mirror of
https://github.com/zitadel/zitadel.git
synced 2025-03-01 04:07:23 +00:00
fix: instance interceptors return NotFound (404) error for unknown hosts (#4184)
* fix: instance interceptors return "NotFound" (404) error for unknown hosts * fix tests
This commit is contained in:
parent
d0733b3185
commit
d656b3f3c9
@ -2,15 +2,20 @@ package middleware
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
"github.com/zitadel/logging"
|
||||||
|
"golang.org/x/text/language"
|
||||||
"google.golang.org/grpc"
|
"google.golang.org/grpc"
|
||||||
"google.golang.org/grpc/codes"
|
"google.golang.org/grpc/codes"
|
||||||
"google.golang.org/grpc/metadata"
|
"google.golang.org/grpc/metadata"
|
||||||
"google.golang.org/grpc/status"
|
"google.golang.org/grpc/status"
|
||||||
|
|
||||||
"github.com/zitadel/zitadel/internal/api/authz"
|
"github.com/zitadel/zitadel/internal/api/authz"
|
||||||
|
caos_errors "github.com/zitadel/zitadel/internal/errors"
|
||||||
|
"github.com/zitadel/zitadel/internal/i18n"
|
||||||
"github.com/zitadel/zitadel/internal/telemetry/tracing"
|
"github.com/zitadel/zitadel/internal/telemetry/tracing"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -23,12 +28,14 @@ type InstanceVerifier interface {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func InstanceInterceptor(verifier authz.InstanceVerifier, headerName string, ignoredServices ...string) grpc.UnaryServerInterceptor {
|
func InstanceInterceptor(verifier authz.InstanceVerifier, headerName string, ignoredServices ...string) grpc.UnaryServerInterceptor {
|
||||||
|
translator, err := newZitadelTranslator(language.English)
|
||||||
|
logging.OnError(err).Panic("unable to get translator")
|
||||||
return func(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (interface{}, error) {
|
return func(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (interface{}, error) {
|
||||||
return setInstance(ctx, req, info, handler, verifier, headerName, ignoredServices...)
|
return setInstance(ctx, req, info, handler, verifier, headerName, translator, ignoredServices...)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func setInstance(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler, verifier authz.InstanceVerifier, headerName string, ignoredServices ...string) (_ interface{}, err error) {
|
func setInstance(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler, verifier authz.InstanceVerifier, headerName string, translator *i18n.Translator, ignoredServices ...string) (_ interface{}, err error) {
|
||||||
interceptorCtx, span := tracing.NewServerInterceptorSpan(ctx)
|
interceptorCtx, span := tracing.NewServerInterceptorSpan(ctx)
|
||||||
defer func() { span.EndWithError(err) }()
|
defer func() { span.EndWithError(err) }()
|
||||||
for _, service := range ignoredServices {
|
for _, service := range ignoredServices {
|
||||||
@ -42,11 +49,15 @@ func setInstance(ctx context.Context, req interface{}, info *grpc.UnaryServerInf
|
|||||||
|
|
||||||
host, err := hostFromContext(interceptorCtx, headerName)
|
host, err := hostFromContext(interceptorCtx, headerName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, status.Error(codes.PermissionDenied, err.Error())
|
return nil, status.Error(codes.NotFound, err.Error())
|
||||||
}
|
}
|
||||||
instance, err := verifier.InstanceByHost(interceptorCtx, host)
|
instance, err := verifier.InstanceByHost(interceptorCtx, host)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, status.Error(codes.PermissionDenied, err.Error())
|
caosErr := new(caos_errors.NotFoundError)
|
||||||
|
if errors.As(err, &caosErr) {
|
||||||
|
caosErr.Message = translator.LocalizeFromCtx(ctx, caosErr.GetMessage(), nil)
|
||||||
|
}
|
||||||
|
return nil, status.Error(codes.NotFound, err.Error())
|
||||||
}
|
}
|
||||||
span.End()
|
span.End()
|
||||||
return handler(authz.WithInstance(ctx, instance), req)
