482 lines
14 KiB
Go
482 lines
14 KiB
Go
|
package common
|
||
|
|
||
|
import (
|
||
|
"crypto/tls"
|
||
|
"encoding/base64"
|
||
|
"encoding/json"
|
||
|
"errors"
|
||
|
"fmt"
|
||
|
"io"
|
||
|
"os"
|
||
|
"path/filepath"
|
||
|
"time"
|
||
|
|
||
|
ipfsconfig "github.com/ipfs/go-ipfs-config"
|
||
|
logging "github.com/ipfs/go-log/v2"
|
||
|
crypto "github.com/libp2p/go-libp2p-core/crypto"
|
||
|
peer "github.com/libp2p/go-libp2p-core/peer"
|
||
|
ma "github.com/multiformats/go-multiaddr"
|
||
|
|
||
|
"github.com/kelseyhightower/envconfig"
|
||
|
"github.com/rs/cors"
|
||
|
|
||
|
"github.com/ipfs-cluster/ipfs-cluster/config"
|
||
|
)
|
||
|
|
||
|
const minMaxHeaderBytes = 4096
|
||
|
|
||
|
const defaultMaxHeaderBytes = minMaxHeaderBytes
|
||
|
|
||
|
// Config provides common API configuration values and allows to customize its
|
||
|
// behavior. It implements most of the config.ComponentConfig interface
|
||
|
// (except the Default() and ConfigKey() methods). Config should be embedded
|
||
|
// in a Config object that implements the missing methods and sets the
|
||
|
// meta options.
|
||
|
type Config struct {
|
||
|
config.Saver
|
||
|
|
||
|
// These are meta-options and should be set by actual Config
|
||
|
// implementations as early as possible.
|
||
|
DefaultFunc func(*Config) error
|
||
|
ConfigKey string
|
||
|
EnvConfigKey string
|
||
|
Logger *logging.ZapEventLogger
|
||
|
RequestLogger *logging.ZapEventLogger
|
||
|
APIErrorFunc func(err error, status int) error
|
||
|
|
||
|
// Listen address for the HTTP REST API endpoint.
|
||
|
HTTPListenAddr []ma.Multiaddr
|
||
|
|
||
|
// TLS configuration for the HTTP listener
|
||
|
TLS *tls.Config
|
||
|
|
||
|
// pathSSLCertFile is a path to a certificate file used to secure the
|
||
|
// HTTP API endpoint. We track it so we can write it in the JSON.
|
||
|
PathSSLCertFile string
|
||
|
|
||
|
// pathSSLKeyFile is a path to the private key corresponding to the
|
||
|
// SSLKeyFile. We track it so we can write it in the JSON.
|
||
|
PathSSLKeyFile string
|
||
|
|
||
|
// Maximum duration before timing out reading a full request
|
||
|
ReadTimeout time.Duration
|
||
|
|
||
|
// Maximum duration before timing out reading the headers of a request
|
||
|
ReadHeaderTimeout time.Duration
|
||
|
|
||
|
// Maximum duration before timing out write of the response
|
||
|
WriteTimeout time.Duration
|
||
|
|
||
|
// Server-side amount of time a Keep-Alive connection will be
|
||
|
// kept idle before being reused
|
||
|
IdleTimeout time.Duration
|
||
|
|
||
|
// Maximum cumulative size of HTTP request headers in bytes
|
||
|
// accepted by the server
|
||
|
MaxHeaderBytes int
|
||
|
|
||
|
// Listen address for the Libp2p REST API endpoint.
|
||
|
Libp2pListenAddr []ma.Multiaddr
|
||
|
|
||
|
// ID and PrivateKey are used to create a libp2p host if we
|
||
|
// want the API component to do it (not by default).
