mirror of
https://github.com/pomerium/pomerium.git
synced 2025-04-28 18:06:34 +02:00
* validation: option to bypass * concurrently build config * add regex_priority_order and route sorting * rm mutex
329 lines
8.5 KiB
Go
329 lines
8.5 KiB
Go
package databroker
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"runtime"
|
|
"sort"
|
|
"sync"
|
|
"time"
|
|
|
|
"golang.org/x/exp/maps"
|
|
"golang.org/x/sync/errgroup"
|
|
|
|
"github.com/pomerium/pomerium/config"
|
|
"github.com/pomerium/pomerium/internal/hashutil"
|
|
"github.com/pomerium/pomerium/internal/log"
|
|
"github.com/pomerium/pomerium/internal/telemetry/metrics"
|
|
"github.com/pomerium/pomerium/internal/telemetry/trace"
|
|
"github.com/pomerium/pomerium/pkg/cryptutil"
|
|
"github.com/pomerium/pomerium/pkg/grpc"
|
|
configpb "github.com/pomerium/pomerium/pkg/grpc/config"
|
|
"github.com/pomerium/pomerium/pkg/grpc/databroker"
|
|
"github.com/pomerium/pomerium/pkg/grpcutil"
|
|
)
|
|
|
|
// ConfigSource provides a new Config source that decorates an underlying config with
|
|
// configuration derived from the data broker.
|
|
type ConfigSource struct {
|
|
mu sync.RWMutex
|
|
outboundGRPCConnection *grpc.CachedOutboundGRPClientConn
|
|
computedConfig *config.Config
|
|
underlyingConfig *config.Config
|
|
dbConfigs map[string]dbConfig
|
|
updaterHash uint64
|
|
cancel func()
|
|
enableValidation bool
|
|
|
|
config.ChangeDispatcher
|
|
}
|
|
|
|
type dbConfig struct {
|
|
*configpb.Config
|
|
version uint64
|
|
}
|
|
|
|
// EnableConfigValidation is a type that can be used to enable config validation.
|
|
type EnableConfigValidation bool
|
|
|
|
// NewConfigSource creates a new ConfigSource.
|
|
func NewConfigSource(
|
|
ctx context.Context,
|
|
underlying config.Source,
|
|
enableValidation EnableConfigValidation,
|
|
listeners ...config.ChangeListener,
|
|
) *ConfigSource {
|
|
src := &ConfigSource{
|
|
enableValidation: bool(enableValidation),
|
|
dbConfigs: map[string]dbConfig{},
|
|
outboundGRPCConnection: new(grpc.CachedOutboundGRPClientConn),
|
|
}
|
|
for _, li := range listeners {
|
|
src.OnConfigChange(ctx, li)
|
|
}
|
|
underlying.OnConfigChange(ctx, func(ctx context.Context, cfg *config.Config) {
|
|
src.mu.Lock()
|
|
src.underlyingConfig = cfg.Clone()
|
|
src.mu.Unlock()
|
|
|
|
src.rebuild(ctx, firstTime(false))
|
|
})
|
|
src.underlyingConfig = underlying.GetConfig()
|
|
src.rebuild(ctx, firstTime(true))
|
|
return src
|
|
}
|
|
|
|
// GetConfig gets the current config.
