2020-04-13 11:59:05 +02:00
|
|
|
package promauth
|
|
|
|
|
|
|
|
import (
|
2021-05-22 15:20:18 +02:00
|
|
|
"context"
|
2020-04-13 11:59:05 +02:00
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
|
|
|
"encoding/base64"
|
|
|
|
"fmt"
|
2022-04-22 22:50:51 +02:00
|
|
|
"net/http"
|
2021-05-22 16:59:23 +02:00
|
|
|
"net/url"
|
2022-04-22 23:16:34 +02:00
|
|
|
"strings"
|
2021-05-14 19:00:05 +02:00
|
|
|
"sync"
|
|
|
|
|
2022-06-21 19:23:30 +02:00
|
|
|
"github.com/cespare/xxhash/v2"
|
2021-05-22 15:20:18 +02:00
|
|
|
"golang.org/x/oauth2"
|
|
|
|
"golang.org/x/oauth2/clientcredentials"
|
2024-04-03 10:01:43 +02:00
|
|
|
|
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/fasttime"
|
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/fs/fscore"
|
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/netutil"
|
2020-04-13 11:59:05 +02:00
|
|
|
)
|
|
|
|
|
2021-11-05 13:41:14 +01:00
|
|
|
// Secret represents a string secret such as password or auth token.
|
|
|
|
//
|
|
|
|
// It is marshaled to "<secret>" string in yaml.
|
|
|
|
//
|
|
|
|
// This is needed for hiding secret strings in /config page output.
|
|
|
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1764
|
|
|
|
type Secret struct {
|
2022-05-06 23:02:54 +02:00
|
|
|
S string
|
2021-11-05 13:41:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewSecret returns new secret for s.
|
|
|
|
func NewSecret(s string) *Secret {
|
|
|
|
if s == "" {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return &Secret{
|
2022-05-06 23:02:54 +02:00
|
|
|
S: s,
|
2021-11-05 13:41:14 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// MarshalYAML implements yaml.Marshaler interface.
|
|
|
|
//
|
|
|
|
// It substitutes the secret with "<secret>" string.
|
2024-07-10 00:14:15 +02:00
|
|
|
func (s *Secret) MarshalYAML() (any, error) {
|
2021-11-05 13:41:14 +01:00
|
|
|
return "<secret>", nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnmarshalYAML implements yaml.Unmarshaler interface.
|
2024-07-10 00:14:15 +02:00
|
|
|
func (s *Secret) UnmarshalYAML(f func(any) error) error {
|
2021-11-05 13:41:14 +01:00
|
|
|
var secret string
|
|
|
|
if err := f(&secret); err != nil {
|
|
|
|
return fmt.Errorf("cannot parse secret: %w", err)
|
|
|
|
}
|
2022-05-06 23:02:54 +02:00
|
|
|
s.S = secret
|
2021-11-05 13:41:14 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// String returns the secret in plaintext.
|
|
|
|
func (s *Secret) String() string {
|
|
|
|
if s == nil {
|
|
|
|
return ""
|
|
|
|
}
|
2022-05-06 23:02:54 +02:00
|
|
|
return s.S
|
2021-11-05 13:41:14 +01:00
|
|
|
}
|
|
|
|
|
2020-04-13 11:59:05 +02:00
|
|
|
// TLSConfig represents TLS config.
|
|
|
|
//
|
|
|
|
// See https://prometheus.io/docs/prometheus/latest/configuration/configuration/#tls_config
|
|
|
|
type TLSConfig struct {
|
2023-10-25 23:12:19 +02:00
|
|
|
CA string `yaml:"ca,omitempty"`
|
2020-11-13 15:17:03 +01:00
|
|
|
CAFile string `yaml:"ca_file,omitempty"`
|
2023-10-25 23:12:19 +02:00
|
|
|
Cert string `yaml:"cert,omitempty"`
|
2020-11-13 15:17:03 +01:00
|
|
|
CertFile string `yaml:"cert_file,omitempty"`
|
2023-10-25 23:12:19 +02:00
|
|
|
Key string `yaml:"key,omitempty"`
|
2020-11-13 15:17:03 +01:00
|
|
|
KeyFile string `yaml:"key_file,omitempty"`
|
|
|
|
ServerName string `yaml:"server_name,omitempty"`
|
|
|
|
InsecureSkipVerify bool `yaml:"insecure_skip_verify,omitempty"`
|
2022-04-22 23:16:34 +02:00
|
|
|
MinVersion string `yaml:"min_version,omitempty"`
|
2022-09-26 16:35:45 +02:00
|
|
|
// Do not define MaxVersion field (max_version), since this has no sense from security PoV.
|
|
|
|
// This can only result in lower security level if improperly set.
|
2020-04-13 11:59:05 +02:00
|
|
|
}
|
|
|
|
|
2021-04-02 20:17:43 +02:00
|
|
|
// Authorization represents generic authorization config.
|
|
|
|
//
|
|
|
|
// See https://prometheus.io/docs/prometheus/latest/configuration/configuration/
|
|
|
|
type Authorization struct {
|
2021-11-05 13:41:14 +01:00
|
|
|
Type string `yaml:"type,omitempty"`
|
|
|
|
Credentials *Secret `yaml:"credentials,omitempty"`
|
|
|
|
CredentialsFile string `yaml:"credentials_file,omitempty"`
|
2021-04-02 20:17:43 +02:00
|
|
|
}
|
|
|
|
|
2020-04-13 11:59:05 +02:00
|
|
|
// BasicAuthConfig represents basic auth config.
|
|
|
|
type BasicAuthConfig struct {
|
2024-01-31 18:45:13 +01:00
|
|
|
Username string `yaml:"username,omitempty"`
|
|
|
|
UsernameFile string `yaml:"username_file,omitempty"`
|
2021-11-05 13:41:14 +01:00
|
|
|
Password *Secret `yaml:"password,omitempty"`
|
|
|
|
PasswordFile string `yaml:"password_file,omitempty"`
|
2020-04-13 11:59:05 +02:00
|
|
|
}
|
|
|
|
|
2021-04-02 20:17:43 +02:00
|
|
|
// HTTPClientConfig represents http client config.
|
|
|
|
type HTTPClientConfig struct {
|
|
|
|
Authorization *Authorization `yaml:"authorization,omitempty"`
|
|
|
|
BasicAuth *BasicAuthConfig `yaml:"basic_auth,omitempty"`
|
2021-11-05 13:41:14 +01:00
|
|
|
BearerToken *Secret `yaml:"bearer_token,omitempty"`
|
2021-04-02 20:17:43 +02:00
|
|
|
BearerTokenFile string `yaml:"bearer_token_file,omitempty"`
|
2021-05-22 15:20:18 +02:00
|
|
|
OAuth2 *OAuth2Config `yaml:"oauth2,omitempty"`
|
2021-04-02 20:17:43 +02:00
|
|
|
TLSConfig *TLSConfig `yaml:"tls_config,omitempty"`
|
2022-06-22 19:38:43 +02:00
|
|
|
|
|
|
|
// Headers contains optional HTTP headers, which must be sent in the request to the server
|
|
|
|
Headers []string `yaml:"headers,omitempty"`
|
2023-05-26 09:39:45 +02:00
|
|
|
|
|
|
|
// FollowRedirects specifies whether the client should follow HTTP 3xx redirects.
|
|
|
|
FollowRedirects *bool `yaml:"follow_redirects,omitempty"`
|
2023-06-05 15:56:49 +02:00
|
|
|
|
2023-07-07 00:59:56 +02:00
|
|
|
// Do not support enable_http2 option because of the following reasons:
|
|
|
|
//
|
|
|
|
// - http2 is used very rarely comparing to http for Prometheus metrics exposition and service discovery
|
|
|
|
// - http2 is much harder to debug than http
|
|
|
|
// - http2 has very bad security record because of its complexity - see https://portswigger.net/research/http2
|
|
|
|
//
|
|
|
|
// EnableHTTP2 bool
|
2021-04-02 20:17:43 +02:00
|
|
|
}
|
|
|
|
|
2021-04-03 23:40:08 +02:00
|
|
|
// ProxyClientConfig represents proxy client config.
