2021-02-22 17:27:13 +05:30
|
|
|
package sendurl
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net/http"
|
2023-07-09 08:55:56 +05:30
|
|
|
"strings"
|
2021-02-22 17:27:13 +05:30
|
|
|
|
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
|
|
"github.com/prometheus/client_golang/prometheus/promauto"
|
|
|
|
|
|
|
|
"gitlab.com/gitlab-org/labkit/mask"
|
|
|
|
|
2023-03-04 22:38:38 +05:30
|
|
|
"gitlab.com/gitlab-org/gitlab/workhorse/internal/helper/fail"
|
2021-10-27 15:23:28 +05:30
|
|
|
"gitlab.com/gitlab-org/gitlab/workhorse/internal/log"
|
|
|
|
"gitlab.com/gitlab-org/gitlab/workhorse/internal/senddata"
|
2022-11-25 23:54:43 +05:30
|
|
|
"gitlab.com/gitlab-org/gitlab/workhorse/internal/transport"
|
2021-02-22 17:27:13 +05:30
|
|
|
)
|
|
|
|
|
|
|
|
type entry struct{ senddata.Prefix }
|
|
|
|
|
|
|
|
type entryParams struct {
|
|
|
|
URL string
|
|
|
|
AllowRedirects bool
|
2023-07-09 08:55:56 +05:30
|
|
|
Body string
|
|
|
|
Header http.Header
|
|
|
|
Method string
|
2021-02-22 17:27:13 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
var SendURL = &entry{"send-url:"}
|
|
|
|
|
|
|
|
var rangeHeaderKeys = []string{
|
|
|
|
"If-Match",
|
|
|
|
"If-Unmodified-Since",
|
|
|
|
"If-None-Match",
|
|
|
|
"If-Modified-Since",
|
|
|
|
"If-Range",
|
|
|
|
"Range",
|
|
|
|
}
|
|
|
|
|
|
|
|
// Keep cache headers from the original response, not the proxied response. The
|
|
|
|
// original response comes from the Rails application, which should be the
|
|
|
|
// source of truth for caching.
|
|
|
|
var preserveHeaderKeys = map[string]bool{
|
|
|
|
"Cache-Control": true,
|
|
|
|
"Expires": true,
|
|
|
|
"Date": true, // Support for HTTP 1.0 proxies
|
|
|
|
"Pragma": true, // Support for HTTP 1.0 proxies
|
|
|
|
}
|
|
|
|
|
2022-11-25 23:54:43 +05:30
|
|
|
var httpTransport = transport.NewRestrictedTransport()
|
2021-02-22 17:27:13 +05:30
|
|
|
|
|
|
|
var httpClient = &http.Client{
|
|
|
|
Transport: httpTransport,
|
|
|
|
}
|
|
|
|
|
|
|
|
var (
|
|
|
|
sendURLRequests = promauto.NewCounterVec(
|
|
|
|
prometheus.CounterOpts{
|
|
|
|
Name: "gitlab_workhorse_send_url_requests",
|
|
|
|
Help: "How many send URL requests have been processed",
|
|
|
|
},
|
|
|
|
[]string{"status"},
|
|
|
|
)
|
|
|
|
sendURLOpenRequests = promauto.NewGauge(
|
|
|
|
prometheus.GaugeOpts{
|
|
|
|
Name: "gitlab_workhorse_send_url_open_requests",
|
|
|
|
Help: "Describes how many send URL requests are open now",
|
|
|
|
},
|
|
|
|
)
|
|
|
|
sendURLBytes = promauto.NewCounter(
|
|
|
|
prometheus.CounterOpts{
|
|
|
|
Name: "gitlab_workhorse_send_url_bytes",
|
|
|
|
Help: "How many bytes were passed with send URL",
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
sendURLRequestsInvalidData = sendURLRequests.WithLabelValues("invalid-data")
|
|
|
|
sendURLRequestsRequestFailed = sendURLRequests.WithLabelValues("request-failed")
|
|
|
|
sendURLRequestsSucceeded = sendURLRequests.WithLabelValues("succeeded")
|
|
|
|
)
|
|
|
|
|
|
|
|
func (e *entry) Inject(w http.ResponseWriter, r *http.Request, sendData string) {