|
||
|
ID peer.ID
|
||
|
PrivateKey crypto.PrivKey
|
||
|
|
||
|
// BasicAuthCredentials is a map of username-password pairs
|
||
|
// which are authorized to use Basic Authentication
|
||
|
BasicAuthCredentials map[string]string
|
||
|
|
||
|
// HTTPLogFile is path of the file that would save HTTP API logs. If this
|
||
|
// path is empty, HTTP logs would be sent to standard output. This path
|
||
|
// should either be absolute or relative to cluster base directory. Its
|
||
|
// default value is empty.
|
||
|
HTTPLogFile string
|
||
|
|
||
|
// Headers provides customization for the headers returned
|
||
|
// by the API on existing routes.
|
||
|
Headers map[string][]string
|
||
|
|
||
|
// CORS header management
|
||
|
CORSAllowedOrigins []string
|
||
|
CORSAllowedMethods []string
|
||
|
CORSAllowedHeaders []string
|
||
|
CORSExposedHeaders []string
|
||
|
CORSAllowCredentials bool
|
||
|
CORSMaxAge time.Duration
|
||
|
|
||
|
// Tracing flag used to skip tracing specific paths when not enabled.
|
||
|
Tracing bool
|
||
|
}
|
||
|
|
||
|
type jsonConfig struct {
|
||
|
HTTPListenMultiaddress ipfsconfig.Strings `json:"http_listen_multiaddress"`
|
||
|
SSLCertFile string `json:"ssl_cert_file,omitempty"`
|
||
|
SSLKeyFile string `json:"ssl_key_file,omitempty"`
|
||
|
ReadTimeout string `json:"read_timeout"`
|
||
|
ReadHeaderTimeout string `json:"read_header_timeout"`
|
||
|
WriteTimeout string `json:"write_timeout"`
|
||
|
IdleTimeout string `json:"idle_timeout"`
|
||
|
MaxHeaderBytes int `json:"max_header_bytes"`
|
||
|
|
||
|
Libp2pListenMultiaddress ipfsconfig.Strings `json:"libp2p_listen_multiaddress,omitempty"`
|
||
|
ID string `json:"id,omitempty"`
|
||
|
PrivateKey string `json:"private_key,omitempty" hidden:"true"`
|
||
|
|
||
|
BasicAuthCredentials map[string]string `json:"basic_auth_credentials" hidden:"true"`
|
||
|
HTTPLogFile string `json:"http_log_file"`
|
||
|
Headers map[string][]string `json:"headers"`
|
||
|
|
||
|
CORSAllowedOrigins []string `json:"cors_allowed_origins"`
|
||
|
CORSAllowedMethods []string `json:"cors_allowed_methods"`
|
||
|
CORSAllowedHeaders []string `json:"cors_allowed_headers"`
|
||
|
CORSExposedHeaders []string `json:"cors_exposed_headers"`
|
||
|
CORSAllowCredentials bool `json:"cors_allow_credentials"`
|
||
|
CORSMaxAge string `json:"cors_max_age"`
|
||
|
}
|
||
|
|
||
|
// GetHTTPLogPath gets full path of the file where http logs should be
|
||
|
// saved.
|
||
|
func (cfg *Config) GetHTTPLogPath() string {
|
||
|
if filepath.IsAbs(cfg.HTTPLogFile) {
|
||
|
return cfg.HTTPLogFile
|
||
|
}
|
||
|
|
||
|
if cfg.BaseDir == "" {
|
||
|
return ""
|
||
|
}
|
||
|
|
||
|
return filepath.Join(cfg.BaseDir, cfg.HTTPLogFile)
|
||
|
}
|
||
|
|
||
|
// ApplyEnvVars fills in any Config fields found as environment variables.
|
||
|
func (cfg *Config) ApplyEnvVars() error {
|
||
|
jcfg, err := cfg.toJSONConfig()
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
err = envconfig.Process(cfg.EnvConfigKey, jcfg)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
return cfg.applyJSONConfig(jcfg)
|
||
|
}
|
||
|
|
||
|
// Validate makes sure that all fields in this Config have
|
||
|
// working values, at least in appearance.
