", // Adresse du client HTTP à l'origine de la requête
|
||||||
requestUri: "string" // URL "brute" associée à la requêtes (avant opérations d'assainissement, utiliser "url" plutôt)
|
request_uri: "string" // URL "brute" associée à la requêtes (avant opérations d'assainissement, utiliser "url" plutôt)
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Réponse
|
#### Réponse
|
||||||
|
|
||||||
##### `response`
|
##### `vars.response`
|
||||||
|
|
||||||
La réponse en cours de traitement.
|
La réponse en cours de traitement.
|
||||||
|
|
||||||
```js
|
```js
|
||||||
{
|
{
|
||||||
statusCode: "int", // Code de statut de la réponse
|
status_code: "int", // Code de statut de la réponse
|
||||||
status: "string", // Message associé au code de statut
|
status: "string", // Message associé au code de statut
|
||||||
proto: "string", // Numéro de version du protocole utilisé
|
proto: "string", // Numéro de version du protocole utilisé
|
||||||
protoMajor: "int", // Numéro de version majeure du protocole utilisé
|
proto_major: "int", // Numéro de version majeure du protocole utilisé
|
||||||
protoMinor: "int", // Numéro de version mineur du protocole utilisé
|
proto_minor: "int", // Numéro de version mineur du protocole utilisé
|
||||||
header: { // Table associative des entêtes HTTP associés à la requête
|
header: { // Table associative des entêtes HTTP associés à la requête
|
||||||
"string": ["string"]
|
"string": ["string"]
|
||||||
},
|
},
|
||||||
contentLength: "int", // Taille du corps de la réponse
|
content_length: "int", // Taille du corps de la réponse
|
||||||
transferEncoding: ["string"], // MIME-Type(s) d'encodage du corps de la requête
|
transfer_encoding: ["string"], // MIME-Type(s) d'encodage du corps de la requête
|
||||||
trailer: { // Table associative des entêtes HTTP associés à la requête, transmises après le corps de la requête
|
trailer: { // Table associative des entêtes HTTP associés à la requête, transmises après le corps de la requête
|
||||||
"string": ["string"]
|
"string": ["string"]
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
##### `request`
|
##### `vars.request`
|
||||||
|
|
||||||
|
_Voir section précédente._
|
||||||
|
|
||||||
|
##### `vars.original_url`
|
||||||
|
|
||||||
_Voir section précédente._
|
_Voir section précédente._
|
||||||
|
|
||||||
|
29
doc/fr/terminology.md
Normal file
29
doc/fr/terminology.md
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
# Terminologie
|
||||||
|
|
||||||
|
Voici une liste des termes utilisés dans le lexique Bouncer.
|
||||||
|
|
||||||
|
## Proxy
|
||||||
|
|
||||||
|
Un proxy est une entité logique définie par les propriétés suivantes:
|
||||||
|
|
||||||
|
- Il possède **un ou plusieurs filtres d'origine** sous la forme de motifs d'URL avec le caractère `*` comme joker. Ces filtres identifient le ou les URLs associées au proxy.
|
||||||
|
- Il peut avoir **zéro ou une URL cible**, qui servira de base pour la réécriture des requêtes. Si l'URL est absente, on parle alors de "passthrough" (voir note).
|
||||||
|
- Il peut avoir **zéro ou plusieurs "layers" associés**.
|
||||||
|
- Il peut être **activé ou désactivé**.
|
||||||
|
- Il a **un poids qui définit son niveau de priorité** dans la pile de traitement (plus son poids est élevé plus il est prioritaire).
|
||||||
|
|
||||||
|
Pour résumer un proxy répond à la question "_Quelle URL orienter vers quel serveur cible ?_".
|
||||||
|
|
||||||
|
> **Passthrough**
|
||||||
|
>
|
||||||
|
> Un proxy "passthrough" est un proxy n'ayant pas d'URL cible (champ vide). Dans ce cas si les motifs d'URLs correspondent à l'URL de la requête Bouncer appliquera les layers associés puis passera la main aux proxies suivants.
|
||||||
|
|
||||||
|
## Layer
|
||||||
|
|
||||||
|
Un layer est une entité logique définie par les propriétés suivantes:
|
||||||
|
|
||||||
|
- Il a **un type auquel est associé un schéma d'options** permettant de configurer son comportement.
|
||||||
|
- Il peut être **activé ou désactivé**.
|
||||||
|
- Il a **un poids qui définit son niveau de priorité** dans la pile de traitement (plus son poids est élevé plus il est prioritaire).
|
||||||
|
|
||||||
|
Pour résumer un layer répond à la question "_Quel traitement appliquer à la requête et/ou réponse ?_".
|
@ -1,31 +1,68 @@
|
|||||||
# Analyser les performances de Bouncer
|
# Étudier les performances de Bouncer
|
||||||
|
|
||||||
1. Lancer un benchmark du proxy
|
## In situ
|
||||||
|
|
||||||
```shell
|
Il est possible d'activer via la configuration de Bouncer de endpoints capable de générer des fichiers de profil au format [`pprof`](https://github.com/google/pprof). Par défaut, le point d'entrée est `.bouncer/profiling` (l'activation et la personnalisation de ce point d'entrée sont modifiables via la [configuration](../../../misc/packaging/common/config.yml)).
|
||||||
go test -bench=. -run '^$' -count=5 -cpuprofile bench_proxy.prof ./internal/proxy
|
|
||||||
```
|
|
||||||
|
|
||||||
2. Visualiser les temps d'exécution
|
**Exemple:** Visualiser l'utilisation mémoire de Bouncer
|
||||||
|
|
||||||
```shell
|
```bash
|
||||||
go tool pprof -web bench_proxy.prof
|
go tool pprof -web http://<bouncer_proxy>/.bouncer/profiling/heap
|
||||||
```
|
```
|
||||||
|
|
||||||
3. Comparer les performances d'une exécution à l'autre
|
L'ensemble des profils disponibles sont visibles à l'adresse `http://<bouncer_proxy>/.bouncer/profiling`.
|
||||||
|
|
||||||
```shell
|
## En développement
|
||||||
# Lancer un premier benchmark
|
|
||||||
go test -bench=. -run '^$' -count=10 ./internal/proxy > bench_before.txt
|
|
||||||
|
|
||||||
# Faire des modifications sur les sources
|
Le package `./internal` est dédié à l'étude des performances de Bouncer. Il contient une suite de benchmarks simulant de proxies avec différentes configurations de layers afin d'évaluer les points d'engorgement sur le traitement des requêtes.
|
||||||
|
|
||||||
# Lancer un second benchmark
|
Voir le répertoire `./internal/bench/testdata/proxies` pour voir les différentes configurations de cas.
|
||||||
go test -bench=. -run '^$' -count=10 ./internal/proxy > bench_after.txt
|
|
||||||
|
|
||||||
# Installer l'outil benchstat
|
### Lancer les benchmarks
|
||||||
make tools/benchstat/bin/benchstat
|
|
||||||
|
|
||||||
# Comparer les rapports
|
Le plus simple est d'utiliser la commande `make bench` qui exécutera séquentiellement tous les benchmarks. Il est également possible de lancer un benchmark spécifique via la commande suivante:
|
||||||
tools/benchstat/bin/benchstat bench_before.txt bench_after.txt
|
|
||||||
```
|
```bash
|
||||||
|
go test -bench="BenchmarkProxies/$BENCH_CASE" -run='^$' ./internal/bench
|
||||||
|
```
|
||||||
|
|
||||||
|
Par exemple:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Pour exécuter ./internal/bench/testdata/proxies/basic-auth.yml
|
||||||
|
go test -bench='BenchmarkProxies/basic-auth' -run='^$' ./internal/bench
|
||||||
|
```
|
||||||
|
|
||||||
|
### Visualiser les profils d'exécution
|
||||||
|
|
||||||
|
Vous pouvez visualiser les profils d'exécution via la commande suivante:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
go tool pprof -web path/to/file.prof
|
||||||
|
```
|
||||||
|
|
||||||
|
Par défaut l'exécution des benchmarks créera automatiquement des fichiers de profil dans le répertoire `./internal/bench/testdata/proxies`.
|
||||||
|
|
||||||
|
Par exemple:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
go tool pprof -web ./internal/bench/testdata/proxies/basic-auth.prof
|
||||||
|
```
|
||||||
|
|
||||||
|
### Comparer les évolutions
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Lancer un premier benchmark
|
||||||
|
go test -bench="BenchmarkProxies/$BENCH_CASE" -run='^$' ./internal/bench
|
||||||
|
|
||||||
|
# Faire une sauvegarde du fichier de profil
|
||||||
|
cp ./internal/bench/testdata/proxies/$BENCH_CASE.prof ./internal/bench/testdata/proxies/$BENCH_CASE-prev.prof
|
||||||
|
|
||||||
|
# Faire des modifications sur les sources
|
||||||
|
|
||||||
|
# Lancer un second benchmark
|
||||||
|
go test -bench="BenchmarkProxies/$BENCH_CASE" -run='^$' ./internal/bench
|
||||||
|
|
||||||
|
# Visualiser la différence entre les deux profils
|
||||||
|
go tool pprof -web -base=./internal/bench/testdata/proxies/$BENCH_CASE-prev.prof ./internal/bench/testdata/proxies/$BENCH_CASE.prof
|
||||||
|
```
|
||||||
|
129
doc/fr/tutorials/virtual-hosting.md
Normal file
129
doc/fr/tutorials/virtual-hosting.md
Normal file
@ -0,0 +1,129 @@
|
|||||||
|
# Le cas du "virtual hosting"
|
||||||
|
|
||||||
|
De nombreux serveurs HTTP utilisent le mécanisme du ["virtual hosting"](https://en.wikipedia.org/wiki/Virtual_hosting) afin d'héberger plusieurs sites/applications différentes sur un même serveur, se basant alors sur l'entête HTTP `Host` pour effectuer le routage.
|
||||||
|
|
||||||
|
## Exemple
|
||||||
|
|
||||||
|
Pour exemple, avec le site [example.net](https://example.net) il est facile de tester ce type de comportement. Ainsi, en exécutant une requête HTTP avec `curl`:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
curl -I https://example.net
|
||||||
|
```
|
||||||
|
|
||||||
|
On obtient le résultat suivant:
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/2 200
|
||||||
|
accept-ranges: bytes
|
||||||
|
age: 568237
|
||||||
|
cache-control: max-age=604800
|
||||||
|
content-type: text/html; charset=UTF-8
|
||||||
|
date: Thu, 27 Jun 2024 08:32:46 GMT
|
||||||
|
etag: "3147526947"
|
||||||
|
expires: Thu, 04 Jul 2024 08:32:46 GMT
|
||||||
|
last-modified: Thu, 17 Oct 2019 07:18:26 GMT
|
||||||
|
server: ECAcc (bsb/2789)
|
||||||
|
x-cache: HIT
|
||||||
|
content-length: 1256
|
||||||
|
```
|
||||||
|
|
||||||
|
Ce résultat indique que le serveur a correctement orienté notre requête (code HTTP `200`) et qu'il nous a renvoyé la réponse attendue.
|
||||||
|
|
||||||
|
Si maintenant on modifie l'entête `Host` de notre requête pour la remplacer par une valeur arbitraire:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
curl -I -H 'Host: localhost:8080' https://example.net
|
||||||
|
```
|
||||||
|
|
||||||
|
On obtient alors le résultat:
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/2 404
|
||||||
|
content-type: text/html
|
||||||
|
date: Thu, 27 Jun 2024 08:38:04 GMT
|
||||||
|
server: ECAcc (bsb/2789)
|
||||||
|
content-length: 345
|
||||||
|
```
|
||||||
|
|
||||||
|
Le serveur nous répond avec un code HTTP `404`, indiquant qu'il n'a pas trouvé la page demandée.
|
||||||
|
|
||||||
|
> **Note**
|
||||||
|
> Le code HTTP retourné par le serveur peut varier en fonction des implémentations. Parfois la requête sera orientée vers la page par défaut, parfois vous recevrez un code d'erreur HTTP comme `404`, `421`, etc.
|
||||||
|
|
||||||
|
## Avec Bouncer
|
||||||
|
|
||||||
|
Ce mécanisme peut parfois poser problème avec Bouncer car par défaut celui ci n'effectue pas de réécriture de l'entête `Host`. Pour exemple:
|
||||||
|
|
||||||
|
1. Créez puis activez un nouveau proxy pointant vers https://example.net
|
||||||
|
|
||||||
|
```shell
|
||||||
|
bouncer admin proxy create --proxy-name example --proxy-to https://example.net
|
||||||
|
bouncer admin proxy update --proxy-name example --proxy-enabled=true
|
||||||
|
```
|
||||||
|
|
||||||
|
2. Avec `curl`, faites une requête sur votre nouveau proxy:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
curl -I http://localhost:8080
|
||||||
|
```
|
||||||
|
|
||||||
|
La réponse devrait ressembler à:
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 404 Not Found
|
||||||
|
Content-Length: 345
|
||||||
|
Content-Type: text/html
|
||||||
|
Date: Thu, 27 Jun 2024 08:49:05 GMT
|
||||||
|
Server: ECAcc (bsb/2789)
|
||||||
|
```
|
||||||
|
|
||||||
|
On retrouve bien notre code HTTP `404` tel que vu plus haut. En effet, vu que l'on accède au proxy Bouncer avec `http://localhost:8080` alors le serveur distant recevra l'entête `Host: localhost:8080`.
|
||||||
|
|
||||||
|
### Comment corriger la situation ?
|
||||||
|
|
||||||
|
Le layer [`rewriter`](../references/layers/rewriter.md) a été implémenté notamment pour répondre à ce type de cas. Voyons comment l'utiliser:
|
||||||
|
|
||||||
|
1. Créez puis activez un nouveau layer pour votre proxy `example`:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Création du layer
|
||||||
|
bouncer admin layer create --proxy-name example --layer-name host-rewrite --layer-type rewriter
|
||||||
|
|
||||||
|
# Mise à jour et activation du layer
|
||||||
|
bouncer admin layer update \
|
||||||
|
--proxy-name example \
|
||||||
|
--layer-name host-rewrite \
|
||||||
|
--layer-options '{ "rules": { "request": ["set_host(\"example.net\")"] } }' \
|
||||||
|
--layer-enabled=true
|
||||||
|
```
|
||||||
|
|
||||||
|
> **Les règles**
|
||||||
|
>
|
||||||
|
> Le layer `rewriter` permet la modification des requêtes/réponses via un moteur de règles.
|
||||||
|
>
|
||||||
|
> [Voir la page du layer pour plus d'informations](../references/layers/rewriter.md) sur la syntaxe ainsi que sur l'API à disposition des règles.
|
||||||
|
|
||||||
|
2. Testez maintenant à nouveau un appel vers votre proxy:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
curl -I http://localhost:8080
|
||||||
|
```
|
||||||
|
|
||||||
|
La réponse devrait ressembler à:
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Accept-Ranges: bytes
|
||||||
|
Age: 569980
|
||||||
|
Cache-Control: max-age=604800
|
||||||
|
Content-Length: 1256
|
||||||
|
Content-Type: text/html; charset=UTF-8
|
||||||
|
Date: Thu, 27 Jun 2024 09:01:49 GMT
|
||||||
|
Etag: "3147526947"
|
||||||
|
Expires: Thu, 04 Jul 2024 09:01:49 GMT
|
||||||
|
Last-Modified: Thu, 17 Oct 2019 07:18:26 GMT
|
||||||
|
Server: ECAcc (bsb/2789)
|
||||||
|
X-Cache: HIT
|
||||||
|
```
|
||||||
|
|
||||||
|
Cette fois ci, le serveur distant a bien identifié la cible de notre requête.
|
Before Width: | Height: | Size: 35 KiB After Width: | Height: | Size: 35 KiB |
28
go.mod
28
go.mod
@ -1,11 +1,11 @@
|
|||||||
module forge.cadoles.com/cadoles/bouncer
|
module forge.cadoles.com/cadoles/bouncer
|
||||||
|
|
||||||
go 1.21
|
go 1.23
|
||||||
|
|
||||||
toolchain go1.22.0
|
toolchain go1.23.0
|
||||||
|
|
||||||
require (
|
require (
|
||||||
forge.cadoles.com/Cadoles/go-proxy v0.0.0-20230701194111-c6b3d482cca6
|
forge.cadoles.com/Cadoles/go-proxy v0.0.0-20240626132607-e1db6466a926
|
||||||
github.com/Masterminds/sprig/v3 v3.2.3
|
github.com/Masterminds/sprig/v3 v3.2.3
|
||||||
github.com/bsm/redislock v0.9.4
|
github.com/bsm/redislock v0.9.4
|
||||||
github.com/btcsuite/btcd/btcutil v1.1.3
|
github.com/btcsuite/btcd/btcutil v1.1.3
|
||||||
@ -92,9 +92,9 @@ require (
|
|||||||
github.com/xeipuuv/gojsonschema v1.2.0 // indirect
|
github.com/xeipuuv/gojsonschema v1.2.0 // indirect
|
||||||
go.opentelemetry.io/otel v1.21.0 // indirect
|
go.opentelemetry.io/otel v1.21.0 // indirect
|
||||||
go.opentelemetry.io/otel/trace v1.21.0 // indirect
|
go.opentelemetry.io/otel/trace v1.21.0 // indirect
|
||||||
golang.org/x/net v0.19.0 // indirect
|
golang.org/x/net v0.26.0 // indirect
|
||||||
golang.org/x/sync v0.7.0 // indirect
|
golang.org/x/sync v0.7.0 // indirect
|
||||||
golang.org/x/text v0.14.0 // indirect
|
golang.org/x/text v0.16.0 // indirect
|
||||||
golang.org/x/time v0.3.0 // indirect
|
golang.org/x/time v0.3.0 // indirect
|
||||||
google.golang.org/appengine v1.6.8 // indirect
|
google.golang.org/appengine v1.6.8 // indirect
|
||||||
google.golang.org/protobuf v1.33.0 // indirect
|
google.golang.org/protobuf v1.33.0 // indirect
|
||||||
@ -111,18 +111,18 @@ require (
|
|||||||
require (
|
require (
|
||||||
cdr.dev/slog v1.6.1 // indirect
|
cdr.dev/slog v1.6.1 // indirect
|
||||||
github.com/cpuguy83/go-md2man/v2 v2.0.2 // indirect
|
github.com/cpuguy83/go-md2man/v2 v2.0.2 // indirect
|
||||||
github.com/decred/dcrd/dcrec/secp256k1/v4 v4.2.0 // indirect
|
github.com/decred/dcrd/dcrec/secp256k1/v4 v4.3.0 // indirect
|
||||||
github.com/go-chi/cors v1.2.1
|
github.com/go-chi/cors v1.2.1
|
||||||
github.com/go-playground/locales v0.14.0 // indirect
|
github.com/go-playground/locales v0.14.0 // indirect
|
||||||
github.com/go-playground/universal-translator v0.18.0 // indirect
|
github.com/go-playground/universal-translator v0.18.0 // indirect
|
||||||
github.com/goccy/go-json v0.10.2 // indirect
|
github.com/goccy/go-json v0.10.3 // indirect
|
||||||
github.com/google/uuid v1.3.0
|
github.com/google/uuid v1.3.0
|
||||||
github.com/leodido/go-urn v1.2.1 // indirect
|
github.com/leodido/go-urn v1.2.1 // indirect
|
||||||
github.com/lestrrat-go/blackmagic v1.0.2 // indirect
|
github.com/lestrrat-go/blackmagic v1.0.2 // indirect
|
||||||
github.com/lestrrat-go/httpcc v1.0.1 // indirect
|
github.com/lestrrat-go/httpcc v1.0.1 // indirect
|
||||||
github.com/lestrrat-go/httprc v1.0.4 // indirect
|
github.com/lestrrat-go/httprc v1.0.5 // indirect
|
||||||
github.com/lestrrat-go/iter v1.0.2 // indirect
|
github.com/lestrrat-go/iter v1.0.2 // indirect
|
||||||
github.com/lestrrat-go/jwx/v2 v2.0.19
|
github.com/lestrrat-go/jwx/v2 v2.1.0
|
||||||
github.com/lestrrat-go/option v1.0.1 // indirect
|
github.com/lestrrat-go/option v1.0.1 // indirect
|
||||||
github.com/lib/pq v1.10.0 // indirect
|
github.com/lib/pq v1.10.0 // indirect
|
||||||
github.com/lithammer/shortuuid/v4 v4.0.0
|
github.com/lithammer/shortuuid/v4 v4.0.0
|
||||||
@ -132,11 +132,11 @@ require (
|
|||||||
github.com/urfave/cli/v2 v2.25.3
|
github.com/urfave/cli/v2 v2.25.3
|
||||||
github.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 // indirect
|
github.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 // indirect
|
||||||
gitlab.com/wpetit/goweb v0.0.0-20240226160244-6b2826c79f88
|
gitlab.com/wpetit/goweb v0.0.0-20240226160244-6b2826c79f88
|
||||||
golang.org/x/crypto v0.19.0
|
golang.org/x/crypto v0.24.0
|
||||||
golang.org/x/mod v0.14.0 // indirect
|
golang.org/x/mod v0.17.0 // indirect
|
||||||
golang.org/x/sys v0.17.0 // indirect
|
golang.org/x/sys v0.21.0 // indirect
|
||||||
golang.org/x/term v0.17.0 // indirect
|
golang.org/x/term v0.21.0 // indirect
|
||||||
golang.org/x/tools v0.16.1 // indirect
|
golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d // indirect
|
||||||
golang.org/x/xerrors v0.0.0-20231012003039-104605ab7028 // indirect
|
golang.org/x/xerrors v0.0.0-20231012003039-104605ab7028 // indirect
|
||||||
gopkg.in/go-playground/validator.v9 v9.29.1 // indirect
|
gopkg.in/go-playground/validator.v9 v9.29.1 // indirect
|
||||||
gopkg.in/yaml.v3 v3.0.1
|
gopkg.in/yaml.v3 v3.0.1
|
||||||
|
52
go.sum
52
go.sum
@ -8,8 +8,8 @@ cloud.google.com/go/logging v1.7.0 h1:CJYxlNNNNAMkHp9em/YEXcfJg+rPDg7YfwoRpMU+t5
|
|||||||
cloud.google.com/go/logging v1.7.0/go.mod h1:3xjP2CjkM3ZkO73aj4ASA5wRPGGCRrPIAeNqVNkzY8M=
|
cloud.google.com/go/logging v1.7.0/go.mod h1:3xjP2CjkM3ZkO73aj4ASA5wRPGGCRrPIAeNqVNkzY8M=
|
||||||
cloud.google.com/go/longrunning v0.5.1 h1:Fr7TXftcqTudoyRJa113hyaqlGdiBQkp0Gq7tErFDWI=
|
cloud.google.com/go/longrunning v0.5.1 h1:Fr7TXftcqTudoyRJa113hyaqlGdiBQkp0Gq7tErFDWI=
|
||||||
cloud.google.com/go/longrunning v0.5.1/go.mod h1:spvimkwdz6SPWKEt/XBij79E9fiTkHSQl/fRUUQJYJc=
|
cloud.google.com/go/longrunning v0.5.1/go.mod h1:spvimkwdz6SPWKEt/XBij79E9fiTkHSQl/fRUUQJYJc=
|
||||||
forge.cadoles.com/Cadoles/go-proxy v0.0.0-20230701194111-c6b3d482cca6 h1:FTk0ZoaV5N8Tkps5Da5RrDMZZXSHZIuD67Hy1Y4fsos=
|
forge.cadoles.com/Cadoles/go-proxy v0.0.0-20240626132607-e1db6466a926 h1:gSTTuW2lqH66cGVrhplrVrqos62BY1/GxR3KYh2TElk=
|
||||||
forge.cadoles.com/Cadoles/go-proxy v0.0.0-20230701194111-c6b3d482cca6/go.mod h1:o8ZK5v/3J1dRmklFVn1l6WHAyQ3LgegyHjRIT8KLAFw=
|
forge.cadoles.com/Cadoles/go-proxy v0.0.0-20240626132607-e1db6466a926/go.mod h1:o8ZK5v/3J1dRmklFVn1l6WHAyQ3LgegyHjRIT8KLAFw=
|
||||||
github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1 h1:UQHMgLO+TxOElx5B5HZ4hJQsoJ/PvUvKRhJHDQXO8P8=
|
github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1 h1:UQHMgLO+TxOElx5B5HZ4hJQsoJ/PvUvKRhJHDQXO8P8=
|
||||||
github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1/go.mod h1:xomTg63KZ2rFqZQzSB4Vz2SUXa1BpHTVz9L5PTmPC4E=
|
github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1/go.mod h1:xomTg63KZ2rFqZQzSB4Vz2SUXa1BpHTVz9L5PTmPC4E=
|
||||||
github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
|
github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
|
||||||
@ -83,8 +83,8 @@ github.com/dchest/uniuri v1.2.0 h1:koIcOUdrTIivZgSLhHQvKgqdWZq5d7KdMEWF1Ud6+5g=
|
|||||||
github.com/dchest/uniuri v1.2.0/go.mod h1:fSzm4SLHzNZvWLvWJew423PhAzkpNQYq+uNLq4kxhkY=
|
github.com/dchest/uniuri v1.2.0/go.mod h1:fSzm4SLHzNZvWLvWJew423PhAzkpNQYq+uNLq4kxhkY=
|
||||||
github.com/decred/dcrd/crypto/blake256 v1.0.0/go.mod h1:sQl2p6Y26YV+ZOcSTP6thNdn47hh8kt6rqSlvmrXFAc=
|
github.com/decred/dcrd/crypto/blake256 v1.0.0/go.mod h1:sQl2p6Y26YV+ZOcSTP6thNdn47hh8kt6rqSlvmrXFAc=
|
||||||
github.com/decred/dcrd/dcrec/secp256k1/v4 v4.0.1/go.mod h1:hyedUtir6IdtD/7lIxGeCxkaw7y45JueMRL4DIyJDKs=
|
github.com/decred/dcrd/dcrec/secp256k1/v4 v4.0.1/go.mod h1:hyedUtir6IdtD/7lIxGeCxkaw7y45JueMRL4DIyJDKs=
|
||||||
github.com/decred/dcrd/dcrec/secp256k1/v4 v4.2.0 h1:8UrgZ3GkP4i/CLijOJx79Yu+etlyjdBU4sfcs2WYQMs=
|
github.com/decred/dcrd/dcrec/secp256k1/v4 v4.3.0 h1:rpfIENRNNilwHwZeG5+P150SMrnNEcHYvcCuK6dPZSg=
|
||||||
github.com/decred/dcrd/dcrec/secp256k1/v4 v4.2.0/go.mod h1:v57UDF4pDQJcEfFUCRop3lJL149eHGSe9Jvczhzjo/0=
|
github.com/decred/dcrd/dcrec/secp256k1/v4 v4.3.0/go.mod h1:v57UDF4pDQJcEfFUCRop3lJL149eHGSe9Jvczhzjo/0=
|
||||||
github.com/decred/dcrd/lru v1.0.0/go.mod h1:mxKOwFd7lFjN2GZYsiz/ecgqR6kkYAl+0pz0tEMk218=
|
github.com/decred/dcrd/lru v1.0.0/go.mod h1:mxKOwFd7lFjN2GZYsiz/ecgqR6kkYAl+0pz0tEMk218=
|
||||||
github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f h1:lO4WD4F/rVNCu3HqELle0jiPLLBs70cWOduZpkS1E78=
|
github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f h1:lO4WD4F/rVNCu3HqELle0jiPLLBs70cWOduZpkS1E78=
|
||||||
github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f/go.mod h1:cuUVRXasLTGF7a8hSLbxyZXjz+1KgoB3wDUb6vlszIc=
|
github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f/go.mod h1:cuUVRXasLTGF7a8hSLbxyZXjz+1KgoB3wDUb6vlszIc=
|
||||||
@ -133,8 +133,8 @@ github.com/go-sql-driver/mysql v1.6.0 h1:BCTh4TKNUYmOmMUcQ3IipzF5prigylS7XXjEkfC
|
|||||||
github.com/go-sql-driver/mysql v1.6.0/go.mod h1:DCzpHaOWr8IXmIStZouvnhqoel9Qv2LBy8hT2VhHyBg=
|
github.com/go-sql-driver/mysql v1.6.0/go.mod h1:DCzpHaOWr8IXmIStZouvnhqoel9Qv2LBy8hT2VhHyBg=
|
||||||
github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 h1:tfuBGBXKqDEevZMzYi5KSi8KkcZtzBcTgAUUtapy0OI=
|
github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 h1:tfuBGBXKqDEevZMzYi5KSi8KkcZtzBcTgAUUtapy0OI=
|
||||||
github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572/go.mod h1:9Pwr4B2jHnOSGXyyzV8ROjYa2ojvAY6HCGYYfMoC3Ls=
|
github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572/go.mod h1:9Pwr4B2jHnOSGXyyzV8ROjYa2ojvAY6HCGYYfMoC3Ls=
|
||||||
github.com/goccy/go-json v0.10.2 h1:CrxCmQqYDkv1z7lO7Wbh2HN93uovUHgrECaO5ZrCXAU=
|
github.com/goccy/go-json v0.10.3 h1:KZ5WoDbxAIgm2HNbYckL0se1fHD6rz5j4ywS6ebzDqA=
|
||||||
github.com/goccy/go-json v0.10.2/go.mod h1:6MelG93GURQebXPDq3khkgXZkazVtN9CRI+MGFi0w8I=
|
github.com/goccy/go-json v0.10.3/go.mod h1:oq7eo15ShAhp70Anwd5lgX2pLfOS3QCiwU/PULtXL6M=
|
||||||
github.com/godbus/dbus/v5 v5.0.4/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA=
|
github.com/godbus/dbus/v5 v5.0.4/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA=
|
||||||
github.com/godbus/dbus/v5 v5.0.6/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA=
|
github.com/godbus/dbus/v5 v5.0.6/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA=
|
||||||
github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q=
|
github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q=
|
||||||
@ -208,12 +208,12 @@ github.com/lestrrat-go/blackmagic v1.0.2 h1:Cg2gVSc9h7sz9NOByczrbUvLopQmXrfFx//N
|
|||||||
github.com/lestrrat-go/blackmagic v1.0.2/go.mod h1:UrEqBzIR2U6CnzVyUtfM6oZNMt/7O7Vohk2J0OGSAtU=
|
github.com/lestrrat-go/blackmagic v1.0.2/go.mod h1:UrEqBzIR2U6CnzVyUtfM6oZNMt/7O7Vohk2J0OGSAtU=
|
||||||
github.com/lestrrat-go/httpcc v1.0.1 h1:ydWCStUeJLkpYyjLDHihupbn2tYmZ7m22BGkcvZZrIE=
|
github.com/lestrrat-go/httpcc v1.0.1 h1:ydWCStUeJLkpYyjLDHihupbn2tYmZ7m22BGkcvZZrIE=
|
||||||
github.com/lestrrat-go/httpcc v1.0.1/go.mod h1:qiltp3Mt56+55GPVCbTdM9MlqhvzyuL6W/NMDA8vA5E=
|
github.com/lestrrat-go/httpcc v1.0.1/go.mod h1:qiltp3Mt56+55GPVCbTdM9MlqhvzyuL6W/NMDA8vA5E=
|
||||||
github.com/lestrrat-go/httprc v1.0.4 h1:bAZymwoZQb+Oq8MEbyipag7iSq6YIga8Wj6GOiJGdI8=
|
github.com/lestrrat-go/httprc v1.0.5 h1:bsTfiH8xaKOJPrg1R+E3iE/AWZr/x0Phj9PBTG/OLUk=
|
||||||
github.com/lestrrat-go/httprc v1.0.4/go.mod h1:mwwz3JMTPBjHUkkDv/IGJ39aALInZLrhBp0X7KGUZlo=
|
github.com/lestrrat-go/httprc v1.0.5/go.mod h1:mwwz3JMTPBjHUkkDv/IGJ39aALInZLrhBp0X7KGUZlo=
|
||||||
github.com/lestrrat-go/iter v1.0.2 h1:gMXo1q4c2pHmC3dn8LzRhJfP1ceCbgSiT9lUydIzltI=
|
github.com/lestrrat-go/iter v1.0.2 h1:gMXo1q4c2pHmC3dn8LzRhJfP1ceCbgSiT9lUydIzltI=
|
||||||
github.com/lestrrat-go/iter v1.0.2/go.mod h1:Momfcq3AnRlRjI5b5O8/G5/BvpzrhoFTZcn06fEOPt4=
|
github.com/lestrrat-go/iter v1.0.2/go.mod h1:Momfcq3AnRlRjI5b5O8/G5/BvpzrhoFTZcn06fEOPt4=
|
||||||
github.com/lestrrat-go/jwx/v2 v2.0.19 h1:ekv1qEZE6BVct89QA+pRF6+4pCpfVrOnEJnTnT4RXoY=
|
github.com/lestrrat-go/jwx/v2 v2.1.0 h1:0zs7Ya6+39qoit7gwAf+cYm1zzgS3fceIdo7RmQ5lkw=
|
||||||
github.com/lestrrat-go/jwx/v2 v2.0.19/go.mod h1:l3im3coce1lL2cDeAjqmaR+Awx+X8Ih+2k8BuHNJ4CU=
|
github.com/lestrrat-go/jwx/v2 v2.1.0/go.mod h1:Xpw9QIaUGiIUD1Wx0NcY1sIHwFf8lDuZn/cmxtXYRys=
|
||||||
github.com/lestrrat-go/option v1.0.1 h1:oAzP2fvZGQKWkvHa1/SAcFolBEca1oN+mQ7eooNBEYU=
|
github.com/lestrrat-go/option v1.0.1 h1:oAzP2fvZGQKWkvHa1/SAcFolBEca1oN+mQ7eooNBEYU=
|
||||||
github.com/lestrrat-go/option v1.0.1/go.mod h1:5ZHFbivi4xwXxhxY9XHDe2FHo6/Z7WWmtT7T5nBBp3I=
|
github.com/lestrrat-go/option v1.0.1/go.mod h1:5ZHFbivi4xwXxhxY9XHDe2FHo6/Z7WWmtT7T5nBBp3I=
|
||||||
github.com/lib/pq v1.10.0 h1:Zx5DJFEYQXio93kgXnQ09fXNiUKsqv4OUEu2UtGcB1E=
|
github.com/lib/pq v1.10.0 h1:Zx5DJFEYQXio93kgXnQ09fXNiUKsqv4OUEu2UtGcB1E=
|
||||||
@ -339,8 +339,8 @@ github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/
|
|||||||
github.com/stretchr/testify v1.7.4/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
|
github.com/stretchr/testify v1.7.4/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
|
||||||
github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
|
github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
|
||||||
github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
|
github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
|
||||||
github.com/stretchr/testify v1.8.4 h1:CcVxjf3Q8PM0mHUKJCdn+eZZtm5yQwehR5yeSVQQcUk=
|
github.com/stretchr/testify v1.9.0 h1:HtqpIVDClZ4nwg75+f6Lvsy/wHu+3BoSGCbBAcpTsTg=
|
||||||
github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo=
|
github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
|
||||||
github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635/go.mod h1:hkRG7XYTFWNJGYcbNJQlaLq0fg1yr4J4t/NcTQtrfww=
|
github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635/go.mod h1:hkRG7XYTFWNJGYcbNJQlaLq0fg1yr4J4t/NcTQtrfww=
|
||||||
github.com/syndtr/goleveldb v1.0.1-0.20210819022825-2ae1ddf74ef7/go.mod h1:q4W45IWZaF22tdD+VEXcAWRA037jwmWEB5VWYORlTpc=
|
github.com/syndtr/goleveldb v1.0.1-0.20210819022825-2ae1ddf74ef7/go.mod h1:q4W45IWZaF22tdD+VEXcAWRA037jwmWEB5VWYORlTpc=
|
||||||
github.com/urfave/cli v1.22.1/go.mod h1:Gos4lmkARVdJ6EkW0WaNv/tZAAMe9V7XWyB60NtXRu0=
|
github.com/urfave/cli v1.22.1/go.mod h1:Gos4lmkARVdJ6EkW0WaNv/tZAAMe9V7XWyB60NtXRu0=
|
||||||
@ -375,13 +375,13 @@ golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8U
|
|||||||
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
|
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
|
||||||
golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
|
golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
|
||||||
golang.org/x/crypto v0.3.0/go.mod h1:hebNnKkNXi2UzZN1eVRvBB7co0a+JxK6XbPiWVs/3J4=
|