|
|
|
|
type ProxyClientConfig struct {
|
|
|
|
Authorization *Authorization `yaml:"proxy_authorization,omitempty"`
|
|
|
|
BasicAuth *BasicAuthConfig `yaml:"proxy_basic_auth,omitempty"`
|
2021-11-05 13:41:14 +01:00
|
|
|
BearerToken *Secret `yaml:"proxy_bearer_token,omitempty"`
|
2021-04-03 23:40:08 +02:00
|
|
|
BearerTokenFile string `yaml:"proxy_bearer_token_file,omitempty"`
|
2022-06-22 19:38:43 +02:00
|
|
|
OAuth2 *OAuth2Config `yaml:"proxy_oauth2,omitempty"`
|
2021-04-03 23:40:08 +02:00
|
|
|
TLSConfig *TLSConfig `yaml:"proxy_tls_config,omitempty"`
|
2022-06-22 19:38:43 +02:00
|
|
|
|
|
|
|
// Headers contains optional HTTP headers, which must be sent in the request to the proxy
|
|
|
|
Headers []string `yaml:"proxy_headers,omitempty"`
|
2021-04-03 23:40:08 +02:00
|
|
|
}
|
|
|
|
|
2021-05-22 15:20:18 +02:00
|
|
|
// OAuth2Config represent OAuth2 configuration
|
|
|
|
type OAuth2Config struct {
|
2021-05-22 16:59:23 +02:00
|
|
|
ClientID string `yaml:"client_id"`
|
2021-11-05 13:41:14 +01:00
|
|
|
ClientSecret *Secret `yaml:"client_secret,omitempty"`
|
2021-11-05 11:53:12 +01:00
|
|
|
ClientSecretFile string `yaml:"client_secret_file,omitempty"`
|
|
|
|
Scopes []string `yaml:"scopes,omitempty"`
|
2021-05-22 16:59:23 +02:00
|
|
|
TokenURL string `yaml:"token_url"`
|
2021-11-05 11:53:12 +01:00
|
|
|
EndpointParams map[string]string `yaml:"endpoint_params,omitempty"`
|
2022-04-22 22:50:51 +02:00
|
|
|
TLSConfig *TLSConfig `yaml:"tls_config,omitempty"`
|
2022-04-22 23:00:44 +02:00
|
|
|
ProxyURL string `yaml:"proxy_url,omitempty"`
|
2021-05-22 15:20:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (o *OAuth2Config) validate() error {
|
2021-05-22 16:59:23 +02:00
|
|
|
if o.ClientID == "" {
|
|
|
|
return fmt.Errorf("client_id cannot be empty")
|
2021-05-22 15:20:18 +02:00
|
|
|
}
|
2021-11-05 13:41:14 +01:00
|
|
|
if o.ClientSecret == nil && o.ClientSecretFile == "" {
|
2021-05-22 15:20:18 +02:00
|
|
|
return fmt.Errorf("ClientSecret or ClientSecretFile must be set")
|
|
|
|
}
|
2021-11-05 13:41:14 +01:00
|
|
|
if o.ClientSecret != nil && o.ClientSecretFile != "" {
|
2021-05-22 16:59:23 +02:00
|
|
|
return fmt.Errorf("ClientSecret and ClientSecretFile cannot be set simultaneously")
|
|
|
|
}
|
|
|
|
if o.TokenURL == "" {
|
|
|
|
return fmt.Errorf("token_url cannot be empty")
|
2021-05-22 15:20:18 +02:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-05-22 16:59:23 +02:00
|
|
|
type oauth2ConfigInternal struct {
|
|
|
|
mu sync.Mutex
|
|
|
|
cfg *clientcredentials.Config
|
|
|
|
clientSecretFile string
|
2023-10-25 23:19:33 +02:00
|
|
|
|
|
|
|
// ac contains auth config needed for initializing tls config
|
|
|
|
ac *Config
|
|
|
|
|
|
|
|
proxyURL string
|
|
|
|
proxyURLFunc func(*http.Request) (*url.URL, error)
|
|
|
|
|
|
|
|
ctx context.Context
|
|
|
|
tokenSource oauth2.TokenSource
|
|
|
|
}
|
|
|
|
|
|
|
|
func (oi *oauth2ConfigInternal) String() string {
|
|
|
|
return fmt.Sprintf("clientID=%q, clientSecret=%q, clientSecretFile=%q, scopes=%q, endpointParams=%q, tokenURL=%q, proxyURL=%q, tlsConfig={%s}",
|
|
|
|
oi.cfg.ClientID, oi.cfg.ClientSecret, oi.clientSecretFile, oi.cfg.Scopes, oi.cfg.EndpointParams, oi.cfg.TokenURL, oi.proxyURL, oi.ac.String())
|
2021-05-22 16:59:23 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func newOAuth2ConfigInternal(baseDir string, o *OAuth2Config) (*oauth2ConfigInternal, error) {
|
2023-10-25 23:19:33 +02:00
|
|
|
if err := o.validate(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-05-22 16:59:23 +02:00
|
|
|
oi := &oauth2ConfigInternal{
|
|
|
|
cfg: &clientcredentials.Config{
|
|
|
|
ClientID: o.ClientID,
|
2021-11-05 13:41:14 +01:00
|
|
|
ClientSecret: o.ClientSecret.String(),
|
2021-05-22 16:59:23 +02:00
|
|
|
TokenURL: o.TokenURL,
|
|
|
|
Scopes: o.Scopes,
|
|
|
|
EndpointParams: urlValuesFromMap(o.EndpointParams),
|
|
|
|
},
|
|
|
|
}
|
2021-05-22 15:20:18 +02:00
|
|
|
if o.ClientSecretFile != "" {
|
2024-01-21 20:58:26 +01:00
|
|
|
oi.clientSecretFile = fscore.GetFilepath(baseDir, o.ClientSecretFile)
|
2023-10-25 23:19:33 +02:00
|
|
|
// There is no need in reading oi.clientSecretFile now, since it may be missing right now.
|
|
|
|
// It is read later before performing oauth2 request to server.