|
||
|
func (cfg *Config) Validate() error {
|
||
|
if cfg.Logger == nil || cfg.RequestLogger == nil {
|
||
|
return errors.New("config loggers not set")
|
||
|
}
|
||
|
|
||
|
switch {
|
||
|
case cfg.ReadTimeout < 0:
|
||
|
return errors.New(cfg.ConfigKey + ".read_timeout is invalid")
|
||
|
case cfg.ReadHeaderTimeout < 0:
|
||
|
return errors.New(cfg.ConfigKey + ".read_header_timeout is invalid")
|
||
|
case cfg.WriteTimeout < 0:
|
||
|
return errors.New(cfg.ConfigKey + ".write_timeout is invalid")
|
||
|
case cfg.IdleTimeout < 0:
|
||
|
return errors.New(cfg.ConfigKey + ".idle_timeout invalid")
|
||
|
case cfg.MaxHeaderBytes < minMaxHeaderBytes:
|
||
|
return fmt.Errorf(cfg.ConfigKey+".max_header_bytes must be not less then %d", minMaxHeaderBytes)
|
||
|
case cfg.BasicAuthCredentials != nil && len(cfg.BasicAuthCredentials) == 0:
|
||
|
return errors.New(cfg.ConfigKey + ".basic_auth_creds should be null or have at least one entry")
|
||
|
case (cfg.PathSSLCertFile != "" || cfg.PathSSLKeyFile != "") && cfg.TLS == nil:
|
||
|
return errors.New(cfg.ConfigKey + ": missing TLS configuration")
|
||
|
case (cfg.CORSMaxAge < 0):
|
||
|
return errors.New(cfg.ConfigKey + ".cors_max_age is invalid")
|
||
|
}
|
||
|
|
||
|
return cfg.validateLibp2p()
|
||
|
}
|
||
|
|
||
|
func (cfg *Config) validateLibp2p() error {
|
||
|
if cfg.ID != "" || cfg.PrivateKey != nil || len(cfg.Libp2pListenAddr) > 0 {
|
||
|
// if one is set, all should be
|
||
|
if cfg.ID == "" || cfg.PrivateKey == nil || len(cfg.Libp2pListenAddr) == 0 {
|
||
|
return errors.New("all ID, private_key and libp2p_listen_multiaddress should be set")
|
||
|
}
|
||
|
if !cfg.ID.MatchesPrivateKey(cfg.PrivateKey) {
|
||
|
return errors.New(cfg.ConfigKey + ".ID does not match private_key")
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
// LoadJSON parses a raw JSON byte slice created by ToJSON() and sets the
|
||
|
// configuration fields accordingly.
|
||
|
func (cfg *Config) LoadJSON(raw []byte) error {
|
||
|
jcfg := &jsonConfig{}
|
||
|
err := json.Unmarshal(raw, jcfg)
|
||
|
if err != nil {
|
||
|
cfg.Logger.Error(cfg.ConfigKey + ": error unmarshaling config")
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
if cfg.DefaultFunc == nil {
|
||
|
return errors.New("default config generation not set. This is a bug")
|
||
|
}
|
||
|
cfg.DefaultFunc(cfg)
|
||
|
|
||
|
return cfg.applyJSONConfig(jcfg)
|
||
|
}
|
||
|
|
||
|
func (cfg *Config) applyJSONConfig(jcfg *jsonConfig) error {
|
||
|
err := cfg.loadHTTPOptions(jcfg)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
err = cfg.loadLibp2pOptions(jcfg)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
// Other options
|
||
|
cfg.BasicAuthCredentials = jcfg.BasicAuthCredentials
|
||
|