golang.org/x/crypto v0.3.0/go.mod h1:hebNnKkNXi2UzZN1eVRvBB7co0a+JxK6XbPiWVs/3J4=
|
||||||
golang.org/x/crypto v0.19.0 h1:ENy+Az/9Y1vSrlrvBSyna3PITt4tiZLf7sgCjZBX7Wo=
|
golang.org/x/crypto v0.24.0 h1:mnl8DM0o513X8fdIkmyFE/5hTYxbwYOjDS/+rK6qpRI=
|
||||||
golang.org/x/crypto v0.19.0/go.mod h1:Iy9bg/ha4yyC70EfRS8jz+B6ybOBKMaSxLj6P6oBDfU=
|
golang.org/x/crypto v0.24.0/go.mod h1:Z1PMYSOR5nyMcyAVAIQSKCDwalqy85Aqn1x3Ws4L5DM=
|
||||||
golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
||||||
golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
||||||
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4=
|
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4=
|
||||||
golang.org/x/mod v0.14.0 h1:dGoOF9QVLYng8IHTm7BAyWqCqSheQ5pYWGhzW00YJr0=
|
golang.org/x/mod v0.17.0 h1:zY54UmvipHiNd+pm+m0x9KhZ9hl1/7QNMyxXbc6ICqA=
|
||||||
golang.org/x/mod v0.14.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
|
golang.org/x/mod v0.17.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
|
||||||
golang.org/x/net v0.0.0-20180719180050-a680a1efc54d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
golang.org/x/net v0.0.0-20180719180050-a680a1efc54d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
||||||
golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
||||||
golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
|
golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
|
||||||
@ -395,8 +395,8 @@ golang.org/x/net v0.0.0-20201224014010-6772e930b67b/go.mod h1:m0MpNAwzfU5UDzcl9v
|
|||||||
golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
|
golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
|
||||||
golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
|
golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
|
||||||
golang.org/x/net v0.2.0/go.mod h1:KqCZLdyyvdV855qA2rE3GC2aiw5xGR5TEjj8smXukLY=
|
golang.org/x/net v0.2.0/go.mod h1:KqCZLdyyvdV855qA2rE3GC2aiw5xGR5TEjj8smXukLY=
|
||||||
golang.org/x/net v0.19.0 h1:zTwKpTd2XuCqf8huc7Fo2iSy+4RHPd10s4KzeTnVr1c=
|
golang.org/x/net v0.26.0 h1:soB7SVo0PWrY4vPW/+ay0jKDNScG2X9wFeYlXIvJsOQ=
|
||||||
golang.org/x/net v0.19.0/go.mod h1:CfAk/cbD4CthTvqiEl8NpboMuiuOYsAr/7NOjZJtv1U=
|
golang.org/x/net v0.26.0/go.mod h1:5YKkiSynbBIh3p6iOc/vibscux0x38BZDkn8sCUPxHE=
|
||||||
golang.org/x/oauth2 v0.13.0 h1:jDDenyj+WgFtmV3zYVoi8aE2BwtXFLWOA67ZfNWftiY=
|
golang.org/x/oauth2 v0.13.0 h1:jDDenyj+WgFtmV3zYVoi8aE2BwtXFLWOA67ZfNWftiY=
|
||||||
golang.org/x/oauth2 v0.13.0/go.mod h1:/JMhi4ZRXAf4HG9LiNmxvk+45+96RUlVThiH8FzNBn0=
|
golang.org/x/oauth2 v0.13.0/go.mod h1:/JMhi4ZRXAf4HG9LiNmxvk+45+96RUlVThiH8FzNBn0=
|
||||||
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
@ -433,13 +433,13 @@ golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBc
|
|||||||
golang.org/x/sys v0.1.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.1.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.17.0 h1:25cE3gD+tdBA7lp7QfhuV+rJiE9YXTcS3VG1SqssI/Y=
|
golang.org/x/sys v0.21.0 h1:rF+pYz3DAGSQAxAu1CbC7catZg4ebC4UIeIhKxBZvws=
|
||||||
golang.org/x/sys v0.17.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
|
golang.org/x/sys v0.21.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
|
||||||
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
|
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
|
||||||
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
|
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
|
||||||
golang.org/x/term v0.2.0/go.mod h1:TVmDHMZPmdnySmBfhjOoOdhjzdE1h4u1VwSiw2l1Nuc=
|
golang.org/x/term v0.2.0/go.mod h1:TVmDHMZPmdnySmBfhjOoOdhjzdE1h4u1VwSiw2l1Nuc=
|
||||||
golang.org/x/term v0.17.0 h1:mkTF7LCd6WGJNL3K1Ad7kwxNfYAW6a8a8QqtMblp/4U=
|
golang.org/x/term v0.21.0 h1:WVXCp+/EBEHOj53Rvu+7KiT/iElMrO8ACK16SMZ3jaA=
|
||||||
golang.org/x/term v0.17.0/go.mod h1:lLRBjIVuehSbZlaOtGMbcMncT+aqLLLmKrsjNrUguwk=
|
golang.org/x/term v0.21.0/go.mod h1:ooXLefLobQVslOqselCNF4SxFAaoS6KujMbsGzSDmX0=
|
||||||
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
||||||
golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
|
golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
|
||||||
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
||||||
@ -447,8 +447,8 @@ golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
|||||||
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
|
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
|
||||||
golang.org/x/text v0.3.8/go.mod h1:E6s5w1FMmriuDzIBO73fBruAKo1PCIq6d2Q6DHfQ8WQ=
|
golang.org/x/text v0.3.8/go.mod h1:E6s5w1FMmriuDzIBO73fBruAKo1PCIq6d2Q6DHfQ8WQ=
|
||||||
golang.org/x/text v0.4.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
|
golang.org/x/text v0.4.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
|
||||||
golang.org/x/text v0.14.0 h1:ScX5w1eTa3QqT8oi6+ziP7dTV1S2+ALU0bI+0zXKWiQ=
|
golang.org/x/text v0.16.0 h1:a94ExnEXNtEwYLGJSIUxnWoxoRz/ZcCsV63ROupILh4=
|
||||||
golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
|
golang.org/x/text v0.16.0/go.mod h1:GhwF1Be+LQoKShO3cGOHzqOgRrGaYc9AvblQOmPVHnI=
|
||||||
golang.org/x/time v0.3.0 h1:rg5rLMjNzMS1RkNLzCG38eapWhnYLFYXDXj2gOlr8j4=
|
golang.org/x/time v0.3.0 h1:rg5rLMjNzMS1RkNLzCG38eapWhnYLFYXDXj2gOlr8j4=
|
||||||
golang.org/x/time v0.3.0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
golang.org/x/time v0.3.0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
||||||
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
||||||
@ -457,8 +457,8 @@ golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtn
|
|||||||
golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
||||||
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
||||||
golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=
|
golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=
|
||||||
golang.org/x/tools v0.16.1 h1:TLyB3WofjdOEepBHAU20JdNC1Zbg87elYofWYAY5oZA=
|
golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d h1:vU5i/LfpvrRCpgM/VPfJLg5KjxD3E+hfT1SH+d9zLwg=
|
||||||
golang.org/x/tools v0.16.1/go.mod h1:kYVVN6I1mBNoB1OX+noeBjbRk4IUEPa7JJ+TJMEooJ0=
|
golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d/go.mod h1:aiJjzUbINMkxbQROHiO6hDPo2LHcIPhhQsa9DLh0yGk=
|
||||||
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
|
@ -70,7 +70,7 @@ func assertRequestUser(w http.ResponseWriter, r *http.Request) (auth.User, bool)
|
|||||||
ctx := r.Context()
|
ctx := r.Context()
|
||||||
user, err := auth.CtxUser(ctx)
|
user, err := auth.CtxUser(ctx)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error(ctx, "could not retrieve user", logger.E(errors.WithStack(err)))
|
logger.Error(ctx, "could not retrieve user", logger.CapturedE(errors.WithStack(err)))
|
||||||
|
|
||||||
forbidden(w, r)
|
forbidden(w, r)
|
||||||
|
|
||||||
|
@ -6,7 +6,6 @@ import (
|
|||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/schema"
|
"forge.cadoles.com/cadoles/bouncer/internal/schema"
|
||||||
"github.com/getsentry/sentry-go"
|
|
||||||
"gitlab.com/wpetit/goweb/api"
|
"gitlab.com/wpetit/goweb/api"
|
||||||
"gitlab.com/wpetit/goweb/logger"
|
"gitlab.com/wpetit/goweb/logger"
|
||||||
)
|
)
|
||||||
@ -29,11 +28,8 @@ func invalidDataErrorResponse(w http.ResponseWriter, r *http.Request, err *schem
|
|||||||
}{
|
}{
|
||||||
Message: message,
|
Message: message,
|
||||||
})
|
})
|
||||||
|
|
||||||
return
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func logAndCaptureError(ctx context.Context, message string, err error) {
|
func logAndCaptureError(ctx context.Context, message string, err error) {
|
||||||
sentry.CaptureException(err)
|
logger.Error(ctx, message, logger.CapturedE(err))
|
||||||
logger.Error(ctx, message, logger.E(err))
|
|
||||||
}
|
}
|
||||||
|
@ -27,7 +27,7 @@ func (s *Server) initRepositories(ctx context.Context) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) initRedisClient(ctx context.Context) error {
|
func (s *Server) initRedisClient(ctx context.Context) error {
|
||||||
client := setup.NewRedisClient(ctx, s.redisConfig)
|
client := setup.NewSharedClient(s.redisConfig)
|
||||||
|
|
||||||
s.redisClient = client
|
s.redisClient = client
|
||||||
|
|
||||||
|
@ -121,7 +121,7 @@ func (s *Server) deleteProxy(w http.ResponseWriter, r *http.Request) {
|
|||||||
|
|
||||||
type CreateProxyRequest struct {
|
type CreateProxyRequest struct {
|
||||||
Name string `json:"name" validate:"required"`
|
Name string `json:"name" validate:"required"`
|
||||||
To string `json:"to" validate:"required"`
|
To string `json:"to"`
|
||||||
From []string `json:"from" validate:"required"`
|
From []string `json:"from" validate:"required"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -2,10 +2,12 @@ package admin
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"expvar"
|
||||||
"fmt"
|
"fmt"
|
||||||
"log"
|
"log"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
"net/http/pprof"
|
||||||
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/auth"
|
"forge.cadoles.com/cadoles/bouncer/internal/auth"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/auth/jwt"
|
"forge.cadoles.com/cadoles/bouncer/internal/auth/jwt"
|
||||||
@ -114,7 +116,9 @@ func (s *Server) run(parentCtx context.Context, addrs chan net.Addr, errs chan e
|
|||||||
router.Use(middleware.RealIP)
|
router.Use(middleware.RealIP)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
router.Use(middleware.RequestID)
|
||||||
router.Use(middleware.RequestLogger(bouncerChi.NewLogFormatter()))
|
router.Use(middleware.RequestLogger(bouncerChi.NewLogFormatter()))
|
||||||
|
router.Use(middleware.Recoverer)
|
||||||
|
|
||||||
if s.serverConfig.Sentry.DSN != "" {
|
if s.serverConfig.Sentry.DSN != "" {
|
||||||
logger.Info(ctx, "enabling sentry http middleware")
|
logger.Info(ctx, "enabling sentry http middleware")
|
||||||
@ -155,6 +159,35 @@ func (s *Server) run(parentCtx context.Context, addrs chan net.Addr, errs chan e
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if s.serverConfig.Profiling.Enabled {
|
||||||
|
profiling := s.serverConfig.Profiling
|
||||||
|
logger.Info(ctx, "enabling profiling", logger.F("endpoint", profiling.Endpoint))
|
||||||
|
|
||||||
|
router.Group(func(r chi.Router) {
|
||||||
|
if profiling.BasicAuth != nil {
|
||||||
|
logger.Info(ctx, "enabling authentication on profiling endpoint")
|
||||||
|
|
||||||
|
r.Use(middleware.BasicAuth(
|
||||||
|
"profiling",
|
||||||
|
profiling.BasicAuth.CredentialsMap(),
|
||||||
|
))
|
||||||
|
}
|
||||||
|
|
||||||
|
r.Route(string(profiling.Endpoint), func(r chi.Router) {
|
||||||
|
r.HandleFunc("/", pprof.Index)
|
||||||
|
r.HandleFunc("/cmdline", pprof.Cmdline)
|
||||||
|
r.HandleFunc("/profile", pprof.Profile)
|
||||||
|
r.HandleFunc("/symbol", pprof.Symbol)
|
||||||
|
r.HandleFunc("/trace", pprof.Trace)
|
||||||
|
r.Handle("/vars", expvar.Handler())
|
||||||
|
r.HandleFunc("/{name}", func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
name := chi.URLParam(r, "name")
|
||||||
|
pprof.Handler(name).ServeHTTP(w, r)
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
router.Route("/api/v1", func(r chi.Router) {
|
router.Route("/api/v1", func(r chi.Router) {
|
||||||
r.Group(func(r chi.Router) {
|
r.Group(func(r chi.Router) {
|
||||||
r.Use(auth.Middleware(
|
r.Use(auth.Middleware(
|
||||||
|
@ -52,7 +52,7 @@ func Middleware(authenticators ...Authenticator) func(http.Handler) http.Handler
|
|||||||
for _, auth := range authenticators {
|
for _, auth := range authenticators {
|
||||||
user, err = auth.Authenticate(ctx, r)
|
user, err = auth.Authenticate(ctx, r)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Debug(ctx, "could not authenticate request", logger.E(errors.WithStack(err)))
|
logger.Debug(ctx, "could not authenticate request", logger.CapturedE(errors.WithStack(err)))
|
||||||
|
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
318
internal/bench/proxy_test.go
Normal file
318
internal/bench/proxy_test.go
Normal file
@ -0,0 +1,318 @@
|
|||||||
|
package proxy_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"io"
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
|
"net/http/httputil"
|
||||||
|
"net/url"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"runtime/pprof"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"forge.cadoles.com/Cadoles/go-proxy"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/cache/memory"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/cache/ttl"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/config"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/proxy/director"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
||||||
|
redisStore "forge.cadoles.com/cadoles/bouncer/internal/store/redis"
|
||||||
|
"github.com/pkg/errors"
|
||||||
|
"github.com/redis/go-redis/v9"
|
||||||
|
"gitlab.com/wpetit/goweb/logger"
|
||||||
|
"gopkg.in/yaml.v3"
|
||||||
|
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/setup"
|
||||||
|
)
|
||||||
|
|
||||||
|
func BenchmarkProxies(b *testing.B) {
|
||||||
|
proxyFiles, err := filepath.Glob("testdata/proxies/*.yml")
|
||||||
|
if err != nil {
|
||||||
|
b.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, f := range proxyFiles {
|
||||||
|
name := strings.TrimSuffix(filepath.Base(f), filepath.Ext(f))
|
||||||
|
|
||||||
|
b.Run(name, func(b *testing.B) {
|
||||||
|
heap, err := os.Create(filepath.Join("testdata", "proxies", name+"_heap.prof"))
|
||||||
|
if err != nil {
|
||||||
|
b.Fatalf("%+v", errors.Wrapf(err, "could not create heap profile"))
|
||||||
|
}
|
||||||
|
|
||||||
|
defer func() {
|
||||||
|
defer heap.Close()
|
||||||
|
|
||||||
|
if err := pprof.WriteHeapProfile(heap); err != nil {
|
||||||
|
b.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
conf, err := loadProxyBenchConfig(f)
|
||||||
|
if err != nil {
|
||||||
|
b.Fatalf("%+v", errors.Wrapf(err, "could notre load bench config"))
|
||||||
|
}
|
||||||
|
|
||||||
|
proxy, backend, err := createProxy(name, conf, b.Logf)
|
||||||
|
if err != nil {
|
||||||
|
b.Fatalf("%+v", errors.Wrapf(err, "could not create proxy"))
|
||||||
|
}
|
||||||
|
|
||||||
|
defer proxy.Close()
|
||||||
|
|
||||||
|
if backend != nil {
|
||||||
|
defer backend.Close()
|
||||||
|
}
|
||||||
|
|
||||||
|
client := proxy.Client()
|
||||||
|
|
||||||
|
proxyURL, err := url.Parse(proxy.URL)
|
||||||
|
if err != nil {
|
||||||
|
b.Fatalf("%+v", errors.Wrapf(err, "could not parse proxy url"))
|
||||||
|
}
|
||||||
|
|
||||||
|
if conf.Fetch.URL.Path != "" {
|
||||||
|
proxyURL.Path = conf.Fetch.URL.Path
|
||||||
|
}
|
||||||
|
|
||||||
|
if conf.Fetch.URL.RawQuery != "" {
|
||||||
|
proxyURL.RawQuery = conf.Fetch.URL.RawQuery
|
||||||
|
}
|
||||||
|
|
||||||
|
if conf.Fetch.URL.User.Username != "" || conf.Fetch.URL.User.Password != "" {
|
||||||
|
proxyURL.User = url.UserPassword(conf.Fetch.URL.User.Username, conf.Fetch.URL.User.Password)
|
||||||
|
}
|
||||||
|
|
||||||
|
rawProxyURL := proxyURL.String()
|
||||||
|
|
||||||
|
b.Logf("fetching url '%s'", rawProxyURL)
|
||||||
|
|
||||||
|
profile, err := os.Create(filepath.Join("testdata", "proxies", name+"_cpu.prof"))
|
||||||
|
if err != nil {
|
||||||
|
b.Fatalf("%+v", errors.Wrapf(err, "could not create cpu profile"))
|
||||||
|
}
|
||||||
|
|
||||||
|
defer profile.Close()
|
||||||
|
|
||||||
|
if err := pprof.StartCPUProfile(profile); err != nil {
|
||||||
|
b.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
defer pprof.StopCPUProfile()
|
||||||
|
|
||||||
|
b.ResetTimer()
|
||||||
|
|
||||||
|
for i := 0; i < b.N; i++ {
|
||||||
|
res, err := client.Get(rawProxyURL)
|
||||||
|
if err != nil {
|
||||||
|
b.Errorf("could not fetch proxy url: %+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
body, err := io.ReadAll(res.Body)
|
||||||
|
if err != nil {
|
||||||
|
b.Errorf("could not read response body: %+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
b.Logf("%s \n %v", res.Status, string(body))
|
||||||
|
|
||||||
|
if err := res.Body.Close(); err != nil {
|
||||||
|
b.Errorf("could not close response body: %+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type proxyBenchConfig struct {
|
||||||
|
Proxy config.BootstrapProxyConfig `yaml:"proxy"`
|
||||||
|
Fetch fetchBenchConfig `yaml:"fetch"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type fetchBenchConfig struct {
|
||||||
|
URL fetchURLBenchConfig `yaml:"url"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type fetchURLBenchConfig struct {
|
||||||
|
Path string `yaml:"path"`
|
||||||
|
RawQuery string `yaml:"rawQuery"`
|
||||||
|
User fetchURLUserBenchConfig `yaml:"user"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type fetchURLUserBenchConfig struct {
|
||||||
|
Username string `yaml:"username"`
|
||||||
|
Password string `yaml:"password"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func loadProxyBenchConfig(filename string) (*proxyBenchConfig, error) {
|
||||||
|
data, err := os.ReadFile(filename)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.Wrapf(err, "could not read file '%s'", filename)
|
||||||
|
}
|
||||||
|
|
||||||
|
conf := proxyBenchConfig{}
|
||||||
|
|
||||||
|
if err := yaml.Unmarshal(data, &conf); err != nil {
|
||||||
|
return nil, errors.Wrapf(err, "could not unmarshal config")
|
||||||
|
}
|
||||||
|
|
||||||
|
return &conf, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func createProxy(name string, conf *proxyBenchConfig, logf func(format string, a ...any)) (*httptest.Server, *httptest.Server, error) {
|
||||||
|
redisEndpoint := os.Getenv("BOUNCER_BENCH_REDIS_ADDR")
|
||||||
|
if redisEndpoint == "" {
|
||||||
|
redisEndpoint = "127.0.0.1:6379"
|
||||||
|
}
|
||||||
|
|
||||||
|
client := redis.NewUniversalClient(&redis.UniversalOptions{
|
||||||
|
Addrs: []string{redisEndpoint},
|
||||||
|
})
|
||||||
|
|
||||||
|
proxyRepository := redisStore.NewProxyRepository(client, redisStore.DefaultTxMaxAttempts, redisStore.DefaultTxBaseDelay)
|
||||||
|
layerRepository := redisStore.NewLayerRepository(client, redisStore.DefaultTxMaxAttempts, redisStore.DefaultTxBaseDelay)
|
||||||
|
|
||||||
|
var backend *httptest.Server
|
||||||
|
|
||||||
|
if conf.Proxy.To == "" {
|
||||||
|
backend = httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
w.WriteHeader(http.StatusOK)
|
||||||
|
if _, err := w.Write([]byte("Hello, world.")); err != nil {
|
||||||
|
logf("[ERROR] %+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
}))
|
||||||
|
|
||||||
|
if err := waitFor(backend.URL, 5*time.Second); err != nil {
|
||||||
|
return nil, nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
logf("started backend '%s'", backend.URL)
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
proxyName := store.ProxyName("bench-" + name)
|
||||||
|
|
||||||
|
proxies, err := proxyRepository.QueryProxy(ctx)
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Cleanup existing proxies
|
||||||
|
for _, p := range proxies {
|
||||||
|
if err := proxyRepository.DeleteProxy(ctx, p.Name); err != nil {
|
||||||
|
return nil, nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
logf("creating proxy '%s'", proxyName)
|
||||||
|
|
||||||
|
to := string(conf.Proxy.To)
|
||||||
|
if to == "" {
|
||||||
|
to = backend.URL
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := proxyRepository.CreateProxy(ctx, proxyName, to, conf.Proxy.From...); err != nil {
|
||||||
|
return nil, nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := proxyRepository.UpdateProxy(ctx, proxyName, store.WithProxyUpdateEnabled(true)); err != nil {
|
||||||
|
return nil, nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
for layerName, layerConf := range conf.Proxy.Layers {
|
||||||
|
if err := layerRepository.DeleteLayer(ctx, proxyName, store.LayerName(layerName)); err != nil {
|
||||||
|
return nil, nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err := layerRepository.CreateLayer(ctx, proxyName, store.LayerName(layerName), store.LayerType(layerConf.Type), layerConf.Options.Data)
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = layerRepository.UpdateLayer(ctx, proxyName, store.LayerName(layerName), store.WithLayerUpdateEnabled(bool(layerConf.Enabled)))
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
appConf := config.NewDefault()
|
||||||
|
appConf.Logger.Level = config.InterpolatedInt(logger.LevelError)
|
||||||
|
appConf.Layers.Authn.TemplateDir = "../../layers/authn/templates"
|
||||||
|
appConf.Layers.Queue.TemplateDir = "../../layers/queue/templates"
|
||||||
|
|
||||||
|
layers, err := setup.GetLayers(context.Background(), appConf)
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
director := director.New(
|
||||||
|
proxyRepository, layerRepository,
|
||||||
|
director.WithLayerCache(
|
||||||
|
ttl.NewCache(
|
||||||
|
memory.NewCache[string, []*store.Layer](),
|
||||||
|
memory.NewCache[string, time.Time](),
|
||||||
|
30*time.Second,
|
||||||
|
),
|
||||||
|
),
|
||||||
|
director.WithProxyCache(
|
||||||
|
ttl.NewCache(
|
||||||
|
memory.NewCache[string, []*store.Proxy](),
|
||||||
|
memory.NewCache[string, time.Time](),
|
||||||
|
30*time.Second,
|
||||||
|
),
|
||||||
|
),
|
||||||
|
director.WithLayers(layers...),
|
||||||
|
)
|
||||||
|
|
||||||
|
directorMiddleware := director.Middleware()
|
||||||
|
|
||||||
|
handler := proxy.New(
|
||||||
|
proxy.WithRequestTransformers(
|
||||||
|
director.RequestTransformer(),
|
||||||
|
),
|
||||||
|
proxy.WithResponseTransformers(
|
||||||
|
director.ResponseTransformer(),
|
||||||
|
),
|
||||||
|
proxy.WithReverseProxyFactory(func(ctx context.Context, target *url.URL) *httputil.ReverseProxy {
|
||||||
|
reverse := httputil.NewSingleHostReverseProxy(target)
|
||||||
|
reverse.ErrorHandler = func(w http.ResponseWriter, r *http.Request, err error) {
|
||||||
|
logf("[ERROR] %s", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
return reverse
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
|
||||||
|
server := httptest.NewServer(directorMiddleware(handler))
|
||||||
|
|
||||||
|
return server, backend, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func waitFor(url string, ttl time.Duration) error {
|
||||||
|
var lastErr error
|
||||||
|
timeout := time.After(ttl)
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case <-timeout:
|
||||||
|
if lastErr != nil {
|
||||||
|
return lastErr
|
||||||
|
}
|
||||||
|
|
||||||
|
return errors.New("wait timed out")
|
||||||
|
default:
|
||||||
|
res, err := http.Get(url)
|
||||||
|
if err != nil {
|
||||||
|
lastErr = errors.WithStack(err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if res.StatusCode >= 200 && res.StatusCode < 400 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
20
internal/bench/testdata/proxies/basic-auth.yml
vendored
Normal file
20
internal/bench/testdata/proxies/basic-auth.yml
vendored
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
proxy:
|
||||||
|
from: ["*"]
|
||||||
|
to: ""
|
||||||
|
layers:
|
||||||
|
basic-auth:
|
||||||
|
type: authn-basic
|
||||||
|
enabled: true
|
||||||
|
options:
|
||||||
|
users:
|
||||||
|
- username: foo
|
||||||
|
passwordHash: "$2y$10$ShTc856wMB8PCxyr46qJRO8z06MpV4UejAVRDJ/bixhu0XTGn7Giy"
|
||||||
|
attributes:
|
||||||
|
email: foo@bar.com
|
||||||
|
rules:
|
||||||
|
- set_header(ctx, "Remote-User-Attr-Email", vars.user.attrs.email)
|
||||||
|
fetch:
|
||||||
|
url:
|
||||||
|
user:
|
||||||
|
username: foo
|
||||||
|
password: bar
|
3
internal/bench/testdata/proxies/noop.yml
vendored
Normal file
3
internal/bench/testdata/proxies/noop.yml
vendored
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
proxy:
|
||||||
|
from: ["*"]
|
||||||
|
to: ""
|
10
internal/bench/testdata/proxies/queue.yml
vendored
Normal file
10
internal/bench/testdata/proxies/queue.yml
vendored
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
proxy:
|
||||||
|
from: ["*"]
|
||||||
|
to: ""
|
||||||
|
layers:
|
||||||
|
queue:
|
||||||
|
type: queue
|
||||||
|
enabled: true
|
||||||
|
options:
|
||||||
|
capacity: 100
|
||||||
|
keepAlive: 10s
|
12
internal/bench/testdata/proxies/rewriter.yml
vendored
Normal file
12
internal/bench/testdata/proxies/rewriter.yml
vendored
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
proxy:
|
||||||
|
from: ["*"]
|
||||||
|
to: ""
|
||||||
|
layers:
|
||||||
|
host-rewriter:
|
||||||
|
type: rewriter
|
||||||
|
enabled: true
|
||||||
|
options:
|
||||||
|
rules:
|
||||||
|
request:
|
||||||
|
- set_host(ctx, vars.request.url.host)
|
||||||
|
- set_header(ctx, "X-Proxied-With", "bouncer")
|
1
internal/cache/cache.go
vendored
1
internal/cache/cache.go
vendored
@ -3,4 +3,5 @@ package cache
|
|||||||
type Cache[K comparable, V any] interface {
|
type Cache[K comparable, V any] interface {
|
||||||
Get(key K) (V, bool)
|
Get(key K) (V, bool)
|
||||||
Set(key K, value V)
|
Set(key K, value V)
|
||||||
|
Clear()
|
||||||
}
|
}
|
||||||
|
4
internal/cache/memory/cache.go
vendored
4
internal/cache/memory/cache.go
vendored
@ -25,6 +25,10 @@ func (c *Cache[K, V]) Set(key K, value V) {
|
|||||||
c.store.Store(key, value)
|
c.store.Store(key, value)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *Cache[K, V]) Clear() {
|
||||||
|
c.store.Clear()
|
||||||
|
}
|
||||||
|
|
||||||
func NewCache[K comparable, V any]() *Cache[K, V] {
|
func NewCache[K comparable, V any]() *Cache[K, V] {
|
||||||
return &Cache[K, V]{
|
return &Cache[K, V]{
|
||||||
store: new(sync.Map),
|
store: new(sync.Map),
|
||||||
|
5
internal/cache/ttl/cache.go
vendored
5
internal/cache/ttl/cache.go
vendored
@ -28,6 +28,11 @@ func (c *Cache[K, V]) Set(key K, value V) {
|
|||||||
c.values.Set(key, value)
|
c.values.Set(key, value)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *Cache[K, V]) Clear() {
|
||||||
|
c.timestamps.Clear()
|
||||||
|
c.values.Clear()
|
||||||
|
}
|
||||||
|
|
||||||
func NewCache[K comparable, V any](values cache.Cache[K, V], timestamps cache.Cache[K, time.Time], ttl time.Duration) *Cache[K, V] {
|
func NewCache[K comparable, V any](values cache.Cache[K, V], timestamps cache.Cache[K, time.Time], ttl time.Duration) *Cache[K, V] {
|
||||||
return &Cache[K, V]{
|
return &Cache[K, V]{
|
||||||
values: values,
|
values: values,
|
||||||
|
@ -2,7 +2,6 @@ package chi
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
|
||||||
"net/http"
|
"net/http"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
@ -37,12 +36,19 @@ type LogEntry struct {
|
|||||||
|
|
||||||
// Panic implements middleware.LogEntry
|
// Panic implements middleware.LogEntry
|
||||||
func (e *LogEntry) Panic(v interface{}, stack []byte) {
|
func (e *LogEntry) Panic(v interface{}, stack []byte) {
|
||||||
logger.Error(e.ctx, fmt.Sprintf("%s %s", e.method, e.path), logger.F("stack", string(stack)))
|
logger.Error(
|
||||||
|
e.ctx, "http panic",
|
||||||
|
logger.F("stack", string(stack)),
|
||||||
|
logger.F("host", e.host),
|
||||||
|
logger.F("method", e.method),
|
||||||
|
logger.F("path", e.path),
|
||||||
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Write implements middleware.LogEntry
|
// Write implements middleware.LogEntry
|
||||||
func (e *LogEntry) Write(status int, bytes int, header http.Header, elapsed time.Duration, extra interface{}) {
|
func (e *LogEntry) Write(status int, bytes int, header http.Header, elapsed time.Duration, extra interface{}) {
|
||||||
logger.Info(e.ctx, fmt.Sprintf("%s %s - %d", e.method, e.path, status),
|
logger.Info(
|
||||||
|
e.ctx, "http request",
|
||||||
logger.F("host", e.host),
|
logger.F("host", e.host),
|
||||||
logger.F("status", status),
|
logger.F("status", status),
|
||||||
logger.F("bytes", bytes),
|
logger.F("bytes", bytes),
|
||||||
|
@ -2,6 +2,7 @@ package layer
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"os"
|
"os"
|
||||||
|
"slices"
|
||||||
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/client"
|
"forge.cadoles.com/cadoles/bouncer/internal/client"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/command/admin/apierr"
|
"forge.cadoles.com/cadoles/bouncer/internal/command/admin/apierr"
|
||||||
@ -52,14 +53,16 @@ func QueryCommand() *cli.Command {
|
|||||||
|
|
||||||
client := client.New(baseFlags.ServerURL, client.WithToken(token))
|
client := client.New(baseFlags.ServerURL, client.WithToken(token))
|
||||||
|
|
||||||
proxies, err := client.QueryLayer(ctx.Context, proxyName, options...)