|
2021-05-22 16:59:23 +02:00
|
|
|
}
|
2022-07-04 13:27:48 +02:00
|
|
|
opts := &Options{
|
|
|
|
BaseDir: baseDir,
|
|
|
|
TLSConfig: o.TLSConfig,
|
|
|
|
}
|
|
|
|
ac, err := opts.NewConfig()
|
2022-04-22 22:50:51 +02:00
|
|
|
if err != nil {
|
2023-10-25 23:19:33 +02:00
|
|
|
return nil, fmt.Errorf("cannot parse TLS config for OAuth2: %w", err)
|
2022-04-22 22:50:51 +02:00
|
|
|
}
|
2023-10-25 23:19:33 +02:00
|
|
|
oi.ac = ac
|
2022-04-22 23:00:44 +02:00
|
|
|
if o.ProxyURL != "" {
|
|
|
|
u, err := url.Parse(o.ProxyURL)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot parse proxy_url=%q: %w", o.ProxyURL, err)
|
|
|
|
}
|
2023-10-25 23:19:33 +02:00
|
|
|
oi.proxyURL = o.ProxyURL
|
|
|
|
oi.proxyURLFunc = http.ProxyURL(u)
|
2022-04-22 22:50:51 +02:00
|
|
|
}
|
2021-05-22 16:59:23 +02:00
|
|
|
return oi, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func urlValuesFromMap(m map[string]string) url.Values {
|
|
|
|
result := make(url.Values, len(m))
|
|
|
|
for k, v := range m {
|
|
|
|
result[k] = []string{v}
|
2021-05-22 15:20:18 +02:00
|
|
|
}
|
2021-05-22 16:59:23 +02:00
|
|
|
return result
|
|
|
|
}
|
|
|
|
|
2023-10-25 23:19:33 +02:00
|
|
|
func (oi *oauth2ConfigInternal) initTokenSource() error {
|
|
|
|
c := &http.Client{
|
2024-04-03 23:46:40 +02:00
|
|
|
Transport: oi.ac.NewRoundTripper(&http.Transport{
|
|
|
|
Proxy: oi.proxyURLFunc,
|
|
|
|
}),
|
2023-10-25 23:19:33 +02:00
|
|
|
}
|
|
|
|
oi.ctx = context.WithValue(context.Background(), oauth2.HTTPClient, c)
|
|
|
|
oi.tokenSource = oi.cfg.TokenSource(oi.ctx)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-05-22 16:59:23 +02:00
|
|
|
func (oi *oauth2ConfigInternal) getTokenSource() (oauth2.TokenSource, error) {
|
|
|
|
oi.mu.Lock()
|
|
|
|
defer oi.mu.Unlock()
|
|
|
|
|
2023-10-25 23:19:33 +02:00
|
|
|
if oi.tokenSource == nil {
|
|
|
|
if err := oi.initTokenSource(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-22 16:59:23 +02:00
|
|
|
if oi.clientSecretFile == "" {
|
|
|
|
return oi.tokenSource, nil
|
2021-05-22 15:20:18 +02:00
|
|
|
}
|
2024-01-21 20:58:26 +01:00
|
|
|
newSecret, err := fscore.ReadPasswordFromFileOrHTTP(oi.clientSecretFile)
|
2021-05-22 15:20:18 +02:00
|
|
|
if err != nil {
|
2021-05-22 16:59:23 +02:00
|
|
|
return nil, fmt.Errorf("cannot read OAuth2 secret from %q: %w", oi.clientSecretFile, err)
|
2021-05-22 15:20:18 +02:00
|
|
|
}
|
2021-05-22 16:59:23 +02:00
|
|
|
if newSecret == oi.cfg.ClientSecret {
|
|
|
|
return oi.tokenSource, nil
|
|
|
|
}
|
|
|
|
oi.cfg.ClientSecret = newSecret
|
2022-04-22 22:50:51 +02:00
|
|
|
oi.tokenSource = oi.cfg.TokenSource(oi.ctx)
|
2021-05-22 16:59:23 +02:00
|
|
|
return oi.tokenSource, nil
|
2021-05-22 15:20:18 +02:00
|
|
|
}
|
|
|
|
|
2020-04-13 11:59:05 +02:00
|
|
|
// Config is auth config.
|
|
|
|
type Config struct {
|
2023-10-25 23:19:33 +02:00
|
|
|
tlsServerName string
|
|
|
|
tlsInsecureSkipVerify bool
|
|
|
|
tlsMinVersion uint16
|
2021-05-14 19:00:05 +02:00
|
|
|
|
2024-04-03 23:46:40 +02:00
|
|
|
getTLSConfigCached getTLSConfigFunc
|
|
|
|
|
|
|
|
getTLSRootCA getTLSRootCAFunc
|
|
|
|
tlsRootCADigest string
|
2021-07-01 14:27:44 +02:00
|
|
|
|
2023-10-25 23:19:33 +02:00
|
|
|
getTLSCertCached getTLSCertFunc
|
|
|
|
tlsCertDigest string
|
2021-05-14 19:00:05 +02:00
|
|
|
|
2023-10-25 23:19:33 +02:00
|
|
|
getAuthHeaderCached getAuthHeaderFunc
|
|
|
|
authHeaderDigest string
|
2022-06-22 19:38:43 +02:00
|
|
|
|
2023-10-25 23:19:33 +02:00
|
|
|
headers []keyValue
|
|
|
|
headersDigest string
|
2021-05-14 19:00:05 +02:00
|
|
|
}
|
|
|
|
|
2022-06-22 19:38:43 +02:00
|
|
|
type keyValue struct {
|
|
|
|
key string
|
|
|
|
value string
|
|
|
|
}
|
|
|
|
|
|
|
|
func parseHeaders(headers []string) ([]keyValue, error) {
|
|
|
|
if len(headers) == 0 {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
kvs := make([]keyValue, len(headers))
|
|
|
|
for i, h := range headers {
|
|
|
|
n := strings.IndexByte(h, ':')
|
|
|
|
if n < 0 {
|
|
|
|
return nil, fmt.Errorf(`missing ':' in header %q; expecting "key: value" format`, h)
|
|
|
|
}
|
|
|
|
kv := &kvs[i]
|
2024-03-17 19:19:23 +01:00
|
|
|
kv.key = http.CanonicalHeaderKey(strings.TrimSpace(h[:n]))
|
2022-06-22 19:38:43 +02:00
|
|
|
kv.value = strings.TrimSpace(h[n+1:])
|
|
|
|
}
|
|
|
|
return kvs, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// HeadersNoAuthString returns string representation of ac headers
|
|
|
|
func (ac *Config) HeadersNoAuthString() string {
|
|
|
|
if len(ac.headers) == 0 {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
a := make([]string, len(ac.headers))
|
|
|
|
for i, h := range ac.headers {
|
|
|
|
a[i] = h.key + ": " + h.value + "\r\n"
|
|
|
|
}
|
|
|
|
return strings.Join(a, "")
|
|
|
|
}
|
|
|
|
|
2022-07-21 15:59:55 +02:00
|
|
|
// SetHeaders sets the configured ac headers to req.
|
2023-10-17 11:58:19 +02:00
|
|
|
func (ac *Config) SetHeaders(req *http.Request, setAuthHeader bool) error {
|
2024-03-07 00:21:59 +01:00
|
|
|
if ac.tlsServerName != "" {
|
|
|
|
// It tlsServerName is set, then it is likely the request is performed via IP address instead of hostname.
|
|
|
|
// In this case users expect that the specified tlsServerName is used as a Host header in the request to https server.
|
|
|
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/pull/5802
|
|
|
|
req.Host = ac.tlsServerName
|
|
|
|
}
|
2022-06-22 19:38:43 +02:00
|
|
|
reqHeaders := req.Header
|
|
|
|
for _, h := range ac.headers {
|
2024-03-17 19:19:23 +01:00
|
|
|
if h.key == "Host" {
|
|
|
|
// Host header must be set via req.Host - see https://github.com/VictoriaMetrics/VictoriaMetrics/issues/5969
|
|
|
|
req.Host = h.value
|
|
|
|
} else {
|
|
|
|
reqHeaders.Set(h.key, h.value)
|
|
|
|
}
|
2022-06-22 19:38:43 +02:00
|
|
|
}
|
|
|
|
if setAuthHeader {
|
2023-10-17 11:58:19 +02:00
|
|
|
ah, err := ac.GetAuthHeader()
|
|
|
|
if err != nil {
|
2023-10-25 23:19:33 +02:00
|
|
|
return fmt.Errorf("failed to obtain Authorization request header: %w", err)
|
2023-10-17 11:58:19 +02:00
|
|
|
}
|
|
|
|
if ah != "" {
|
2022-06-22 19:38:43 +02:00
|
|
|
reqHeaders.Set("Authorization", ah)
|
|
|
|
}
|
|
|
|
}
|
2023-10-17 11:58:19 +02:00
|
|
|
return nil
|
2022-06-22 19:38:43 +02:00
|
|
|
}
|
|
|
|
|
2021-05-14 19:00:05 +02:00
|
|
|
// GetAuthHeader returns optional `Authorization: ...` http header.