cfg.HTTPLogFile = jcfg.HTTPLogFile
|
||
|
cfg.Headers = jcfg.Headers
|
||
|
|
||
|
return cfg.Validate()
|
||
|
}
|
||
|
|
||
|
func (cfg *Config) loadHTTPOptions(jcfg *jsonConfig) error {
|
||
|
if addresses := jcfg.HTTPListenMultiaddress; len(addresses) > 0 {
|
||
|
cfg.HTTPListenAddr = make([]ma.Multiaddr, 0, len(addresses))
|
||
|
for _, addr := range addresses {
|
||
|
httpAddr, err := ma.NewMultiaddr(addr)
|
||
|
if err != nil {
|
||
|
err = fmt.Errorf("error parsing %s.http_listen_multiaddress: %s", cfg.ConfigKey, err)
|
||
|
return err
|
||
|
}
|
||
|
cfg.HTTPListenAddr = append(cfg.HTTPListenAddr, httpAddr)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
err := cfg.tlsOptions(jcfg)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
if jcfg.MaxHeaderBytes == 0 {
|
||
|
cfg.MaxHeaderBytes = defaultMaxHeaderBytes
|
||
|
} else {
|
||
|
cfg.MaxHeaderBytes = jcfg.MaxHeaderBytes
|
||
|
}
|
||
|
|
||
|
// CORS
|
||
|
cfg.CORSAllowedOrigins = jcfg.CORSAllowedOrigins
|
||
|
cfg.CORSAllowedMethods = jcfg.CORSAllowedMethods
|
||
|
cfg.CORSAllowedHeaders = jcfg.CORSAllowedHeaders
|
||
|
cfg.CORSExposedHeaders = jcfg.CORSExposedHeaders
|
||
|
cfg.CORSAllowCredentials = jcfg.CORSAllowCredentials
|
||
|
if jcfg.CORSMaxAge == "" { // compatibility
|
||
|
jcfg.CORSMaxAge = "0s"
|
||
|
}
|
||
|
|
||
|
return config.ParseDurations(
|
||
|
cfg.ConfigKey,
|
||
|
&config.DurationOpt{Duration: jcfg.ReadTimeout, Dst: &cfg.ReadTimeout, Name: "read_timeout"},
|
||
|
&config.DurationOpt{Duration: jcfg.ReadHeaderTimeout, Dst: &cfg.ReadHeaderTimeout, Name: "read_header_timeout"},
|
||
|
&config.DurationOpt{Duration: jcfg.WriteTimeout, Dst: &cfg.WriteTimeout, Name: "write_timeout"},
|
||
|
&config.DurationOpt{Duration: jcfg.IdleTimeout, Dst: &cfg.IdleTimeout, Name: "idle_timeout"},
|
||
|
&config.DurationOpt{Duration: jcfg.CORSMaxAge, Dst: &cfg.CORSMaxAge, Name: "cors_max_age"},
|
||
|
)
|
||
|
}
|
||
|
|
||
|
func (cfg *Config) tlsOptions(jcfg *jsonConfig) error {
|
||
|
cert := jcfg.SSLCertFile
|
||
|
key := jcfg.SSLKeyFile
|
||
|
|
||
|
if cert+key == "" {
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
cfg.PathSSLCertFile = cert
|
||
|
cfg.PathSSLKeyFile = key
|
||
|
|
||
|
if !filepath.IsAbs(cert) {
|
||
|
cert = filepath.Join(cfg.BaseDir, cert)
|
||
|
}
|
||
|
|
||
|
if !filepath.IsAbs(key) {
|
||
|
key = filepath.Join(cfg.BaseDir, key)
|
||
|
}
|
||
|
|
||
|
cfg.Logger.Debug("baseDir: ", cfg.BaseDir)
|
||
|
cfg.Logger.Debug("cert path: ", cert)
|
||
|
cfg.Logger.Debug("key path: ", key)
|
||
|
|
||
|
tlsCfg, err := newTLSConfig(cert, key)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
cfg.TLS = tlsCfg
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (cfg *Config) loadLibp2pOptions(jcfg *jsonConfig) error {