|
layers, err := client.QueryLayer(ctx.Context, proxyName, options...)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.WithStack(apierr.Wrap(err))
|
return errors.WithStack(apierr.Wrap(err))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
slices.SortFunc(layers, sortLayerssByWeight)
|
||||||
|
|
||||||
hints := layerHeaderHints(baseFlags.OutputMode)
|
hints := layerHeaderHints(baseFlags.OutputMode)
|
||||||
|
|
||||||
if err := format.Write(baseFlags.Format, os.Stdout, hints, clientFlag.AsAnySlice(proxies)...); err != nil {
|
if err := format.Write(baseFlags.Format, os.Stdout, hints, clientFlag.AsAnySlice(layers)...); err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -67,3 +70,13 @@ func QueryCommand() *cli.Command {
|
|||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func sortLayerssByWeight(a *store.LayerHeader, b *store.LayerHeader) int {
|
||||||
|
if a.Weight < b.Weight {
|
||||||
|
return 1
|
||||||
|
}
|
||||||
|
if a.Weight > b.Weight {
|
||||||
|
return -1
|
||||||
|
}
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
@ -13,6 +13,7 @@ func layerHeaderHints(outputMode format.OutputMode) format.Hints {
|
|||||||
format.NewProp("Type", "Type"),
|
format.NewProp("Type", "Type"),
|
||||||
format.NewProp("Enabled", "Enabled"),
|
format.NewProp("Enabled", "Enabled"),
|
||||||
format.NewProp("Weight", "Weight"),
|
format.NewProp("Weight", "Weight"),
|
||||||
|
format.NewProp("Revision", "Revision"),
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -25,6 +26,7 @@ func layerHints(outputMode format.OutputMode) format.Hints {
|
|||||||
format.NewProp("Type", "Type"),
|
format.NewProp("Type", "Type"),
|
||||||
format.NewProp("Enabled", "Enabled"),
|
format.NewProp("Enabled", "Enabled"),
|
||||||
format.NewProp("Weight", "Weight"),
|
format.NewProp("Weight", "Weight"),
|
||||||
|
format.NewProp("Revision", "Revision"),
|
||||||
format.NewProp("Options", "Options"),
|
format.NewProp("Options", "Options"),
|
||||||
format.NewProp("CreatedAt", "CreatedAt", table.WithCompactModeMaxColumnWidth(20)),
|
format.NewProp("CreatedAt", "CreatedAt", table.WithCompactModeMaxColumnWidth(20)),
|
||||||
format.NewProp("UpdatedAt", "UpdatedAt", table.WithCompactModeMaxColumnWidth(20)),
|
format.NewProp("UpdatedAt", "UpdatedAt", table.WithCompactModeMaxColumnWidth(20)),
|
||||||
|
@ -19,7 +19,7 @@ func CreateCommand() *cli.Command {
|
|||||||
Name: "create",
|
Name: "create",
|
||||||
Usage: "Create proxy",
|
Usage: "Create proxy",
|
||||||
Flags: proxyFlag.WithProxyFlags(
|
Flags: proxyFlag.WithProxyFlags(
|
||||||
flag.ProxyTo(true),
|
flag.ProxyTo(),
|
||||||
flag.ProxyFrom(),
|
flag.ProxyFrom(),
|
||||||
),
|
),
|
||||||
Action: func(ctx *cli.Context) error {
|
Action: func(ctx *cli.Context) error {
|
||||||
|
@ -30,12 +30,11 @@ func ProxyName() cli.Flag {
|
|||||||
|
|
||||||
const KeyProxyTo = "proxy-to"
|
const KeyProxyTo = "proxy-to"
|
||||||
|
|
||||||
func ProxyTo(required bool) cli.Flag {
|
func ProxyTo() cli.Flag {
|
||||||
return &cli.StringFlag{
|
return &cli.StringFlag{
|
||||||
Name: KeyProxyTo,
|
Name: KeyProxyTo,
|
||||||
Usage: "Set `PROXY_TO` as proxy's destination url",
|
Usage: "Set `PROXY_TO` as proxy's destination url",
|
||||||
Value: "",
|
Value: "",
|
||||||
Required: required,
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -2,6 +2,7 @@ package proxy
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"os"
|
"os"
|
||||||
|
"slices"
|
||||||
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/client"
|
"forge.cadoles.com/cadoles/bouncer/internal/client"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/command/admin/apierr"
|
"forge.cadoles.com/cadoles/bouncer/internal/command/admin/apierr"
|
||||||
@ -51,6 +52,8 @@ func QueryCommand() *cli.Command {
|
|||||||
return errors.WithStack(apierr.Wrap(err))
|
return errors.WithStack(apierr.Wrap(err))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
slices.SortFunc(proxies, sortProxiesByWeight)
|
||||||
|
|
||||||
hints := proxyHeaderHints(baseFlags.OutputMode)
|
hints := proxyHeaderHints(baseFlags.OutputMode)
|
||||||
|
|
||||||
if err := format.Write(baseFlags.Format, os.Stdout, hints, clientFlag.AsAnySlice(proxies)...); err != nil {
|
if err := format.Write(baseFlags.Format, os.Stdout, hints, clientFlag.AsAnySlice(proxies)...); err != nil {
|
||||||
@ -61,3 +64,13 @@ func QueryCommand() *cli.Command {
|
|||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func sortProxiesByWeight(a *store.ProxyHeader, b *store.ProxyHeader) int {
|
||||||
|
if a.Weight < b.Weight {
|
||||||
|
return 1
|
||||||
|
}
|
||||||
|
if a.Weight > b.Weight {
|
||||||
|
return -1
|
||||||
|
}
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
@ -19,7 +19,7 @@ func UpdateCommand() *cli.Command {
|
|||||||
Name: "update",
|
Name: "update",
|
||||||
Usage: "Update proxy",
|
Usage: "Update proxy",
|
||||||
Flags: proxyFlag.WithProxyFlags(
|
Flags: proxyFlag.WithProxyFlags(
|
||||||
flag.ProxyTo(false),
|
flag.ProxyTo(),
|
||||||
flag.ProxyFrom(),
|
flag.ProxyFrom(),
|
||||||
flag.ProxyEnabled(),
|
flag.ProxyEnabled(),
|
||||||
flag.ProxyWeight(),
|
flag.ProxyWeight(),
|
||||||
|
@ -12,6 +12,7 @@ func proxyHeaderHints(outputMode format.OutputMode) format.Hints {
|
|||||||
format.NewProp("Name", "Name"),
|
format.NewProp("Name", "Name"),
|
||||||
format.NewProp("Enabled", "Enabled"),
|
format.NewProp("Enabled", "Enabled"),
|
||||||
format.NewProp("Weight", "Weight"),
|
format.NewProp("Weight", "Weight"),
|
||||||
|
format.NewProp("Revision", "Revision"),
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -25,6 +26,7 @@ func proxyHints(outputMode format.OutputMode) format.Hints {
|
|||||||
format.NewProp("To", "To"),
|
format.NewProp("To", "To"),
|
||||||
format.NewProp("Enabled", "Enabled"),
|
format.NewProp("Enabled", "Enabled"),
|
||||||
format.NewProp("Weight", "Weight"),
|
format.NewProp("Weight", "Weight"),
|
||||||
|
format.NewProp("Revision", "Revision"),
|
||||||
format.NewProp("CreatedAt", "CreatedAt", table.WithCompactModeMaxColumnWidth(20)),
|
format.NewProp("CreatedAt", "CreatedAt", table.WithCompactModeMaxColumnWidth(20)),
|
||||||
format.NewProp("UpdatedAt", "UpdatedAt", table.WithCompactModeMaxColumnWidth(20)),
|
format.NewProp("UpdatedAt", "UpdatedAt", table.WithCompactModeMaxColumnWidth(20)),
|
||||||
},
|
},
|
||||||
|
@ -12,14 +12,8 @@ import (
|
|||||||
"gitlab.com/wpetit/goweb/logger"
|
"gitlab.com/wpetit/goweb/logger"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
|
||||||
flagPrintDefaultToken = "print-default-token"
|
|
||||||
)
|
|
||||||
|
|
||||||
func RunCommand() *cli.Command {
|
func RunCommand() *cli.Command {
|
||||||
flags := append(
|
flags := common.Flags()
|
||||||
common.Flags(),
|
|
||||||
)
|
|
||||||
|
|
||||||
return &cli.Command{
|
return &cli.Command{
|
||||||
Name: "run",
|
Name: "run",
|
||||||
@ -34,13 +28,18 @@ func RunCommand() *cli.Command {
|
|||||||
logger.SetFormat(logger.Format(conf.Logger.Format))
|
logger.SetFormat(logger.Format(conf.Logger.Format))
|
||||||
logger.SetLevel(logger.Level(conf.Logger.Level))
|
logger.SetLevel(logger.Level(conf.Logger.Level))
|
||||||
|
|
||||||
projectVersion := ctx.String("projectVersion")
|
logger.Debug(ctx.Context, "using config", logger.F("config", conf))
|
||||||
flushSentry, err := setup.SetupSentry(ctx.Context, conf.Admin.Sentry, projectVersion)
|
|
||||||
if err != nil {
|
|
||||||
return errors.Wrap(err, "could not initialize sentry client")
|
|
||||||
}
|
|
||||||
|
|
||||||
defer flushSentry()
|
projectVersion := ctx.String("projectVersion")
|
||||||
|
|
||||||
|
if conf.Proxy.Sentry.DSN != "" {
|
||||||
|
flushSentry, err := setup.SetupSentry(ctx.Context, conf.Proxy.Sentry, projectVersion)
|
||||||
|
if err != nil {
|
||||||
|
return errors.Wrap(err, "could not initialize sentry client")
|
||||||
|
}
|
||||||
|
|
||||||
|
defer flushSentry()
|
||||||
|
}
|
||||||
|
|
||||||
integrations, err := setup.SetupIntegrations(ctx.Context, conf)
|
integrations, err := setup.SetupIntegrations(ctx.Context, conf)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -4,14 +4,14 @@
|
|||||||
<h2>Incoming headers</h2>
|
<h2>Incoming headers</h2>
|
||||||
<table style="width: 100%">
|
<table style="width: 100%">
|
||||||
<thead>
|
<thead>
|
||||||
<tr>
|
<tr style="text-align: left">
|
||||||
<th>Key</th>
|
<th>Key</th>
|
||||||
<th>Value</th>
|
<th>Value</th>
|
||||||
</tr>
|
</tr>
|
||||||
</thead>
|
</thead>
|
||||||
<tbody>
|
<tbody>
|
||||||
{{ range $key, $val := .Request.Header }}
|
{{ range $key, $val := .Request.Header }}
|
||||||
<tr>
|
<tr style="text-align: left">
|
||||||
<td>
|
<td>
|
||||||
<b>{{ $key }}</b>
|
<b>{{ $key }}</b>
|
||||||
</td>
|
</td>
|
||||||
@ -27,7 +27,7 @@
|
|||||||
<h2>Incoming cookies</h2>
|
<h2>Incoming cookies</h2>
|
||||||
<table style="width: 100%">
|
<table style="width: 100%">
|
||||||
<thead>
|
<thead>
|
||||||
<tr>
|
<tr style="text-align: left">
|
||||||
<th>Name</th>
|
<th>Name</th>
|
||||||
<th>Domain</th>
|
<th>Domain</th>
|
||||||
<th>Path</th>
|
<th>Path</th>
|
||||||
@ -41,7 +41,7 @@
|
|||||||
</thead>
|
</thead>
|
||||||
<tbody>
|
<tbody>
|
||||||
{{ range $cookie := .Request.Cookies }}
|
{{ range $cookie := .Request.Cookies }}
|
||||||
<tr>
|
<tr style="text-align: left">
|
||||||
<td>
|
<td>
|
||||||
<b>{{ $cookie.Name }}</b>
|
<b>{{ $cookie.Name }}</b>
|
||||||
</td>
|
</td>
|
||||||
|
@ -53,7 +53,7 @@ func RunCommand() *cli.Command {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if err := tmpl.Execute(w, data); err != nil {
|
if err := tmpl.Execute(w, data); err != nil {
|
||||||
logger.Error(ctx.Context, "could not execute template", logger.E(errors.WithStack(err)))
|
logger.Error(ctx.Context, "could not execute template", logger.CapturedE(errors.WithStack(err)))
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -29,13 +29,18 @@ func RunCommand() *cli.Command {
|
|||||||
logger.SetFormat(logger.Format(conf.Logger.Format))
|
logger.SetFormat(logger.Format(conf.Logger.Format))
|
||||||
logger.SetLevel(logger.Level(conf.Logger.Level))
|
logger.SetLevel(logger.Level(conf.Logger.Level))
|
||||||
|
|
||||||
projectVersion := ctx.String("projectVersion")
|
logger.Debug(ctx.Context, "using config", logger.F("config", conf))
|
||||||
flushSentry, err := setup.SetupSentry(ctx.Context, conf.Proxy.Sentry, projectVersion)
|
|
||||||
if err != nil {
|
|
||||||
return errors.Wrap(err, "could not initialize sentry client")
|
|
||||||
}
|
|
||||||
|
|
||||||
defer flushSentry()
|
projectVersion := ctx.String("projectVersion")
|
||||||
|
|
||||||
|
if conf.Proxy.Sentry.DSN != "" {
|
||||||
|
flushSentry, err := setup.SetupSentry(ctx.Context, conf.Proxy.Sentry, projectVersion)
|
||||||
|
if err != nil {
|
||||||
|
return errors.Wrap(err, "could not initialize sentry client")
|
||||||
|
}
|
||||||
|
|
||||||
|
defer flushSentry()
|
||||||
|
}
|
||||||
|
|
||||||
layers, err := setup.GetLayers(ctx.Context, conf)
|
layers, err := setup.GetLayers(ctx.Context, conf)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -46,7 +51,7 @@ func RunCommand() *cli.Command {
|
|||||||
proxy.WithServerConfig(conf.Proxy),
|
proxy.WithServerConfig(conf.Proxy),
|
||||||
proxy.WithRedisConfig(conf.Redis),
|
proxy.WithRedisConfig(conf.Redis),
|
||||||
proxy.WithDirectorLayers(layers...),
|
proxy.WithDirectorLayers(layers...),
|
||||||
proxy.WithDirectorCacheTTL(time.Duration(conf.Proxy.Cache.TTL)),
|
proxy.WithDirectorCacheTTL(time.Duration(*conf.Proxy.Cache.TTL)),
|
||||||
)
|
)
|
||||||
|
|
||||||
addrs, srvErrs := srv.Start(ctx.Context)
|
addrs, srvErrs := srv.Start(ctx.Context)
|
||||||
|
@ -1,20 +1,22 @@
|
|||||||
package config
|
package config
|
||||||
|
|
||||||
type AdminServerConfig struct {
|
type AdminServerConfig struct {
|
||||||
HTTP HTTPConfig `yaml:"http"`
|
HTTP HTTPConfig `yaml:"http"`
|
||||||
CORS CORSConfig `yaml:"cors"`
|
CORS CORSConfig `yaml:"cors"`
|
||||||
Auth AuthConfig `yaml:"auth"`
|
Auth AuthConfig `yaml:"auth"`
|
||||||
Metrics MetricsConfig `yaml:"metrics"`
|
Metrics MetricsConfig `yaml:"metrics"`
|
||||||
Sentry SentryConfig `yaml:"sentry"`
|
Profiling ProfilingConfig `yaml:"profiling"`
|
||||||
|
Sentry SentryConfig `yaml:"sentry"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewDefaultAdminServerConfig() AdminServerConfig {
|
func NewDefaultAdminServerConfig() AdminServerConfig {
|
||||||
return AdminServerConfig{
|
return AdminServerConfig{
|
||||||
HTTP: NewHTTPConfig("127.0.0.1", 8081),
|
HTTP: NewHTTPConfig("127.0.0.1", 8081),
|
||||||
CORS: NewDefaultCORSConfig(),
|
CORS: NewDefaultCORSConfig(),
|
||||||
Auth: NewDefaultAuthConfig(),
|
Auth: NewDefaultAuthConfig(),
|
||||||
Metrics: NewDefaultMetricsConfig(),
|
Metrics: NewDefaultMetricsConfig(),
|
||||||
Sentry: NewDefaultSentryConfig(),
|
Sentry: NewDefaultSentryConfig(),
|
||||||
|
Profiling: NewDefaultProfilingConfig(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -80,24 +80,33 @@ func loadBootstrapDir(dir string) (map[store.ProxyName]BootstrapProxyConfig, err
|
|||||||
|
|
||||||
proxies := make(map[store.ProxyName]BootstrapProxyConfig)
|
proxies := make(map[store.ProxyName]BootstrapProxyConfig)
|
||||||
for _, f := range files {
|
for _, f := range files {
|
||||||
data, err := os.ReadFile(f)
|
proxy, err := loadBootstrappedProxyConfig(f)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errors.Wrapf(err, "could not read file '%s'", f)
|
return nil, errors.Wrapf(err, "could not load proxy bootstrap file '%s'", f)
|
||||||
}
|
|
||||||
|
|
||||||
proxy := BootstrapProxyConfig{}
|
|
||||||
|
|
||||||
if err := yaml.Unmarshal(data, &proxy); err != nil {
|
|
||||||
return nil, errors.Wrapf(err, "could not unmarshal proxy")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
name := store.ProxyName(strings.TrimSuffix(filepath.Base(f), filepath.Ext(f)))
|
name := store.ProxyName(strings.TrimSuffix(filepath.Base(f), filepath.Ext(f)))
|
||||||
proxies[name] = proxy
|
proxies[name] = *proxy
|
||||||
}
|
}
|
||||||
|
|
||||||
return proxies, nil
|
return proxies, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func loadBootstrappedProxyConfig(filename string) (*BootstrapProxyConfig, error) {
|
||||||
|
data, err := os.ReadFile(filename)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.Wrapf(err, "could not read file '%s'", filename)
|
||||||
|
}
|
||||||
|
|
||||||
|
proxy := BootstrapProxyConfig{}
|
||||||
|
|
||||||
|
if err := yaml.Unmarshal(data, &proxy); err != nil {
|
||||||
|
return nil, errors.Wrapf(err, "could not unmarshal proxy")
|
||||||
|
}
|
||||||
|
|
||||||
|
return &proxy, nil
|
||||||
|
}
|
||||||
|
|
||||||
func overrideProxies(base map[store.ProxyName]BootstrapProxyConfig, proxies map[store.ProxyName]BootstrapProxyConfig) map[store.ProxyName]BootstrapProxyConfig {
|
func overrideProxies(base map[store.ProxyName]BootstrapProxyConfig, proxies map[store.ProxyName]BootstrapProxyConfig) map[store.ProxyName]BootstrapProxyConfig {
|
||||||
for name, proxy := range proxies {
|
for name, proxy := range proxies {
|
||||||
base[name] = proxy
|
base[name] = proxy
|
||||||
|
@ -2,7 +2,6 @@ package config
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"os"
|
"os"
|
||||||
"regexp"
|
|
||||||
"strconv"
|
"strconv"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
@ -11,9 +10,6 @@ import (
|
|||||||
"gopkg.in/yaml.v3"
|
"gopkg.in/yaml.v3"
|
||||||
)
|
)
|
||||||
|
|
||||||
// var reVar = regexp.MustCompile(`^\${(\w+)}$`)
|
|
||||||
var reVar = regexp.MustCompile(`\${(.*?)}`)
|
|
||||||
|
|
||||||
type InterpolatedString string
|
type InterpolatedString string
|
||||||
|
|
||||||
func (is *InterpolatedString) UnmarshalYAML(value *yaml.Node) error {
|
func (is *InterpolatedString) UnmarshalYAML(value *yaml.Node) error {
|
||||||
@ -23,12 +19,13 @@ func (is *InterpolatedString) UnmarshalYAML(value *yaml.Node) error {
|
|||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if match := reVar.FindStringSubmatch(str); len(match) > 0 {
|
str, err := envsubst.Eval(str, getEnv)
|
||||||
*is = InterpolatedString(os.Getenv(match[1]))
|
if err != nil {
|
||||||
} else {
|
return errors.WithStack(err)
|
||||||
*is = InterpolatedString(str)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
*is = InterpolatedString(str)
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -41,8 +38,9 @@ func (ii *InterpolatedInt) UnmarshalYAML(value *yaml.Node) error {
|
|||||||
return errors.Wrapf(err, "could not decode value '%v' (line '%d') into string", value.Value, value.Line)
|
return errors.Wrapf(err, "could not decode value '%v' (line '%d') into string", value.Value, value.Line)
|
||||||
}
|
}
|
||||||
|
|
||||||
if match := reVar.FindStringSubmatch(str); len(match) > 0 {
|
str, err := envsubst.Eval(str, getEnv)
|
||||||
str = os.Getenv(match[1])
|
if err != nil {
|
||||||
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
intVal, err := strconv.ParseInt(str, 10, 32)
|
intVal, err := strconv.ParseInt(str, 10, 32)
|
||||||
@ -64,11 +62,12 @@ func (ifl *InterpolatedFloat) UnmarshalYAML(value *yaml.Node) error {
|
|||||||
return errors.Wrapf(err, "could not decode value '%v' (line '%d') into string", value.Value, value.Line)
|
return errors.Wrapf(err, "could not decode value '%v' (line '%d') into string", value.Value, value.Line)
|
||||||
}
|
}
|
||||||
|
|
||||||
if match := reVar.FindStringSubmatch(str); len(match) > 0 {
|
str, err := envsubst.Eval(str, getEnv)
|
||||||
str = os.Getenv(match[1])
|
if err != nil {
|
||||||
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
floatVal, err := strconv.ParseFloat(str, 10)
|
floatVal, err := strconv.ParseFloat(str, 32)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.Wrapf(err, "could not parse float '%v', line '%d'", str, value.Line)
|
return errors.Wrapf(err, "could not parse float '%v', line '%d'", str, value.Line)
|
||||||
}
|
}
|
||||||
@ -87,8 +86,9 @@ func (ib *InterpolatedBool) UnmarshalYAML(value *yaml.Node) error {
|
|||||||
return errors.Wrapf(err, "could not decode value '%v' (line '%d') into string", value.Value, value.Line)
|
return errors.Wrapf(err, "could not decode value '%v' (line '%d') into string", value.Value, value.Line)
|
||||||
}
|
}
|
||||||
|
|
||||||
if match := reVar.FindStringSubmatch(str); len(match) > 0 {
|
str, err := envsubst.Eval(str, getEnv)
|
||||||
str = os.Getenv(match[1])
|
if err != nil {
|
||||||
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
boolVal, err := strconv.ParseBool(str)
|
boolVal, err := strconv.ParseBool(str)
|
||||||
@ -101,9 +101,10 @@ func (ib *InterpolatedBool) UnmarshalYAML(value *yaml.Node) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var getEnv = os.Getenv
|
||||||
|
|
||||||
type InterpolatedMap struct {
|
type InterpolatedMap struct {
|
||||||
Data map[string]any
|
Data map[string]any
|
||||||
getEnv func(string) string
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (im *InterpolatedMap) UnmarshalYAML(value *yaml.Node) error {
|
func (im *InterpolatedMap) UnmarshalYAML(value *yaml.Node) error {
|
||||||
@ -113,10 +114,6 @@ func (im *InterpolatedMap) UnmarshalYAML(value *yaml.Node) error {
|
|||||||
return errors.Wrapf(err, "could not decode value '%v' (line '%d') into map", value.Value, value.Line)
|
return errors.Wrapf(err, "could not decode value '%v' (line '%d') into map", value.Value, value.Line)
|
||||||
}
|
}
|
||||||
|
|
||||||
if im.getEnv == nil {
|
|
||||||
im.getEnv = os.Getenv
|
|
||||||
}
|
|
||||||
|
|
||||||
interpolated, err := im.interpolateRecursive(data)
|
interpolated, err := im.interpolateRecursive(data)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
@ -127,7 +124,7 @@ func (im *InterpolatedMap) UnmarshalYAML(value *yaml.Node) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (im *InterpolatedMap) interpolateRecursive(data any) (any, error) {
|
func (im InterpolatedMap) interpolateRecursive(data any) (any, error) {
|
||||||
switch typ := data.(type) {
|
switch typ := data.(type) {
|
||||||
case map[string]any:
|
case map[string]any:
|
||||||
for key, value := range typ {
|
for key, value := range typ {
|
||||||
@ -140,7 +137,7 @@ func (im *InterpolatedMap) interpolateRecursive(data any) (any, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
case string:
|
case string:
|
||||||
value, err := envsubst.Eval(typ, im.getEnv)
|
value, err := envsubst.Eval(typ, getEnv)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errors.WithStack(err)
|
return nil, errors.WithStack(err)
|
||||||
}
|
}
|
||||||
@ -165,22 +162,15 @@ type InterpolatedStringSlice []string
|
|||||||
|
|
||||||
func (iss *InterpolatedStringSlice) UnmarshalYAML(value *yaml.Node) error {
|
func (iss *InterpolatedStringSlice) UnmarshalYAML(value *yaml.Node) error {
|
||||||
var data []string
|
var data []string
|
||||||
var evErr error
|
|
||||||
|
|
||||||
if err := value.Decode(&data); err != nil {
|
if err := value.Decode(&data); err != nil {
|
||||||
return errors.Wrapf(err, "could not decode value '%v' (line '%d') into map", value.Value, value.Line)
|
return errors.Wrapf(err, "could not decode value '%v' (line '%d') into map", value.Value, value.Line)
|
||||||
}
|
}
|
||||||
|
|
||||||
for index, value := range data {
|
for index, value := range data {
|
||||||
//match := reVar.FindStringSubmatch(value)
|
value, err := envsubst.Eval(value, getEnv)
|
||||||
re := regexp.MustCompile(`\${(.*?)}`)
|
if err != nil {
|
||||||
|
return errors.WithStack(err)
|
||||||
res := re.FindAllStringSubmatch(value, 10)
|
|
||||||
if len(res) > 0 {
|
|
||||||
value, evErr = envsubst.EvalEnv(value)
|
|
||||||
if evErr != nil {
|
|
||||||
return evErr
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
data[index] = value
|
data[index] = value
|
||||||
@ -200,8 +190,9 @@ func (id *InterpolatedDuration) UnmarshalYAML(value *yaml.Node) error {
|
|||||||
return errors.Wrapf(err, "could not decode value '%v' (line '%d') into string", value.Value, value.Line)
|
return errors.Wrapf(err, "could not decode value '%v' (line '%d') into string", value.Value, value.Line)
|
||||||
}
|
}
|
||||||
|
|
||||||
if match := reVar.FindStringSubmatch(str); len(match) > 0 {
|
str, err := envsubst.Eval(str, getEnv)
|
||||||
str = os.Getenv(match[1])
|
if err != nil {
|
||||||
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
duration, err := time.ParseDuration(str)
|
duration, err := time.ParseDuration(str)
|
||||||
|
@ -4,6 +4,7 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"testing"
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
"gopkg.in/yaml.v3"
|
"gopkg.in/yaml.v3"
|
||||||
@ -65,7 +66,7 @@ func TestInterpolatedMap(t *testing.T) {
|
|||||||
var interpolatedMap InterpolatedMap
|
var interpolatedMap InterpolatedMap
|
||||||
|
|
||||||
if tc.Env != nil {
|
if tc.Env != nil {
|
||||||
interpolatedMap.getEnv = func(key string) string {
|
getEnv = func(key string) string {
|
||||||
return tc.Env[key]
|
return tc.Env[key]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -80,3 +81,54 @@ func TestInterpolatedMap(t *testing.T) {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestInterpolatedDuration(t *testing.T) {
|
||||||
|
type testCase struct {
|
||||||
|
Path string
|
||||||
|
Env map[string]string
|
||||||
|
Assert func(t *testing.T, parsed *InterpolatedDuration)
|
||||||
|
}
|
||||||
|
|
||||||
|
testCases := []testCase{
|
||||||
|
{
|
||||||
|
Path: "testdata/environment/interpolated-duration.yml",
|
||||||
|
Env: map[string]string{
|
||||||
|
"MY_DURATION": "30s",
|
||||||
|
},
|
||||||
|
Assert: func(t *testing.T, parsed *InterpolatedDuration) {
|
||||||
|
if e, g := 30*time.Second, parsed; e != time.Duration(*g) {
|
||||||
|
t.Errorf("parsed: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for idx, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("Case #%d", idx), func(t *testing.T) {
|
||||||
|
data, err := os.ReadFile(tc.Path)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
if tc.Env != nil {
|
||||||
|
getEnv = func(key string) string {
|
||||||
|
return tc.Env[key]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
config := struct {
|
||||||
|
Duration *InterpolatedDuration `yaml:"duration"`
|
||||||
|
}{
|
||||||
|
Duration: NewInterpolatedDuration(-1),
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := yaml.Unmarshal(data, &config); err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
if tc.Assert != nil {
|
||||||
|
tc.Assert(t, config.Duration)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -20,6 +20,10 @@ func NewDefaultLayersConfig() LayersConfig {
|
|||||||
TransportConfig: NewDefaultTransportConfig(),
|
TransportConfig: NewDefaultTransportConfig(),
|
||||||
Timeout: NewInterpolatedDuration(10 * time.Second),
|
Timeout: NewInterpolatedDuration(10 * time.Second),
|
||||||
},
|
},
|
||||||
|
ProviderCacheTimeout: NewInterpolatedDuration(time.Hour),
|
||||||
|
},
|
||||||
|
Sessions: AuthnLayerSessionConfig{
|
||||||
|
TTL: NewInterpolatedDuration(time.Hour),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
@ -31,13 +35,19 @@ type QueueLayerConfig struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type AuthnLayerConfig struct {
|
type AuthnLayerConfig struct {
|
||||||
Debug InterpolatedBool `yaml:"debug"`
|
Debug InterpolatedBool `yaml:"debug"`
|
||||||
TemplateDir InterpolatedString `yaml:"templateDir"`
|
TemplateDir InterpolatedString `yaml:"templateDir"`
|
||||||
OIDC AuthnOIDCLayerConfig `yaml:"oidc"`
|
OIDC AuthnOIDCLayerConfig `yaml:"oidc"`
|
||||||
|
Sessions AuthnLayerSessionConfig `yaml:"sessions"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type AuthnLayerSessionConfig struct {
|
||||||
|
TTL *InterpolatedDuration `yaml:"ttl"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type AuthnOIDCLayerConfig struct {
|
type AuthnOIDCLayerConfig struct {
|
||||||
HTTPClient AuthnOIDCHTTPClientConfig `yaml:"httpClient"`
|
HTTPClient AuthnOIDCHTTPClientConfig `yaml:"httpClient"`
|
||||||
|
ProviderCacheTimeout *InterpolatedDuration `yaml:"providerCacheTimeout"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type AuthnOIDCHTTPClientConfig struct {
|
type AuthnOIDCHTTPClientConfig struct {
|
||||||
|
15
internal/config/profiling.go
Normal file
15
internal/config/profiling.go
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
type ProfilingConfig struct {
|
||||||
|
Enabled InterpolatedBool `yaml:"enabled"`
|
||||||
|
Endpoint InterpolatedString `yaml:"endpoint"`
|
||||||
|
BasicAuth *BasicAuthConfig `yaml:"basicAuth"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewDefaultProfilingConfig() ProfilingConfig {
|
||||||
|
return ProfilingConfig{
|
||||||
|
Enabled: true,
|
||||||
|
Endpoint: "/.bouncer/profiling",
|
||||||
|
BasicAuth: nil,
|
||||||
|
}
|
||||||
|
}
|
@ -10,6 +10,7 @@ type ProxyServerConfig struct {
|
|||||||
Debug InterpolatedBool `yaml:"debug"`
|
Debug InterpolatedBool `yaml:"debug"`
|
||||||
HTTP HTTPConfig `yaml:"http"`
|
HTTP HTTPConfig `yaml:"http"`
|
||||||
Metrics MetricsConfig `yaml:"metrics"`
|
Metrics MetricsConfig `yaml:"metrics"`
|
||||||
|
Profiling ProfilingConfig `yaml:"profiling"`
|
||||||
Transport TransportConfig `yaml:"transport"`
|
Transport TransportConfig `yaml:"transport"`
|
||||||
Dial DialConfig `yaml:"dial"`
|
Dial DialConfig `yaml:"dial"`
|
||||||