|
2023-10-17 11:58:19 +02:00
|
|
|
func (ac *Config) GetAuthHeader() (string, error) {
|
2023-10-25 23:19:33 +02:00
|
|
|
if f := ac.getAuthHeaderCached; f != nil {
|
|
|
|
return f()
|
2021-05-14 19:00:05 +02:00
|
|
|
}
|
2023-10-25 23:19:33 +02:00
|
|
|
return "", nil
|
2020-04-13 11:59:05 +02:00
|
|
|
}
|
|
|
|
|
2024-08-19 22:31:18 +02:00
|
|
|
// GetHTTPHeadersNoAuth returns http formatted headers without Authorization header
|
|
|
|
func (ac *Config) GetHTTPHeadersNoAuth() http.Header {
|
|
|
|
if len(ac.headers) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
dst := make(http.Header, len(ac.headers))
|
|
|
|
for _, kv := range ac.headers {
|
|
|
|
dst.Add(kv.key, kv.value)
|
|
|
|
}
|
|
|
|
return dst
|
|
|
|
}
|
|
|
|
|
2021-05-14 19:00:05 +02:00
|
|
|
// String returns human-readable representation for ac.
|
2022-06-04 00:01:13 +02:00
|
|
|
//
|
|
|
|
// It is also used for comparing Config objects for equality. If two Config
|
|
|
|
// objects have the same string representation, then they are considered equal.
|
2020-05-03 11:41:13 +02:00
|
|
|
func (ac *Config) String() string {
|
2023-10-25 23:19:33 +02:00
|
|
|
return fmt.Sprintf("AuthHeader=%s, Headers=%s, TLSRootCA=%s, TLSCert=%s, TLSServerName=%s, TLSInsecureSkipVerify=%v, TLSMinVersion=%d",
|
|
|
|
ac.authHeaderDigest, ac.headersDigest, ac.tlsRootCADigest, ac.tlsCertDigest, ac.tlsServerName, ac.tlsInsecureSkipVerify, ac.tlsMinVersion)
|
2020-05-03 11:41:13 +02:00
|
|
|
}
|
|
|
|
|
2023-10-25 23:19:33 +02:00
|
|
|
// getAuthHeaderFunc must return <value> for 'Authorization: <value>' http request header
|
|
|
|
type getAuthHeaderFunc func() (string, error)
|
|
|
|
|
|
|
|
func newGetAuthHeaderCached(getAuthHeader getAuthHeaderFunc) getAuthHeaderFunc {
|
|
|
|
if getAuthHeader == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
var mu sync.Mutex
|
|
|
|
var deadline uint64
|
|
|
|
var ah string
|
|
|
|
var err error
|
|
|
|
return func() (string, error) {
|
|
|
|
// Cahe the auth header and the error for up to a second in order to save CPU time
|
|
|
|
// on reading and parsing auth headers from files.
|
|
|
|
// This also reduces load on OAuth2 server when oauth2 config is enabled.
|
|
|
|
mu.Lock()
|
|
|
|
defer mu.Unlock()
|
|
|
|
if fasttime.UnixTimestamp() > deadline {
|
|
|
|
ah, err = getAuthHeader()
|
2024-04-03 23:46:40 +02:00
|
|
|
deadline = fasttime.UnixTimestamp() + 1
|
2023-10-25 23:19:33 +02:00
|
|
|
}
|
|
|
|
return ah, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type getTLSRootCAFunc func() (*x509.CertPool, error)
|
|
|
|
|
2024-04-03 23:46:40 +02:00
|
|
|
type getTLSConfigFunc func() (*tls.Config, error)
|
|
|
|
|
|
|
|
func newGetTLSConfigCached(getTLSConfig getTLSConfigFunc) getTLSConfigFunc {
|
2023-10-25 23:19:33 +02:00
|
|
|
var mu sync.Mutex
|
|
|
|
var deadline uint64
|
2024-04-03 23:46:40 +02:00
|
|
|
var tlsCfg *tls.Config
|
2023-10-25 23:19:33 +02:00
|
|
|
var err error
|
2024-04-03 23:46:40 +02:00
|
|
|
return func() (*tls.Config, error) {
|
|
|
|
// Cache the tlsCfg and the error for up to a second in order to save CPU time on getTLSConfig() call.
|
2023-10-25 23:19:33 +02:00
|
|
|
mu.Lock()
|
|
|
|
defer mu.Unlock()
|
|
|
|
if fasttime.UnixTimestamp() > deadline {
|
2024-04-03 23:46:40 +02:00
|
|
|
tlsCfg, err = getTLSConfig()
|
|
|
|
deadline = fasttime.UnixTimestamp() + 1
|
2023-10-25 23:19:33 +02:00
|
|
|
}
|
2024-04-03 23:46:40 +02:00
|
|
|
return tlsCfg, err
|
2023-10-25 23:19:33 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type getTLSCertFunc func(cri *tls.CertificateRequestInfo) (*tls.Certificate, error)
|
|
|
|
|
|
|
|
func newGetTLSCertCached(getTLSCert getTLSCertFunc) getTLSCertFunc {
|
|
|
|
if getTLSCert == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
var mu sync.Mutex
|
|
|
|
var deadline uint64
|
|
|
|
var cert *tls.Certificate
|
|
|
|
var err error
|
|
|
|
return func(cri *tls.CertificateRequestInfo) (*tls.Certificate, error) {
|
|
|
|
// Cache the certificate and the error for up to a second in order to save CPU time
|
|
|
|
// on certificate parsing when TLS connections are frequently re-established.
|
|
|
|
mu.Lock()
|
|
|
|
defer mu.Unlock()
|
|
|
|
if fasttime.UnixTimestamp() > deadline {
|
|
|
|
cert, err = getTLSCert(cri)
|
2024-04-03 23:46:40 +02:00
|
|
|
deadline = fasttime.UnixTimestamp() + 1
|
2023-10-25 23:19:33 +02:00
|
|
|
}
|
|
|
|
return cert, err
|
2020-05-03 11:41:13 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-08-19 22:31:18 +02:00
|
|
|
// GetTLSConfig returns cached tls configuration
|
|
|
|
func (ac *Config) GetTLSConfig() (*tls.Config, error) {
|
|
|
|
if ac.getTLSConfigCached == nil {
|
|
|
|
return nil, fmt.Errorf("BUG: config must be properly initialized with Options.NewConfig() call")
|
|
|
|
}
|
|
|
|
tlsC, err := ac.getTLSConfigCached()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return tlsC, nil
|
|
|
|
}
|
|
|
|
|
2024-10-08 10:36:31 +02:00
|
|
|
type idleConnectionsCloser interface {
|
|
|
|
CloseIdleConnections()
|
|
|
|
}
|
|
|
|
|
2024-04-03 23:46:40 +02:00
|
|
|
// NewRoundTripper returns new http.RoundTripper for the given ac, which uses the given trBase as base transport.
|
|
|
|
//
|
|
|
|
// The caller shouldn't change the trBase, since the returned RoundTripper owns it.
|
|
|
|
func (ac *Config) NewRoundTripper(trBase *http.Transport) http.RoundTripper {
|
|
|
|
rt := &roundTripper{
|
|
|
|
trBase: trBase,
|
2024-10-08 10:36:31 +02:00
|
|
|
trGetter: func(tls *tls.Config) http.RoundTripper {
|
|
|
|
tr := trBase.Clone()
|
|
|
|
if tls != nil {
|
|
|
|
tr.TLSClientConfig = tls
|
|
|
|
}
|
|
|
|
return tr
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if ac != nil {
|
|
|
|
rt.getTLSConfigCached = ac.getTLSConfigCached
|
|
|
|
}
|
|
|
|
return rt
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewRoundTripperFromGetter returns new http.RoundTripper for the given ac, which uses the given get as transport getter.