|
||
|
if addresses := jcfg.Libp2pListenMultiaddress; len(addresses) > 0 {
|
||
|
cfg.Libp2pListenAddr = make([]ma.Multiaddr, 0, len(addresses))
|
||
|
for _, addr := range addresses {
|
||
|
libp2pAddr, err := ma.NewMultiaddr(addr)
|
||
|
if err != nil {
|
||
|
err = fmt.Errorf("error parsing %s.libp2p_listen_multiaddress: %s", cfg.ConfigKey, err)
|
||
|
return err
|
||
|
}
|
||
|
cfg.Libp2pListenAddr = append(cfg.Libp2pListenAddr, libp2pAddr)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if jcfg.PrivateKey != "" {
|
||
|
pkb, err := base64.StdEncoding.DecodeString(jcfg.PrivateKey)
|
||
|
if err != nil {
|
||
|
return fmt.Errorf("error decoding %s.private_key: %s", cfg.ConfigKey, err)
|
||
|
}
|
||
|
pKey, err := crypto.UnmarshalPrivateKey(pkb)
|
||
|
if err != nil {
|
||
|
return fmt.Errorf("error parsing %s.private_key ID: %s", cfg.ConfigKey, err)
|
||
|
}
|
||
|
cfg.PrivateKey = pKey
|
||
|
}
|
||
|
|
||
|
if jcfg.ID != "" {
|
||
|
id, err := peer.Decode(jcfg.ID)
|
||
|
if err != nil {
|
||
|
return fmt.Errorf("error parsing %s.ID: %s", cfg.ConfigKey, err)
|
||
|
}
|
||
|
cfg.ID = id
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
// ToJSON produce a human-friendly JSON representation of the Config
|
||
|
// object.
|
||
|
func (cfg *Config) ToJSON() (raw []byte, err error) {
|
||
|
jcfg, err := cfg.toJSONConfig()
|
||
|
if err != nil {
|
||
|
return
|
||
|
}
|
||
|
|
||
|
raw, err = config.DefaultJSONMarshal(jcfg)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
func (cfg *Config) toJSONConfig() (jcfg *jsonConfig, err error) {
|
||
|
// Multiaddress String() may panic
|
||
|
defer func() {
|
||
|
if r := recover(); r != nil {
|
||
|
err = fmt.Errorf("%s", r)
|
||
|
}
|
||
|
}()
|
||
|
|
||
|
httpAddresses := make([]string, 0, len(cfg.HTTPListenAddr))
|
||
|
for _, addr := range cfg.HTTPListenAddr {
|
||
|
httpAddresses = append(httpAddresses, addr.String())
|
||
|
}
|
||
|
|
||
|
libp2pAddresses := make([]string, 0, len(cfg.Libp2pListenAddr))
|
||
|
for _, addr := range cfg.Libp2pListenAddr {
|
||
|
libp2pAddresses = append(libp2pAddresses, addr.String())
|
||
|
}
|
||
|
|
||
|
jcfg = &jsonConfig{
|
||
|
HTTPListenMultiaddress: httpAddresses,
|
||
|
SSLCertFile: cfg.PathSSLCertFile,
|
||
|
SSLKeyFile: cfg.PathSSLKeyFile,
|
||
|
ReadTimeout: cfg.ReadTimeout.String(),
|
||
|
ReadHeaderTimeout: cfg.ReadHeaderTimeout.String(),
|
||
|
WriteTimeout: cfg.WriteTimeout.String(),
|
||
|
IdleTimeout: cfg.IdleTimeout.String(),
|
||
|
MaxHeaderBytes: cfg.MaxHeaderBytes,
|
||
|
BasicAuthCredentials: cfg.BasicAuthCredentials,
|
||
|
HTTPLogFile: cfg.HTTPLogFile,
|
||
|
Headers: cfg.Headers,
|
||
|
CORSAllowedOrigins: cfg.CORSAllowedOrigins,
|
||
|
CORSAllowedMethods: cfg.CORSAllowedMethods,