Sentry SentryConfig `yaml:"sentry"`
|
Sentry SentryConfig `yaml:"sentry"`
|
||||||
@ -27,6 +28,7 @@ func NewDefaultProxyServerConfig() ProxyServerConfig {
|
|||||||
Sentry: NewDefaultSentryConfig(),
|
Sentry: NewDefaultSentryConfig(),
|
||||||
Cache: NewDefaultCacheConfig(),
|
Cache: NewDefaultCacheConfig(),
|
||||||
Templates: NewDefaultTemplatesConfig(),
|
Templates: NewDefaultTemplatesConfig(),
|
||||||
|
Profiling: NewDefaultProfilingConfig(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -111,12 +113,12 @@ func NewDefaultDialConfig() DialConfig {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type CacheConfig struct {
|
type CacheConfig struct {
|
||||||
TTL InterpolatedDuration `yaml:"ttl"`
|
TTL *InterpolatedDuration `yaml:"ttl"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewDefaultCacheConfig() CacheConfig {
|
func NewDefaultCacheConfig() CacheConfig {
|
||||||
return CacheConfig{
|
return CacheConfig{
|
||||||
TTL: *NewInterpolatedDuration(time.Second * 30),
|
TTL: NewInterpolatedDuration(time.Second * 30),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -9,21 +9,35 @@ const (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type RedisConfig struct {
|
type RedisConfig struct {
|
||||||
Adresses InterpolatedStringSlice `yaml:"addresses"`
|
Adresses InterpolatedStringSlice `yaml:"addresses"`
|
||||||
Master InterpolatedString `yaml:"master"`
|
Master InterpolatedString `yaml:"master"`
|
||||||
ReadTimeout InterpolatedDuration `yaml:"readTimeout"`
|
ReadTimeout InterpolatedDuration `yaml:"readTimeout"`
|
||||||
WriteTimeout InterpolatedDuration `yaml:"writeTimeout"`
|
WriteTimeout InterpolatedDuration `yaml:"writeTimeout"`
|
||||||
DialTimeout InterpolatedDuration `yaml:"dialTimeout"`
|
DialTimeout InterpolatedDuration `yaml:"dialTimeout"`
|
||||||
LockMaxRetries InterpolatedInt `yaml:"lockMaxRetries"`
|
LockMaxRetries InterpolatedInt `yaml:"lockMaxRetries"`
|
||||||
|
RouteByLatency InterpolatedBool `yaml:"routeByLatency"`
|
||||||
|
ContextTimeoutEnabled InterpolatedBool `yaml:"contextTimeoutEnabled"`
|
||||||
|
MaxRetries InterpolatedInt `yaml:"maxRetries"`
|
||||||
|
PingInterval InterpolatedDuration `yaml:"pingInterval"`
|
||||||
|
PoolSize InterpolatedInt `yaml:"poolSize"`
|
||||||
|
PoolTimeout InterpolatedDuration `yaml:"poolTimeout"`
|
||||||
|
MinIdleConns InterpolatedInt `yaml:"minIdleConns"`
|
||||||
|
MaxIdleConns InterpolatedInt `yaml:"maxIdleConns"`
|
||||||
|
ConnMaxIdleTime InterpolatedDuration `yaml:"connMaxIdleTime"`
|
||||||
|
ConnMaxLifetime InterpolatedDuration `yaml:"connMaxLifeTime"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewDefaultRedisConfig() RedisConfig {
|
func NewDefaultRedisConfig() RedisConfig {
|
||||||
return RedisConfig{
|
return RedisConfig{
|
||||||
Adresses: InterpolatedStringSlice{"localhost:6379"},
|
Adresses: InterpolatedStringSlice{"localhost:6379"},
|
||||||
Master: "",
|
Master: "",
|
||||||
ReadTimeout: InterpolatedDuration(30 * time.Second),
|
ReadTimeout: InterpolatedDuration(30 * time.Second),
|
||||||
WriteTimeout: InterpolatedDuration(30 * time.Second),
|
WriteTimeout: InterpolatedDuration(30 * time.Second),
|
||||||
DialTimeout: InterpolatedDuration(30 * time.Second),
|
DialTimeout: InterpolatedDuration(30 * time.Second),
|
||||||
LockMaxRetries: 10,
|
LockMaxRetries: 10,
|
||||||
|
MaxRetries: 3,
|
||||||
|
PingInterval: InterpolatedDuration(30 * time.Second),
|
||||||
|
ContextTimeoutEnabled: true,
|
||||||
|
RouteByLatency: true,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -29,10 +29,10 @@ func NewDefaultSentryConfig() SentryConfig {
|
|||||||
FlushTimeout: NewInterpolatedDuration(2 * time.Second),
|
FlushTimeout: NewInterpolatedDuration(2 * time.Second),
|
||||||
AttachStacktrace: true,
|
AttachStacktrace: true,
|
||||||
SampleRate: 1,
|
SampleRate: 1,
|
||||||
EnableTracing: true,
|
EnableTracing: false,
|
||||||
TracesSampleRate: 0.2,
|
TracesSampleRate: 0.1,
|
||||||
ProfilesSampleRate: 1,
|
ProfilesSampleRate: 0.1,
|
||||||
IgnoreErrors: []string{},
|
IgnoreErrors: []string{"context canceled", "net/http: abort"},
|
||||||
SendDefaultPII: false,
|
SendDefaultPII: false,
|
||||||
ServerName: "",
|
ServerName: "",
|
||||||
Environment: "",
|
Environment: "",
|
||||||
|
1
internal/config/testdata/environment/interpolated-duration.yml
vendored
Normal file
1
internal/config/testdata/environment/interpolated-duration.yml
vendored
Normal file
@ -0,0 +1 @@
|
|||||||
|
duration: ${MY_DURATION}
|
@ -38,7 +38,7 @@ func (l *Locker) WithLock(ctx context.Context, key string, timeout time.Duration
|
|||||||
|
|
||||||
defer func() {
|
defer func() {
|
||||||
if err := lock.Release(ctx); err != nil {
|
if err := lock.Release(ctx); err != nil {
|
||||||
logger.Error(ctx, "could not release lock", logger.E(errors.WithStack(err)))
|
logger.Error(ctx, "could not release lock", logger.CapturedE(errors.WithStack(err)))
|
||||||
}
|
}
|
||||||
|
|
||||||
logger.Debug(ctx, "lock released")
|
logger.Debug(ctx, "lock released")
|
||||||
|
@ -30,7 +30,7 @@ func retryWithBackoff(ctx context.Context, attempts int, fn func(ctx context.Con
|
|||||||
return errors.Wrapf(err, "execution failed after %d attempts", attempts)
|
return errors.Wrapf(err, "execution failed after %d attempts", attempts)
|
||||||
}
|
}
|
||||||
|
|
||||||
logger.Error(ctx, "error while executing func, retrying with backoff", logger.E(err), logger.F("backoffDelay", backoffDelay), logger.F("remainingAttempts", attempts-count))
|
logger.Error(ctx, "error while executing func, retrying with backoff", logger.CapturedE(err), logger.F("backoffDelay", backoffDelay), logger.F("remainingAttempts", attempts-count))
|
||||||
|
|
||||||
time.Sleep(backoffDelay)
|
time.Sleep(backoffDelay)
|
||||||
|
|
||||||
|
@ -2,10 +2,13 @@ package director
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"net/http"
|
||||||
"net/url"
|
"net/url"
|
||||||
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
||||||
|
"github.com/getsentry/sentry-go"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
|
"gitlab.com/wpetit/goweb/logger"
|
||||||
)
|
)
|
||||||
|
|
||||||
type contextKey string
|
type contextKey string
|
||||||
@ -14,6 +17,8 @@ const (
|
|||||||
contextKeyProxy contextKey = "proxy"
|
contextKeyProxy contextKey = "proxy"
|
||||||
contextKeyLayers contextKey = "layers"
|
contextKeyLayers contextKey = "layers"
|
||||||
contextKeyOriginalURL contextKey = "originalURL"
|
contextKeyOriginalURL contextKey = "originalURL"
|
||||||
|
contextKeyHandleError contextKey = "handleError"
|
||||||
|
contextKeySentryScope contextKey = "sentryScope"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
@ -34,19 +39,6 @@ func OriginalURL(ctx context.Context) (*url.URL, error) {
|
|||||||
return url, nil
|
return url, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func withProxy(ctx context.Context, proxy *store.Proxy) context.Context {
|
|
||||||
return context.WithValue(ctx, contextKeyProxy, proxy)
|
|
||||||
}
|
|
||||||
|
|
||||||
func ctxProxy(ctx context.Context) (*store.Proxy, error) {
|
|
||||||
proxy, err := ctxValue[*store.Proxy](ctx, contextKeyProxy)
|
|
||||||
if err != nil {
|
|
||||||
return nil, errors.WithStack(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return proxy, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func withLayers(ctx context.Context, layers []*store.Layer) context.Context {
|
func withLayers(ctx context.Context, layers []*store.Layer) context.Context {
|
||||||
return context.WithValue(ctx, contextKeyLayers, layers)
|
return context.WithValue(ctx, contextKeyLayers, layers)
|
||||||
}
|
}
|
||||||
@ -73,3 +65,35 @@ func ctxValue[T any](ctx context.Context, key contextKey) (T, error) {
|
|||||||
|
|
||||||
return value, nil
|
return value, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type HandleErrorFunc func(w http.ResponseWriter, r *http.Request, status int, err error)
|
||||||
|
|
||||||
|
func withHandleError(ctx context.Context, fn HandleErrorFunc) context.Context {
|
||||||
|
return context.WithValue(ctx, contextKeyHandleError, fn)
|
||||||
|
}
|
||||||
|
|
||||||
|
func HandleError(ctx context.Context, w http.ResponseWriter, r *http.Request, status int, err error) {
|
||||||
|
err = errors.WithStack(err)
|
||||||
|
|
||||||
|
fn, ok := ctx.Value(contextKeyHandleError).(HandleErrorFunc)
|
||||||
|
if !ok {
|
||||||
|
logger.Error(ctx, err.Error(), logger.CapturedE(err))
|
||||||
|
http.Error(w, http.StatusText(status), status)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
fn(w, r, status, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
func withSentryScope(ctx context.Context, scope *sentry.Scope) context.Context {
|
||||||
|
return context.WithValue(ctx, contextKeySentryScope, scope)
|
||||||
|
}
|
||||||
|
|
||||||
|
func SentryScope(ctx context.Context) (*sentry.Scope, error) {
|
||||||
|
scope, err := ctxValue[*sentry.Scope](ctx, contextKeySentryScope)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return scope, nil
|
||||||
|
}
|
||||||
|
@ -7,8 +7,9 @@ import (
|
|||||||
|
|
||||||
"forge.cadoles.com/Cadoles/go-proxy"
|
"forge.cadoles.com/Cadoles/go-proxy"
|
||||||
"forge.cadoles.com/Cadoles/go-proxy/wildcard"
|
"forge.cadoles.com/Cadoles/go-proxy/wildcard"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/cache"
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/syncx"
|
||||||
|
"github.com/getsentry/sentry-go"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
"github.com/prometheus/client_golang/prometheus"
|
"github.com/prometheus/client_golang/prometheus"
|
||||||
"gitlab.com/wpetit/goweb/logger"
|
"gitlab.com/wpetit/goweb/logger"
|
||||||
@ -19,92 +20,85 @@ type Director struct {
|
|||||||
layerRepository store.LayerRepository
|
layerRepository store.LayerRepository
|
||||||
layerRegistry *LayerRegistry
|
layerRegistry *LayerRegistry
|
||||||
|
|
||||||
proxyCache cache.Cache[string, []*store.Proxy]
|
cachedProxies *syncx.CachedResource[string, []*store.Proxy]
|
||||||
layerCache cache.Cache[string, []*store.Layer]
|
cachedLayers *syncx.CachedResource[string, []*store.Layer]
|
||||||
|
|
||||||
|
handleError HandleErrorFunc
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const proxiesCacheKey = "proxies"
|
||||||
|
|
||||||
func (d *Director) rewriteRequest(r *http.Request) (*http.Request, error) {
|
func (d *Director) rewriteRequest(r *http.Request) (*http.Request, error) {
|
||||||
ctx := r.Context()
|
ctx := r.Context()
|
||||||
|
|
||||||
proxies, err := d.getProxies(ctx)
|
proxies, _, err := d.cachedProxies.Get(ctx, proxiesCacheKey)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return r, errors.WithStack(err)
|
return r, errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
url := getRequestURL(r)
|
url := getRequestURL(r)
|
||||||
|
|
||||||
ctx = withOriginalURL(ctx, url)
|
ctx = withOriginalURL(ctx, url)
|
||||||
ctx = logger.With(ctx, logger.F("url", url.String()))
|
ctx = logger.With(ctx, logger.F("url", url.String()))
|
||||||
|
|
||||||
var match *store.Proxy
|
layers := make([]*store.Layer, 0)
|
||||||
|
|
||||||
MAIN:
|
|
||||||
for _, p := range proxies {
|
for _, p := range proxies {
|
||||||
for _, from := range p.From {
|
for _, from := range p.From {
|
||||||
logger.Debug(
|
|
||||||
ctx, "matching request with proxy's from",
|
|
||||||
logger.F("from", from),
|
|
||||||
)
|
|
||||||
if matches := wildcard.Match(url.String(), from); !matches {
|
if matches := wildcard.Match(url.String(), from); !matches {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
logger.Debug(
|
proxyCtx := logger.With(ctx,
|
||||||
ctx, "proxy's from matched",
|
logger.F("proxy", p.Name),
|
||||||
logger.F("from", from),
|
logger.F("host", r.Host),
|
||||||
|
logger.F("remoteAddr", r.RemoteAddr),
|
||||||
)
|
)
|
||||||
|
|
||||||
match = p
|
metricProxyRequestsTotal.With(prometheus.Labels{metricLabelProxy: string(p.Name)}).Add(1)
|
||||||
break MAIN
|
|
||||||
|
proxyLayers, _, err := d.cachedLayers.Get(proxyCtx, string(p.Name))
|
||||||
|
if err != nil {
|
||||||
|
return r, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
layers = append(layers, proxyLayers...)
|
||||||
|
|
||||||
|
if p.To == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
toURL, err := url.Parse(p.To)
|
||||||
|
if err != nil {
|
||||||
|
return r, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
r.URL.Host = toURL.Host
|
||||||
|
r.URL.Scheme = toURL.Scheme
|
||||||
|
r.URL.Path = toURL.JoinPath(r.URL.Path).Path
|
||||||
|
|
||||||
|
proxyCtx = withLayers(proxyCtx, layers)
|
||||||
|
r = r.WithContext(proxyCtx)
|
||||||
|
|
||||||
|
if sentryScope, _ := SentryScope(ctx); sentryScope != nil {
|
||||||
|
sentryScope.SetTags(map[string]string{
|
||||||
|
"bouncer.proxy.name": string(p.Name),
|
||||||
|
"bouncer.proxy.target.url": r.URL.String(),
|
||||||
|
"bouncer.proxy.target.host": r.URL.Host,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
return r, nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if match == nil {
|
|
||||||
return r, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
toURL, err := url.Parse(match.To)
|
|
||||||
if err != nil {
|
|
||||||
return r, errors.WithStack(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
r.URL.Host = toURL.Host
|
|
||||||
r.URL.Scheme = toURL.Scheme
|
|
||||||
r.URL.Path = toURL.JoinPath(r.URL.Path).Path
|
|
||||||
|
|
||||||
ctx = logger.With(ctx,
|
|
||||||
logger.F("proxy", match.Name),
|
|
||||||
logger.F("host", r.Host),
|
|
||||||
logger.F("remoteAddr", r.RemoteAddr),
|
|
||||||
)
|
|
||||||
|
|
||||||
logger.Debug(
|
|
||||||
ctx, "rewritten url",
|
|
||||||
logger.F("rewrittenURL", r.URL.String()),
|
|
||||||
)
|
|
||||||
|
|
||||||
metricProxyRequestsTotal.With(prometheus.Labels{metricLabelProxy: string(match.Name)}).Add(1)
|
|
||||||
|
|
||||||
ctx = withProxy(ctx, match)
|
|
||||||
|
|
||||||
layers, err := d.getLayers(ctx, match.Name)
|
|
||||||
if err != nil {
|
|
||||||
return r, errors.WithStack(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
ctx = withLayers(ctx, layers)
|
ctx = withLayers(ctx, layers)
|
||||||
r = r.WithContext(ctx)
|
r = r.WithContext(ctx)
|
||||||
|
|
||||||
return r, nil
|
return r, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
const proxiesCacheKey = "proxies"
|
func (d *Director) getProxies(ctx context.Context, key string) ([]*store.Proxy, error) {
|
||||||
|
logger.Debug(ctx, "querying fresh proxies")
|
||||||
func (d *Director) getProxies(ctx context.Context) ([]*store.Proxy, error) {
|
|
||||||
proxies, exists := d.proxyCache.Get(proxiesCacheKey)
|
|
||||||
if exists {
|
|
||||||
return proxies, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
headers, err := d.proxyRepository.QueryProxy(ctx, store.WithProxyQueryEnabled(true))
|
headers, err := d.proxyRepository.QueryProxy(ctx, store.WithProxyQueryEnabled(true))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -113,7 +107,7 @@ func (d *Director) getProxies(ctx context.Context) ([]*store.Proxy, error) {
|
|||||||
|
|
||||||
sort.Sort(store.ByProxyWeight(headers))
|
sort.Sort(store.ByProxyWeight(headers))
|
||||||
|
|
||||||
proxies = make([]*store.Proxy, 0, len(headers))
|
proxies := make([]*store.Proxy, 0, len(headers))
|
||||||
|
|
||||||
for _, h := range headers {
|
for _, h := range headers {
|
||||||
if !h.Enabled {
|
if !h.Enabled {
|
||||||
@ -128,18 +122,13 @@ func (d *Director) getProxies(ctx context.Context) ([]*store.Proxy, error) {
|
|||||||
proxies = append(proxies, proxy)
|
proxies = append(proxies, proxy)
|
||||||
}
|
}
|
||||||
|
|
||||||
d.proxyCache.Set(proxiesCacheKey, proxies)
|
|
||||||
|
|
||||||
return proxies, nil
|
return proxies, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (d *Director) getLayers(ctx context.Context, proxyName store.ProxyName) ([]*store.Layer, error) {
|
func (d *Director) getLayers(ctx context.Context, rawProxyName string) ([]*store.Layer, error) {
|
||||||
cacheKey := "layers-" + string(proxyName)
|
proxyName := store.ProxyName(rawProxyName)
|
||||||
|
|
||||||
layers, exists := d.layerCache.Get(cacheKey)
|
logger.Debug(ctx, "querying fresh layers")
|
||||||
if exists {
|
|
||||||
return layers, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
headers, err := d.layerRepository.QueryLayers(ctx, proxyName, store.WithLayerQueryEnabled(true))
|
headers, err := d.layerRepository.QueryLayers(ctx, proxyName, store.WithLayerQueryEnabled(true))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -148,7 +137,7 @@ func (d *Director) getLayers(ctx context.Context, proxyName store.ProxyName) ([]
|
|||||||
|
|
||||||
sort.Sort(store.ByLayerWeight(headers))
|
sort.Sort(store.ByLayerWeight(headers))
|
||||||
|
|
||||||
layers = make([]*store.Layer, 0, len(headers))
|
layers := make([]*store.Layer, 0, len(headers))
|
||||||
|
|
||||||
for _, h := range headers {
|
for _, h := range headers {
|
||||||
if !h.Enabled {
|
if !h.Enabled {
|
||||||
@ -163,21 +152,20 @@ func (d *Director) getLayers(ctx context.Context, proxyName store.ProxyName) ([]
|
|||||||
layers = append(layers, layer)
|
layers = append(layers, layer)
|
||||||
}
|
}
|
||||||
|
|
||||||
d.layerCache.Set(cacheKey, layers)
|
|
||||||
|
|
||||||
return layers, nil
|
return layers, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (d *Director) RequestTransformer() proxy.RequestTransformer {
|
func (d *Director) RequestTransformer() proxy.RequestTransformer {
|
||||||
return func(r *http.Request) {
|
return func(r *http.Request) {
|
||||||
ctx := r.Context()
|
ctx := r.Context()
|
||||||
|
|
||||||
layers, err := ctxLayers(ctx)
|
layers, err := ctxLayers(ctx)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if errors.Is(err, errContextKeyNotFound) {
|
if errors.Is(err, errContextKeyNotFound) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
logger.Error(ctx, "could not retrieve layers from context", logger.E(errors.WithStack(err)))
|
logger.Error(ctx, "could not retrieve layers from context", logger.CapturedE(errors.WithStack(err)))
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@ -227,41 +215,43 @@ func (d *Director) ResponseTransformer() proxy.ResponseTransformer {
|
|||||||
func (d *Director) Middleware() proxy.Middleware {
|
func (d *Director) Middleware() proxy.Middleware {
|
||||||
return func(next http.Handler) http.Handler {
|
return func(next http.Handler) http.Handler {
|
||||||
fn := func(w http.ResponseWriter, r *http.Request) {
|
fn := func(w http.ResponseWriter, r *http.Request) {
|
||||||
r, err := d.rewriteRequest(r)
|
sentry.ConfigureScope(func(scope *sentry.Scope) {
|
||||||
if err != nil {
|
ctx := withHandleError(r.Context(), d.handleError)
|
||||||
logger.Error(r.Context(), "could not rewrite request", logger.E(errors.WithStack(err)))
|
ctx = withSentryScope(ctx, scope)
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
r = r.WithContext(ctx)
|
||||||
|
|
||||||
return
|
r, err := d.rewriteRequest(r)
|
||||||
}
|
if err != nil {
|
||||||
|
HandleError(ctx, w, r, http.StatusInternalServerError, errors.Wrap(err, "could not rewrite request"))
|
||||||
ctx := r.Context()
|
|
||||||
|
|
||||||
layers, err := ctxLayers(ctx)
|
|
||||||
if err != nil {
|
|
||||||
if errors.Is(err, errContextKeyNotFound) {
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
logger.Error(ctx, "could not retrieve proxy and layers from context", logger.E(errors.WithStack(err)))
|
ctx = r.Context()
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
||||||
|
|
||||||
return
|
layers, err := ctxLayers(ctx)
|
||||||
}
|
if err != nil {
|
||||||
|
if errors.Is(err, errContextKeyNotFound) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
httpMiddlewares := make([]proxy.Middleware, 0)
|
HandleError(ctx, w, r, http.StatusInternalServerError, errors.Wrap(err, "could not retrieve proxy and layers from context"))
|
||||||
for _, layer := range layers {
|
return
|
||||||
middleware, ok := d.layerRegistry.GetMiddleware(layer.Type)
|
|
||||||
if !ok {
|
|
||||||
continue
|
|
||||||
}
|
}
|
||||||
|
|
||||||
httpMiddlewares = append(httpMiddlewares, middleware.Middleware(layer))
|
httpMiddlewares := make([]proxy.Middleware, 0)
|
||||||
}
|
for _, layer := range layers {
|
||||||
|
middleware, ok := d.layerRegistry.GetMiddleware(layer.Type)
|
||||||
|
if !ok {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
handler := createMiddlewareChain(next, httpMiddlewares)
|
httpMiddlewares = append(httpMiddlewares, middleware.Middleware(layer))
|
||||||
|
}
|
||||||
|
|
||||||
handler.ServeHTTP(w, r)
|
handler := createMiddlewareChain(next, httpMiddlewares)
|
||||||
|
|
||||||
|
handler.ServeHTTP(w, r)
|
||||||
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
return http.HandlerFunc(fn)
|
return http.HandlerFunc(fn)
|
||||||
@ -273,11 +263,15 @@ func New(proxyRepository store.ProxyRepository, layerRepository store.LayerRepos
|
|||||||
|
|
||||||
registry := NewLayerRegistry(opts.Layers...)
|
registry := NewLayerRegistry(opts.Layers...)
|
||||||
|
|
||||||
return &Director{
|
director := &Director{
|
||||||
proxyRepository: proxyRepository,
|
proxyRepository: proxyRepository,
|
||||||
layerRepository: layerRepository,
|
layerRepository: layerRepository,
|
||||||
layerRegistry: registry,
|
layerRegistry: registry,
|
||||||
proxyCache: opts.ProxyCache,
|
handleError: opts.HandleError,
|
||||||
layerCache: opts.LayerCache,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
director.cachedProxies = syncx.NewCachedResource(opts.ProxyCache, director.getProxies)
|
||||||
|
director.cachedLayers = syncx.NewCachedResource(opts.LayerCache, director.getLayers)
|
||||||
|
|
||||||
|
return director
|
||||||
}
|
}
|
||||||
|
@ -1,13 +1,18 @@
|
|||||||
package authn
|
package authn
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
"html/template"
|
"html/template"
|
||||||
|
"io"
|
||||||
"net/http"
|
"net/http"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
|
|
||||||
"forge.cadoles.com/Cadoles/go-proxy"
|
"forge.cadoles.com/Cadoles/go-proxy"
|
||||||
"forge.cadoles.com/Cadoles/go-proxy/wildcard"
|
"forge.cadoles.com/Cadoles/go-proxy/wildcard"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/proxy/director"
|
"forge.cadoles.com/cadoles/bouncer/internal/proxy/director"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/proxy/director/layer/util"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/rule"
|
||||||
|
ruleHTTP "forge.cadoles.com/cadoles/bouncer/internal/rule/http"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
||||||
"github.com/Masterminds/sprig/v3"
|
"github.com/Masterminds/sprig/v3"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
@ -19,6 +24,8 @@ type Layer struct {
|
|||||||
auth Authenticator
|
auth Authenticator
|
||||||
debug bool
|
debug bool
|
||||||
|
|
||||||
|
ruleEngineCache *util.RuleEngineCache[*Vars, *LayerOptions]
|
||||||
|
|
||||||
templateDir string
|
templateDir string
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -29,9 +36,7 @@ func (l *Layer) Middleware(layer *store.Layer) proxy.Middleware {
|
|||||||
|
|
||||||
options, err := fromStoreOptions(layer.Options)
|
options, err := fromStoreOptions(layer.Options)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error(ctx, "could not parse layer options", logger.E(errors.WithStack(err)))
|
director.HandleError(ctx, w, r, http.StatusInternalServerError, errors.Wrap(err, "could not parse layer options"))
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -42,7 +47,7 @@ func (l *Layer) Middleware(layer *store.Layer) proxy.Middleware {
|
|||||||
}
|
}
|
||||||
|
|
||||||
err = errors.WithStack(err)
|
err = errors.WithStack(err)
|
||||||
logger.Error(ctx, "could not execute pre-auth hook", logger.E(err))
|
logger.Error(ctx, "could not execute pre-auth hook", logger.CapturedE(err))
|
||||||
l.renderErrorPage(w, r, layer, options, err)
|
l.renderErrorPage(w, r, layer, options, err)
|
||||||
|
|
||||||
return
|
return
|
||||||
@ -68,20 +73,20 @@ func (l *Layer) Middleware(layer *store.Layer) proxy.Middleware {
|
|||||||
}
|
}
|
||||||
|
|
||||||
err = errors.WithStack(err)
|
err = errors.WithStack(err)
|
||||||
logger.Error(ctx, "could not authenticate user", logger.E(err))
|
logger.Error(ctx, "could not authenticate user", logger.CapturedE(err))
|
||||||
l.renderErrorPage(w, r, layer, options, err)
|
l.renderErrorPage(w, r, layer, options, err)
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := l.applyRules(r, options, user); err != nil {
|
if err := l.applyRules(ctx, r, layer, options, user); err != nil {
|
||||||
if errors.Is(err, ErrForbidden) {
|
if errors.Is(err, ErrForbidden) {
|
||||||
l.renderForbiddenPage(w, r, layer, options, user)
|
l.renderForbiddenPage(w, r, layer, options, user)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
err = errors.WithStack(err)
|
err = errors.WithStack(err)
|
||||||
logger.Error(ctx, "could not apply rules", logger.E(err))
|
logger.Error(ctx, "could not apply rules", logger.CapturedE(err))
|
||||||
l.renderErrorPage(w, r, layer, options, err)
|
l.renderErrorPage(w, r, layer, options, err)
|
||||||
|
|
||||||
return
|
return
|
||||||
@ -99,7 +104,7 @@ func (l *Layer) Middleware(layer *store.Layer) proxy.Middleware {
|
|||||||
}
|
}
|
||||||
|
|
||||||
err = errors.WithStack(err)
|
err = errors.WithStack(err)
|
||||||
logger.Error(ctx, "could not execute post-auth hook", logger.E(err))
|
logger.Error(ctx, "could not execute post-auth hook", logger.CapturedE(err))
|
||||||
l.renderErrorPage(w, r, layer, options, err)
|
l.renderErrorPage(w, r, layer, options, err)
|
||||||
|
|
||||||
return
|
return
|
||||||
@ -162,20 +167,22 @@ func (l *Layer) renderPage(w http.ResponseWriter, r *http.Request, page string,
|
|||||||
|
|
||||||
tmpl, err := template.New("").Funcs(sprig.FuncMap()).ParseGlob(pattern)
|
tmpl, err := template.New("").Funcs(sprig.FuncMap()).ParseGlob(pattern)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error(ctx, "could not load authn templates", logger.E(errors.WithStack(err)))
|
director.HandleError(ctx, w, r, http.StatusInternalServerError, errors.Wrap(err, "could not load authn templates"))
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
w.Header().Add("Cache-Control", "no-cache")
|
w.Header().Add("Cache-Control", "no-cache")
|
||||||
|
|
||||||
if err := tmpl.ExecuteTemplate(w, block, templateData); err != nil {
|
var buf bytes.Buffer
|
||||||
logger.Error(ctx, "could not render authn page", logger.E(errors.WithStack(err)))
|
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
||||||
|
|
||||||
|
if err := tmpl.ExecuteTemplate(w, block, templateData); err != nil {
|
||||||
|
director.HandleError(ctx, w, r, http.StatusInternalServerError, errors.Wrap(err, "could not render authn page"))
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if _, err := io.Copy(w, &buf); err != nil {
|
||||||
|
logger.Error(ctx, "could not write authn page", logger.CapturedE(errors.WithStack(err)))
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// LayerType implements director.MiddlewareLayer
|
// LayerType implements director.MiddlewareLayer
|
||||||
@ -187,6 +194,18 @@ func NewLayer(layerType store.LayerType, auth Authenticator, funcs ...OptionFunc
|
|||||||
opts := NewOptions(funcs...)
|
opts := NewOptions(funcs...)