|
|
|
|
func (ac *Config) NewRoundTripperFromGetter(get func(tls *tls.Config) http.RoundTripper) http.RoundTripper {
|
|
|
|
rt := &roundTripper{
|
|
|
|
trGetter: get,
|
2020-04-13 11:59:05 +02:00
|
|
|
}
|
2024-04-03 23:46:40 +02:00
|
|
|
if ac != nil {
|
|
|
|
rt.getTLSConfigCached = ac.getTLSConfigCached
|
2023-10-25 23:19:33 +02:00
|
|
|
}
|
2024-04-03 23:46:40 +02:00
|
|
|
return rt
|
|
|
|
}
|
|
|
|
|
|
|
|
type roundTripper struct {
|
2024-10-08 10:36:31 +02:00
|
|
|
trBase http.RoundTripper
|
2024-04-03 23:46:40 +02:00
|
|
|
getTLSConfigCached getTLSConfigFunc
|
2024-10-08 10:36:31 +02:00
|
|
|
trGetter func(tls *tls.Config) http.RoundTripper
|
2024-04-03 23:46:40 +02:00
|
|
|
|
|
|
|
rootCAPrev *x509.CertPool
|
2024-10-08 10:36:31 +02:00
|
|
|
trPrev http.RoundTripper
|
2024-04-03 23:46:40 +02:00
|
|
|
mu sync.Mutex
|
|
|
|
}
|
|
|
|
|
|
|
|
// RoundTrip implements http.RoundTripper interface.
|
|
|
|
func (rt *roundTripper) RoundTrip(req *http.Request) (*http.Response, error) {
|
|
|
|
tr, err := rt.getTransport()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot initialize Transport: %w", err)
|
2021-07-02 12:20:15 +02:00
|
|
|
}
|
2024-04-03 23:46:40 +02:00
|
|
|
return tr.RoundTrip(req)
|
2020-04-13 11:59:05 +02:00
|
|
|
}
|
|
|
|
|
2024-10-08 10:36:31 +02:00
|
|
|
func (rt *roundTripper) getTransport() (http.RoundTripper, error) {
|
|
|
|
if rt.trBase == nil {
|
|
|
|
if rt.getTLSConfigCached != nil {
|
|
|
|
tlsCfg, err := rt.getTLSConfigCached()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot initialize TLS config: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
rt.trBase = rt.trGetter(tlsCfg)
|
|
|
|
} else {
|
|
|
|
rt.trBase = rt.trGetter(nil)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-04-03 23:46:40 +02:00
|
|
|
if rt.getTLSConfigCached == nil {
|
|
|
|
return rt.trBase, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
tlsCfg, err := rt.getTLSConfigCached()
|
2024-04-03 10:01:43 +02:00
|
|
|
if err != nil {
|
2024-04-03 23:46:40 +02:00
|
|
|
return nil, fmt.Errorf("cannot initialize TLS config: %w", err)
|
2024-04-03 10:01:43 +02:00
|
|
|
}
|
|
|
|
|
2024-04-03 23:46:40 +02:00
|
|
|
rt.mu.Lock()
|
|
|
|
defer rt.mu.Unlock()
|
|
|
|
|
|
|
|
if rt.trPrev != nil && tlsCfg.RootCAs.Equal(rt.rootCAPrev) {
|
|
|
|
// Fast path - tlsCfg wasn't changed. Return the previously created transport.
|
|
|
|
return rt.trPrev, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Slow path - tlsCfg has been changed.
|
|
|
|
// Close connections for the previous transport and create new transport for the updated tlsCfg.
|
|
|
|
if rt.trPrev != nil {
|
2024-10-08 10:36:31 +02:00
|
|
|
if ic, ok := rt.trPrev.(idleConnectionsCloser); ok {
|
|
|
|
ic.CloseIdleConnections()
|
|
|
|
}
|
2024-04-03 23:46:40 +02:00
|
|
|
}
|
|
|
|
|
2024-10-08 10:36:31 +02:00
|
|
|
tr := rt.trGetter(tlsCfg)
|
2024-04-03 23:46:40 +02:00
|
|
|
rt.trPrev = tr
|
|
|
|
rt.rootCAPrev = tlsCfg.RootCAs
|
|
|
|
|
|
|
|
return rt.trPrev, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ac *Config) getTLSConfig() (*tls.Config, error) {
|
|
|
|
if ac.getTLSCertCached == nil && ac.tlsServerName == "" && !ac.tlsInsecureSkipVerify && ac.tlsMinVersion == 0 && ac.getTLSRootCA == nil {
|
|
|
|
// Re-use zeroTLSConfig when ac doesn't contain tls-specific configs.
|
|
|
|
// This should reduce memory usage a bit.
|
|
|
|
return zeroTLSConfig, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
tlsCfg := &tls.Config{
|
|
|
|
ClientSessionCache: tls.NewLRUClientSessionCache(0),
|
|
|
|
GetClientCertificate: ac.getTLSCertCached,
|
|
|
|
ServerName: ac.tlsServerName,
|
|
|
|
InsecureSkipVerify: ac.tlsInsecureSkipVerify,
|
|
|
|
MinVersion: ac.tlsMinVersion,
|
|
|
|
// Do not set MaxVersion, since this has no sense from security PoV.
|
|
|
|
// This can only result in lower security level if improperly configured.
|
|
|
|
}
|
|
|
|
if f := ac.getTLSRootCA; f != nil {
|
|
|
|
rootCA, err := f()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot load root CAs: %w", err)
|
2024-04-03 10:01:43 +02:00
|
|
|
}
|
2024-04-03 23:46:40 +02:00
|
|
|
tlsCfg.RootCAs = rootCA
|
2024-04-03 10:01:43 +02:00
|
|
|
}
|
2024-04-03 23:46:40 +02:00
|
|
|
return tlsCfg, nil
|
|
|
|
}
|
2024-04-03 10:01:43 +02:00
|
|
|
|
2024-04-03 23:46:40 +02:00
|
|
|
var zeroTLSConfig = &tls.Config{
|
|
|
|
ClientSessionCache: tls.NewLRUClientSessionCache(0),
|
2024-04-03 10:01:43 +02:00
|
|
|
}
|
|
|
|
|
2021-04-02 20:17:43 +02:00
|
|
|
// NewConfig creates auth config for the given hcc.
|
|
|
|
func (hcc *HTTPClientConfig) NewConfig(baseDir string) (*Config, error) {
|
2022-07-04 13:27:48 +02:00
|
|
|
opts := &Options{
|
|
|
|
BaseDir: baseDir,
|
|
|
|
Authorization: hcc.Authorization,
|
|
|
|
BasicAuth: hcc.BasicAuth,
|
|
|
|
BearerToken: hcc.BearerToken.String(),
|
|
|
|
BearerTokenFile: hcc.BearerTokenFile,
|
|
|
|
OAuth2: hcc.OAuth2,
|
|
|
|
TLSConfig: hcc.TLSConfig,
|
|
|
|
Headers: hcc.Headers,
|
|
|
|
}
|
|
|
|
return opts.NewConfig()
|
2021-04-02 20:17:43 +02:00
|
|
|
}
|
|
|
|
|
2021-04-03 23:40:08 +02:00
|
|
|
// NewConfig creates auth config for the given pcc.
|
|
|
|
func (pcc *ProxyClientConfig) NewConfig(baseDir string) (*Config, error) {
|
2022-07-04 13:27:48 +02:00
|
|
|
opts := &Options{
|
|
|
|
BaseDir: baseDir,
|
|
|
|
Authorization: pcc.Authorization,
|
|
|
|
BasicAuth: pcc.BasicAuth,
|
|
|
|
BearerToken: pcc.BearerToken.String(),
|
|
|
|
BearerTokenFile: pcc.BearerTokenFile,
|
|
|
|
OAuth2: pcc.OAuth2,
|
|
|
|
TLSConfig: pcc.TLSConfig,
|
|
|
|
Headers: pcc.Headers,
|
|
|
|
}
|
|
|
|
return opts.NewConfig()
|
2022-06-22 19:38:43 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewConfig creates auth config for the given ba.
|
|
|
|
func (ba *BasicAuthConfig) NewConfig(baseDir string) (*Config, error) {
|
2022-07-04 13:27:48 +02:00
|
|
|
opts := &Options{
|
|
|
|
BaseDir: baseDir,
|
|
|
|
BasicAuth: ba,
|
|
|
|
}
|
|
|
|
return opts.NewConfig()
|
2022-04-22 22:50:51 +02:00
|
|
|
}
|
|
|
|
|
2022-07-04 13:27:48 +02:00
|
|
|
// Options contain options, which must be passed to NewConfig.