|
|
func (src *ConfigSource) GetConfig() *config.Config {
|
|
src.mu.RLock()
|
|
defer src.mu.RUnlock()
|
|
|
|
return src.computedConfig
|
|
}
|
|
|
|
type firstTime bool
|
|
|
|
func (src *ConfigSource) rebuild(ctx context.Context, firstTime firstTime) {
|
|
_, span := trace.StartSpan(ctx, "databroker.config_source.rebuild")
|
|
defer span.End()
|
|
|
|
now := time.Now()
|
|
src.mu.Lock()
|
|
defer src.mu.Unlock()
|
|
log.Info(ctx).Str("lock-wait", time.Since(now).String()).Msg("databroker: rebuilding configuration")
|
|
|
|
cfg := src.underlyingConfig.Clone()
|
|
|
|
// start the updater
|
|
src.runUpdater(cfg)
|
|
|
|
now = time.Now()
|
|
err := src.buildNewConfigLocked(ctx, cfg)
|
|
if err != nil {
|
|
log.Error(ctx).Err(err).Msg("databroker: failed to build new config")
|
|
return
|
|
}
|
|
log.Info(ctx).Str("elapsed", time.Since(now).String()).Msg("databroker: built new config")
|
|
|
|
src.computedConfig = cfg
|
|
if !firstTime {
|
|
src.Trigger(ctx, cfg)
|
|
}
|
|
|
|
metrics.SetConfigInfo(ctx, cfg.Options.Services, "databroker", cfg.Checksum(), true)
|
|
}
|
|
|
|
func (src *ConfigSource) buildNewConfigLocked(ctx context.Context, cfg *config.Config) error {
|
|
eg, ctx := errgroup.WithContext(ctx)
|
|
eg.SetLimit(runtime.NumCPU()/2 + 1)
|
|
eg.Go(func() error {
|
|
src.applySettingsLocked(ctx, cfg)
|
|
err := cfg.Options.Validate()
|
|
if err != nil {
|
|
return fmt.Errorf("validating settings: %w", err)
|
|
}
|
|
return nil
|
|
})
|
|
|
|
var policies []*config.Policy
|
|
var builders []func() error
|
|
buildPolicy := func(i int, routepb *configpb.Route) func() error {
|
|
return func() error {
|
|
policy, err := src.buildPolicyFromProto(routepb)
|
|
if err != nil {
|
|
log.Ctx(ctx).Err(err).Msg("databroker: error building policy from protobuf")
|
|
return nil
|
|
}
|
|
policies[i] = policy
|
|
return nil
|
|
}
|
|
}
|
|
|
|
for _, cfgpb := range src.dbConfigs {
|
|
for _, routepb := range cfgpb.GetRoutes() {
|
|
builders = append(builders, buildPolicy(len(builders), routepb))
|
|
}
|
|
}
|
|
|
|
policies = make([]*config.Policy, len(builders))
|
|
for _, builder := range builders {
|
|
eg.Go(builder)
|
|
}
|
|
|
|
err := eg.Wait()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
src.addPolicies(ctx, cfg, policies)
|
|
return nil
|
|
}
|
|
|
|
func (src *ConfigSource) applySettingsLocked(ctx context.Context, cfg *config.Config) {
|
|
ids := maps.Keys(src.dbConfigs)
|
|
sort.Strings(ids)
|
|
|
|
var certsIndex *cryptutil.CertificatesIndex
|
|
if src.enableValidation {
|
|
certsIndex = cryptutil.NewCertificatesIndex()
|
|
for _, cert := range cfg.Options.GetX509Certificates() {
|
|
certsIndex.Add(cert)
|
|
}
|
|
}
|
|
|
|
for i := 0; i < len(ids) && ctx.Err() == nil; i++ {
|
|
cfgpb := src.dbConfigs[ids[i]]
|
|
cfg.Options.ApplySettings(ctx, certsIndex, cfgpb.Settings)
|
|
}
|
|
}
|
|
|
|
func (src *ConfigSource) buildPolicyFromProto(routepb *configpb.Route) (*config.Policy, error) {
|
|
policy, err := config.NewPolicyFromProto(routepb)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error building policy from protobuf: %w", err)
|
|
}
|
|
|
|
if !src.enableValidation {
|
|
return policy, nil
|
|
}
|
|
|
|
err = policy.Validate()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error validating policy: %w", err)
|
|
}
|
|
|
|
return policy, nil
|
|
}
|
|
|
|
func (src *ConfigSource) addPolicies(ctx context.Context, cfg *config.Config, policies []*config.Policy) {
|
|
seen := make(map[uint64]struct{})
|
|
for _, policy := range cfg.Options.GetAllPolicies() {
|
|
id, err := policy.RouteID()
|
|
if err != nil {
|
|
log.Ctx(ctx).Err(err).Str("policy", policy.String()).Msg("databroker: error getting route id")
|
|
continue
|
|
}
|
|
seen[id] = struct{}{}
|
|
}
|
|
|
|
var additionalPolicies []config.Policy
|
|
for _, policy := range policies {
|
|
if policy == nil {
|
|
continue
|
|
}
|
|
|
|
id, err := policy.RouteID()
|
|
if err != nil {
|
|
log.Ctx(ctx).Err(err).Str("policy", policy.String()).Msg("databroker: error getting route id")
|
|
continue
|
|
}
|
|
if _, ok := seen[id]; ok {
|
|
log.Ctx(ctx).Debug().Str("policy", policy.String()).Msg("databroker: policy already exists")
|
|
continue
|
|
}
|
|
additionalPolicies = append(additionalPolicies, *policy)
|
|
seen[id] = struct{}{}
|
|
}
|
|
|
|
config.SortPolicies(additionalPolicies)
|
|
|
|
// add the additional policies here since calling `Validate` will reset them.