|
||||||
|
|
||||||
return &Layer{
|
return &Layer{
|
||||||
|
ruleEngineCache: util.NewInMemoryRuleEngineCache[*Vars, *LayerOptions](func(options *LayerOptions) (*rule.Engine[*Vars], error) {
|
||||||
|
engine, err := rule.NewEngine[*Vars](
|
||||||
|
rule.WithRules(options.Rules...),
|
||||||
|
rule.WithExpr(getAuthnAPI()...),
|
||||||
|
ruleHTTP.WithRequestFuncs(),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return engine, nil
|
||||||
|
}),
|
||||||
layerType: layerType,
|
layerType: layerType,
|
||||||
auth: auth,
|
auth: auth,
|
||||||
templateDir: opts.TemplateDir,
|
templateDir: opts.TemplateDir,
|
||||||
|
@ -28,12 +28,13 @@ func DefaultLayerOptions() LayerOptions {
|
|||||||
return LayerOptions{
|
return LayerOptions{
|
||||||
MatchURLs: []string{"*"},
|
MatchURLs: []string{"*"},
|
||||||
Rules: []string{
|
Rules: []string{
|
||||||
"del_headers('Remote-*')",
|
"del_headers(ctx, 'Remote-*')",
|
||||||
"set_header('Remote-User', user.subject)",
|
"set_header(ctx,'Remote-User', vars.user.subject)",
|
||||||
`map(
|
`map(
|
||||||
toPairs(user.attrs), {
|
toPairs(vars.user.attrs), {
|
||||||
let name = replace(lower(string(get(#, 0))), '_', '-');
|
let name = replace(lower(string(get(#, 0))), '_', '-');
|
||||||
set_header(
|
set_header(
|
||||||
|
ctx,
|
||||||
'Remote-User-Attr-' + name,
|
'Remote-User-Attr-' + name,
|
||||||
get(#, 1)
|
get(#, 1)
|
||||||
)
|
)
|
||||||
|
@ -39,6 +39,23 @@ func TestMatchAuthorizedCIDRs(t *testing.T) {
|
|||||||
},
|
},
|
||||||
ExpectedResult: false,
|
ExpectedResult: false,
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
RemoteHostPort: "192.168.1.15:43349",
|
||||||
|
AuthorizedCIDRs: []string{
|
||||||
|
"192.168.1.5/32",
|
||||||
|
"192.168.1.0/24",
|
||||||
|
},
|
||||||
|
ExpectedResult: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
RemoteHostPort: "192.168.1.15:43349",
|
||||||
|
AuthorizedCIDRs: []string{
|
||||||
|
"192.168.1.5/32",
|
||||||
|
"192.168.1.6/32",
|
||||||
|
"192.168.1.7/32",
|
||||||
|
},
|
||||||
|
ExpectedResult: false,
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
auth := Authenticator{}
|
auth := Authenticator{}
|
||||||
|
@ -13,9 +13,12 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
|
|
||||||
"forge.cadoles.com/Cadoles/go-proxy/wildcard"
|
"forge.cadoles.com/Cadoles/go-proxy/wildcard"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/cache/memory"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/cache/ttl"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/proxy/director"
|
"forge.cadoles.com/cadoles/bouncer/internal/proxy/director"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/proxy/director/layer/authn"
|
"forge.cadoles.com/cadoles/bouncer/internal/proxy/director/layer/authn"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/syncx"
|
||||||
"github.com/coreos/go-oidc/v3/oidc"
|
"github.com/coreos/go-oidc/v3/oidc"
|
||||||
"github.com/gorilla/sessions"
|
"github.com/gorilla/sessions"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
@ -24,9 +27,10 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type Authenticator struct {
|
type Authenticator struct {
|
||||||
store sessions.Store
|
store sessions.Store
|
||||||
httpTransport *http.Transport
|
httpTransport *http.Transport
|
||||||
httpClientTimeout time.Duration
|
httpClientTimeout time.Duration
|
||||||
|
cachedOIDCProvider *syncx.CachedResource[string, *oidc.Provider]
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *Authenticator) PreAuthentication(w http.ResponseWriter, r *http.Request, layer *store.Layer) error {
|
func (a *Authenticator) PreAuthentication(w http.ResponseWriter, r *http.Request, layer *store.Layer) error {
|
||||||
@ -44,7 +48,7 @@ func (a *Authenticator) PreAuthentication(w http.ResponseWriter, r *http.Request
|
|||||||
|
|
||||||
sess, err := a.store.Get(r, a.getCookieName(options.Cookie.Name, layer.Proxy, layer.Name))
|
sess, err := a.store.Get(r, a.getCookieName(options.Cookie.Name, layer.Proxy, layer.Name))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error(ctx, "could not retrieve session", logger.E(errors.WithStack(err)))
|
logger.Error(ctx, "could not retrieve session", logger.CapturedE(errors.WithStack(err)))
|
||||||
}
|
}
|
||||||
|
|
||||||
loginCallbackURL, err := a.getLoginCallbackURL(originalURL, layer.Proxy, layer.Name, options)
|
loginCallbackURL, err := a.getLoginCallbackURL(originalURL, layer.Proxy, layer.Name, options)
|
||||||
@ -52,7 +56,7 @@ func (a *Authenticator) PreAuthentication(w http.ResponseWriter, r *http.Request
|
|||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
client, err := a.getClient(options, loginCallbackURL.String())
|
client, err := a.getClient(ctx, options, loginCallbackURL.String())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
@ -86,7 +90,7 @@ func (a *Authenticator) PreAuthentication(w http.ResponseWriter, r *http.Request
|
|||||||
if postLogoutRedirectURL != "" {
|
if postLogoutRedirectURL != "" {
|
||||||
isAuthorized := slices.Contains(options.OIDC.PostLogoutRedirectURLs, postLogoutRedirectURL)
|
isAuthorized := slices.Contains(options.OIDC.PostLogoutRedirectURLs, postLogoutRedirectURL)
|
||||||
if !isAuthorized {
|
if !isAuthorized {
|
||||||
http.Error(w, "unauthorized post-logout redirect", http.StatusBadRequest)
|
director.HandleError(ctx, w, r, http.StatusBadRequest, errors.New("unauthorized post-logout redirect"))
|
||||||
return errors.WithStack(authn.ErrSkipRequest)
|
return errors.WithStack(authn.ErrSkipRequest)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -128,7 +132,7 @@ func (a *Authenticator) Authenticate(w http.ResponseWriter, r *http.Request, lay
|
|||||||
|
|
||||||
defer func() {
|
defer func() {
|
||||||
if err := sess.Save(r, w); err != nil {
|
if err := sess.Save(r, w); err != nil {
|
||||||
logger.Error(ctx, "could not save session", logger.E(errors.WithStack(err)))
|
logger.Error(ctx, "could not save session", logger.CapturedE(errors.WithStack(err)))
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
@ -158,7 +162,7 @@ func (a *Authenticator) Authenticate(w http.ResponseWriter, r *http.Request, lay
|
|||||||
return nil, errors.WithStack(err)
|
return nil, errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
client, err := a.getClient(options, loginCallbackURL.String())
|
client, err := a.getClient(ctx, options, loginCallbackURL.String())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errors.WithStack(err)
|
return nil, errors.WithStack(err)
|
||||||
}
|
}
|
||||||
@ -360,9 +364,7 @@ func (a *Authenticator) templatize(rawTemplate string, proxyName store.ProxyName
|
|||||||
return raw.String(), nil
|
return raw.String(), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *Authenticator) getClient(options *LayerOptions, redirectURL string) (*Client, error) {
|
func (a *Authenticator) getClient(ctx context.Context, options *LayerOptions, redirectURL string) (*Client, error) {
|
||||||
ctx := context.Background()
|
|
||||||
|
|
||||||
transport := a.httpTransport.Clone()
|
transport := a.httpTransport.Clone()
|
||||||
|
|
||||||
if options.OIDC.TLSInsecureSkipVerify {
|
if options.OIDC.TLSInsecureSkipVerify {
|
||||||
@ -373,6 +375,10 @@ func (a *Authenticator) getClient(options *LayerOptions, redirectURL string) (*C
|
|||||||
transport.TLSClientConfig.InsecureSkipVerify = true
|
transport.TLSClientConfig.InsecureSkipVerify = true
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if options.OIDC.SkipIssuerVerification {
|
||||||
|
ctx = oidc.InsecureIssuerURLContext(ctx, options.OIDC.IssuerURL)
|
||||||
|
}
|
||||||
|
|
||||||
httpClient := &http.Client{
|
httpClient := &http.Client{
|
||||||
Timeout: a.httpClientTimeout,
|
Timeout: a.httpClientTimeout,
|
||||||
Transport: transport,
|
Transport: transport,
|
||||||
@ -384,9 +390,9 @@ func (a *Authenticator) getClient(options *LayerOptions, redirectURL string) (*C
|
|||||||
ctx = oidc.InsecureIssuerURLContext(ctx, options.OIDC.IssuerURL)
|
ctx = oidc.InsecureIssuerURLContext(ctx, options.OIDC.IssuerURL)
|
||||||
}
|
}
|
||||||
|
|
||||||
provider, err := oidc.NewProvider(ctx, options.OIDC.IssuerURL)
|
provider, _, err := a.cachedOIDCProvider.Get(ctx, options.OIDC.IssuerURL)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errors.Wrap(err, "could not create oidc provider")
|
return nil, errors.Wrap(err, "could not retrieve oidc provider")
|
||||||
}
|
}
|
||||||
|
|
||||||
client := NewClient(
|
client := NewClient(
|
||||||
@ -401,6 +407,17 @@ func (a *Authenticator) getClient(options *LayerOptions, redirectURL string) (*C
|
|||||||
return client, nil
|
return client, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (a *Authenticator) getOIDCProvider(ctx context.Context, issuerURL string) (*oidc.Provider, error) {
|
||||||
|
logger.Debug(ctx, "refreshing oidc provider", logger.F("issuerURL", issuerURL))
|
||||||
|
|
||||||
|
provider, err := oidc.NewProvider(ctx, issuerURL)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.Wrap(err, "could not create oidc provider")
|
||||||
|
}
|
||||||
|
|
||||||
|
return provider, nil
|
||||||
|
}
|
||||||
|
|
||||||
const defaultCookieNamePrefix = "_bouncer_authn_oidc"
|
const defaultCookieNamePrefix = "_bouncer_authn_oidc"
|
||||||
|
|
||||||
func (a *Authenticator) getCookieName(cookieName string, proxyName store.ProxyName, layerName store.LayerName) string {
|
func (a *Authenticator) getCookieName(cookieName string, proxyName store.ProxyName, layerName store.LayerName) string {
|
||||||
@ -411,6 +428,25 @@ func (a *Authenticator) getCookieName(cookieName string, proxyName store.ProxyNa
|
|||||||
return strings.ToLower(fmt.Sprintf("%s_%s_%s", defaultCookieNamePrefix, proxyName, layerName))
|
return strings.ToLower(fmt.Sprintf("%s_%s_%s", defaultCookieNamePrefix, proxyName, layerName))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func NewAuthenticator(httpTransport *http.Transport, clientTimeout time.Duration, store sessions.Store, oidcProviderCacheTimeout time.Duration) *Authenticator {
|
||||||
|
authenticator := &Authenticator{
|
||||||
|
httpTransport: httpTransport,
|
||||||
|
httpClientTimeout: clientTimeout,
|
||||||
|
store: store,
|
||||||
|
}
|
||||||
|
|
||||||
|
authenticator.cachedOIDCProvider = syncx.NewCachedResource(
|
||||||
|
ttl.NewCache(
|
||||||
|
memory.NewCache[string, *oidc.Provider](),
|
||||||
|
memory.NewCache[string, time.Time](),
|
||||||
|
oidcProviderCacheTimeout,
|
||||||
|
),
|
||||||
|
authenticator.getOIDCProvider,
|
||||||
|
)
|
||||||
|
|
||||||
|
return authenticator
|
||||||
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
_ authn.PreAuthentication = &Authenticator{}
|
_ authn.PreAuthentication = &Authenticator{}
|
||||||
_ authn.Authenticator = &Authenticator{}
|
_ authn.Authenticator = &Authenticator{}
|
||||||
|
@ -6,6 +6,7 @@ import (
|
|||||||
"net/url"
|
"net/url"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/proxy/director"
|
||||||
"github.com/coreos/go-oidc/v3/oidc"
|
"github.com/coreos/go-oidc/v3/oidc"
|
||||||
"github.com/dchest/uniuri"
|
"github.com/dchest/uniuri"
|
||||||
"github.com/gorilla/sessions"
|
"github.com/gorilla/sessions"
|
||||||
@ -68,8 +69,7 @@ func (c *Client) login(w http.ResponseWriter, r *http.Request, sess *sessions.Se
|
|||||||
sess.Values[sessionKeyPostLoginRedirectURL] = postLoginRedirectURL
|
sess.Values[sessionKeyPostLoginRedirectURL] = postLoginRedirectURL
|
||||||
|
|
||||||
if err := sess.Save(r, w); err != nil {
|
if err := sess.Save(r, w); err != nil {
|
||||||
logger.Error(ctx, "could not save session", logger.E(errors.WithStack(err)))
|
director.HandleError(ctx, w, r, http.StatusInternalServerError, errors.Wrap(err, "could not save session"))
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@ -127,7 +127,7 @@ func (c *Client) HandleLogout(w http.ResponseWriter, r *http.Request, sess *sess
|
|||||||
|
|
||||||
rawIDToken, err := c.getRawIDToken(sess)
|
rawIDToken, err := c.getRawIDToken(sess)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error(ctx, "could not retrieve raw id token", logger.E(errors.WithStack(err)))
|
logger.Error(ctx, "could not retrieve raw id token", logger.CapturedE(errors.WithStack(err)))
|
||||||
}
|
}
|
||||||
|
|
||||||
sess.Values[sessionKeyIDToken] = nil
|
sess.Values[sessionKeyIDToken] = nil
|
||||||
|
@ -10,9 +10,11 @@ const LayerType store.LayerType = "authn-oidc"
|
|||||||
|
|
||||||
func NewLayer(store sessions.Store, funcs ...OptionFunc) *authn.Layer {
|
func NewLayer(store sessions.Store, funcs ...OptionFunc) *authn.Layer {
|
||||||
opts := NewOptions(funcs...)
|
opts := NewOptions(funcs...)
|
||||||
return authn.NewLayer(LayerType, &Authenticator{
|
authenticator := NewAuthenticator(
|
||||||
httpTransport: opts.HTTPTransport,
|
opts.HTTPTransport,
|
||||||
httpClientTimeout: opts.HTTPClientTimeout,
|
opts.HTTPClientTimeout,
|
||||||
store: store,
|
store,
|
||||||
}, opts.AuthnOptions...)
|
opts.OIDCProviderCacheTimeout,
|
||||||
|
)
|
||||||
|
return authn.NewLayer(LayerType, authenticator, opts.AuthnOptions...)
|
||||||
}
|
}
|
||||||
|
@ -8,9 +8,10 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type Options struct {
|
type Options struct {
|
||||||
HTTPTransport *http.Transport
|
HTTPTransport *http.Transport
|
||||||
HTTPClientTimeout time.Duration
|
HTTPClientTimeout time.Duration
|
||||||
AuthnOptions []authn.OptionFunc
|
AuthnOptions []authn.OptionFunc
|
||||||
|
OIDCProviderCacheTimeout time.Duration
|
||||||
}
|
}
|
||||||
|
|
||||||
type OptionFunc func(opts *Options)
|
type OptionFunc func(opts *Options)
|
||||||
@ -33,11 +34,18 @@ func WithAuthnOptions(funcs ...authn.OptionFunc) OptionFunc {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func WithOIDCProviderCacheTimeout(timeout time.Duration) OptionFunc {
|
||||||
|
return func(opts *Options) {
|
||||||
|
opts.OIDCProviderCacheTimeout = timeout
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func NewOptions(funcs ...OptionFunc) *Options {
|
func NewOptions(funcs ...OptionFunc) *Options {
|
||||||
opts := &Options{
|
opts := &Options{
|
||||||
HTTPTransport: http.DefaultTransport.(*http.Transport),
|
HTTPTransport: http.DefaultTransport.(*http.Transport),
|
||||||
HTTPClientTimeout: 30 * time.Second,
|
HTTPClientTimeout: 30 * time.Second,
|
||||||
AuthnOptions: make([]authn.OptionFunc, 0),
|
AuthnOptions: make([]authn.OptionFunc, 0),
|
||||||
|
OIDCProviderCacheTimeout: time.Hour,
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, fn := range funcs {
|
for _, fn := range funcs {
|
||||||
|
@ -1,38 +1,35 @@
|
|||||||
package authn
|
package authn
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/rule"
|
|
||||||
ruleHTTP "forge.cadoles.com/cadoles/bouncer/internal/rule/http"
|
ruleHTTP "forge.cadoles.com/cadoles/bouncer/internal/rule/http"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
||||||
"github.com/expr-lang/expr"
|
"github.com/expr-lang/expr"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Env struct {
|
type Vars struct {
|
||||||
User *User `expr:"user"`
|
User *User `expr:"user"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *Layer) applyRules(r *http.Request, options *LayerOptions, user *User) error {
|
func (l *Layer) applyRules(ctx context.Context, r *http.Request, layer *store.Layer, options *LayerOptions, user *User) error {
|
||||||
rules := options.Rules
|
key := string(layer.Proxy) + "-" + string(layer.Name)
|
||||||
if len(rules) == 0 {
|
revisionedEngine := l.ruleEngineCache.Get(key)
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
engine, err := rule.NewEngine[*Env](
|
engine, err := revisionedEngine.Get(ctx, layer.Revision, options)
|
||||||
rule.WithRules(options.Rules...),
|
|
||||||
rule.WithExpr(getAuthnAPI()...),
|
|
||||||
ruleHTTP.WithRequestFuncs(r),
|
|
||||||
)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
env := &Env{
|
vars := &Vars{
|
||||||
User: user,
|
User: user,
|
||||||
}
|
}
|
||||||
|
|
||||||
if _, err := engine.Apply(env); err != nil {
|
ctx = ruleHTTP.WithRequest(ctx, r)
|
||||||
|
|
||||||
|
if _, err := engine.Apply(ctx, vars); err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1,9 +1,11 @@
|
|||||||
package queue
|
package queue
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
"html/template"
|
"html/template"
|
||||||
|
"io"
|
||||||
"math/rand"
|
"math/rand"
|
||||||
"net/http"
|
"net/http"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
@ -52,9 +54,7 @@ func (q *Queue) Middleware(layer *store.Layer) proxy.Middleware {
|
|||||||
|
|
||||||
options, err := fromStoreOptions(layer.Options, q.defaultKeepAlive)
|
options, err := fromStoreOptions(layer.Options, q.defaultKeepAlive)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error(ctx, "could not parse layer options", logger.E(errors.WithStack(err)))
|
director.HandleError(ctx, w, r, http.StatusInternalServerError, errors.Wrap(err, "could not parse layer options"))
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -65,13 +65,13 @@ func (q *Queue) Middleware(layer *store.Layer) proxy.Middleware {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
defer q.updateMetrics(ctx, layer.Proxy, layer.Name, options)
|
defer q.updateMetrics(layer.Proxy, layer.Name, options)
|
||||||
|
|
||||||
cookieName := q.getCookieName(layer.Name)
|
cookieName := q.getCookieName(layer.Name)
|
||||||
|
|
||||||
cookie, err := r.Cookie(cookieName)
|
cookie, err := r.Cookie(cookieName)
|
||||||
if err != nil && !errors.Is(err, http.ErrNoCookie) {
|
if err != nil && !errors.Is(err, http.ErrNoCookie) {
|
||||||
logger.Error(ctx, "could not retrieve cookie", logger.E(errors.WithStack(err)))
|
logger.Error(ctx, "could not retrieve cookie", logger.CapturedE(errors.WithStack(err)))
|
||||||
}
|
}
|
||||||
|
|
||||||
if cookie == nil {
|
if cookie == nil {
|
||||||
@ -89,9 +89,7 @@ func (q *Queue) Middleware(layer *store.Layer) proxy.Middleware {
|
|||||||
|
|
||||||
rank, err := q.adapter.Touch(ctx, queueName, sessionID)
|
rank, err := q.adapter.Touch(ctx, queueName, sessionID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error(ctx, "could not retrieve session rank", logger.E(errors.WithStack(err)))
|
director.HandleError(ctx, w, r, http.StatusInternalServerError, errors.Wrap(err, "could not update queue session rank"))
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -126,7 +124,7 @@ func (q *Queue) updateSessionsMetric(ctx context.Context, proxyName store.ProxyN
|
|||||||
|
|
||||||
status, err := q.adapter.Status(ctx, queueName)
|
status, err := q.adapter.Status(ctx, queueName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error(ctx, "could not retrieve queue status", logger.E(errors.WithStack(err)))
|
logger.Error(ctx, "could not retrieve queue status", logger.CapturedE(errors.WithStack(err)))
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@ -144,9 +142,7 @@ func (q *Queue) renderQueuePage(w http.ResponseWriter, r *http.Request, queueNam
|
|||||||
|
|
||||||
status, err := q.adapter.Status(ctx, queueName)
|
status, err := q.adapter.Status(ctx, queueName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error(ctx, "could not retrieve queue status", logger.E(errors.WithStack(err)))
|
director.HandleError(ctx, w, r, http.StatusInternalServerError, errors.Wrap(err, "could not retrieve queue status"))
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -157,7 +153,7 @@ func (q *Queue) renderQueuePage(w http.ResponseWriter, r *http.Request, queueNam
|
|||||||
|
|
||||||
tmpl, err := template.New("").Funcs(sprig.FuncMap()).ParseGlob(pattern)
|
tmpl, err := template.New("").Funcs(sprig.FuncMap()).ParseGlob(pattern)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error(ctx, "could not load queue templates", logger.E(errors.WithStack(err)))
|
logger.Error(ctx, "could not load queue templates", logger.CapturedE(errors.WithStack(err)))
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@ -166,9 +162,7 @@ func (q *Queue) renderQueuePage(w http.ResponseWriter, r *http.Request, queueNam
|
|||||||
})
|
})
|
||||||
|
|
||||||
if q.tmpl == nil {
|
if q.tmpl == nil {
|
||||||
logger.Error(ctx, "queue page templates not loaded", logger.E(errors.WithStack(err)))
|
director.HandleError(ctx, w, r, http.StatusInternalServerError, errors.New("queue page templates not loaded"))
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -194,12 +188,16 @@ func (q *Queue) renderQueuePage(w http.ResponseWriter, r *http.Request, queueNam
|
|||||||
w.Header().Add("Retry-After", strconv.FormatInt(int64(refreshRate.Seconds()), 10))
|
w.Header().Add("Retry-After", strconv.FormatInt(int64(refreshRate.Seconds()), 10))
|
||||||
w.WriteHeader(http.StatusServiceUnavailable)
|
w.WriteHeader(http.StatusServiceUnavailable)
|
||||||
|
|
||||||
if err := q.tmpl.ExecuteTemplate(w, "queue", templateData); err != nil {
|
var buf bytes.Buffer
|
||||||
logger.Error(ctx, "could not render queue page", logger.E(errors.WithStack(err)))
|
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
||||||
|
|
||||||
|
if err := q.tmpl.ExecuteTemplate(&buf, "queue", templateData); err != nil {
|
||||||
|
director.HandleError(ctx, w, r, http.StatusInternalServerError, errors.Wrap(err, "could not render queue page"))
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if _, err := io.Copy(w, &buf); err != nil {
|
||||||
|
logger.Error(ctx, "could not write queue page", logger.CapturedE(errors.WithStack(err)))
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (q *Queue) refreshQueue(ctx context.Context, layerName store.LayerName, keepAlive time.Duration) {
|
func (q *Queue) refreshQueue(ctx context.Context, layerName store.LayerName, keepAlive time.Duration) {
|
||||||
@ -211,13 +209,15 @@ func (q *Queue) refreshQueue(ctx context.Context, layerName store.LayerName, kee
|
|||||||
|
|
||||||
if err := q.adapter.Refresh(ctx, string(layerName), keepAlive); err != nil {
|
if err := q.adapter.Refresh(ctx, string(layerName), keepAlive); err != nil {
|
||||||
logger.Error(ctx, "could not refresh queue",
|
logger.Error(ctx, "could not refresh queue",
|
||||||
logger.E(errors.WithStack(err)),
|
logger.CapturedE(errors.WithStack(err)),
|
||||||
logger.F("queue", layerName),
|
logger.F("queue", layerName),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (q *Queue) updateMetrics(ctx context.Context, proxyName store.ProxyName, layerName store.LayerName, options *LayerOptions) {
|
func (q *Queue) updateMetrics(proxyName store.ProxyName, layerName store.LayerName, options *LayerOptions) {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
// Update queue capacity metric
|
// Update queue capacity metric
|
||||||
metricQueueCapacity.With(
|
metricQueueCapacity.With(
|
||||||
prometheus.Labels{
|
prometheus.Labels{
|
||||||
|
79
internal/proxy/director/layer/rewriter/api.go
Normal file
79
internal/proxy/director/layer/rewriter/api.go
Normal file
@ -0,0 +1,79 @@
|
|||||||
|
package rewriter
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/rule"
|
||||||
|
"github.com/expr-lang/expr"
|
||||||
|
"github.com/pkg/errors"
|
||||||
|
)
|
||||||
|
|
||||||
|
type errRedirect struct {
|
||||||
|
statusCode int
|
||||||
|
url string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *errRedirect) StatusCode() int {
|
||||||
|
return e.statusCode
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *errRedirect) URL() string {
|
||||||
|
return e.url
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *errRedirect) Error() string {
|
||||||
|
return fmt.Sprintf("redirect %d %s", e.statusCode, e.url)
|
||||||
|
}
|
||||||
|
|
||||||
|
func newErrRedirect(statusCode int, url string) *errRedirect {
|
||||||
|
return &errRedirect{
|
||||||
|
url: url,
|
||||||
|
statusCode: statusCode,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ error = &errRedirect{}
|
||||||
|
|
||||||
|
func redirectFunc() expr.Option {
|
||||||
|
return expr.Function(
|
||||||
|
"redirect",
|
||||||
|
func(params ...any) (any, error) {
|
||||||
|
_, err := rule.Assert[context.Context](params[0])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
statusCode, err := rule.Assert[int](params[1])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if statusCode < 300 || statusCode >= 400 {
|
||||||
|
return nil, errors.Errorf("unexpected redirect status code '%d'", statusCode)
|
||||||
|
}
|
||||||
|
|
||||||
|
url, err := rule.Assert[string](params[2])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil, newErrRedirect(statusCode, url)
|
||||||
|
},
|
||||||
|
new(func(context.Context, int, string) bool),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func WithRewriterFuncs() rule.OptionFunc {
|
||||||
|
return func(opts *rule.Options) {
|
||||||
|
funcs := []expr.Option{
|
||||||
|
redirectFunc(),
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(opts.Expr) == 0 {
|
||||||
|
opts.Expr = make([]expr.Option, 0)
|
||||||
|
}
|
||||||
|
|
||||||
|
opts.Expr = append(opts.Expr, funcs...)