|
|
|
|
type Options struct {
|
|
|
|
// BaseDir is an optional path to a base directory for resolving
|
|
|
|
// relative filepaths in various config options.
|
|
|
|
//
|
|
|
|
// It is set to the current directory by default.
|
|
|
|
BaseDir string
|
|
|
|
|
|
|
|
// Authorization contains optional Authorization.
|
|
|
|
Authorization *Authorization
|
|
|
|
|
|
|
|
// BasicAuth contains optional BasicAuthConfig.
|
|
|
|
BasicAuth *BasicAuthConfig
|
|
|
|
|
|
|
|
// BearerToken contains optional bearer token.
|
|
|
|
BearerToken string
|
|
|
|
|
|
|
|
// BearerTokenFile contains optional path to a file with bearer token.
|
|
|
|
BearerTokenFile string
|
|
|
|
|
|
|
|
// OAuth2 contains optional OAuth2Config.
|
|
|
|
OAuth2 *OAuth2Config
|
|
|
|
|
|
|
|
// TLSconfig contains optional TLSConfig.
|
|
|
|
TLSConfig *TLSConfig
|
|
|
|
|
|
|
|
// Headers contains optional http request headers in the form 'Foo: bar'.
|
|
|
|
Headers []string
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewConfig creates auth config from the given opts.
|
|
|
|
func (opts *Options) NewConfig() (*Config, error) {
|
|
|
|
baseDir := opts.BaseDir
|
|
|
|
if baseDir == "" {
|
|
|
|
baseDir = "."
|
|
|
|
}
|
|
|
|
var actx authContext
|
|
|
|
if opts.Authorization != nil {
|
|
|
|
if err := actx.initFromAuthorization(baseDir, opts.Authorization); err != nil {
|
|
|
|
return nil, err
|
2021-04-02 20:17:43 +02:00
|
|
|
}
|
|
|
|
}
|
2022-07-04 13:27:48 +02:00
|
|
|
if opts.BasicAuth != nil {
|
|
|
|
if actx.getAuthHeader != nil {
|
2021-04-02 20:17:43 +02:00
|
|
|
return nil, fmt.Errorf("cannot use both `authorization` and `basic_auth`")
|
|
|
|
}
|
2022-07-04 13:27:48 +02:00
|
|
|
if err := actx.initFromBasicAuthConfig(baseDir, opts.BasicAuth); err != nil {
|
|
|
|
return nil, err
|
2020-04-13 11:59:05 +02:00
|
|
|
}
|
|
|
|
}
|
2022-07-04 13:27:48 +02:00
|
|
|
if opts.BearerTokenFile != "" {
|
|
|
|
if actx.getAuthHeader != nil {
|
2021-04-02 20:17:43 +02:00
|
|
|
return nil, fmt.Errorf("cannot simultaneously use `authorization`, `basic_auth` and `bearer_token_file`")
|
|
|
|
}
|
2022-07-04 13:27:48 +02:00
|
|
|
if opts.BearerToken != "" {
|
|
|
|
return nil, fmt.Errorf("both `bearer_token`=%q and `bearer_token_file`=%q are set", opts.BearerToken, opts.BearerTokenFile)
|
2020-04-13 11:59:05 +02:00
|
|
|
}
|
2023-10-25 23:19:33 +02:00
|
|
|
actx.mustInitFromBearerTokenFile(baseDir, opts.BearerTokenFile)
|
2020-04-13 11:59:05 +02:00
|
|
|
}
|
2022-07-04 13:27:48 +02:00
|
|
|
if opts.BearerToken != "" {
|
|
|
|
if actx.getAuthHeader != nil {
|
2021-04-02 20:17:43 +02:00
|
|
|
return nil, fmt.Errorf("cannot simultaneously use `authorization`, `basic_auth` and `bearer_token`")
|
2020-04-13 11:59:05 +02:00
|
|
|
}
|
2023-10-25 23:19:33 +02:00
|
|
|
actx.mustInitFromBearerToken(opts.BearerToken)
|
2020-04-13 11:59:05 +02:00
|
|
|
}
|
2022-07-04 13:27:48 +02:00
|
|
|
if opts.OAuth2 != nil {
|
|
|
|
if actx.getAuthHeader != nil {
|
2021-05-22 15:20:18 +02:00
|
|
|
return nil, fmt.Errorf("cannot simultaneously use `authorization`, `basic_auth, `bearer_token` and `ouath2`")
|
|
|
|
}
|
2022-07-04 13:27:48 +02:00
|
|
|
if err := actx.initFromOAuth2Config(baseDir, opts.OAuth2); err != nil {
|
2023-12-20 20:58:12 +01:00
|
|
|
return nil, fmt.Errorf("cannot initialize oauth2: %w", err)
|
2021-05-22 15:20:18 +02:00
|
|
|
}
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
|
|
|
var tctx tlsContext
|
|
|
|
if opts.TLSConfig != nil {
|
|
|
|
if err := tctx.initFromTLSConfig(baseDir, opts.TLSConfig); err != nil {
|
2023-12-20 20:58:12 +01:00
|
|
|
return nil, fmt.Errorf("cannot initialize tls: %w", err)
|
2022-04-22 23:16:34 +02:00
|
|
|
}
|
2020-04-13 11:59:05 +02:00
|
|
|
}
|
2022-07-04 13:27:48 +02:00
|
|
|
headers, err := parseHeaders(opts.Headers)
|
2022-06-22 19:38:43 +02:00
|
|
|
if err != nil {
|
2023-12-20 20:58:12 +01:00
|
|
|
return nil, fmt.Errorf("cannot parse headers: %w", err)
|
2022-06-22 19:38:43 +02:00
|
|
|
}
|
2023-10-25 23:19:33 +02:00
|
|
|
hd := xxhash.New()
|
|
|
|
for _, kv := range headers {
|
|
|
|
hd.Sum([]byte(kv.key))
|
|
|
|
hd.Sum([]byte("="))
|
|
|
|
hd.Sum([]byte(kv.value))
|
|
|
|
hd.Sum([]byte(","))
|
|
|
|
}
|
|
|
|
headersDigest := fmt.Sprintf("digest(headers)=%d", hd.Sum64())
|
|
|
|
|
2020-04-13 11:59:05 +02:00
|
|
|
ac := &Config{
|
2023-10-25 23:19:33 +02:00
|
|
|
tlsServerName: tctx.serverName,
|
|
|
|
tlsInsecureSkipVerify: tctx.insecureSkipVerify,
|
|
|
|
tlsMinVersion: tctx.minVersion,
|
2021-05-14 19:00:05 +02:00
|
|
|
|
2024-04-03 23:46:40 +02:00
|
|
|
getTLSRootCA: tctx.getTLSRootCA,
|
|
|
|
tlsRootCADigest: tctx.tlsRootCADigest,
|
2023-10-25 23:19:33 +02:00
|
|
|
|
|
|
|
getTLSCertCached: newGetTLSCertCached(tctx.getTLSCert),
|
|
|
|
tlsCertDigest: tctx.tlsCertDigest,
|
|
|
|
|
|
|
|
getAuthHeaderCached: newGetAuthHeaderCached(actx.getAuthHeader),
|
|
|
|
authHeaderDigest: actx.authHeaderDigest,
|
2021-07-01 14:27:44 +02:00
|
|
|
|
2022-07-04 13:27:48 +02:00
|
|
|
headers: headers,
|
2023-10-25 23:19:33 +02:00
|
|
|
headersDigest: headersDigest,
|
2020-04-13 11:59:05 +02:00
|
|
|
}
|
2024-04-03 23:46:40 +02:00
|
|
|
ac.getTLSConfigCached = newGetTLSConfigCached(ac.getTLSConfig)
|
2020-04-13 11:59:05 +02:00
|
|
|
return ac, nil
|
|
|
|
}
|
2022-04-22 23:16:34 +02:00
|
|
|
|
2022-07-04 13:27:48 +02:00
|
|
|
type authContext struct {
|
|
|
|
// getAuthHeader must return <value> for 'Authorization: <value>' http request header
|
2023-10-25 23:19:33 +02:00
|
|
|
getAuthHeader getAuthHeaderFunc
|
2022-07-04 13:27:48 +02:00
|
|
|
|
2023-10-25 23:19:33 +02:00
|
|
|
// authHeaderDigest must contain the digest for the used authorization
|
2022-07-04 13:27:48 +02:00
|
|
|
// The digest must be changed whenever the original config changes.