|
||
|
CORSAllowedHeaders: cfg.CORSAllowedHeaders,
|
||
|
CORSExposedHeaders: cfg.CORSExposedHeaders,
|
||
|
CORSAllowCredentials: cfg.CORSAllowCredentials,
|
||
|
CORSMaxAge: cfg.CORSMaxAge.String(),
|
||
|
}
|
||
|
|
||
|
if cfg.ID != "" {
|
||
|
jcfg.ID = peer.Encode(cfg.ID)
|
||
|
}
|
||
|
if cfg.PrivateKey != nil {
|
||
|
pkeyBytes, err := crypto.MarshalPrivateKey(cfg.PrivateKey)
|
||
|
if err == nil {
|
||
|
pKey := base64.StdEncoding.EncodeToString(pkeyBytes)
|
||
|
jcfg.PrivateKey = pKey
|
||
|
}
|
||
|
}
|
||
|
if len(libp2pAddresses) > 0 {
|
||
|
jcfg.Libp2pListenMultiaddress = libp2pAddresses
|
||
|
}
|
||
|
|
||
|
return
|
||
|
}
|
||
|
|
||
|
// CorsOptions returns cors.Options setup from the configured values.
|
||
|
func (cfg *Config) CorsOptions() *cors.Options {
|
||
|
maxAgeSeconds := int(cfg.CORSMaxAge / time.Second)
|
||
|
|
||
|
return &cors.Options{
|
||
|
AllowedOrigins: cfg.CORSAllowedOrigins,
|
||
|
AllowedMethods: cfg.CORSAllowedMethods,
|
||
|
AllowedHeaders: cfg.CORSAllowedHeaders,
|
||
|
ExposedHeaders: cfg.CORSExposedHeaders,
|
||
|
AllowCredentials: cfg.CORSAllowCredentials,
|
||
|
MaxAge: maxAgeSeconds,
|
||
|
Debug: false,
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// ToDisplayJSON returns JSON config as a string.
|
||
|
func (cfg *Config) ToDisplayJSON() ([]byte, error) {
|
||
|
jcfg, err := cfg.toJSONConfig()
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
|
||
|
return config.DisplayJSON(jcfg)
|
||
|
}
|
||
|
|
||
|
// LogWriter returns a writer to write logs to. If a log path is configured,
|
||
|
// it creates a file. Otherwise, uses the given logger.
|
||
|
func (cfg *Config) LogWriter() (io.Writer, error) {
|
||
|
if cfg.HTTPLogFile != "" {
|
||
|
f, err := os.OpenFile(cfg.GetHTTPLogPath(), os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
return f, nil
|
||
|
}
|
||
|
return logWriter{
|
||
|
logger: cfg.RequestLogger,
|
||
|
}, nil
|
||
|
}
|
||
|
|
||
|
func newTLSConfig(certFile, keyFile string) (*tls.Config, error) {
|
||
|
cert, err := tls.LoadX509KeyPair(certFile, keyFile)
|
||
|
if err != nil {
|
||
|
return nil, errors.New("Error loading TLS certficate/key: " + err.Error())
|
||
|
}
|
||
|
// based on https://github.com/denji/golang-tls
|
||
|
return &tls.Config{
|
||
|
MinVersion: tls.VersionTLS12,
|
||
|
CurvePreferences: []tls.CurveID{tls.CurveP521, tls.CurveP384, tls.CurveP256},
|
||
|
PreferServerCipherSuites: true,
|
||
|
CipherSuites: []uint16{
|
||
|
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
||
|
tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
|
||
|
tls.TLS_RSA_WITH_AES_256_GCM_SHA384,
|
||
|
tls.TLS_RSA_WITH_AES_256_CBC_SHA,
|
||
|
},
|
||
|
Certificates: []tls.Certificate{cert},
|
||
|
}, nil
|
||
|
}
|