New middleware to handle SSL termination proxies
The Heat API doesn't behave properly if it is behind an SSL termination proxy. If this is the case, the HTTP redirections and the links returned in the REST response bodies are build using http protocol instead of https. To handle this situation, a new middleware was added. The purpose of the SSLMiddleware is to update the wsgi.url_scheme environment variable of the request with the value contained in an HTTP header that can be configured in heat.conf (by default: 'X-Forwarded-Proto') Change-Id: I418cd8cf2fb2a5fb3f630b4945084fb6eab57310 Closes-Bug: #1235555
This commit is contained in:
parent
0c83ac25a9
commit
29807237cb
@ -1,7 +1,7 @@
|
||||
|
||||
# heat-api pipeline
|
||||
[pipeline:heat-api]
|
||||
pipeline = faultwrap versionnegotiation authtoken context apiv1app
|
||||
pipeline = faultwrap ssl versionnegotiation authtoken context apiv1app
|
||||
|
||||
# heat-api pipeline for standalone heat
|
||||
# ie. uses alternative auth backend that authenticates users against keystone
|
||||
@ -12,7 +12,7 @@ pipeline = faultwrap versionnegotiation authtoken context apiv1app
|
||||
# flavor = standalone
|
||||
#
|
||||
[pipeline:heat-api-standalone]
|
||||
pipeline = faultwrap versionnegotiation authpassword context apiv1app
|
||||
pipeline = faultwrap ssl versionnegotiation authpassword context apiv1app
|
||||
|
||||
# heat-api pipeline for custom cloud backends
|
||||
# i.e. in heat.conf:
|
||||
@ -74,6 +74,10 @@ paste.filter_factory = heat.common.context:ContextMiddleware_filter_factory
|
||||
[filter:ec2authtoken]
|
||||
paste.filter_factory = heat.api.aws.ec2token:EC2Token_filter_factory
|
||||
|
||||
[filter:ssl]
|
||||
paste.filter_factory = heat.common.wsgi:filter_factory
|
||||
heat.filter_factory = heat.api.openstack:sslmiddleware_filter
|
||||
|
||||
# Auth middleware that validates token against keystone
|
||||
[filter:authtoken]
|
||||
paste.filter_factory = heat.common.auth_token:filter_factory
|
||||
|
@ -1,5 +1,15 @@
|
||||
[DEFAULT]
|
||||
|
||||
#
|
||||
# Options defined in heat.api.middleware.ssl
|
||||
#
|
||||
|
||||
# The HTTP Header that will be used to determine which the
|
||||
# original request protocol scheme was, even if it was removed
|
||||
# by an SSL terminator proxy. (string value)
|
||||
#secure_proxy_ssl_header=X-Forwarded-Proto
|
||||
|
||||
|
||||
#
|
||||
# Options defined in heat.common.config
|
||||
#
|
||||
|
41
heat/api/middleware/ssl.py
Normal file
41
heat/api/middleware/ssl.py
Normal file
@ -0,0 +1,41 @@
|
||||
# -*- encoding: utf-8 -*-
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
from oslo.config import cfg
|
||||
from heat.common import wsgi
|
||||
|
||||
ssl_middleware_opts = [
|
||||
cfg.StrOpt('secure_proxy_ssl_header',
|
||||
default='X-Forwarded-Proto',
|
||||
help="The HTTP Header that will be used to determine which "
|
||||
"the original request protocol scheme was, even if it was "
|
||||
"removed by an SSL terminator proxy.")
|
||||
]
|
||||
cfg.CONF.register_opts(ssl_middleware_opts)
|
||||
|
||||
|
||||
class SSLMiddleware(wsgi.Middleware):
|
||||
"""A middleware that replaces the request wsgi.url_scheme environment
|
||||
variable with the value of HTTP header configured in
|
||||
secure_proxy_ssl_header if exists in the incoming request.
|
||||
This is useful if the server is behind a SSL termination proxy.
|
||||
"""
|
||||
def __init__(self, application):
|
||||
super(SSLMiddleware, self).__init__(application)
|
||||
self.secure_proxy_ssl_header = 'HTTP_{0}'.format(
|
||||
cfg.CONF.secure_proxy_ssl_header.upper().replace('-', '_'))
|
||||
|
||||
def process_request(self, req):
|
||||
req.environ['wsgi.url_scheme'] = req.environ.get(
|
||||
self.secure_proxy_ssl_header, req.environ['wsgi.url_scheme'])
|
@ -15,6 +15,7 @@
|
||||
|
||||
from heat.api.middleware.version_negotiation import VersionNegotiationFilter
|
||||
from heat.api.middleware.fault import FaultWrapper
|
||||
from heat.api.middleware.ssl import SSLMiddleware
|
||||
from heat.api.openstack import versions
|
||||
|
||||
|
||||
@ -25,3 +26,7 @@ def version_negotiation_filter(app, conf, **local_conf):
|
||||
|
||||
def faultwrap_filter(app, conf, **local_conf):
|
||||
return FaultWrapper(app)
|
||||
|
||||
|
||||
def sslmiddleware_filter(app, conf, **local_conf):
|
||||
return SSLMiddleware(app)
|
||||
|
46
heat/tests/test_ssl_middleware.py
Normal file
46
heat/tests/test_ssl_middleware.py
Normal file
@ -0,0 +1,46 @@
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
import webob
|
||||
|
||||
from heat.api.middleware import ssl
|
||||
from oslo.config import cfg
|
||||
|
||||
from heat.tests.common import HeatTestCase
|
||||
|
||||
|
||||
class SSLMiddlewareTest(HeatTestCase):
|
||||
scenarios = [('with_forwarded_proto_default_header',
|
||||
dict(forwarded_protocol='https',
|
||||
secure_proxy_ssl_header=None,
|
||||
headers={'X-Forwarded-Proto': 'https'})),
|
||||
('with_forwarded_proto_non_default_header',
|
||||
dict(forwarded_protocol='http',
|
||||
secure_proxy_ssl_header='X-My-Forwarded-Proto',
|
||||
headers={})),
|
||||
('without_forwarded_proto',
|
||||
dict(forwarded_protocol='http',
|
||||
secure_proxy_ssl_header=None,
|
||||
headers={}))]
|
||||
|
||||
def test_ssl_middleware(self):
|
||||
if self.secure_proxy_ssl_header:
|
||||
cfg.CONF.set_override('secure_proxy_ssl_header',
|
||||
self.secure_proxy_ssl_header)
|
||||
|
||||
middleware = ssl.SSLMiddleware(None)
|
||||
request = webob.Request.blank('/stacks', headers=self.headers)
|
||||
self.assertIsNone(middleware.process_request(request))
|
||||
self.assertEqual(self.forwarded_protocol,
|
||||
request.environ['wsgi.url_scheme'])
|
Loading…
Reference in New Issue
Block a user