Merge branch '17284-redact-railsapi-host'
[arvados.git] / lib / controller / proxy.go
1 // Copyright (C) The Arvados Authors. All rights reserved.
2 //
3 // SPDX-License-Identifier: AGPL-3.0
4
5 package controller
6
7 import (
8         "io"
9         "net/http"
10         "net/url"
11
12         "git.arvados.org/arvados.git/sdk/go/httpserver"
13 )
14
15 type proxy struct {
16         Name string // to use in Via header
17 }
18
19 type HTTPError struct {
20         Message string
21         Code    int
22 }
23
24 func (h HTTPError) Error() string {
25         return h.Message
26 }
27
28 var dropHeaders = map[string]bool{
29         // Headers that shouldn't be forwarded when proxying. See
30         // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers
31         "Connection":          true,
32         "Keep-Alive":          true,
33         "Proxy-Authenticate":  true,
34         "Proxy-Authorization": true,
35         // (comment/space here makes gofmt1.10 agree with gofmt1.11)
36         "TE":      true,
37         "Trailer": true,
38         "Upgrade": true,
39
40         // Headers that would interfere with Go's automatic
41         // compression/decompression if we forwarded them.
42         "Accept-Encoding":   true,
43         "Content-Encoding":  true,
44         "Transfer-Encoding": true,
45
46         // Content-Length depends on encoding.
47         "Content-Length": true,
48 }
49
50 type ResponseFilter func(*http.Response, error) (*http.Response, error)
51
52 // Forward a request to upstream service, and return response or error.
53 func (p *proxy) Do(
54         reqIn *http.Request,
55         urlOut *url.URL,
56         client *http.Client) (*http.Response, error) {
57
58         // Copy headers from incoming request, then add/replace proxy
59         // headers like Via and X-Forwarded-For.
60         hdrOut := http.Header{}
61         for k, v := range reqIn.Header {
62                 if !dropHeaders[k] {
63                         hdrOut[k] = v
64                 }
65         }
66         xff := reqIn.RemoteAddr
67         if xffIn := reqIn.Header.Get("X-Forwarded-For"); xffIn != "" {
68                 xff = xffIn + "," + xff
69         }
70         hdrOut.Set("X-Forwarded-For", xff)
71         if hdrOut.Get("X-Forwarded-Proto") == "" {
72                 hdrOut.Set("X-Forwarded-Proto", reqIn.URL.Scheme)
73         }
74         hdrOut.Add("Via", reqIn.Proto+" arvados-controller")
75
76         reqOut := (&http.Request{
77                 Method: reqIn.Method,
78                 URL:    urlOut,
79                 Host:   reqIn.Host,
80                 Header: hdrOut,
81                 Body:   reqIn.Body,
82         }).WithContext(reqIn.Context())
83         return client.Do(reqOut)
84 }
85
86 // Copy a response (or error) to the downstream client
87 func (p *proxy) ForwardResponse(w http.ResponseWriter, resp *http.Response, err error) (int64, error) {
88         if err != nil {
89                 if he, ok := err.(HTTPError); ok {
90                         httpserver.Error(w, he.Message, he.Code)
91                 } else {
92                         httpserver.Error(w, err.Error(), http.StatusBadGateway)
93                 }
94                 return 0, nil
95         }
96
97         defer resp.Body.Close()
98         for k, v := range resp.Header {
99                 for _, v := range v {
100                         w.Header().Add(k, v)
101                 }
102         }
103         w.WriteHeader(resp.StatusCode)
104         return io.Copy(w, resp.Body)
105 }