Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Users: Log unauthorized requests #63

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
61 changes: 51 additions & 10 deletions web/tls_config.go
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,10 @@ import (
"io/ioutil"
"net"
"net/http"
"os"
"path/filepath"
"sync"
"time"

"github.com/go-kit/log"
"github.com/go-kit/log/level"
Expand All @@ -30,13 +33,18 @@ import (
)

var (
errNoTLSConfig = errors.New("TLS config is not present")
errNoTLSConfig = errors.New("TLS config is not present")
timestampFormat = log.TimestampFormat(
func() time.Time { return time.Now().UTC() },
"2006-01-02T15:04:05.000Z07:00",
)
)

type Config struct {
TLSConfig TLSStruct `yaml:"tls_server_config"`
HTTPConfig HTTPStruct `yaml:"http_server_config"`
Users map[string]config_util.Secret `yaml:"basic_auth_users"`
TLSConfig TLSStruct `yaml:"tls_server_config"`
HTTPConfig HTTPStruct `yaml:"http_server_config"`
RequestLogConfig RequestLogStruct `yaml:"request_log_config"`
Users map[string]config_util.Secret `yaml:"basic_auth_users"`
}

type TLSStruct struct {
Expand All @@ -62,6 +70,15 @@ type HTTPStruct struct {
HTTP2 bool `yaml:"http2"`
}

type RequestLogStruct struct {
File string `yaml:"file"`
HeaderForIp string `yaml:"header_for_ip"`
}

func (r *RequestLogStruct) SetDirectory(dir string) {
r.File = config_util.JoinDir(dir, r.File)
}

func getConfig(configPath string) (*Config, error) {
content, err := ioutil.ReadFile(configPath)
if err != nil {
Expand All @@ -73,10 +90,12 @@ func getConfig(configPath string) (*Config, error) {
MaxVersion: tls.VersionTLS13,
PreferServerCipherSuites: true,
},
HTTPConfig: HTTPStruct{HTTP2: true},
HTTPConfig: HTTPStruct{HTTP2: true},
RequestLogConfig: RequestLogStruct{File: "", HeaderForIp: ""},
}
err = yaml.UnmarshalStrict(content, c)
c.TLSConfig.SetDirectory(filepath.Dir(configPath))
c.RequestLogConfig.SetDirectory(filepath.Dir(configPath))
return c, err
}

Expand Down Expand Up @@ -207,11 +226,33 @@ func Serve(l net.Listener, server *http.Server, tlsConfigPath string, logger log
return err
}

server.Handler = &userAuthRoundtrip{
tlsConfigPath: tlsConfigPath,
logger: logger,
handler: handler,
cache: newCache(),
if c.RequestLogConfig.File != "" {
f, err := os.OpenFile(c.RequestLogConfig.File, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0666)
if err != nil {
return err
}

defer f.Close()

server.Handler = &userAuthRoundtrip{
tlsConfigPath: tlsConfigPath,
logger: logger,
handler: handler,
cache: newCache(),
requestLogger: log.With(log.NewJSONLogger(f), "ts", timestampFormat),
requestLoggerLock: sync.RWMutex{},
}

level.Info(logger).Log("msg", "Request logging is enabled.", "file", c.RequestLogConfig.File, "headerForIp", c.RequestLogConfig.HeaderForIp)
} else {
server.Handler = &userAuthRoundtrip{
tlsConfigPath: tlsConfigPath,
logger: logger,
handler: handler,
cache: newCache(),
}

level.Info(logger).Log("msg", "Request logging is disabled.")
}

config, err := ConfigToTLSConfig(&c.TLSConfig)
Expand Down
32 changes: 28 additions & 4 deletions web/users.go
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,7 @@ import (
"sync"

"github.com/go-kit/log"
"github.com/go-kit/log/level"
"golang.org/x/crypto/bcrypt"
)

Expand All @@ -41,10 +42,12 @@ func validateUsers(configPath string) error {
}

type userAuthRoundtrip struct {
tlsConfigPath string
handler http.Handler
logger log.Logger
cache *cache
tlsConfigPath string
handler http.Handler
logger log.Logger
requestLogger log.Logger
requestLoggerLock sync.RWMutex
cache *cache
// bcryptMtx is there to ensure that bcrypt.CompareHashAndPassword is run
// only once in parallel as this is CPU intensive.
bcryptMtx sync.Mutex
Expand Down Expand Up @@ -89,10 +92,31 @@ func (u *userAuthRoundtrip) ServeHTTP(w http.ResponseWriter, r *http.Request) {

if authOk && validUser {
u.handler.ServeHTTP(w, r)
logRequest(u, r, c, true)
return
}
}

w.Header().Set("WWW-Authenticate", "Basic")
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)

logRequest(u, r, c, false)
}

func logRequest(u *userAuthRoundtrip, r *http.Request, c *Config, authorized bool) {
u.requestLoggerLock.RLock()

if l := u.requestLogger; l != nil {
var ip = r.RemoteAddr

if c.RequestLogConfig.HeaderForIp != "" {
ip = r.Header.Get(c.RequestLogConfig.HeaderForIp)
}

if err := l.Log("path", r.URL.Path, "authorized", authorized, "ip", ip); err != nil {
level.Error(u.logger).Log("msg", "can't log query", "err", err)
}
}

u.requestLoggerLock.RUnlock()
}