|
|
cfg.Options.AdditionalPolicies = append(cfg.Options.AdditionalPolicies, additionalPolicies...)
|
|
}
|
|
|
|
func (src *ConfigSource) runUpdater(cfg *config.Config) {
|
|
sharedKey, _ := cfg.Options.GetSharedKey()
|
|
connectionOptions := &grpc.OutboundOptions{
|
|
OutboundPort: cfg.OutboundPort,
|
|
InstallationID: cfg.Options.InstallationID,
|
|
ServiceName: cfg.Options.Services,
|
|
SignedJWTKey: sharedKey,
|
|
}
|
|
h, err := hashutil.Hash(connectionOptions)
|
|
if err != nil {
|
|
log.Fatal().Err(err).Send()
|
|
}
|
|
// nothing changed, so don't restart the updater
|
|
if src.updaterHash == h {
|
|
return
|
|
}
|
|
src.updaterHash = h
|
|
|
|
if src.cancel != nil {
|
|
src.cancel()
|
|
src.cancel = nil
|
|
}
|
|
|
|
ctx := context.Background()
|
|
ctx, src.cancel = context.WithCancel(ctx)
|
|
|
|
cc, err := src.outboundGRPCConnection.Get(ctx, connectionOptions)
|
|
if err != nil {
|
|
log.Error(ctx).Err(err).Msg("databroker: failed to create gRPC connection to data broker")
|
|
return
|
|
}
|
|
|
|
client := databroker.NewDataBrokerServiceClient(cc)
|
|
|
|
syncer := databroker.NewSyncer("databroker", &syncerHandler{
|
|
client: client,
|
|
src: src,
|
|
}, databroker.WithTypeURL(grpcutil.GetTypeURL(new(configpb.Config))),
|
|
databroker.WithFastForward())
|
|
go func() {
|
|
var databrokerURLs []string
|
|
urls, _ := cfg.Options.GetDataBrokerURLs()
|
|
for _, url := range urls {
|
|
databrokerURLs = append(databrokerURLs, url.String())
|
|
}
|
|
|
|
log.Info(ctx).
|
|
Str("outbound_port", cfg.OutboundPort).
|
|
Strs("databroker_urls", databrokerURLs).
|
|
Msg("config: starting databroker config source syncer")
|
|
_ = grpc.WaitForReady(ctx, cc, time.Second*10)
|
|
_ = syncer.Run(ctx)
|
|
}()
|
|
}
|
|
|
|
type syncerHandler struct {
|
|
src *ConfigSource
|
|
client databroker.DataBrokerServiceClient
|
|
}
|
|
|
|
func (s *syncerHandler) GetDataBrokerServiceClient() databroker.DataBrokerServiceClient {
|
|
return s.client
|
|
}
|
|
|
|
func (s *syncerHandler) ClearRecords(_ context.Context) {
|
|
s.src.mu.Lock()
|
|
s.src.dbConfigs = map[string]dbConfig{}
|
|
s.src.mu.Unlock()
|
|
}
|
|
|
|
func (s *syncerHandler) UpdateRecords(ctx context.Context, _ uint64, records []*databroker.Record) {
|
|
if len(records) == 0 {
|
|
return
|
|
}
|
|
|
|
s.src.mu.Lock()
|
|
for _, record := range records {
|
|
if record.GetDeletedAt() != nil {
|
|
delete(s.src.dbConfigs, record.GetId())
|
|
continue
|
|
}
|
|
|
|
var cfgpb configpb.Config
|
|
err := record.GetData().UnmarshalTo(&cfgpb)
|
|
if err != nil {
|
|
log.Warn(ctx).Err(err).Msg("databroker: error decoding config")
|
|
delete(s.src.dbConfigs, record.GetId())
|
|
continue
|
|
}
|
|
|
|
s.src.dbConfigs[record.GetId()] = dbConfig{&cfgpb, record.Version}
|
|
}
|
|
s.src.mu.Unlock()
|
|
|
|
s.src.rebuild(ctx, firstTime(false))
|
|
}
|