|
2023-10-25 23:19:33 +02:00
|
|
|
authHeaderDigest string
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (actx *authContext) initFromAuthorization(baseDir string, az *Authorization) error {
|
|
|
|
azType := "Bearer"
|
|
|
|
if az.Type != "" {
|
|
|
|
azType = az.Type
|
|
|
|
}
|
|
|
|
if az.CredentialsFile == "" {
|
2023-10-25 23:19:33 +02:00
|
|
|
ah := azType + " " + az.Credentials.String()
|
2023-10-17 11:58:19 +02:00
|
|
|
actx.getAuthHeader = func() (string, error) {
|
2023-10-25 23:19:33 +02:00
|
|
|
return ah, nil
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
2023-10-25 23:19:33 +02:00
|
|
|
actx.authHeaderDigest = fmt.Sprintf("custom(type=%q, creds=%q)", az.Type, az.Credentials)
|
2022-07-04 13:27:48 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if az.Credentials != nil {
|
|
|
|
return fmt.Errorf("both `credentials`=%q and `credentials_file`=%q are set", az.Credentials, az.CredentialsFile)
|
|
|
|
}
|
2024-01-21 20:58:26 +01:00
|
|
|
filePath := fscore.GetFilepath(baseDir, az.CredentialsFile)
|
2023-10-17 11:58:19 +02:00
|
|
|
actx.getAuthHeader = func() (string, error) {
|
2024-01-21 20:58:26 +01:00
|
|
|
token, err := fscore.ReadPasswordFromFileOrHTTP(filePath)
|
2022-07-04 13:27:48 +02:00
|
|
|
if err != nil {
|
2023-10-25 21:24:01 +02:00
|
|
|
return "", fmt.Errorf("cannot read credentials from `credentials_file`=%q: %w", az.CredentialsFile, err)
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
2023-10-17 11:58:19 +02:00
|
|
|
return azType + " " + token, nil
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
2023-10-25 23:19:33 +02:00
|
|
|
actx.authHeaderDigest = fmt.Sprintf("custom(type=%q, credsFile=%q)", az.Type, filePath)
|
2022-07-04 13:27:48 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (actx *authContext) initFromBasicAuthConfig(baseDir string, ba *BasicAuthConfig) error {
|
2024-01-31 18:45:13 +01:00
|
|
|
username := ba.Username
|
|
|
|
usernameFile := ba.UsernameFile
|
|
|
|
password := ""
|
|
|
|
if ba.Password != nil {
|
|
|
|
password = ba.Password.S
|
2024-01-31 18:41:16 +01:00
|
|
|
}
|
2024-01-31 18:45:13 +01:00
|
|
|
passwordFile := ba.PasswordFile
|
|
|
|
if username == "" && usernameFile == "" {
|
|
|
|
return fmt.Errorf("missing `username` and `username_file` in `basic_auth` section; please specify one; " +
|
2024-04-18 02:27:47 +02:00
|
|
|
"see https://docs.victoriametrics.com/sd_configs/#http-api-client-options")
|
2024-01-31 18:41:16 +01:00
|
|
|
}
|
2024-01-31 18:45:13 +01:00
|
|
|
if username != "" && usernameFile != "" {
|
|
|
|
return fmt.Errorf("both `username` and `username_file` are set in `basic_auth` section; please specify only one; " +
|
2024-04-18 02:27:47 +02:00
|
|
|
"see https://docs.victoriametrics.com/sd_configs/#http-api-client-options")
|
2024-01-31 18:41:16 +01:00
|
|
|
}
|
2024-01-31 18:45:13 +01:00
|
|
|
if password != "" && passwordFile != "" {
|
|
|
|
return fmt.Errorf("both `password` and `password_file` are set in `basic_auth` section; please specify only one; " +
|
2024-04-18 02:27:47 +02:00
|
|
|
"see https://docs.victoriametrics.com/sd_configs/#http-api-client-options")
|
2024-01-31 18:41:16 +01:00
|
|
|
}
|
2024-01-31 18:45:13 +01:00
|
|
|
if usernameFile != "" {
|
|
|
|
usernameFile = fscore.GetFilepath(baseDir, usernameFile)
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
2024-01-31 18:45:13 +01:00
|
|
|
if passwordFile != "" {
|
|
|
|
passwordFile = fscore.GetFilepath(baseDir, passwordFile)
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
2024-01-31 18:45:13 +01:00
|
|
|
actx.getAuthHeader = func() (string, error) {
|
|
|
|
usernameLocal := username
|
|
|
|
if usernameFile != "" {
|
|
|
|
s, err := fscore.ReadPasswordFromFileOrHTTP(usernameFile)
|
2024-01-31 18:41:16 +01:00
|
|
|
if err != nil {
|
2024-01-31 18:45:13 +01:00
|
|
|
return "", fmt.Errorf("cannot read username from `username_file`=%q: %w", usernameFile, err)
|
2024-01-31 18:41:16 +01:00
|
|
|
}
|
2024-01-31 18:45:13 +01:00
|
|
|
usernameLocal = s
|
2024-01-31 18:41:16 +01:00
|
|
|
}
|
2024-01-31 18:45:13 +01:00
|
|
|
passwordLocal := password
|
|
|
|
if passwordFile != "" {
|
|
|
|
s, err := fscore.ReadPasswordFromFileOrHTTP(passwordFile)
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("cannot read password from `password_file`=%q: %w", passwordFile, err)
|
|
|
|
}
|
|
|
|
passwordLocal = s
|
2024-01-31 18:41:16 +01:00
|
|
|
}
|
2024-01-31 18:45:13 +01:00
|
|
|
// See https://en.wikipedia.org/wiki/Basic_access_authentication
|
|
|
|
token := usernameLocal + ":" + passwordLocal
|
|
|
|
token64 := base64.StdEncoding.EncodeToString([]byte(token))
|
2023-10-17 11:58:19 +02:00
|
|
|
return "Basic " + token64, nil
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
2024-01-31 18:45:13 +01:00
|
|
|
actx.authHeaderDigest = fmt.Sprintf("basic(username=%q, usernameFile=%q, password=%q, passwordFile=%q)", username, usernameFile, password, passwordFile)
|
|
|
|
return nil
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
|
|
|
|
2023-10-25 23:19:33 +02:00
|
|
|
func (actx *authContext) mustInitFromBearerTokenFile(baseDir string, bearerTokenFile string) {
|
2024-01-21 20:58:26 +01:00
|
|
|
filePath := fscore.GetFilepath(baseDir, bearerTokenFile)
|
2023-10-17 11:58:19 +02:00
|
|
|
actx.getAuthHeader = func() (string, error) {
|
2024-01-21 20:58:26 +01:00
|
|
|
token, err := fscore.ReadPasswordFromFileOrHTTP(filePath)
|
2022-07-04 13:27:48 +02:00
|
|
|
if err != nil {
|
2023-10-25 21:24:01 +02:00
|
|
|
return "", fmt.Errorf("cannot read bearer token from `bearer_token_file`=%q: %w", bearerTokenFile, err)
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
2023-10-17 11:58:19 +02:00
|
|
|
return "Bearer " + token, nil
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
2023-10-25 23:19:33 +02:00
|
|
|
actx.authHeaderDigest = fmt.Sprintf("bearer(tokenFile=%q)", filePath)