|
|
|
|
var params entryParams
|
|
|
|
|
|
|
|
sendURLOpenRequests.Inc()
|
|
|
|
defer sendURLOpenRequests.Dec()
|
|
|
|
|
|
|
|
if err := e.Unpack(¶ms, sendData); err != nil {
|
2023-03-04 22:38:38 +05:30
|
|
|
fail.Request(w, r, fmt.Errorf("SendURL: unpack sendData: %v", err))
|
2021-02-22 17:27:13 +05:30
|
|
|
return
|
|
|
|
}
|
2023-07-09 08:55:56 +05:30
|
|
|
if params.Method == "" {
|
|
|
|
params.Method = http.MethodGet
|
|
|
|
}
|
2021-02-22 17:27:13 +05:30
|
|
|
|
|
|
|
log.WithContextFields(r.Context(), log.Fields{
|
|
|
|
"url": mask.URL(params.URL),
|
|
|
|
"path": r.URL.Path,
|
|
|
|
}).Info("SendURL: sending")
|
|
|
|
|
|
|
|
if params.URL == "" {
|
|
|
|
sendURLRequestsInvalidData.Inc()
|
2023-03-04 22:38:38 +05:30
|
|
|
fail.Request(w, r, fmt.Errorf("SendURL: URL is empty"))
|
2021-02-22 17:27:13 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// create new request and copy range headers
|
2023-07-09 08:55:56 +05:30
|
|
|
newReq, err := http.NewRequest(params.Method, params.URL, strings.NewReader(params.Body))
|
2021-02-22 17:27:13 +05:30
|
|
|
if err != nil {
|
|
|
|
sendURLRequestsInvalidData.Inc()
|
2023-03-04 22:38:38 +05:30
|
|
|
fail.Request(w, r, fmt.Errorf("SendURL: NewRequest: %v", err))
|
2021-02-22 17:27:13 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
newReq = newReq.WithContext(r.Context())
|
|
|
|
|
|
|
|
for _, header := range rangeHeaderKeys {
|
|
|
|
newReq.Header[header] = r.Header[header]
|
|
|
|
}
|
|
|
|
|
2023-07-09 08:55:56 +05:30
|
|
|
for key, values := range params.Header {
|
|
|
|
for _, value := range values {
|
|
|
|
newReq.Header.Add(key, value)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-22 17:27:13 +05:30
|
|
|
// execute new request
|
|
|
|
var resp *http.Response
|
|
|
|
if params.AllowRedirects {
|
|
|
|
resp, err = httpClient.Do(newReq)
|
|
|
|
} else {
|
|
|
|
resp, err = httpTransport.RoundTrip(newReq)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
sendURLRequestsRequestFailed.Inc()
|
2023-03-04 22:38:38 +05:30
|
|
|
fail.Request(w, r, fmt.Errorf("SendURL: Do request: %v", err))
|
2021-02-22 17:27:13 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Prevent Go from adding a Content-Length header automatically
|
|
|
|
w.Header().Del("Content-Length")
|
|
|
|
|
|
|
|
// copy response headers and body, except the headers from preserveHeaderKeys
|
|
|
|
for key, value := range resp.Header {
|
|
|
|
if !preserveHeaderKeys[key] {
|
|
|
|
w.Header()[key] = value
|
|
|
|
}
|
|
|
|
}
|
|
|
|
w.WriteHeader(resp.StatusCode)
|
|
|
|
|
|
|
|
defer resp.Body.Close()
|
|
|
|
n, err := io.Copy(w, resp.Body)
|
|
|
|
sendURLBytes.Add(float64(n))
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
sendURLRequestsRequestFailed.Inc()
|
2021-03-08 18:12:59 +05:30
|
|
|
log.WithRequest(r).WithError(fmt.Errorf("SendURL: Copy response: %v", err)).Error()
|
2021-02-22 17:27:13 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
sendURLRequestsSucceeded.Inc()
|
|
|
|
}
|