|
||||||
|
}
|
||||||
|
}
|
@ -6,14 +6,19 @@ import (
|
|||||||
proxy "forge.cadoles.com/Cadoles/go-proxy"
|
proxy "forge.cadoles.com/Cadoles/go-proxy"
|
||||||
"forge.cadoles.com/Cadoles/go-proxy/wildcard"
|
"forge.cadoles.com/Cadoles/go-proxy/wildcard"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/proxy/director"
|
"forge.cadoles.com/cadoles/bouncer/internal/proxy/director"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/proxy/director/layer/util"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/rule"
|
||||||
|
ruleHTTP "forge.cadoles.com/cadoles/bouncer/internal/rule/http"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
"gitlab.com/wpetit/goweb/logger"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const LayerType store.LayerType = "rewriter"
|
const LayerType store.LayerType = "rewriter"
|
||||||
|
|
||||||
type Layer struct{}
|
type Layer struct {
|
||||||
|
requestRuleEngineCache *util.RuleEngineCache[*RequestVars, *LayerOptions]
|
||||||
|
responseRuleEngineCache *util.RuleEngineCache[*ResponseVars, *LayerOptions]
|
||||||
|
}
|
||||||
|
|
||||||
func (l *Layer) LayerType() store.LayerType {
|
func (l *Layer) LayerType() store.LayerType {
|
||||||
return LayerType
|
return LayerType
|
||||||
@ -26,9 +31,7 @@ func (l *Layer) Middleware(layer *store.Layer) proxy.Middleware {
|
|||||||
|
|
||||||
options, err := fromStoreOptions(layer.Options)
|
options, err := fromStoreOptions(layer.Options)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error(ctx, "could not parse layer options", logger.E(errors.WithStack(err)))
|
director.HandleError(ctx, w, r, http.StatusInternalServerError, errors.Wrap(err, "could not parse layer options"))
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -39,9 +42,14 @@ func (l *Layer) Middleware(layer *store.Layer) proxy.Middleware {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := l.applyRequestRules(r, options); err != nil {
|
if err := l.applyRequestRules(ctx, r, layer, options); err != nil {
|
||||||
logger.Error(ctx, "could not apply request rules", logger.E(errors.WithStack(err)))
|
var redirect *errRedirect
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
if errors.As(err, &redirect) {
|
||||||
|
http.Redirect(w, r, redirect.URL(), redirect.StatusCode())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
director.HandleError(ctx, w, r, http.StatusInternalServerError, errors.Wrap(err, "could not apply request rules"))
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@ -66,7 +74,9 @@ func (l *Layer) ResponseTransformer(layer *store.Layer) proxy.ResponseTransforme
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := l.applyResponseRules(r, options); err != nil {
|
ctx := r.Request.Context()
|
||||||
|
|
||||||
|
if err := l.applyResponseRules(ctx, r, layer, options); err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -74,8 +84,32 @@ func (l *Layer) ResponseTransformer(layer *store.Layer) proxy.ResponseTransforme
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func New() *Layer {
|
func New(funcs ...OptionFunc) *Layer {
|
||||||
return &Layer{}
|
return &Layer{
|
||||||
|
requestRuleEngineCache: util.NewInMemoryRuleEngineCache(func(options *LayerOptions) (*rule.Engine[*RequestVars], error) {
|
||||||
|
engine, err := rule.NewEngine[*RequestVars](
|
||||||
|
rule.WithRules(options.Rules.Request...),
|
||||||
|
ruleHTTP.WithRequestFuncs(),
|
||||||
|
WithRewriterFuncs(),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return engine, nil
|
||||||
|
}),
|
||||||
|
responseRuleEngineCache: util.NewInMemoryRuleEngineCache(func(options *LayerOptions) (*rule.Engine[*ResponseVars], error) {
|
||||||
|
engine, err := rule.NewEngine[*ResponseVars](
|
||||||
|
rule.WithRules(options.Rules.Response...),
|
||||||
|
ruleHTTP.WithResponseFuncs(),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return engine, nil
|
||||||
|
}),
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
|
16
internal/proxy/director/layer/rewriter/options.go
Normal file
16
internal/proxy/director/layer/rewriter/options.go
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
package rewriter
|
||||||
|
|
||||||
|
type Options struct {
|
||||||
|
}
|
||||||
|
|
||||||
|
type OptionFunc func(opts *Options)
|
||||||
|
|
||||||
|
func NewOptions(funcs ...OptionFunc) *Options {
|
||||||
|
opts := &Options{}
|
||||||
|
|
||||||
|
for _, fn := range funcs {
|
||||||
|
fn(opts)
|
||||||
|
}
|
||||||
|
|
||||||
|
return opts
|
||||||
|
}
|
@ -1,118 +1,174 @@
|
|||||||
package rewriter
|
package rewriter
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
"net/url"
|
||||||
|
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/proxy/director"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/rule"
|
"forge.cadoles.com/cadoles/bouncer/internal/rule"
|
||||||
ruleHTTP "forge.cadoles.com/cadoles/bouncer/internal/rule/http"
|
ruleHTTP "forge.cadoles.com/cadoles/bouncer/internal/rule/http"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
)
|
)
|
||||||
|
|
||||||
type RequestEnv struct {
|
type RequestVars struct {
|
||||||
Request RequestInfo `expr:"request"`
|
Request RequestVar `expr:"request"`
|
||||||
|
OriginalURL URLVar `expr:"original_url"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type RequestInfo struct {
|
type URLVar struct {
|
||||||
|
Scheme string `expr:"scheme"`
|
||||||
|
Opaque string `expr:"opaque"`
|
||||||
|
User UserVar `expr:"user"`
|
||||||
|
Host string `expr:"host"`
|
||||||
|
Path string `expr:"path"`
|
||||||
|
RawPath string `expr:"raw_path"`
|
||||||
|
RawQuery string `expr:"raw_query"`
|
||||||
|
Fragment string `expr:"fragment"`
|
||||||
|
RawFragment string `expr:"raw_fragment"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func fromURL(url *url.URL) URLVar {
|
||||||
|
return URLVar{
|
||||||
|
Scheme: url.Scheme,
|
||||||
|
Opaque: url.Opaque,
|
||||||
|
User: UserVar{
|
||||||
|
Username: url.User.Username(),
|
||||||
|
Password: func() string {
|
||||||
|
passwd, _ := url.User.Password()
|
||||||
|
return passwd
|
||||||
|
}(),
|
||||||
|
},
|
||||||
|
Host: url.Host,
|
||||||
|
Path: url.Path,
|
||||||
|
RawPath: url.RawPath,
|
||||||
|
RawQuery: url.RawQuery,
|
||||||
|
Fragment: url.Fragment,
|
||||||
|
RawFragment: url.RawFragment,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type UserVar struct {
|
||||||
|
Username string `expr:"username"`
|
||||||
|
Password string `expr:"password"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type RequestVar struct {
|
||||||
Method string `expr:"method"`
|
Method string `expr:"method"`
|
||||||
URL string `expr:"url"`
|
URL URLVar `expr:"url"`
|
||||||
|
RawURL string `expr:"raw_url"`
|
||||||
Proto string `expr:"proto"`
|
Proto string `expr:"proto"`
|
||||||
ProtoMajor int `expr:"protoMajor"`
|
ProtoMajor int `expr:"proto_major"`
|
||||||
ProtoMinor int `expr:"protoMinor"`
|
ProtoMinor int `expr:"proto_minor"`
|
||||||
Header map[string][]string `expr:"header"`
|
Header map[string][]string `expr:"header"`
|
||||||
ContentLength int64 `expr:"contentLength"`
|
ContentLength int64 `expr:"content_length"`
|
||||||
TransferEncoding []string `expr:"transferEncoding"`
|
TransferEncoding []string `expr:"transfer_encoding"`
|
||||||
Host string `expr:"host"`
|
Host string `expr:"host"`
|
||||||
Trailer map[string][]string `expr:"trailer"`
|
Trailer map[string][]string `expr:"trailer"`
|
||||||
RemoteAddr string `expr:"remoteAddr"`
|
RemoteAddr string `expr:"remote_addr"`
|
||||||
RequestURI string `expr:"requestUri"`
|
RequestURI string `expr:"request_uri"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *Layer) applyRequestRules(r *http.Request, options *LayerOptions) error {
|
func fromRequest(r *http.Request) RequestVar {
|
||||||
|
return RequestVar{
|
||||||
|
Method: r.Method,
|
||||||
|
URL: fromURL(r.URL),
|
||||||
|
RawURL: r.URL.String(),
|
||||||
|
Proto: r.Proto,
|
||||||
|
ProtoMajor: r.ProtoMajor,
|
||||||
|
ProtoMinor: r.ProtoMinor,
|
||||||
|
Header: r.Header,
|
||||||
|
ContentLength: r.ContentLength,
|
||||||
|
TransferEncoding: r.TransferEncoding,
|
||||||
|
Host: r.Host,
|
||||||
|
Trailer: r.Trailer,
|
||||||
|
RemoteAddr: r.RemoteAddr,
|
||||||
|
RequestURI: r.RequestURI,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *Layer) applyRequestRules(ctx context.Context, r *http.Request, layer *store.Layer, options *LayerOptions) error {
|
||||||
rules := options.Rules.Request
|
rules := options.Rules.Request
|
||||||
if len(rules) == 0 {
|
if len(rules) == 0 {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
engine, err := rule.NewEngine[*RequestEnv](
|
engine, err := l.getRequestRuleEngine(ctx, layer, options)
|
||||||
ruleHTTP.WithRequestFuncs(r),
|
|
||||||
rule.WithRules(options.Rules.Request...),
|
|
||||||
)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
env := &RequestEnv{
|
originalURL, err := director.OriginalURL(ctx)
|
||||||
Request: RequestInfo{
|
if err != nil {
|
||||||
Method: r.Method,
|
return errors.WithStack(err)
|
||||||
URL: r.URL.String(),
|
|
||||||
Proto: r.Proto,
|
|
||||||
ProtoMajor: r.ProtoMajor,
|
|
||||||
ProtoMinor: r.ProtoMinor,
|
|
||||||
Header: r.Header,
|
|
||||||
ContentLength: r.ContentLength,
|
|
||||||
TransferEncoding: r.TransferEncoding,
|
|
||||||
Host: r.Host,
|
|
||||||
Trailer: r.Trailer,
|
|
||||||
RemoteAddr: r.RemoteAddr,
|
|
||||||
RequestURI: r.RequestURI,
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if _, err := engine.Apply(env); err != nil {
|
vars := &RequestVars{
|
||||||
|
OriginalURL: fromURL(originalURL),
|
||||||
|
Request: fromRequest(r),
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx = ruleHTTP.WithRequest(ctx, r)
|
||||||
|
|
||||||
|
if _, err := engine.Apply(ctx, vars); err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
type ResponseEnv struct {
|
func (l *Layer) getRequestRuleEngine(ctx context.Context, layer *store.Layer, options *LayerOptions) (*rule.Engine[*RequestVars], error) {
|
||||||
Request RequestInfo `expr:"request"`
|
key := string(layer.Proxy) + "-" + string(layer.Name)
|
||||||
Response ResponseInfo `expr:"response"`
|
revisionedEngine := l.requestRuleEngineCache.Get(key)
|
||||||
|
|
||||||
|
engine, err := revisionedEngine.Get(ctx, layer.Revision, options)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return engine, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
type ResponseInfo struct {
|
type ResponseVars struct {
|
||||||
|
OriginalURL URLVar `expr:"original_url"`
|
||||||
|
Request RequestVar `expr:"request"`
|
||||||
|
Response ResponseVar `expr:"response"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ResponseVar struct {
|
||||||
Status string `expr:"status"`
|
Status string `expr:"status"`
|
||||||
StatusCode int `expr:"statusCode"`
|
StatusCode int `expr:"status_code"`
|
||||||
Proto string `expr:"proto"`
|
Proto string `expr:"proto"`
|
||||||
ProtoMajor int `expr:"protoMajor"`
|
ProtoMajor int `expr:"proto_major"`
|
||||||
ProtoMinor int `expr:"protoMinor"`
|
ProtoMinor int `expr:"proto_minor"`
|
||||||
Header map[string][]string `expr:"header"`
|
Header map[string][]string `expr:"header"`
|
||||||
ContentLength int64 `expr:"contentLength"`
|
ContentLength int64 `expr:"content_length"`
|
||||||
TransferEncoding []string `expr:"transferEncoding"`
|
TransferEncoding []string `expr:"transfer_encoding"`
|
||||||
Uncompressed bool `expr:"uncompressed"`
|
Uncompressed bool `expr:"uncompressed"`
|
||||||
Trailer map[string][]string `expr:"trailer"`
|
Trailer map[string][]string `expr:"trailer"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *Layer) applyResponseRules(r *http.Response, options *LayerOptions) error {
|
func (l *Layer) applyResponseRules(ctx context.Context, r *http.Response, layer *store.Layer, options *LayerOptions) error {
|
||||||
rules := options.Rules.Request
|
rules := options.Rules.Response
|
||||||
if len(rules) == 0 {
|
if len(rules) == 0 {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
engine, err := rule.NewEngine[*ResponseEnv](
|
engine, err := l.getResponseRuleEngine(ctx, layer, options)
|
||||||
rule.WithRules(options.Rules.Response...),
|
|
||||||
ruleHTTP.WithResponseFuncs(r),
|
|
||||||
)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
env := &ResponseEnv{
|
originalURL, err := director.OriginalURL(ctx)
|
||||||
Request: RequestInfo{
|
if err != nil {
|
||||||
Method: r.Request.Method,
|
return errors.WithStack(err)
|
||||||
URL: r.Request.URL.String(),
|
}
|
||||||
Proto: r.Request.Proto,
|
|
||||||
ProtoMajor: r.Request.ProtoMajor,
|
vars := &ResponseVars{
|
||||||
ProtoMinor: r.Request.ProtoMinor,
|
OriginalURL: fromURL(originalURL),
|
||||||
Header: r.Request.Header,
|
Request: fromRequest(r.Request),
|
||||||
ContentLength: r.Request.ContentLength,
|
Response: ResponseVar{
|
||||||
TransferEncoding: r.Request.TransferEncoding,
|
|
||||||
Host: r.Request.Host,
|
|
||||||
Trailer: r.Request.Trailer,
|
|
||||||
RemoteAddr: r.Request.RemoteAddr,
|
|
||||||
RequestURI: r.Request.RequestURI,
|
|
||||||
},
|
|
||||||
Response: ResponseInfo{
|
|
||||||
Proto: r.Proto,
|
Proto: r.Proto,
|
||||||
ProtoMajor: r.ProtoMajor,
|
ProtoMajor: r.ProtoMajor,
|
||||||
ProtoMinor: r.ProtoMinor,
|
ProtoMinor: r.ProtoMinor,
|
||||||
@ -125,9 +181,24 @@ func (l *Layer) applyResponseRules(r *http.Response, options *LayerOptions) erro
|
|||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
if _, err := engine.Apply(env); err != nil {
|
ctx = ruleHTTP.WithResponse(ctx, r)
|
||||||
|
ctx = ruleHTTP.WithRequest(ctx, r.Request)
|
||||||
|
|
||||||
|
if _, err := engine.Apply(ctx, vars); err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (l *Layer) getResponseRuleEngine(ctx context.Context, layer *store.Layer, options *LayerOptions) (*rule.Engine[*ResponseVars], error) {
|
||||||
|
key := string(layer.Proxy) + "-" + string(layer.Name)
|
||||||
|
revisionedEngine := l.responseRuleEngineCache.Get(key)
|
||||||
|
|
||||||
|
engine, err := revisionedEngine.Get(ctx, layer.Revision, options)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return engine, nil
|
||||||
|
}
|
||||||
|
51
internal/proxy/director/layer/util/revisioned_rule_engine.go
Normal file
51
internal/proxy/director/layer/util/revisioned_rule_engine.go
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
package util
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"sync"
|
||||||
|
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/rule"
|
||||||
|
"github.com/pkg/errors"
|
||||||
|
"gitlab.com/wpetit/goweb/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
type RuleEngineFactoryFunc[V any, O any] func(ops O) (*rule.Engine[V], error)
|
||||||
|
|
||||||
|
type RevisionedRuleEngine[V any, O any] struct {
|
||||||
|
mutex sync.RWMutex
|
||||||
|
revision int
|
||||||
|
engine *rule.Engine[V]
|
||||||
|
factory RuleEngineFactoryFunc[V, O]
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *RevisionedRuleEngine[V, O]) Get(ctx context.Context, revision int, opts O) (*rule.Engine[V], error) {
|
||||||
|
e.mutex.RLock()
|
||||||
|
if revision == e.revision {
|
||||||
|
logger.Debug(ctx, "using cached rule engine", logger.F("layerRevision", revision))
|
||||||
|
|
||||||
|
defer e.mutex.RUnlock()
|
||||||
|
return e.engine, nil
|
||||||
|
}
|
||||||
|
e.mutex.RUnlock()
|
||||||
|
|
||||||
|
e.mutex.Lock()
|
||||||
|
defer e.mutex.Unlock()
|
||||||
|
|
||||||
|
logger.Debug(ctx, "creating rule engine", logger.F("layerRevision", revision))
|
||||||
|
|
||||||
|
engine, err := e.factory(opts)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
e.engine = engine
|
||||||
|
e.revision = revision
|
||||||
|
|
||||||
|
return engine, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewRevisionedRuleEngine[V any, O any](factory RuleEngineFactoryFunc[V, O]) *RevisionedRuleEngine[V, O] {
|
||||||
|
return &RevisionedRuleEngine[V, O]{
|
||||||
|
factory: factory,
|
||||||
|
}
|
||||||
|
}
|
28
internal/proxy/director/layer/util/rule_engine_cache.go
Normal file
28
internal/proxy/director/layer/util/rule_engine_cache.go
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
package util
|
||||||
|
|
||||||
|
import (
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/cache"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/cache/memory"
|
||||||
|
)
|
||||||
|
|
||||||
|
type RuleEngineCache[V any, O any] struct {
|
||||||
|
cache cache.Cache[string, *RevisionedRuleEngine[V, O]]
|
||||||
|
factory RuleEngineFactoryFunc[V, O]
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *RuleEngineCache[V, O]) Get(key string) *RevisionedRuleEngine[V, O] {
|
||||||
|
revisionedRuleEngine, exists := c.cache.Get(key)
|
||||||
|
if !exists {
|
||||||
|
revisionedRuleEngine = NewRevisionedRuleEngine(c.factory)
|
||||||
|
c.cache.Set(key, revisionedRuleEngine)
|
||||||
|
}
|
||||||
|
|
||||||
|
return revisionedRuleEngine
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewInMemoryRuleEngineCache[V any, O any](factory RuleEngineFactoryFunc[V, O]) *RuleEngineCache[V, O] {
|
||||||
|
return &RuleEngineCache[V, O]{
|
||||||
|
factory: factory,
|
||||||
|
cache: memory.NewCache[string, *RevisionedRuleEngine[V, O]](),
|
||||||
|
}
|
||||||
|
}
|
@ -1,18 +1,21 @@
|
|||||||
package director
|
package director
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"net/http"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/cache"
|
"forge.cadoles.com/cadoles/bouncer/internal/cache"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/cache/memory"
|
"forge.cadoles.com/cadoles/bouncer/internal/cache/memory"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/cache/ttl"
|
"forge.cadoles.com/cadoles/bouncer/internal/cache/ttl"
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
||||||
|
"gitlab.com/wpetit/goweb/logger"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Options struct {
|
type Options struct {
|
||||||
Layers []Layer
|
Layers []Layer
|
||||||
ProxyCache cache.Cache[string, []*store.Proxy]
|
ProxyCache cache.Cache[string, []*store.Proxy]
|
||||||
LayerCache cache.Cache[string, []*store.Layer]
|
LayerCache cache.Cache[string, []*store.Layer]
|
||||||
|
HandleError HandleErrorFunc
|
||||||
}
|
}
|
||||||
|
|
||||||
type OptionFunc func(opts *Options)
|
type OptionFunc func(opts *Options)
|
||||||
@ -30,6 +33,10 @@ func NewOptions(funcs ...OptionFunc) *Options {
|
|||||||
memory.NewCache[string, time.Time](),
|
memory.NewCache[string, time.Time](),
|
||||||
30*time.Second,
|
30*time.Second,
|
||||||
),
|
),
|
||||||
|
HandleError: func(w http.ResponseWriter, r *http.Request, status int, err error) {
|
||||||
|
logger.Error(r.Context(), err.Error(), logger.CapturedE(err))
|
||||||
|
http.Error(w, http.StatusText(status), status)
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, fn := range funcs {
|
for _, fn := range funcs {
|
||||||
@ -56,3 +63,9 @@ func WithLayerCache(cache cache.Cache[string, []*store.Layer]) OptionFunc {
|
|||||||
opts.LayerCache = cache
|
opts.LayerCache = cache
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func WithHandleErrorFunc(fn HandleErrorFunc) OptionFunc {
|
||||||
|
return func(opts *Options) {
|
||||||
|
opts.HandleError = fn
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -9,7 +9,7 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func (s *Server) initRepositories(ctx context.Context) error {
|
func (s *Server) initRepositories(ctx context.Context) error {
|
||||||
client := setup.NewRedisClient(ctx, s.redisConfig)
|
client := setup.NewSharedClient(s.redisConfig)
|
||||||
|
|
||||||
if err := s.initProxyRepository(ctx, client); err != nil {
|
if err := s.initProxyRepository(ctx, client); err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
|
@ -1,156 +0,0 @@
|
|||||||
package proxy_test
|
|
||||||
|
|
||||||
import (
|
|
||||||
"context"
|
|
||||||
"io"
|
|
||||||
"net/http"
|
|
||||||
"net/http/httptest"
|
|
||||||
"net/http/httputil"
|
|
||||||
"net/url"
|
|
||||||
"os"
|
|
||||||
"testing"
|
|
||||||
"time"
|
|
||||||
|
|
||||||
"forge.cadoles.com/Cadoles/go-proxy"
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/cache/memory"
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/cache/ttl"
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/proxy/director"
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
|
||||||
redisStore "forge.cadoles.com/cadoles/bouncer/internal/store/redis"
|
|
||||||
"github.com/pkg/errors"
|
|
||||||
"github.com/redis/go-redis/v9"
|
|
||||||
)
|
|
||||||
|
|
||||||
func BenchmarkProxy(b *testing.B) {
|
|
||||||
redisEndpoint := os.Getenv("BOUNCER_BENCH_REDIS_ADDR")
|
|
||||||
if redisEndpoint == "" {
|
|
||||||
redisEndpoint = "127.0.0.1:6379"
|
|
||||||
}
|
|
||||||
|
|
||||||
client := redis.NewUniversalClient(&redis.UniversalOptions{
|
|
||||||
Addrs: []string{redisEndpoint},
|
|
||||||
})
|
|
||||||
|
|
||||||
proxyRepository := redisStore.NewProxyRepository(client)
|
|
||||||
layerRepository := redisStore.NewLayerRepository(client)
|
|
||||||
|
|
||||||
backend := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
||||||
w.WriteHeader(http.StatusOK)
|
|
||||||
if _, err := w.Write([]byte("Hello, world.")); err != nil {
|
|
||||||
b.Logf("[ERROR] %+v", errors.WithStack(err))
|
|
||||||
}
|
|
||||||
}))
|
|
||||||
defer backend.Close()
|
|
||||||
|
|
||||||
if err := waitFor(backend.URL, 5*time.Second); err != nil {
|
|
||||||
b.Fatalf("[FATAL] %+v", errors.WithStack(err))
|
|
||||||
}
|
|
||||||
|
|
||||||
b.Logf("started backend '%s'", backend.URL)
|
|
||||||
|
|
||||||
ctx := context.Background()
|
|
||||||
|
|
||||||
proxyName := store.ProxyName(b.Name())
|
|
||||||
|
|
||||||
b.Logf("creating proxy '%s'", proxyName)
|
|
||||||
|
|
||||||
if err := proxyRepository.DeleteProxy(ctx, proxyName); err != nil {
|
|
||||||
b.Fatalf("[FATAL] %+v", errors.WithStack(err))
|
|
||||||
}
|
|
||||||
|
|
||||||
if _, err := proxyRepository.CreateProxy(ctx, proxyName, backend.URL, "*"); err != nil {
|
|
||||||
b.Fatalf("[FATAL] %+v", errors.WithStack(err))
|
|
||||||
}
|
|
||||||
|
|
||||||
if _, err := proxyRepository.UpdateProxy(ctx, proxyName, store.WithProxyUpdateEnabled(true)); err != nil {
|
|
||||||
b.Fatalf("[FATAL] %+v", errors.WithStack(err))
|
|
||||||
}
|
|
||||||
|
|
||||||
director := director.New(
|
|
||||||
proxyRepository, layerRepository,
|
|
||||||
director.WithLayerCache(
|
|
||||||
ttl.NewCache(
|
|
||||||
memory.NewCache[string, []*store.Layer](),
|
|
||||||
memory.NewCache[string, time.Time](),
|
|
||||||
30*time.Second,
|
|
||||||
),
|
|
||||||
),
|
|
||||||
director.WithProxyCache(
|
|
||||||
ttl.NewCache(
|
|
||||||
memory.NewCache[string, []*store.Proxy](),
|
|
||||||
memory.NewCache[string, time.Time](),
|
|
||||||
30*time.Second,
|
|
||||||
),
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
directorMiddleware := director.Middleware()
|
|
||||||
|
|
||||||
handler := proxy.New(
|
|
||||||
proxy.WithRequestTransformers(
|
|
||||||
director.RequestTransformer(),
|
|
||||||
),
|
|
||||||
proxy.WithResponseTransformers(
|
|
||||||
director.ResponseTransformer(),
|
|
||||||
),
|
|
||||||
proxy.WithReverseProxyFactory(func(ctx context.Context, target *url.URL) *httputil.ReverseProxy {
|
|
||||||
reverse := httputil.NewSingleHostReverseProxy(target)
|
|
||||||
reverse.ErrorHandler = func(w http.ResponseWriter, r *http.Request, err error) {
|
|
||||||
b.Logf("[ERROR] %s", errors.WithStack(err))
|
|
||||||
}
|
|
||||||
return reverse
|
|
||||||
}),
|
|
||||||
)
|
|
||||||
|
|
||||||
server := httptest.NewServer(directorMiddleware(handler))
|
|
||||||
defer server.Close()
|
|
||||||
|
|
||||||
b.Logf("started proxy '%s'", server.URL)
|
|
||||||
|
|
||||||
httpClient := server.Client()
|
|
||||||
|
|
||||||
b.ResetTimer()
|
|
||||||
|
|
||||||
for i := 0; i < b.N; i++ {
|
|
||||||
res, err := httpClient.Get(server.URL)
|
|
||||||
if err != nil {
|
|
||||||
b.Errorf("could not fetch server url: %+v", errors.WithStack(err))
|
|
||||||
}
|
|
||||||
|
|
||||||
body, err := io.ReadAll(res.Body)
|
|
||||||
if err != nil {
|
|
||||||
b.Errorf("could not read response body: %+v", errors.WithStack(err))
|
|
||||||
}
|
|
||||||
|
|
||||||
b.Logf("%s - %v", res.Status, string(body))
|
|
||||||
|
|
||||||
if err := res.Body.Close(); err != nil {
|
|
||||||
b.Errorf("could not close response body: %+v", errors.WithStack(err))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func waitFor(url string, ttl time.Duration) error {
|
|
||||||
var lastErr error
|
|
||||||
timeout := time.After(ttl)
|
|
||||||
for {
|
|
||||||
select {
|
|
||||||
case <-timeout:
|
|
||||||
if lastErr != nil {
|
|
||||||
return lastErr
|
|
||||||
}
|
|
||||||
|
|
||||||
return errors.New("wait timed out")
|
|
||||||
default:
|
|
||||||
res, err := http.Get(url)
|
|
||||||
if err != nil {
|
|
||||||
lastErr = errors.WithStack(err)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
if res.StatusCode >= 200 && res.StatusCode < 400 {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,16 +1,23 @@
|
|||||||
package proxy
|
package proxy
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
|
"expvar"
|
||||||
"fmt"
|
"fmt"
|
||||||
"html/template"
|
"html/template"
|
||||||
|
"io"
|
||||||
"log"
|
"log"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/http/httputil"
|
"net/http/httputil"
|
||||||
|
"net/http/pprof"
|
||||||
"net/url"
|
"net/url"
|
||||||
|
"os"
|
||||||
|
"os/signal"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"strconv"
|
"strconv"
|
||||||
|
"syscall"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"forge.cadoles.com/Cadoles/go-proxy"
|
"forge.cadoles.com/Cadoles/go-proxy"
|
||||||
@ -22,7 +29,6 @@ import (
|
|||||||
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
||||||
|
|
||||||
"github.com/Masterminds/sprig/v3"
|
"github.com/Masterminds/sprig/v3"
|
||||||
"github.com/getsentry/sentry-go"
|
|
||||||
sentryhttp "github.com/getsentry/sentry-go/http"
|
sentryhttp "github.com/getsentry/sentry-go/http"
|
||||||
"github.com/go-chi/chi/v5"
|
"github.com/go-chi/chi/v5"
|
||||||
"github.com/go-chi/chi/v5/middleware"
|
"github.com/go-chi/chi/v5/middleware"
|
||||||
@ -91,31 +97,25 @@ func (s *Server) run(parentCtx context.Context, addrs chan net.Addr, errs chan e
|
|||||||
|
|
||||||
logger.Info(ctx, "http server listening")
|
logger.Info(ctx, "http server listening")
|
||||||
|
|
||||||
|
layerCache, proxyCache, cancel := s.createDirectorCaches(ctx)
|
||||||
|
defer cancel()
|
||||||
|
|
||||||
director := director.New(
|
director := director.New(
|
||||||
s.proxyRepository,
|
s.proxyRepository,
|
||||||
s.layerRepository,
|
s.layerRepository,
|
||||||
director.WithLayers(s.directorLayers...),
|
director.WithLayers(s.directorLayers...),
|
||||||
director.WithLayerCache(
|
director.WithLayerCache(layerCache),
|
||||||
ttl.NewCache(
|
director.WithProxyCache(proxyCache),
|
||||||
memory.NewCache[string, []*store.Layer](),
|
director.WithHandleErrorFunc(s.handleError),
|
||||||
memory.NewCache[string, time.Time](),
|
|
||||||
s.directorCacheTTL,
|
|
||||||
),
|
|
||||||
),
|
|
||||||
director.WithProxyCache(
|
|
||||||
ttl.NewCache(
|
|
||||||
memory.NewCache[string, []*store.Proxy](),
|
|
||||||
memory.NewCache[string, time.Time](),
|
|
||||||
s.directorCacheTTL,
|
|
||||||
),
|
|
||||||
),
|
|
||||||
)
|
)
|
||||||
|
|
||||||
if s.serverConfig.HTTP.UseRealIP {
|
if s.serverConfig.HTTP.UseRealIP {
|
||||||
router.Use(middleware.RealIP)
|
router.Use(middleware.RealIP)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
router.Use(middleware.RequestID)
|
||||||
router.Use(middleware.RequestLogger(bouncerChi.NewLogFormatter()))
|
router.Use(middleware.RequestLogger(bouncerChi.NewLogFormatter()))
|
||||||
|
router.Use(middleware.Recoverer)
|
||||||
|
|
||||||
if s.serverConfig.Sentry.DSN != "" {
|
if s.serverConfig.Sentry.DSN != "" {
|
||||||
logger.Info(ctx, "enabling sentry http middleware")
|
logger.Info(ctx, "enabling sentry http middleware")
|
||||||
@ -146,6 +146,35 @@ func (s *Server) run(parentCtx context.Context, addrs chan net.Addr, errs chan e
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if s.serverConfig.Profiling.Enabled {
|
||||||
|
profiling := s.serverConfig.Profiling
|
||||||
|
logger.Info(ctx, "enabling profiling", logger.F("endpoint", profiling.Endpoint))
|
||||||
|
|
||||||
|
router.Group(func(r chi.Router) {
|
||||||
|
if profiling.BasicAuth != nil {
|
||||||
|
logger.Info(ctx, "enabling authentication on profiling endpoint")
|
||||||
|
|
||||||
|
r.Use(middleware.BasicAuth(
|
||||||
|
"profiling",
|
||||||
|
profiling.BasicAuth.CredentialsMap(),
|
||||||
|
))
|
||||||
|
}
|
||||||
|
|
||||||
|
r.Route(string(profiling.Endpoint), func(r chi.Router) {
|
||||||
|
r.HandleFunc("/", pprof.Index)
|
||||||
|
r.HandleFunc("/cmdline", pprof.Cmdline)
|
||||||
|
r.HandleFunc("/profile", pprof.Profile)
|
||||||
|
r.HandleFunc("/symbol", pprof.Symbol)
|
||||||
|
r.HandleFunc("/trace", pprof.Trace)
|
||||||
|
r.Handle("/vars", expvar.Handler())
|
||||||
|
r.HandleFunc("/{name}", func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
name := chi.URLParam(r, "name")
|
||||||
|
pprof.Handler(name).ServeHTTP(w, r)
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
router.Group(func(r chi.Router) {
|
router.Group(func(r chi.Router) {
|
||||||
r.Use(director.Middleware())
|
r.Use(director.Middleware())
|
||||||
|
|
||||||
@ -157,6 +186,7 @@ func (s *Server) run(parentCtx context.Context, addrs chan net.Addr, errs chan e
|
|||||||
director.ResponseTransformer(),
|
director.ResponseTransformer(),
|
||||||
),
|
),
|
||||||
proxy.WithReverseProxyFactory(s.createReverseProxy),
|
proxy.WithReverseProxyFactory(s.createReverseProxy),
|
||||||
|
proxy.WithDefaultHandler(http.HandlerFunc(s.handleDefault)),
|
||||||
)
|
)
|
||||||
|
|
||||||
r.Handle("/*", handler)
|
r.Handle("/*", handler)
|
||||||
@ -169,6 +199,44 @@ func (s *Server) run(parentCtx context.Context, addrs chan net.Addr, errs chan e
|
|||||||
logger.Info(ctx, "http server exiting")
|
logger.Info(ctx, "http server exiting")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (s *Server) createDirectorCaches(ctx context.Context) (*ttl.Cache[string, []*store.Layer], *ttl.Cache[string, []*store.Proxy], func()) {
|
||||||
|
layerCache := ttl.NewCache(
|
||||||
|
memory.NewCache[string, []*store.Layer](),
|
||||||
|
memory.NewCache[string, time.Time](),
|
||||||
|
s.directorCacheTTL,
|
||||||
|
)
|
||||||
|
|
||||||
|
proxyCache := ttl.NewCache(
|
||||||
|
memory.NewCache[string, []*store.Proxy](),
|
||||||
|
memory.NewCache[string, time.Time](),
|
||||||
|
s.directorCacheTTL,
|
||||||
|
)
|
||||||
|
|
||||||
|
sig := make(chan os.Signal, 1)
|
||||||
|
|
||||||
|
signal.Notify(sig, syscall.SIGUSR2)
|
||||||
|
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
_, ok := <-sig
|
||||||
|
if !ok {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
logger.Info(ctx, "received sigusr2 signal, clearing proxies and layers cache")
|
||||||
|
|
||||||
|
layerCache.Clear()
|
||||||
|
proxyCache.Clear()
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
cancel := func() {
|
||||||
|
close(sig)
|
||||||
|
}
|
||||||
|
|
||||||
|
return layerCache, proxyCache, cancel
|
||||||
|
}
|
||||||
|
|
||||||
func (s *Server) createReverseProxy(ctx context.Context, target *url.URL) *httputil.ReverseProxy {
|
func (s *Server) createReverseProxy(ctx context.Context, target *url.URL) *httputil.ReverseProxy {
|
||||||
reverseProxy := httputil.NewSingleHostReverseProxy(target)
|
reverseProxy := httputil.NewSingleHostReverseProxy(target)
|
||||||
|
|
||||||
@ -185,18 +253,27 @@ func (s *Server) createReverseProxy(ctx context.Context, target *url.URL) *httpu
|
|||||||
httpTransport.DialContext = dialer.DialContext
|
httpTransport.DialContext = dialer.DialContext
|
||||||
|
|
||||||
reverseProxy.Transport = httpTransport
|
reverseProxy.Transport = httpTransport
|
||||||
reverseProxy.ErrorHandler = s.errorHandler
|
reverseProxy.ErrorHandler = s.handleProxyError
|
||||||
|
|
||||||
return reverseProxy
|
return reverseProxy
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) errorHandler(w http.ResponseWriter, r *http.Request, err error) {