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
|
|
|
|
2023-10-25 23:19:33 +02:00
|
|
|
func (actx *authContext) mustInitFromBearerToken(bearerToken string) {
|
|
|
|
ah := "Bearer " + bearerToken
|
2023-10-17 11:58:19 +02:00
|
|
|
actx.getAuthHeader = func() (string, error) {
|
2023-10-25 23:19:33 +02:00
|
|
|
return ah, nil
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
2023-10-25 23:19:33 +02:00
|
|
|
actx.authHeaderDigest = fmt.Sprintf("bearer(token=%q)", bearerToken)
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (actx *authContext) initFromOAuth2Config(baseDir string, o *OAuth2Config) error {
|
2023-10-25 23:19:33 +02:00
|
|
|
oi, err := newOAuth2ConfigInternal(baseDir, o)
|
|
|
|
if err != nil {
|
2022-07-04 13:27:48 +02:00
|
|
|
return err
|
|
|
|
}
|
2023-10-17 11:58:19 +02:00
|
|
|
actx.getAuthHeader = func() (string, error) {
|
2022-07-04 13:27:48 +02:00
|
|
|
ts, err := oi.getTokenSource()
|
|
|
|
if err != nil {
|
2023-10-25 21:24:01 +02:00
|
|
|
return "", fmt.Errorf("cannot get OAuth2 tokenSource: %w", err)
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
|
|
|
t, err := ts.Token()
|
|
|
|
if err != nil {
|
2023-10-25 21:24:01 +02:00
|
|
|
return "", fmt.Errorf("cannot get OAuth2 token: %w", err)
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
2023-10-17 11:58:19 +02:00
|
|
|
return t.Type() + " " + t.AccessToken, nil
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
2023-10-25 23:19:33 +02:00
|
|
|
actx.authHeaderDigest = fmt.Sprintf("oauth2(%s)", oi.String())
|
2022-07-04 13:27:48 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type tlsContext struct {
|
2023-10-25 23:19:33 +02:00
|
|
|
getTLSCert getTLSCertFunc
|
2023-10-17 11:58:19 +02:00
|
|
|
tlsCertDigest string
|
|
|
|
|
2023-10-25 23:19:33 +02:00
|
|
|
getTLSRootCA getTLSRootCAFunc
|
|
|
|
tlsRootCADigest string
|
|
|
|
|
2022-07-04 13:27:48 +02:00
|
|
|
serverName string
|
|
|
|
insecureSkipVerify bool
|
|
|
|
minVersion uint16
|
|
|
|
}
|
|
|
|
|
|
|
|
func (tctx *tlsContext) initFromTLSConfig(baseDir string, tc *TLSConfig) error {
|
|
|
|
tctx.serverName = tc.ServerName
|
|
|
|
tctx.insecureSkipVerify = tc.InsecureSkipVerify
|
|
|
|
if len(tc.Key) != 0 || len(tc.Cert) != 0 {
|
2023-10-25 23:12:19 +02:00
|
|
|
cert, err := tls.X509KeyPair([]byte(tc.Cert), []byte(tc.Key))
|
2022-07-04 13:27:48 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("cannot load TLS certificate from the provided `cert` and `key` values: %w", err)
|
|
|
|
}
|
|
|
|
tctx.getTLSCert = func(*tls.CertificateRequestInfo) (*tls.Certificate, error) {
|
|
|
|
return &cert, nil
|
|
|
|
}
|
2023-10-25 23:12:19 +02:00
|
|
|
h := xxhash.Sum64([]byte(tc.Key)) ^ xxhash.Sum64([]byte(tc.Cert))
|
2022-07-04 13:27:48 +02:00
|
|
|
tctx.tlsCertDigest = fmt.Sprintf("digest(key+cert)=%d", h)
|
|
|
|
} else if tc.CertFile != "" || tc.KeyFile != "" {
|
2024-01-21 20:58:26 +01:00
|
|
|
certPath := fscore.GetFilepath(baseDir, tc.CertFile)
|
|
|
|
keyPath := fscore.GetFilepath(baseDir, tc.KeyFile)
|
2024-04-03 23:46:40 +02:00
|
|
|
tctx.getTLSCert = func(*tls.CertificateRequestInfo) (*tls.Certificate, error) {
|
2022-07-04 13:27:48 +02:00
|
|
|
// Re-read TLS certificate from disk. This is needed for https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1420
|
2024-01-21 20:58:26 +01:00
|
|
|
certData, err := fscore.ReadFileOrHTTP(certPath)
|
2023-10-25 23:19:33 +02:00
|
|
|
if err != nil {
|
2024-04-03 23:46:40 +02:00
|
|
|
return nil, fmt.Errorf("cannot read TLS certificate from %q: %w", certPath, err)
|
2023-10-25 23:19:33 +02:00
|
|
|
}
|
2024-01-21 20:58:26 +01:00
|
|
|
keyData, err := fscore.ReadFileOrHTTP(keyPath)
|
2023-10-25 23:19:33 +02:00
|
|
|
if err != nil {
|
2024-04-03 23:46:40 +02:00
|
|
|
return nil, fmt.Errorf("cannot read TLS key from %q: %w", keyPath, err)
|
2024-04-03 10:01:43 +02:00
|
|
|
}
|
2023-10-25 23:19:33 +02:00
|
|
|
cert, err := tls.X509KeyPair(certData, keyData)
|
2022-07-04 13:27:48 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot load TLS certificate from `cert_file`=%q, `key_file`=%q: %w", tc.CertFile, tc.KeyFile, err)
|
|
|
|
}
|
|
|
|
return &cert, nil
|
|
|
|
}
|
|
|
|
tctx.tlsCertDigest = fmt.Sprintf("certFile=%q, keyFile=%q", tc.CertFile, tc.KeyFile)
|
|
|
|
}
|
|
|
|
if len(tc.CA) != 0 {
|
2023-10-25 23:19:33 +02:00
|
|
|
rootCA := x509.NewCertPool()
|
|
|
|
if !rootCA.AppendCertsFromPEM([]byte(tc.CA)) {
|
2022-07-04 13:27:48 +02:00
|
|
|
return fmt.Errorf("cannot parse data from `ca` value")
|
|
|
|
}
|
2023-10-25 23:19:33 +02:00
|
|
|
tctx.getTLSRootCA = func() (*x509.CertPool, error) {
|
|
|
|
return rootCA, nil
|
|
|
|
}
|
|
|
|
h := xxhash.Sum64([]byte(tc.CA))
|
|
|
|
tctx.tlsRootCADigest = fmt.Sprintf("digest(CA)=%d", h)
|
2022-07-04 13:27:48 +02:00
|
|
|
} else if tc.CAFile != "" {
|
2024-01-21 20:58:26 +01:00
|
|
|
path := fscore.GetFilepath(baseDir, tc.CAFile)
|
2024-04-03 23:46:40 +02:00
|
|
|
tctx.getTLSRootCA = func() (*x509.CertPool, error) {
|
2024-01-21 20:58:26 +01:00
|
|
|
data, err := fscore.ReadFileOrHTTP(path)
|
2023-10-25 23:19:33 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot read `ca_file`: %w", err)
|
|
|
|
}
|
|
|
|
rootCA := x509.NewCertPool()
|
|
|
|
if !rootCA.AppendCertsFromPEM(data) {
|
|
|
|
return nil, fmt.Errorf("cannot parse data read from `ca_file` %q", tc.CAFile)
|
|
|
|
}
|
|
|
|
return rootCA, nil
|
|
|
|
}
|
2024-04-03 10:01:43 +02:00
|
|
|
tctx.tlsRootCADigest = fmt.Sprintf("caFile=%q", tc.CAFile)
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
2022-09-26 16:35:45 +02:00
|
|
|
v, err := netutil.ParseTLSVersion(tc.MinVersion)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("cannot parse `min_version`: %w", err)
|
2022-07-04 13:27:48 +02:00
|
|
|
}
|
2022-09-26 16:35:45 +02:00
|
|
|
tctx.minVersion = v
|
2022-07-04 13:27:48 +02:00
|
|
|
return nil
|
|
|
|
}
|