|
func (s *Server) handleDefault(w http.ResponseWriter, r *http.Request) {
|
||||||
|
s.handleError(w, r, http.StatusBadGateway, errors.Errorf("no proxy target found"))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Server) handleError(w http.ResponseWriter, r *http.Request, status int, err error) {
|
||||||
err = errors.WithStack(err)
|
err = errors.WithStack(err)
|
||||||
|
|
||||||
logger.Error(r.Context(), "proxy error", logger.E(err))
|
if !errors.Is(err, context.Canceled) {
|
||||||
sentry.CaptureException(err)
|
logger.Error(r.Context(), err.Error(), logger.CapturedE(err))
|
||||||
|
}
|
||||||
|
|
||||||
s.renderErrorPage(w, r, err, http.StatusBadGateway, http.StatusText(http.StatusBadGateway))
|
s.renderErrorPage(w, r, err, status, http.StatusText(status))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Server) handleProxyError(w http.ResponseWriter, r *http.Request, err error) {
|
||||||
|
s.handleError(w, r, http.StatusBadGateway, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) renderErrorPage(w http.ResponseWriter, r *http.Request, err error, statusCode int, status string) {
|
func (s *Server) renderErrorPage(w http.ResponseWriter, r *http.Request, err error, statusCode int, status string) {
|
||||||
@ -227,7 +304,7 @@ func (s *Server) renderPage(w http.ResponseWriter, r *http.Request, page string,
|
|||||||
|
|
||||||
tmpl, err := template.New("").Funcs(sprig.FuncMap()).ParseGlob(pattern)
|
tmpl, err := template.New("").Funcs(sprig.FuncMap()).ParseGlob(pattern)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error(ctx, "could not load proxy templates", logger.E(errors.WithStack(err)))
|
logger.Error(ctx, "could not load proxy templates", logger.CapturedE(errors.WithStack(err)))
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
||||||
|
|
||||||
return
|
return
|
||||||
@ -247,12 +324,18 @@ func (s *Server) renderPage(w http.ResponseWriter, r *http.Request, page string,
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := blockTmpl.Execute(w, templateData); err != nil {
|
var buf bytes.Buffer
|
||||||
logger.Error(ctx, "could not render proxy page", logger.E(errors.WithStack(err)))
|
|
||||||
|
if err := blockTmpl.Execute(&buf, templateData); err != nil {
|
||||||
|
logger.Error(ctx, "could not render proxy page", logger.CapturedE(errors.WithStack(err)))
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if _, err := io.Copy(w, &buf); err != nil {
|
||||||
|
logger.Error(ctx, "could not write page", logger.CapturedE(errors.WithStack(err)))
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewServer(funcs ...OptionFunc) *Server {
|
func NewServer(funcs ...OptionFunc) *Server {
|
||||||
|
@ -1,16 +1,28 @@
|
|||||||
package rule
|
package rule
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
"github.com/expr-lang/expr"
|
"github.com/expr-lang/expr"
|
||||||
"github.com/expr-lang/expr/vm"
|
"github.com/expr-lang/expr/vm"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Engine[E any] struct {
|
type Engine[V any] struct {
|
||||||
rules []*vm.Program
|
rules []*vm.Program
|
||||||
}
|
}
|
||||||
|
|
||||||
func (e *Engine[E]) Apply(env E) ([]any, error) {
|
func (e *Engine[V]) Apply(ctx context.Context, vars V) ([]any, error) {
|
||||||
|
type Env[V any] struct {
|
||||||
|
Context context.Context `expr:"ctx"`
|
||||||
|
Vars V `expr:"vars"`
|
||||||
|
}
|
||||||
|
|
||||||
|
env := Env[V]{
|
||||||
|
Context: ctx,
|
||||||
|
Vars: vars,
|
||||||
|
}
|
||||||
|
|
||||||
results := make([]any, 0, len(e.rules))
|
results := make([]any, 0, len(e.rules))
|
||||||
for i, r := range e.rules {
|
for i, r := range e.rules {
|
||||||
result, err := expr.Run(r, env)
|
result, err := expr.Run(r, env)
|
||||||
@ -42,3 +54,26 @@ func NewEngine[E any](funcs ...OptionFunc) (*Engine[E], error) {
|
|||||||
|
|
||||||
return engine, nil
|
return engine, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func Context[T any](ctx context.Context, key any) (T, bool) {
|
||||||
|
raw := ctx.Value(key)
|
||||||
|
if raw == nil {
|
||||||
|
return *new(T), false
|
||||||
|
}
|
||||||
|
|
||||||
|
value, err := Assert[T](raw)
|
||||||
|
if err != nil {
|
||||||
|
return *new(T), false
|
||||||
|
}
|
||||||
|
|
||||||
|
return value, true
|
||||||
|
}
|
||||||
|
|
||||||
|
func Assert[T any](raw any) (T, error) {
|
||||||
|
value, ok := raw.(T)
|
||||||
|
if !ok {
|
||||||
|
return *new(T), errors.Errorf("unexpected value '%T'", value)
|
||||||
|
}
|
||||||
|
|
||||||
|
return value, nil
|
||||||
|
}
|
||||||
|
31
internal/rule/http/context.go
Normal file
31
internal/rule/http/context.go
Normal file
@ -0,0 +1,31 @@
|
|||||||
|
package http
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/rule"
|
||||||
|
)
|
||||||
|
|
||||||
|
type contextKey string
|
||||||
|
|
||||||
|
const (
|
||||||
|
contextKeyRequest contextKey = "request"
|
||||||
|
contextKeyResponse contextKey = "response"
|
||||||
|
)
|
||||||
|
|
||||||
|
func WithRequest(ctx context.Context, r *http.Request) context.Context {
|
||||||
|
return context.WithValue(ctx, contextKeyRequest, r)
|
||||||
|
}
|
||||||
|
|
||||||
|
func WithResponse(ctx context.Context, r *http.Response) context.Context {
|
||||||
|
return context.WithValue(ctx, contextKeyResponse, r)
|
||||||
|
}
|
||||||
|
|
||||||
|
func CtxRequest(ctx context.Context) (*http.Request, bool) {
|
||||||
|
return rule.Context[*http.Request](ctx, contextKeyRequest)
|
||||||
|
}
|
||||||
|
|
||||||
|
func CtxResponse(ctx context.Context) (*http.Response, bool) {
|
||||||
|
return rule.Context[*http.Response](ctx, contextKeyResponse)
|
||||||
|
}
|
@ -1,20 +1,20 @@
|
|||||||
package http
|
package http
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"net/http"
|
|
||||||
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/rule"
|
"forge.cadoles.com/cadoles/bouncer/internal/rule"
|
||||||
"github.com/expr-lang/expr"
|
"github.com/expr-lang/expr"
|
||||||
)
|
)
|
||||||
|
|
||||||
func WithRequestFuncs(r *http.Request) rule.OptionFunc {
|
func WithRequestFuncs() rule.OptionFunc {
|
||||||
return func(opts *rule.Options) {
|
return func(opts *rule.Options) {
|
||||||
funcs := []expr.Option{
|
funcs := []expr.Option{
|
||||||
setRequestURL(r),
|
setRequestURLFunc(),
|
||||||
setRequestHeaderFunc(r),
|
setRequestHeaderFunc(),
|
||||||
addRequestHeaderFunc(r),
|
addRequestHeaderFunc(),
|
||||||
delRequestHeadersFunc(r),
|
delRequestHeadersFunc(),
|
||||||
setRequestHostFunc(r),
|
setRequestHostFunc(),
|
||||||
|
getRequestCookieFunc(),
|
||||||
|
addRequestCookieFunc(),
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(opts.Expr) == 0 {
|
if len(opts.Expr) == 0 {
|
||||||
@ -25,12 +25,14 @@ func WithRequestFuncs(r *http.Request) rule.OptionFunc {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func WithResponseFuncs(r *http.Response) rule.OptionFunc {
|
func WithResponseFuncs() rule.OptionFunc {
|
||||||
return func(opts *rule.Options) {
|
return func(opts *rule.Options) {
|
||||||
funcs := []expr.Option{
|
funcs := []expr.Option{
|
||||||
setResponseHeaderFunc(r),
|
setResponseHeaderFunc(),
|
||||||
addResponseHeaderFunc(r),
|
addResponseHeaderFunc(),
|
||||||
delResponseHeadersFunc(r),
|
delResponseHeadersFunc(),
|
||||||
|
addResponseCookieFunc(),
|
||||||
|
getResponseCookieFunc(),
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(opts.Expr) == 0 {
|
if len(opts.Expr) == 0 {
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
package http
|
package http
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
"net/url"
|
||||||
@ -9,101 +10,147 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
|
|
||||||
"forge.cadoles.com/Cadoles/go-proxy/wildcard"
|
"forge.cadoles.com/Cadoles/go-proxy/wildcard"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/rule"
|
||||||
"github.com/expr-lang/expr"
|
"github.com/expr-lang/expr"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
)
|
)
|
||||||
|
|
||||||
func setRequestHostFunc(r *http.Request) expr.Option {
|
func setRequestHostFunc() expr.Option {
|
||||||
return expr.Function(
|
return expr.Function(
|
||||||
"set_host",
|
"set_host",
|
||||||
func(params ...any) (any, error) {
|
func(params ...any) (any, error) {
|
||||||
host := params[0].(string)
|
ctx, err := rule.Assert[context.Context](params[0])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
host, err := rule.Assert[string](params[1])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
r, ok := CtxRequest(ctx)
|
||||||
|
if !ok {
|
||||||
|
return nil, errors.New("could not find http request in context")
|
||||||
|
}
|
||||||
|
|
||||||
r.Host = host
|
r.Host = host
|
||||||
|
|
||||||
return true, nil
|
return true, nil
|
||||||
},
|
},
|
||||||
new(func(string) bool),
|
new(func(context.Context, string) bool),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
func setRequestURL(r *http.Request) expr.Option {
|
func setRequestURLFunc() expr.Option {
|
||||||
return expr.Function(
|
return expr.Function(
|
||||||
"set_url",
|
"set_url",
|
||||||
func(params ...any) (any, error) {
|
func(params ...any) (any, error) {
|
||||||
rawURL := params[0].(string)
|
ctx, err := rule.Assert[context.Context](params[0])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
rawURL, err := rule.Assert[string](params[1])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
url, err := url.Parse(rawURL)
|
url, err := url.Parse(rawURL)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, errors.WithStack(err)
|
return false, errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
r, ok := CtxRequest(ctx)
|
||||||
|
if !ok {
|
||||||
|
return nil, errors.New("could not find http request in context")
|
||||||
|
}
|
||||||
|
|
||||||
r.URL = url
|
r.URL = url
|
||||||
|
|
||||||
return true, nil
|
return true, nil
|
||||||
},
|
},
|
||||||
new(func(string) bool),
|
new(func(context.Context, string) bool),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
func addRequestHeaderFunc(r *http.Request) expr.Option {
|
func addRequestHeaderFunc() expr.Option {
|
||||||
return expr.Function(
|
return expr.Function(
|
||||||
"add_header",
|
"add_header",
|
||||||
func(params ...any) (any, error) {
|
func(params ...any) (any, error) {
|
||||||
name := params[0].(string)
|
ctx, err := rule.Assert[context.Context](params[0])
|
||||||
rawValue := params[1]
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
var value string
|
name, err := rule.Assert[string](params[1])
|
||||||
switch v := rawValue.(type) {
|
if err != nil {
|
||||||
case []string:
|
return nil, errors.WithStack(err)
|
||||||
value = strings.Join(v, ",")
|
}
|
||||||
case time.Time:
|
|
||||||
value = strconv.FormatInt(v.UTC().Unix(), 10)
|
value := formatValue(params[2])
|
||||||
case time.Duration:
|
|
||||||
value = strconv.FormatInt(int64(v.Seconds()), 10)
|
r, ok := CtxRequest(ctx)
|
||||||
default:
|
if !ok {
|
||||||
value = fmt.Sprintf("%v", rawValue)
|
return nil, errors.New("could not find http request in context")
|
||||||
}
|
}
|
||||||
|
|
||||||
r.Header.Add(name, value)
|
r.Header.Add(name, value)
|
||||||
|
|
||||||
return true, nil
|
return true, nil
|
||||||
},
|
},
|
||||||
new(func(string, string) bool),
|
new(func(context.Context, string, string) bool),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
func setRequestHeaderFunc(r *http.Request) expr.Option {
|
func setRequestHeaderFunc() expr.Option {
|
||||||
return expr.Function(
|
return expr.Function(
|
||||||
"set_header",
|
"set_header",
|
||||||
func(params ...any) (any, error) {
|
func(params ...any) (any, error) {
|
||||||
name := params[0].(string)
|
ctx, err := rule.Assert[context.Context](params[0])
|
||||||
rawValue := params[1]
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
var value string
|
name, err := rule.Assert[string](params[1])
|
||||||
switch v := rawValue.(type) {
|
if err != nil {
|
||||||
case []string:
|
return nil, errors.WithStack(err)
|
||||||
value = strings.Join(v, ",")
|
}
|
||||||
case time.Time:
|
|
||||||
value = strconv.FormatInt(v.UTC().Unix(), 10)
|
value := formatValue(params[2])
|
||||||
case time.Duration:
|
|
||||||
value = strconv.FormatInt(int64(v.Seconds()), 10)
|
r, ok := CtxRequest(ctx)
|
||||||
default:
|
if !ok {
|
||||||
value = fmt.Sprintf("%v", rawValue)
|
return nil, errors.New("could not find http request in context")
|
||||||
}
|
}
|
||||||
|
|
||||||
r.Header.Set(name, value)
|
r.Header.Set(name, value)
|
||||||
|
|
||||||
return true, nil
|
return true, nil
|
||||||
},
|
},
|
||||||
new(func(string, string) bool),
|
new(func(context.Context, string, string) bool),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
func delRequestHeadersFunc(r *http.Request) expr.Option {
|
func delRequestHeadersFunc() expr.Option {
|
||||||
return expr.Function(
|
return expr.Function(
|
||||||
"del_headers",
|
"del_headers",
|
||||||
func(params ...any) (any, error) {
|
func(params ...any) (any, error) {
|
||||||
pattern := params[0].(string)
|
ctx, err := rule.Assert[context.Context](params[0])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
pattern, err := rule.Assert[string](params[1])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
r, ok := CtxRequest(ctx)
|
||||||
|
if !ok {
|
||||||
|
return nil, errors.New("could not find http request in context")
|
||||||
|
}
|
||||||
|
|
||||||
deleted := false
|
deleted := false
|
||||||
|
|
||||||
for key := range r.Header {
|
for key := range r.Header {
|
||||||
@ -117,6 +164,160 @@ func delRequestHeadersFunc(r *http.Request) expr.Option {
|
|||||||
|
|
||||||
return deleted, nil
|
return deleted, nil
|
||||||
},
|
},
|
||||||
new(func(string) bool),
|
new(func(context.Context, string) bool),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type CookieVar struct {
|
||||||
|
Name string `expr:"name"`
|
||||||
|
Value string `expr:"value"`
|
||||||
|
Path string `expr:"path"`
|
||||||
|
Domain string `expr:"domain"`
|
||||||
|
Expires time.Time `expr:"expires"`
|
||||||
|
MaxAge int `expr:"max_age"`
|
||||||
|
Secure bool `expr:"secure"`
|
||||||
|
HttpOnly bool `expr:"http_only"`
|
||||||
|
SameSite http.SameSite `expr:"same_site"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func getRequestCookieFunc() expr.Option {
|
||||||
|
return expr.Function(
|
||||||
|
"get_cookie",
|
||||||
|
func(params ...any) (any, error) {
|
||||||
|
ctx, err := rule.Assert[context.Context](params[0])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
name, err := rule.Assert[string](params[1])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
r, ok := CtxRequest(ctx)
|
||||||
|
if !ok {
|
||||||
|
return nil, errors.New("could not find http request in context")
|
||||||
|
}
|
||||||
|
|
||||||
|
cookie, err := r.Cookie(name)
|
||||||
|
if err != nil && !errors.Is(err, http.ErrNoCookie) {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if cookie == nil {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return CookieVar{
|
||||||
|
Name: cookie.Name,
|
||||||
|
Value: cookie.Value,
|
||||||
|
Path: cookie.Path,
|
||||||
|
Domain: cookie.Domain,
|
||||||
|
Expires: cookie.Expires,
|
||||||
|
MaxAge: cookie.MaxAge,
|
||||||
|
Secure: cookie.Secure,
|
||||||
|
HttpOnly: cookie.HttpOnly,
|
||||||
|
SameSite: cookie.SameSite,
|
||||||
|
}, nil
|
||||||
|
},
|
||||||
|
new(func(context.Context, string) CookieVar),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func addRequestCookieFunc() expr.Option {
|
||||||
|
return expr.Function(
|
||||||
|
"add_cookie",
|
||||||
|
func(params ...any) (any, error) {
|
||||||
|
ctx, err := rule.Assert[context.Context](params[0])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
values, err := rule.Assert[map[string]any](params[1])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cookie, err := cookieFrom(values)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
r, ok := CtxRequest(ctx)
|
||||||
|
if !ok {
|
||||||
|
return nil, errors.New("could not find http request in context")
|
||||||
|
}
|
||||||
|
|
||||||
|
r.AddCookie(cookie)
|
||||||
|
|
||||||
|
return true, nil
|
||||||
|
},
|
||||||
|
new(func(context.Context, map[string]any) bool),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func cookieFrom(values map[string]any) (*http.Cookie, error) {
|
||||||
|
cookie := &http.Cookie{}
|
||||||
|
|
||||||
|
if name, ok := values["name"].(string); ok {
|
||||||
|
cookie.Name = name
|
||||||
|
}
|
||||||
|
|
||||||
|
if value, ok := values["value"].(string); ok {
|
||||||
|
cookie.Value = value
|
||||||
|
}
|
||||||
|
|
||||||
|
if domain, ok := values["domain"].(string); ok {
|
||||||
|
cookie.Domain = domain
|
||||||
|
}
|
||||||
|
|
||||||
|
if path, ok := values["path"].(string); ok {
|
||||||
|
cookie.Path = path
|
||||||
|
}
|
||||||
|
|
||||||
|
if httpOnly, ok := values["http_only"].(bool); ok {
|
||||||
|
cookie.HttpOnly = httpOnly
|
||||||
|
}
|
||||||
|
|
||||||
|
if maxAge, ok := values["max_age"].(int); ok {
|
||||||
|
cookie.MaxAge = maxAge
|
||||||
|
}
|
||||||
|
|
||||||
|
if secure, ok := values["secure"].(bool); ok {
|
||||||
|
cookie.Secure = secure
|
||||||
|
}
|
||||||
|
|
||||||
|
if sameSite, ok := values["same_site"].(http.SameSite); ok {
|
||||||
|
cookie.SameSite = sameSite
|
||||||
|
} else if sameSite, ok := values["same_site"].(int); ok {
|
||||||
|
cookie.SameSite = http.SameSite(sameSite)
|
||||||
|
}
|
||||||
|
|
||||||
|
if expires, ok := values["expires"].(time.Time); ok {
|
||||||
|
cookie.Expires = expires
|
||||||
|
} else if rawExpires, ok := values["expires"].(string); ok {
|
||||||
|
expires, err := time.Parse(http.TimeFormat, rawExpires)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cookie.Expires = expires
|
||||||
|
}
|
||||||
|
|
||||||
|
return cookie, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func formatValue(v any) string {
|
||||||
|
var value string
|
||||||
|
switch v := v.(type) {
|
||||||
|
case []string:
|
||||||
|
value = strings.Join(v, ",")
|
||||||
|
case time.Time:
|
||||||
|
value = strconv.FormatInt(v.UTC().Unix(), 10)
|
||||||
|
case time.Duration:
|
||||||
|
value = strconv.FormatInt(int64(v.Seconds()), 10)
|
||||||
|
default:
|
||||||
|
value = fmt.Sprintf("%v", v)
|
||||||
|
}
|
||||||
|
return value
|
||||||
|
}
|
||||||
|
324
internal/rule/http/request_test.go
Normal file
324
internal/rule/http/request_test.go
Normal file
@ -0,0 +1,324 @@
|
|||||||
|
package http
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/rule"
|
||||||
|
"github.com/pkg/errors"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestSetRequestHost(t *testing.T) {
|
||||||
|
type Vars struct {
|
||||||
|
NewHost string `expr:"newHost"`
|
||||||
|
}
|
||||||
|
|
||||||
|
engine := createRuleEngine[Vars](t,
|
||||||
|
rule.WithExpr(setRequestHostFunc()),
|
||||||
|
rule.WithRules(
|
||||||
|
"set_host(ctx, vars.newHost)",
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "http://example.net", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
ctx = WithRequest(ctx, req)
|
||||||
|
|
||||||
|
vars := Vars{
|
||||||
|
NewHost: "foobar",
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := engine.Apply(ctx, vars); err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := vars.NewHost, req.Host; e != g {
|
||||||
|
t.Errorf("req.Host: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestSetRequestURL(t *testing.T) {
|
||||||
|
type Vars struct {
|
||||||
|
NewURL string `expr:"newURL"`
|
||||||
|
}
|
||||||
|
|
||||||
|
engine := createRuleEngine[Vars](t,
|
||||||
|
rule.WithExpr(setRequestURLFunc()),
|
||||||
|
rule.WithRules(
|
||||||
|
"set_url(ctx, vars.newURL)",
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "http://example.net", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
ctx = WithRequest(ctx, req)
|
||||||
|
|
||||||
|
vars := Vars{
|
||||||
|
NewURL: "http://localhost",
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := engine.Apply(ctx, vars); err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := vars.NewURL, req.URL.String(); e != g {
|
||||||
|
t.Errorf("req.URL.String(): expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestAddRequestHeader(t *testing.T) {
|
||||||
|
type Vars struct {
|
||||||
|
NewHeaderKey string `expr:"newHeaderKey"`
|
||||||
|
NewHeaderValue string `expr:"newHeaderValue"`
|
||||||
|
}
|
||||||
|
|
||||||
|
engine := createRuleEngine[Vars](t,
|
||||||
|
rule.WithExpr(addRequestHeaderFunc()),
|
||||||
|
rule.WithRules(
|
||||||
|
"add_header(ctx, vars.newHeaderKey, vars.newHeaderValue)",
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "http://example.net", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
ctx = WithRequest(ctx, req)
|
||||||
|
|
||||||
|
vars := Vars{
|
||||||
|
NewHeaderKey: "X-My-Header",
|
||||||
|
NewHeaderValue: "foobar",
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := engine.Apply(ctx, vars); err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := vars.NewHeaderValue, req.Header.Get(vars.NewHeaderKey); e != g {
|
||||||
|
t.Errorf("req.Header.Get(vars.NewHeaderKey): expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestSetRequestHeader(t *testing.T) {
|
||||||
|
type Vars struct {
|
||||||
|
HeaderKey string `expr:"headerKey"`
|
||||||
|
HeaderValue string `expr:"headerValue"`
|
||||||
|
}
|
||||||
|
|
||||||
|
engine := createRuleEngine[Vars](t,
|
||||||
|
rule.WithExpr(setRequestHeaderFunc()),
|
||||||
|
rule.WithRules(
|
||||||
|
"set_header(ctx, vars.headerKey, vars.headerValue)",
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "http://example.net", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
vars := Vars{
|
||||||
|
HeaderKey: "X-My-Header",
|
||||||
|
HeaderValue: "foobar",
|
||||||
|
}
|
||||||
|
|
||||||
|
req.Header.Set(vars.HeaderKey, "test")
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
ctx = WithRequest(ctx, req)
|
||||||
|
|
||||||
|
if _, err := engine.Apply(ctx, vars); err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := vars.HeaderValue, req.Header.Get(vars.HeaderKey); e != g {
|
||||||
|
t.Errorf("req.Header.Get(vars.HeaderKey): expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestDelRequestHeaders(t *testing.T) {
|
||||||
|
type Vars struct {
|
||||||
|
HeaderPattern string `expr:"headerPattern"`
|
||||||
|
}
|
||||||
|
|
||||||
|
engine := createRuleEngine[Vars](t,
|
||||||
|
rule.WithExpr(delRequestHeadersFunc()),
|
||||||
|
rule.WithRules(
|
||||||
|
"del_headers(ctx, vars.headerPattern)",
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "http://example.net", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
vars := Vars{
|
||||||
|
HeaderPattern: "X-My-*",
|
||||||
|
}
|
||||||
|
|
||||||
|
req.Header.Set("X-My-Header", "test")
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
ctx = WithRequest(ctx, req)
|
||||||
|
|
||||||
|
if _, err := engine.Apply(ctx, vars); err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
if val := req.Header.Get("X-My-Header"); val != "" {
|
||||||
|
t.Errorf("req.Header.Get(\"X-My-Header\") should be empty, got '%v'", val)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestAddRequestCookie(t *testing.T) {
|
||||||
|
type TestCase struct {
|
||||||
|
Cookie map[string]any
|
||||||
|
Check func(t *testing.T, tc TestCase, req *http.Request)
|
||||||
|
ShouldFail bool
|
||||||
|
}
|
||||||
|
|
||||||
|
testCases := []TestCase{
|
||||||
|
{
|
||||||
|
Cookie: map[string]any{
|
||||||
|
"name": "test",
|
||||||
|
},
|
||||||
|
Check: func(t *testing.T, tc TestCase, req *http.Request) {
|
||||||
|
cookie, err := req.Cookie(tc.Cookie["name"].(string))
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("%+v", errors.WithStack(err))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := tc.Cookie["name"], cookie.Name; e != g {
|
||||||
|
t.Errorf("cookie.Name: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Cookie: map[string]any{
|
||||||
|
"name": "foo",
|
||||||
|
"value": "test",
|
||||||
|
},
|
||||||
|
Check: func(t *testing.T, tc TestCase, req *http.Request) {
|
||||||
|
cookie, err := req.Cookie(tc.Cookie["name"].(string))
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("%+v", errors.WithStack(err))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := tc.Cookie["name"], cookie.Name; e != g {
|
||||||
|
t.Errorf("cookie.Name: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := tc.Cookie["value"], cookie.Value; e != g {
|
||||||
|
t.Errorf("cookie.Value: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for idx, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("Case_%d", idx), func(t *testing.T) {
|
||||||
|
type Vars struct {
|
||||||
|
NewCookie map[string]any `expr:"new_cookie"`
|
||||||
|
}
|
||||||
|
|
||||||
|
engine := createRuleEngine[Vars](t,
|
||||||
|
rule.WithExpr(addRequestCookieFunc()),
|
||||||
|
rule.WithRules(
|
||||||
|
`add_cookie(ctx, vars.new_cookie)`,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "http://example.net", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
vars := Vars{
|
||||||
|
NewCookie: tc.Cookie,
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
ctx = WithRequest(ctx, req)
|
||||||
|
|
||||||
|
if _, err := engine.Apply(ctx, vars); err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
if tc.ShouldFail {
|
||||||
|
t.Error("engine.Apply() should have failed")
|
||||||
|
}
|
||||||
|
|
||||||
|
if tc.Check != nil {
|
||||||
|
tc.Check(t, tc, req)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestGetRequestCookie(t *testing.T) {
|
||||||
|
type Vars struct {
|
||||||
|
CookieName string `expr:"cookieName"`
|
||||||
|
}
|
||||||
|
|
||||||
|
engine := createRuleEngine[Vars](t,
|
||||||
|
rule.WithExpr(getRequestCookieFunc()),
|
||||||
|
rule.WithRules(
|
||||||
|
"let cookie = get_cookie(ctx, vars.cookieName); cookie.value",
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "http://example.net", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
vars := Vars{
|
||||||
|
CookieName: "foo",
|
||||||
|
}
|
||||||
|
|
||||||
|
cookie := &http.Cookie{
|
||||||
|
Name: vars.CookieName,
|
||||||
|
Value: "bar",
|
||||||
|
}
|
||||||
|
|
||||||
|
req.AddCookie(cookie)
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
ctx = WithRequest(ctx, req)
|
||||||
|
|
||||||
|
results, err := engine.Apply(ctx, vars)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := cookie.Value, results[0]; e != g {
|
||||||
|
t.Errorf("result[0]: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func createRuleEngine[V any](t *testing.T, funcs ...rule.OptionFunc) *rule.Engine[V] {
|
||||||
|
engine, err := rule.NewEngine[V](funcs...)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
return engine
|
||||||
|
}
|
@ -1,6 +1,7 @@
|
|||||||
package http
|
package http
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
"strconv"
|
"strconv"
|
||||||
@ -8,15 +9,26 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
|
|
||||||
"forge.cadoles.com/Cadoles/go-proxy/wildcard"
|
"forge.cadoles.com/Cadoles/go-proxy/wildcard"
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/rule"
|
||||||
"github.com/expr-lang/expr"
|
"github.com/expr-lang/expr"
|
||||||
|
"github.com/pkg/errors"
|
||||||
)
|
)
|
||||||
|
|
||||||
func addResponseHeaderFunc(r *http.Response) expr.Option {
|
func addResponseHeaderFunc() expr.Option {
|
||||||
return expr.Function(
|
return expr.Function(
|
||||||
"add_header",
|
"add_header",
|
||||||
func(params ...any) (any, error) {
|
func(params ...any) (any, error) {
|
||||||
name := params[0].(string)
|
ctx, err := rule.Assert[context.Context](params[0])
|
||||||
rawValue := params[1]
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
name, err := rule.Assert[string](params[1])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
rawValue := params[2]
|
||||||
|
|
||||||
var value string
|
var value string
|
||||||
switch v := rawValue.(type) {
|
switch v := rawValue.(type) {
|
||||||
@ -30,20 +42,34 @@ func addResponseHeaderFunc(r *http.Response) expr.Option {
|
|||||||
value = fmt.Sprintf("%v", rawValue)
|
value = fmt.Sprintf("%v", rawValue)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
r, ok := CtxResponse(ctx)
|
||||||
|
if !ok {
|
||||||
|
return nil, errors.New("could not find http response in context")
|
||||||
|
}
|
||||||
|
|
||||||
r.Header.Add(name, value)
|
r.Header.Add(name, value)
|
||||||
|
|
||||||
return true, nil
|
return true, nil
|
||||||
},
|
},
|
||||||
new(func(string, string) bool),
|
new(func(context.Context, string, string) bool),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
func setResponseHeaderFunc(r *http.Response) expr.Option {
|
func setResponseHeaderFunc() expr.Option {
|
||||||
return expr.Function(
|
return expr.Function(
|
||||||
"set_header",
|
"set_header",
|
||||||
func(params ...any) (any, error) {
|
func(params ...any) (any, error) {
|
||||||
name := params[0].(string)
|
ctx, err := rule.Assert[context.Context](params[0])
|
||||||
rawValue := params[1]
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
name, err := rule.Assert[string](params[1])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
rawValue := params[2]
|
||||||
|
|
||||||
var value string
|
var value string
|
||||||
switch v := rawValue.(type) {
|
switch v := rawValue.(type) {
|
||||||
@ -57,19 +83,38 @@ func setResponseHeaderFunc(r *http.Response) expr.Option {
|
|||||||
value = fmt.Sprintf("%v", rawValue)
|
value = fmt.Sprintf("%v", rawValue)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
r, ok := CtxResponse(ctx)
|
||||||
|
if !ok {
|
||||||
|
return nil, errors.New("could not find http response in context")
|
||||||
|
}
|
||||||
|
|
||||||
r.Header.Set(name, value)
|
r.Header.Set(name, value)
|
||||||
|
|
||||||
return true, nil
|
return true, nil
|
||||||
},
|
},
|
||||||
new(func(string, string) bool),
|
new(func(context.Context, string, string) bool),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
func delResponseHeadersFunc(r *http.Response) expr.Option {
|
func delResponseHeadersFunc() expr.Option {
|
||||||
return expr.Function(
|
return expr.Function(
|
||||||
"del_headers",
|
"del_headers",
|
||||||
func(params ...any) (any, error) {
|
func(params ...any) (any, error) {
|
||||||
pattern := params[0].(string)
|
ctx, err := rule.Assert[context.Context](params[0])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
pattern, err := rule.Assert[string](params[1])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
r, ok := CtxResponse(ctx)
|
||||||
|
if !ok {
|
||||||
|
return nil, errors.New("could not find http response in context")
|
||||||
|
}
|
||||||
|
|
||||||
deleted := false
|
deleted := false
|
||||||
|
|
||||||
for key := range r.Header {
|
for key := range r.Header {
|
||||||
@ -83,6 +128,87 @@ func delResponseHeadersFunc(r *http.Response) expr.Option {
|
|||||||
|
|
||||||
return deleted, nil
|
return deleted, nil
|
||||||
},
|
},
|
||||||
new(func(string) bool),
|
new(func(context.Context, string) bool),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func addResponseCookieFunc() expr.Option {
|
||||||
|
return expr.Function(
|
||||||
|
"add_cookie",
|
||||||
|
func(params ...any) (any, error) {
|
||||||
|
ctx, err := rule.Assert[context.Context](params[0])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
values, err := rule.Assert[map[string]any](params[1])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cookie, err := cookieFrom(values)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
r, ok := CtxResponse(ctx)
|
||||||
|
if !ok {
|
||||||
|
return nil, errors.New("could not find http request in context")
|
||||||
|
}
|
||||||
|
|
||||||
|
r.Header.Add("Set-Cookie", cookie.String())
|
||||||
|
|
||||||
|
return true, nil
|
||||||
|
},
|
||||||
|
new(func(context.Context, map[string]any) bool),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func getResponseCookieFunc() expr.Option {
|
||||||
|
return expr.Function(
|
||||||
|
"get_cookie",
|
||||||
|
func(params ...any) (any, error) {
|
||||||
|
ctx, err := rule.Assert[context.Context](params[0])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
name, err := rule.Assert[string](params[1])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
res, ok := CtxResponse(ctx)
|
||||||
|
if !ok {
|
||||||
|
return nil, errors.New("could not find http response in context")
|
||||||
|
}
|
||||||
|
|
||||||
|
var cookie *http.Cookie
|
||||||
|
for _, c := range res.Cookies() {
|
||||||
|
if c.Name != name {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
cookie = c
|
||||||
|
break
|
||||||
|
}
|
||||||
|
|
||||||
|
if cookie == nil {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return CookieVar{
|
||||||
|
Name: cookie.Name,
|
||||||
|
Value: cookie.Value,
|
||||||
|
Path: cookie.Path,
|
||||||
|
Domain: cookie.Domain,
|
||||||
|
Expires: cookie.Expires,
|
||||||
|
MaxAge: cookie.MaxAge,
|
||||||
|
Secure: cookie.Secure,
|
||||||
|
HttpOnly: cookie.HttpOnly,
|
||||||
|
SameSite: cookie.SameSite,
|
||||||
|
}, nil
|
||||||
|
},
|
||||||
|
new(func(context.Context, string) CookieVar),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
317
internal/rule/http/response_test.go
Normal file
317
internal/rule/http/response_test.go
Normal file
@ -0,0 +1,317 @@
|
|||||||
|
package http
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net/http"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"forge.cadoles.com/cadoles/bouncer/internal/rule"
|
||||||
|
"github.com/pkg/errors"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestAddResponseHeader(t *testing.T) {
|
||||||
|
type Vars struct {
|
||||||
|
NewHeaderKey string `expr:"newHeaderKey"`
|
||||||
|
NewHeaderValue string `expr:"newHeaderValue"`
|
||||||
|
}
|
||||||
|
|
||||||
|
engine := createRuleEngine[Vars](t,
|
||||||
|
rule.WithExpr(addResponseHeaderFunc()),
|
||||||
|
rule.WithRules(
|
||||||
|
"add_header(ctx, vars.newHeaderKey, vars.newHeaderValue)",
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "http://example.net", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
resp := createResponse(req, http.StatusOK, nil)
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
ctx = WithResponse(ctx, resp)
|
||||||
|
|
||||||
|
vars := Vars{
|
||||||
|
NewHeaderKey: "X-My-Header",
|
||||||
|
NewHeaderValue: "foobar",
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := engine.Apply(ctx, vars); err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := vars.NewHeaderValue, resp.Header.Get(vars.NewHeaderKey); e != g {
|
||||||
|
t.Errorf("resp.Header.Get(vars.NewHeaderKey): expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestResponseSetHeader(t *testing.T) {
|
||||||
|
type Vars struct {
|
||||||
|
HeaderKey string `expr:"headerKey"`
|
||||||
|
HeaderValue string `expr:"headerValue"`
|
||||||
|
}
|
||||||
|
|
||||||
|
engine := createRuleEngine[Vars](t,
|
||||||
|
rule.WithExpr(setResponseHeaderFunc()),
|
||||||
|
rule.WithRules(
|
||||||
|
"set_header(ctx, vars.headerKey, vars.headerValue)",
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "http://example.net", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
resp := createResponse(req, http.StatusOK, nil)
|
||||||
|
|
||||||
|
vars := Vars{
|
||||||
|
HeaderKey: "X-My-Header",
|
||||||
|
HeaderValue: "foobar",
|
||||||
|
}
|
||||||
|
|
||||||
|
resp.Header.Set(vars.HeaderKey, "test")
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
ctx = WithResponse(ctx, resp)
|
||||||
|
|
||||||
|
if _, err := engine.Apply(ctx, vars); err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := vars.HeaderValue, resp.Header.Get(vars.HeaderKey); e != g {
|
||||||
|
t.Errorf("resp.Header.Get(vars.HeaderKey): expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestResponseDelHeaders(t *testing.T) {
|
||||||
|
type Vars struct {
|
||||||
|
HeaderPattern string `expr:"headerPattern"`
|
||||||
|
}
|
||||||
|
|
||||||
|
engine := createRuleEngine[Vars](t,
|
||||||
|
rule.WithExpr(delResponseHeadersFunc()),
|
||||||
|
rule.WithRules(
|
||||||
|
"del_headers(ctx, vars.headerPattern)",
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "http://example.net", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
resp := createResponse(req, http.StatusOK, nil)
|
||||||
|
|
||||||
|
vars := Vars{
|
||||||
|
HeaderPattern: "X-My-*",
|
||||||
|
}
|
||||||
|
|
||||||
|
resp.Header.Set("X-My-Header", "test")
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
ctx = WithResponse(ctx, resp)
|
||||||
|
|
||||||
|
if _, err := engine.Apply(ctx, vars); err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
if val := resp.Header.Get("X-My-Header"); val != "" {
|
||||||
|
t.Errorf("resp.Header.Get(\"X-My-Header\") should be empty, got '%v'", val)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestAddResponseCookie(t *testing.T) {
|
||||||
|
type TestCase struct {
|
||||||
|
Cookie map[string]any
|
||||||
|
Check func(t *testing.T, tc TestCase, res *http.Response)
|
||||||
|
ShouldFail bool
|
||||||
|
}
|
||||||
|
|
||||||
|
testCases := []TestCase{
|
||||||
|
{
|
||||||
|
Cookie: map[string]any{
|
||||||
|
"name": "foo",
|
||||||
|
"value": "test",
|
||||||
|
"domain": "example.net",
|
||||||
|
"path": "/custom",
|
||||||
|
"same_site": http.SameSiteStrictMode,
|
||||||
|
"http_only": true,
|
||||||
|
"secure": false,
|
||||||
|
"expires": time.Now().UTC().Truncate(time.Second),
|
||||||
|
},
|
||||||
|
Check: func(t *testing.T, tc TestCase, res *http.Response) {
|
||||||
|
var cookie *http.Cookie
|
||||||
|
for _, c := range res.Cookies() {
|
||||||
|
if c.Name == tc.Cookie["name"] {
|
||||||
|
cookie = c
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if cookie == nil {
|
||||||
|
t.Errorf("could not find cookie '%s'", tc.Cookie["name"])
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := tc.Cookie["name"], cookie.Name; e != g {
|
||||||
|
t.Errorf("cookie.Name: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := tc.Cookie["value"], cookie.Value; e != g {
|
||||||
|
t.Errorf("cookie.Value: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := tc.Cookie["domain"], cookie.Domain; e != g {
|
||||||
|
t.Errorf("cookie.Domain: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := tc.Cookie["path"], cookie.Path; e != g {
|
||||||
|
t.Errorf("cookie.Path: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := tc.Cookie["secure"], cookie.Secure; e != g {
|
||||||
|
t.Errorf("cookie.Secure: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := tc.Cookie["http_only"], cookie.HttpOnly; e != g {
|
||||||
|
t.Errorf("cookie.HttpOnly: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := tc.Cookie["same_site"], cookie.SameSite; e != g {
|
||||||
|
t.Errorf("cookie.SameSite: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := tc.Cookie["expires"], cookie.Expires; e != g {
|
||||||
|
t.Errorf("cookie.Expires: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Cookie: map[string]any{
|
||||||
|
"name": "foo",
|
||||||
|
"expires": time.Now().UTC().Format(http.TimeFormat),
|
||||||
|
},
|
||||||
|
Check: func(t *testing.T, tc TestCase, res *http.Response) {
|
||||||
|
var cookie *http.Cookie
|
||||||
|
for _, c := range res.Cookies() {
|
||||||
|
if c.Name == tc.Cookie["name"] {
|
||||||
|
cookie = c
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if cookie == nil {
|
||||||
|
t.Errorf("could not find cookie '%s'", tc.Cookie["name"])
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := tc.Cookie["expires"], cookie.Expires.Format(http.TimeFormat); e != g {
|
||||||
|
t.Errorf("cookie.Expires: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for idx, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("Case_%d", idx), func(t *testing.T) {
|
||||||
|
type Vars struct {
|
||||||
|
NewCookie map[string]any `expr:"new_cookie"`
|
||||||
|
}
|
||||||
|
|
||||||
|
engine := createRuleEngine[Vars](t,
|
||||||
|
rule.WithExpr(addResponseCookieFunc()),
|
||||||
|
rule.WithRules(
|
||||||
|
`add_cookie(ctx, vars.new_cookie)`,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "http://example.net", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
resp := createResponse(req, http.StatusOK, nil)
|
||||||
|
|
||||||
|
vars := Vars{
|
||||||
|
NewCookie: tc.Cookie,
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
ctx = WithRequest(ctx, req)
|
||||||
|
ctx = WithResponse(ctx, resp)
|
||||||
|
|
||||||
|
if _, err := engine.Apply(ctx, vars); err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
if tc.ShouldFail {
|
||||||
|
t.Error("engine.Apply() should have failed")
|
||||||
|
}
|
||||||
|
|
||||||
|
if tc.Check != nil {
|
||||||
|
tc.Check(t, tc, resp)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestGetResponseCookie(t *testing.T) {
|
||||||
|
type Vars struct {
|
||||||
|
CookieName string `expr:"cookieName"`
|
||||||
|
}
|
||||||
|
|
||||||
|
engine := createRuleEngine[Vars](t,
|
||||||
|
rule.WithExpr(getResponseCookieFunc()),
|
||||||
|
rule.WithRules(
|
||||||
|
"let cookie = get_cookie(ctx, vars.cookieName); cookie.value",
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "http://example.net", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
resp := createResponse(req, http.StatusOK, nil)
|
||||||
|
|
||||||
|
vars := Vars{
|
||||||
|
CookieName: "foo",
|
||||||
|
}
|
||||||
|
|
||||||
|
cookie := &http.Cookie{
|
||||||
|
Name: vars.CookieName,
|
||||||
|
Value: "bar",
|
||||||
|
}
|
||||||
|
|
||||||
|
resp.Header.Add("Set-Cookie", cookie.String())
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
ctx = WithResponse(ctx, resp)
|
||||||
|
|
||||||
|
results, err := engine.Apply(ctx, vars)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%+v", errors.WithStack(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
if e, g := cookie.Value, results[0]; e != g {
|
||||||
|
t.Errorf("result[0]: expected '%v', got '%v'", e, g)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func createResponse(req *http.Request, statusCode int, body io.Reader) *http.Response {
|
||||||
|
return &http.Response{
|
||||||
|
Status: http.StatusText(statusCode),
|
||||||
|
StatusCode: statusCode,
|
||||||
|
Proto: "HTTP/1.1",
|
||||||
|
ProtoMajor: 1,
|
||||||
|
ProtoMinor: 1,
|
||||||
|
Body: io.NopCloser(body),
|
||||||
|
ContentLength: -1,
|
||||||
|
Request: req,
|
||||||
|
Header: make(http.Header, 0),
|
||||||
|
}
|
||||||
|
}
|
@ -10,6 +10,7 @@ import (
|
|||||||
type Options struct {
|
type Options struct {
|
||||||
Session sessions.Options
|
Session sessions.Options
|
||||||
KeyPrefix string
|
KeyPrefix string
|
||||||
|
TTL time.Duration
|
||||||
}
|
}
|
||||||
|
|
||||||
type OptionFunc func(opts *Options)
|
type OptionFunc func(opts *Options)
|
||||||
@ -25,6 +26,7 @@ func NewOptions(funcs ...OptionFunc) *Options {
|
|||||||
SameSite: http.SameSiteDefaultMode,
|
SameSite: http.SameSiteDefaultMode,
|
||||||
},
|
},
|
||||||
KeyPrefix: "session:",
|
KeyPrefix: "session:",
|
||||||
|
TTL: time.Hour,
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, fn := range funcs {
|
for _, fn := range funcs {
|
||||||
@ -45,3 +47,9 @@ func WithKeyPrefix(prefix string) OptionFunc {
|
|||||||
opts.KeyPrefix = prefix
|
opts.KeyPrefix = prefix
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func WithTTL(ttl time.Duration) OptionFunc {
|
||||||
|
return func(opts *Options) {
|
||||||
|
opts.TTL = ttl
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -31,6 +31,7 @@ type Store struct {
|
|||||||
keyPrefix string
|
keyPrefix string
|
||||||
keyGen KeyGenFunc
|
keyGen KeyGenFunc
|
||||||
serializer SessionSerializer
|
serializer SessionSerializer
|
||||||
|
ttl time.Duration
|
||||||
}
|
}
|
||||||
|
|
||||||
type KeyGenFunc func() (string, error)
|
type KeyGenFunc func() (string, error)
|
||||||
@ -43,6 +44,7 @@ func NewStore(adapter StoreAdapter, funcs ...OptionFunc) *Store {
|
|||||||
keyPrefix: opts.KeyPrefix,
|
keyPrefix: opts.KeyPrefix,
|
||||||
keyGen: generateRandomKey,
|
keyGen: generateRandomKey,
|
||||||
serializer: GobSerializer{},
|
serializer: GobSerializer{},
|
||||||
|
ttl: opts.TTL,
|
||||||
}
|
}
|
||||||
|
|
||||||
return rs
|
return rs
|
||||||
@ -62,20 +64,21 @@ func (s *Store) New(r *http.Request, name string) (*sessions.Session, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return session, nil
|
return session, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
session.ID = c.Value
|
session.ID = c.Value
|
||||||
|
|
||||||
err = s.load(r.Context(), session)
|
err = s.load(r.Context(), session)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
session.IsNew = false
|
session.IsNew = false
|
||||||
} else if !errors.Is(err, ErrNotFound) {
|
} else if !errors.Is(err, ErrNotFound) {
|
||||||
return nil, errors.WithStack(err)
|
return session, errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
return session, nil
|
return session, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Store) Save(r *http.Request, w http.ResponseWriter, session *sessions.Session) error {
|
func (s *Store) Save(r *http.Request, w http.ResponseWriter, session *sessions.Session) error {
|
||||||
if session.Options.MaxAge <= 0 {
|
if session.Options.MaxAge < 0 {
|
||||||
if err := s.delete(r.Context(), session); err != nil {
|
if err := s.delete(r.Context(), session); err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
@ -120,7 +123,12 @@ func (s *Store) save(ctx context.Context, session *sessions.Session) error {
|
|||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := s.adapter.Set(ctx, s.keyPrefix+session.ID, b, time.Duration(session.Options.MaxAge)*time.Second); err != nil {
|
ttl := time.Duration(session.Options.MaxAge) * time.Second
|
||||||
|
if s.ttl < ttl || ttl == 0 {
|
||||||
|
ttl = s.ttl
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := s.adapter.Set(ctx, s.keyPrefix+session.ID, b, ttl); err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@ func init() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func setupAuthnOIDCLayer(conf *config.Config) (director.Layer, error) {
|
func setupAuthnOIDCLayer(conf *config.Config) (director.Layer, error) {
|
||||||
rdb := newRedisClient(conf.Redis)
|
rdb := NewSharedClient(conf.Redis)
|
||||||
adapter := redis.NewStoreAdapter(rdb)
|
adapter := redis.NewStoreAdapter(rdb)
|
||||||
store := session.NewStore(adapter)
|
store := session.NewStore(adapter)
|
||||||
|
|
||||||
@ -37,5 +37,6 @@ func setupAuthnOIDCLayer(conf *config.Config) (director.Layer, error) {
|
|||||||
authn.WithTemplateDir(string(conf.Layers.Authn.TemplateDir)),
|
authn.WithTemplateDir(string(conf.Layers.Authn.TemplateDir)),
|
||||||
authn.WithDebug(bool(conf.Layers.Authn.Debug)),
|
authn.WithDebug(bool(conf.Layers.Authn.Debug)),
|
||||||
),
|
),
|
||||||
|
oidc.WithOIDCProviderCacheTimeout(time.Duration(*conf.Layers.Authn.OIDC.ProviderCacheTimeout)),
|
||||||
), nil
|
), nil
|
||||||
}
|
}
|
||||||
|
@ -27,7 +27,7 @@ func SetupIntegrations(ctx context.Context, conf *config.Config) ([]integration.
|
|||||||
}
|
}
|
||||||
|
|
||||||
func setupKubernetesIntegration(ctx context.Context, conf *config.Config) (*kubernetes.Integration, error) {
|
func setupKubernetesIntegration(ctx context.Context, conf *config.Config) (*kubernetes.Integration, error) {
|
||||||
client := newRedisClient(conf.Redis)
|
client := NewSharedClient(conf.Redis)
|
||||||
locker := redis.NewLocker(client, 10)
|
locker := redis.NewLocker(client, 10)
|
||||||
|
|
||||||
integration := kubernetes.NewIntegration(
|
integration := kubernetes.NewIntegration(
|
||||||
|
@ -9,7 +9,7 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func SetupLocker(ctx context.Context, conf *config.Config) (lock.Locker, error) {
|
func SetupLocker(ctx context.Context, conf *config.Config) (lock.Locker, error) {
|
||||||
client := newRedisClient(conf.Redis)
|
client := NewSharedClient(conf.Redis)
|
||||||
locker := redis.NewLocker(client, int(conf.Redis.LockMaxRetries))
|
locker := redis.NewLocker(client, int(conf.Redis.LockMaxRetries))
|
||||||
return locker, nil
|
return locker, nil
|
||||||
}
|
}
|
||||||
|
@ -3,23 +3,15 @@ package setup
|
|||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/config"
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
||||||
redisStore "forge.cadoles.com/cadoles/bouncer/internal/store/redis"
|
redisStore "forge.cadoles.com/cadoles/bouncer/internal/store/redis"
|
||||||
"github.com/redis/go-redis/v9"
|
"github.com/redis/go-redis/v9"
|
||||||
)
|
)
|
||||||
|
|
||||||
func NewRedisClient(ctx context.Context, conf config.RedisConfig) redis.UniversalClient {
|
|
||||||
return redis.NewUniversalClient(&redis.UniversalOptions{
|
|
||||||
Addrs: conf.Adresses,
|
|
||||||
MasterName: string(conf.Master),
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
func NewProxyRepository(ctx context.Context, client redis.UniversalClient) (store.ProxyRepository, error) {
|
func NewProxyRepository(ctx context.Context, client redis.UniversalClient) (store.ProxyRepository, error) {
|
||||||
return redisStore.NewProxyRepository(client), nil
|
return redisStore.NewProxyRepository(client, redisStore.DefaultTxMaxAttempts, redisStore.DefaultTxBaseDelay), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewLayerRepository(ctx context.Context, client redis.UniversalClient) (store.LayerRepository, error) {
|
func NewLayerRepository(ctx context.Context, client redis.UniversalClient) (store.LayerRepository, error) {
|
||||||
return redisStore.NewLayerRepository(client), nil
|
return redisStore.NewLayerRepository(client, redisStore.DefaultTxMaxAttempts, redisStore.DefaultTxBaseDelay), nil
|
||||||
}
|
}
|
||||||
|
@ -35,6 +35,6 @@ func setupQueueLayer(conf *config.Config) (director.Layer, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func newQueueAdapter(redisConf config.RedisConfig) (queue.Adapter, error) {
|
func newQueueAdapter(redisConf config.RedisConfig) (queue.Adapter, error) {
|
||||||
rdb := newRedisClient(redisConf)
|
rdb := NewSharedClient(redisConf)
|
||||||
return queueRedis.NewAdapter(rdb, 2), nil
|
return queueRedis.NewAdapter(rdb, 2), nil
|
||||||
}
|
}
|
||||||
|
@ -1,20 +1,78 @@
|
|||||||
package setup
|
package setup
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
|
"strings"
|
||||||
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/config"
|
"forge.cadoles.com/cadoles/bouncer/internal/config"
|
||||||
|
"github.com/pkg/errors"
|
||||||
"github.com/redis/go-redis/v9"
|
"github.com/redis/go-redis/v9"
|
||||||
|
"gitlab.com/wpetit/goweb/logger"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
var clients sync.Map
|
||||||
|
|
||||||
|
func NewSharedClient(conf config.RedisConfig) redis.UniversalClient {
|
||||||
|
key := strings.Join(conf.Adresses, "|") + "|" + string(conf.Master)
|
||||||
|
|
||||||
|
value, exists := clients.Load(key)
|
||||||
|
if exists {
|
||||||
|
if client, ok := (value).(redis.UniversalClient); ok {
|
||||||
|
return client
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
client := newRedisClient(conf)
|
||||||
|
|
||||||
|
clients.Store(key, client)
|
||||||
|
|
||||||
|
return client
|
||||||
|
}
|
||||||
|
|
||||||
func newRedisClient(conf config.RedisConfig) redis.UniversalClient {
|
func newRedisClient(conf config.RedisConfig) redis.UniversalClient {
|
||||||
return redis.NewUniversalClient(&redis.UniversalOptions{
|
client := redis.NewUniversalClient(&redis.UniversalOptions{
|
||||||
Addrs: conf.Adresses,
|
Addrs: conf.Adresses,
|
||||||
MasterName: string(conf.Master),
|
MasterName: string(conf.Master),
|
||||||
ReadTimeout: time.Duration(conf.ReadTimeout),
|
ReadTimeout: time.Duration(conf.ReadTimeout),
|
||||||
WriteTimeout: time.Duration(conf.WriteTimeout),
|
WriteTimeout: time.Duration(conf.WriteTimeout),
|
||||||
DialTimeout: time.Duration(conf.DialTimeout),
|
DialTimeout: time.Duration(conf.DialTimeout),
|
||||||
RouteByLatency: true,
|
RouteByLatency: bool(conf.RouteByLatency),
|
||||||
ContextTimeoutEnabled: true,
|
ContextTimeoutEnabled: bool(conf.ContextTimeoutEnabled),
|
||||||
|
MaxRetries: int(conf.MaxRetries),
|
||||||
|
PoolSize: int(conf.PoolSize),
|
||||||
|
PoolTimeout: time.Duration(conf.PoolTimeout),
|
||||||
|
MinIdleConns: int(conf.MinIdleConns),
|
||||||
|
MaxIdleConns: int(conf.MaxIdleConns),
|
||||||
|
ConnMaxIdleTime: time.Duration(conf.ConnMaxIdleTime),
|
||||||
|
ConnMaxLifetime: time.Duration(conf.ConnMaxLifetime),
|
||||||
})
|
})
|
||||||
|
|
||||||
|
go func() {
|
||||||
|
ctx := logger.With(context.Background(),
|
||||||
|
logger.F("adresses", conf.Adresses),
|
||||||
|
logger.F("master", conf.Master),
|
||||||
|
)
|
||||||
|
|
||||||
|
timer := time.NewTicker(time.Duration(conf.PingInterval))
|
||||||
|
defer timer.Stop()
|
||||||
|
|
||||||
|
connected := true
|
||||||
|
|
||||||
|
for range timer.C {
|
||||||
|
if _, err := client.Ping(ctx).Result(); err != nil {
|
||||||
|
logger.Error(ctx, "redis disconnected", logger.CapturedE(errors.WithStack(err)))
|
||||||
|
connected = false
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if !connected {
|
||||||
|
logger.Info(ctx, "redis reconnected")
|
||||||
|
connected = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
return client
|
||||||
}
|
}
|
||||||
|
@ -34,6 +34,10 @@ func SetupSentry(ctx context.Context, conf config.SentryConfig, release string)
|
|||||||
return nil, errors.WithStack(err)
|
return nil, errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
logger.SetCaptureFunc(func(err error) {
|
||||||
|
sentry.CaptureException(err)
|
||||||
|
})
|
||||||
|
|
||||||
flush := func() {
|
flush := func() {
|
||||||
sentry.Flush(time.Duration(*conf.FlushTimeout))
|
sentry.Flush(time.Duration(*conf.FlushTimeout))
|
||||||
}
|
}
|
||||||
|
@ -11,9 +11,10 @@ type (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type LayerHeader struct {
|
type LayerHeader struct {
|
||||||
Proxy ProxyName `json:"proxy"`
|
Proxy ProxyName `json:"proxy"`
|
||||||
Name LayerName `json:"name"`
|
Name LayerName `json:"name"`
|
||||||
Type LayerType `json:"type"`
|
Revision int `json:"revision"`
|
||||||
|
Type LayerType `json:"type"`
|
||||||
|
|
||||||
Weight int `json:"weight"`
|
Weight int `json:"weight"`
|
||||||
Enabled bool `json:"enabled"`
|
Enabled bool `json:"enabled"`
|
||||||
|
@ -7,10 +7,10 @@ import (
|
|||||||
type ProxyName Name
|
type ProxyName Name
|
||||||
|
|
||||||
type ProxyHeader struct {
|
type ProxyHeader struct {
|
||||||
Name ProxyName `json:"name"`
|
Name ProxyName `json:"name"`
|
||||||
|
Revision int `json:"revision"`
|
||||||
Weight int `json:"weight"`
|
Weight int `json:"weight"`
|
||||||
Enabled bool `json:"enabled"`
|
Enabled bool `json:"enabled"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type Proxy struct {
|
type Proxy struct {
|
||||||
|
@ -3,10 +3,18 @@ package redis
|
|||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
|
"math/rand"
|
||||||
"strings"
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
"github.com/redis/go-redis/v9"
|
"github.com/redis/go-redis/v9"
|
||||||
|
"gitlab.com/wpetit/goweb/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
DefaultTxMaxAttempts = 20
|
||||||
|
DefaultTxBaseDelay = 100 * time.Millisecond
|
||||||
)
|
)
|
||||||
|
|
||||||
type jsonWrapper[T any] struct {
|
type jsonWrapper[T any] struct {
|
||||||
@ -65,6 +73,35 @@ func key(parts ...string) string {
|
|||||||
return strings.Join(parts, ":")
|
return strings.Join(parts, ":")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func WithRetry(ctx context.Context, client redis.UniversalClient, key string, fn func(ctx context.Context, tx *redis.Tx) error, maxAttempts int, baseDelay time.Duration) error {
|
||||||
|
var err error
|
||||||
|
|
||||||
|
delay := baseDelay
|
||||||
|
|
||||||
|
for attempt := 0; attempt < maxAttempts; attempt++ {
|
||||||
|
if err = WithTx(ctx, client, key, fn); err != nil {
|
||||||
|
err = errors.WithStack(err)
|
||||||
|
logger.Debug(ctx, "redis transaction failed", logger.CapturedE(err))
|
||||||
|
|
||||||
|
if errors.Is(err, redis.TxFailedErr) {
|
||||||
|
logger.Debug(ctx, "retrying redis transaction", logger.F("attempts", attempt), logger.F("delay", delay))
|
||||||
|
time.Sleep(delay)
|
||||||
|
delay = delay*2 + time.Duration(rand.Int63n(int64(baseDelay)))
|
||||||
|
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
return errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
logger.Error(ctx, "redis error", logger.CapturedE(errors.WithStack(err)))
|
||||||
|
|
||||||
|
return errors.WithStack(redis.TxFailedErr)
|
||||||
|
}
|
||||||
|
|
||||||
func WithTx(ctx context.Context, client redis.UniversalClient, key string, fn func(ctx context.Context, tx *redis.Tx) error) error {
|
func WithTx(ctx context.Context, client redis.UniversalClient, key string, fn func(ctx context.Context, tx *redis.Tx) error) error {
|
||||||
txf := func(tx *redis.Tx) error {
|
txf := func(tx *redis.Tx) error {
|
||||||
if err := fn(ctx, tx); err != nil {
|
if err := fn(ctx, tx); err != nil {
|
||||||
|
@ -8,9 +8,10 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type layerHeaderItem struct {
|
type layerHeaderItem struct {
|
||||||
Proxy string `redis:"proxy"`
|
Proxy string `redis:"proxy"`
|
||||||
Name string `redis:"name"`
|
Name string `redis:"name"`
|
||||||
Type string `redis:"type"`
|
Revision int `redis:"revision"`
|
||||||
|
Type string `redis:"type"`
|
||||||
|
|
||||||
Weight int `redis:"weight"`
|
Weight int `redis:"weight"`
|
||||||
Enabled bool `redis:"enabled"`
|
Enabled bool `redis:"enabled"`
|
||||||
@ -18,11 +19,12 @@ type layerHeaderItem struct {
|
|||||||
|
|
||||||
func (i *layerHeaderItem) ToLayerHeader() (*store.LayerHeader, error) {
|
func (i *layerHeaderItem) ToLayerHeader() (*store.LayerHeader, error) {
|
||||||
layerHeader := &store.LayerHeader{
|
layerHeader := &store.LayerHeader{
|
||||||
Proxy: store.ProxyName(i.Proxy),
|
Proxy: store.ProxyName(i.Proxy),
|
||||||
Name: store.LayerName(i.Name),
|
Name: store.LayerName(i.Name),
|
||||||
Type: store.LayerType(i.Type),
|
Revision: i.Revision,
|
||||||
Weight: i.Weight,
|
Type: store.LayerType(i.Type),
|
||||||
Enabled: i.Enabled,
|
Weight: i.Weight,
|
||||||
|
Enabled: i.Enabled,
|
||||||
}
|
}
|
||||||
|
|
||||||
return layerHeader, nil
|
return layerHeader, nil
|
||||||
|
@ -14,7 +14,9 @@ const (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type LayerRepository struct {
|
type LayerRepository struct {
|
||||||
client redis.UniversalClient
|
client redis.UniversalClient
|
||||||
|
txMaxAttempts int
|
||||||
|
txRetryBaseDelay time.Duration
|
||||||
}
|
}
|
||||||
|
|
||||||
// CreateLayer implements store.LayerRepository
|
// CreateLayer implements store.LayerRepository
|
||||||
@ -24,16 +26,17 @@ func (r *LayerRepository) CreateLayer(ctx context.Context, proxyName store.Proxy
|
|||||||
|
|
||||||
layerItem := &layerItem{
|
layerItem := &layerItem{
|
||||||
layerHeaderItem: layerHeaderItem{
|
layerHeaderItem: layerHeaderItem{
|
||||||
Proxy: string(proxyName),
|
Proxy: string(proxyName),
|
||||||
Name: string(layerName),
|
Name: string(layerName),
|
||||||
Type: string(layerType),
|
Type: string(layerType),
|
||||||
Weight: 0,
|
Weight: 0,
|
||||||
Enabled: false,
|
Revision: 0,
|
||||||
|
Enabled: false,
|
||||||
},
|
},
|
||||||
|
|
||||||
CreatedAt: wrap(now),
|
CreatedAt: wrap(now),
|
||||||
UpdatedAt: wrap(now),
|
UpdatedAt: wrap(now),
|
||||||
Options: wrap(store.LayerOptions{}),
|
Options: wrap(options),
|
||||||
}
|
}
|
||||||
|
|
||||||
txf := func(tx *redis.Tx) error {
|
txf := func(tx *redis.Tx) error {
|
||||||
@ -57,6 +60,11 @@ func (r *LayerRepository) CreateLayer(ctx context.Context, proxyName store.Proxy
|
|||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
layerItem, err = r.txGetLayerItem(ctx, tx, proxyName, layerName)
|
||||||
|
if err != nil {
|
||||||
|
return errors.WithStack(err)
|
||||||
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -67,16 +75,16 @@ func (r *LayerRepository) CreateLayer(ctx context.Context, proxyName store.Proxy
|
|||||||
|
|
||||||
return &store.Layer{
|
return &store.Layer{
|
||||||
LayerHeader: store.LayerHeader{
|
LayerHeader: store.LayerHeader{
|
||||||
Name: layerName,
|
Name: store.LayerName(layerItem.Name),
|
||||||
Proxy: proxyName,
|
Proxy: store.ProxyName(layerItem.Proxy),
|
||||||
Type: layerType,
|
Type: store.LayerType(layerItem.Type),
|
||||||
Weight: 0,
|
Weight: layerItem.Weight,
|
||||||
Enabled: false,
|
Enabled: layerItem.Enabled,
|
||||||
},
|
},
|
||||||
|
|
||||||
CreatedAt: now,
|
CreatedAt: layerItem.CreatedAt.Value(),
|
||||||
UpdatedAt: now,
|
UpdatedAt: layerItem.UpdatedAt.Value(),
|
||||||
Options: store.LayerOptions{},
|
Options: layerItem.Options.Value(),
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -96,7 +104,7 @@ func (r *LayerRepository) GetLayer(ctx context.Context, proxyName store.ProxyNam
|
|||||||
key := layerKey(proxyName, layerName)
|
key := layerKey(proxyName, layerName)
|
||||||
var layerItem *layerItem
|
var layerItem *layerItem
|
||||||
|
|
||||||
err := WithTx(ctx, r.client, key, func(ctx context.Context, tx *redis.Tx) error {
|
err := WithRetry(ctx, r.client, key, func(ctx context.Context, tx *redis.Tx) error {
|
||||||
pItem, err := r.txGetLayerItem(ctx, tx, proxyName, layerName)
|
pItem, err := r.txGetLayerItem(ctx, tx, proxyName, layerName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
@ -105,7 +113,7 @@ func (r *LayerRepository) GetLayer(ctx context.Context, proxyName store.ProxyNam
|
|||||||
layerItem = pItem
|
layerItem = pItem
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
})
|
}, r.txMaxAttempts, r.txRetryBaseDelay)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errors.WithStack(err)
|
return nil, errors.WithStack(err)
|
||||||
}
|
}
|
||||||
@ -197,7 +205,7 @@ func (r *LayerRepository) UpdateLayer(ctx context.Context, proxyName store.Proxy
|
|||||||
key := layerKey(proxyName, layerName)
|
key := layerKey(proxyName, layerName)
|
||||||
var layerItem layerItem
|
var layerItem layerItem
|
||||||
|
|
||||||
err := WithTx(ctx, r.client, key, func(ctx context.Context, tx *redis.Tx) error {
|
err := WithRetry(ctx, r.client, key, func(ctx context.Context, tx *redis.Tx) error {
|
||||||
item, err := r.txGetLayerItem(ctx, tx, proxyName, layerName)
|
item, err := r.txGetLayerItem(ctx, tx, proxyName, layerName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
@ -216,6 +224,7 @@ func (r *LayerRepository) UpdateLayer(ctx context.Context, proxyName store.Proxy
|
|||||||
}
|
}
|
||||||
|
|
||||||
item.UpdatedAt = wrap(time.Now().UTC())
|
item.UpdatedAt = wrap(time.Now().UTC())
|
||||||
|
item.Revision = item.Revision + 1
|
||||||
|
|
||||||
_, err = tx.TxPipelined(ctx, func(p redis.Pipeliner) error {
|
_, err = tx.TxPipelined(ctx, func(p redis.Pipeliner) error {
|
||||||
p.HMSet(ctx, key, item.layerHeaderItem)
|
p.HMSet(ctx, key, item.layerHeaderItem)
|
||||||
@ -230,7 +239,7 @@ func (r *LayerRepository) UpdateLayer(ctx context.Context, proxyName store.Proxy
|
|||||||
layerItem = *item
|
layerItem = *item
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
})
|
}, r.txMaxAttempts, r.txRetryBaseDelay)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errors.WithStack(err)
|
return nil, errors.WithStack(err)
|
||||||
}
|
}
|
||||||
@ -243,9 +252,11 @@ func (r *LayerRepository) UpdateLayer(ctx context.Context, proxyName store.Proxy
|
|||||||
return layer, nil
|
return layer, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewLayerRepository(client redis.UniversalClient) *LayerRepository {
|
func NewLayerRepository(client redis.UniversalClient, txMaxAttempts int, txRetryBaseDelay time.Duration) *LayerRepository {
|
||||||
return &LayerRepository{
|
return &LayerRepository{
|
||||||
client: client,
|
client: client,
|
||||||
|
txMaxAttempts: txMaxAttempts,
|
||||||
|
txRetryBaseDelay: txRetryBaseDelay,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -7,6 +7,6 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func TestLayerRepository(t *testing.T) {
|
func TestLayerRepository(t *testing.T) {
|
||||||
repository := NewLayerRepository(client)
|
repository := NewLayerRepository(client, DefaultTxMaxAttempts, DefaultTxBaseDelay)
|
||||||
testsuite.TestLayerRepository(t, repository)
|
testsuite.TestLayerRepository(t, repository)
|
||||||
}
|
}
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user