|
return handler(authz.WithInstance(ctx, instance), req)
|
||||||
|
@ -135,7 +135,7 @@ func Test_setInstance(t *testing.T) {
|
|||||||
}
|
}
|
||||||
for _, tt := range tests {
|
for _, tt := range tests {
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
got, err := setInstance(tt.args.ctx, tt.args.req, tt.args.info, tt.args.handler, tt.args.verifier, tt.args.headerName)
|
got, err := setInstance(tt.args.ctx, tt.args.req, tt.args.info, tt.args.handler, tt.args.verifier, tt.args.headerName, nil)
|
||||||
if (err != nil) != tt.res.err {
|
if (err != nil) != tt.res.err {
|
||||||
t.Errorf("setInstance() error = %v, wantErr %v", err, tt.res.err)
|
t.Errorf("setInstance() error = %v, wantErr %v", err, tt.res.err)
|
||||||
return
|
return
|
||||||
|
@ -2,11 +2,18 @@ package middleware
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
"github.com/rakyll/statik/fs"
|
||||||
|
"github.com/zitadel/logging"
|
||||||
|
"golang.org/x/text/language"
|
||||||
|
|
||||||
"github.com/zitadel/zitadel/internal/api/authz"
|
"github.com/zitadel/zitadel/internal/api/authz"
|
||||||
|
caos_errors "github.com/zitadel/zitadel/internal/errors"
|
||||||
|
"github.com/zitadel/zitadel/internal/i18n"
|
||||||
"github.com/zitadel/zitadel/internal/telemetry/tracing"
|
"github.com/zitadel/zitadel/internal/telemetry/tracing"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -14,6 +21,7 @@ type instanceInterceptor struct {
|
|||||||
verifier authz.InstanceVerifier
|
verifier authz.InstanceVerifier
|
||||||
headerName string
|
headerName string
|
||||||
ignoredPrefixes []string
|
ignoredPrefixes []string
|
||||||
|
translator *i18n.Translator
|
||||||
}
|
}
|
||||||
|
|
||||||
func InstanceInterceptor(verifier authz.InstanceVerifier, headerName string, ignoredPrefixes ...string) *instanceInterceptor {
|
func InstanceInterceptor(verifier authz.InstanceVerifier, headerName string, ignoredPrefixes ...string) *instanceInterceptor {
|
||||||
@ -21,43 +29,40 @@ func InstanceInterceptor(verifier authz.InstanceVerifier, headerName string, ign
|
|||||||
verifier: verifier,
|
verifier: verifier,
|
||||||
headerName: headerName,
|
headerName: headerName,
|
||||||
ignoredPrefixes: ignoredPrefixes,
|
ignoredPrefixes: ignoredPrefixes,
|
||||||
|
translator: newZitadelTranslator(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *instanceInterceptor) Handler(next http.Handler) http.Handler {
|
func (a *instanceInterceptor) Handler(next http.Handler) http.Handler {
|
||||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
for _, prefix := range a.ignoredPrefixes {
|
a.handleInstance(w, r, next)
|
||||||
if strings.HasPrefix(r.URL.Path, prefix) {
|
|
||||||
next.ServeHTTP(w, r)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
}
|
|
||||||
ctx, err := setInstance(r, a.verifier, a.headerName)
|
|
||||||
if err != nil {
|
|
||||||
http.Error(w, err.Error(), http.StatusUnauthorized)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
r = r.WithContext(ctx)
|
|
||||||
next.ServeHTTP(w, r)
|
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *instanceInterceptor) HandlerFunc(next http.HandlerFunc) http.HandlerFunc {
|
func (a *instanceInterceptor) HandlerFunc(next http.HandlerFunc) http.HandlerFunc {
|
||||||
return func(w http.ResponseWriter, r *http.Request) {
|
return func(w http.ResponseWriter, r *http.Request) {
|
||||||
for _, prefix := range a.ignoredPrefixes {
|
a.handleInstance(w, r, next)
|
||||||
if strings.HasPrefix(r.URL.Path, prefix) {
|
}
|
||||||
next.ServeHTTP(w, r)
|
}
|
||||||
return
|
|
||||||
}
|
func (a *instanceInterceptor) handleInstance(w http.ResponseWriter, r *http.Request, next http.Handler) {
|
||||||
}
|
for _, prefix := range a.ignoredPrefixes {
|
||||||
ctx, err := setInstance(r, a.verifier, a.headerName)
|
if strings.HasPrefix(r.URL.Path, prefix) {
|
||||||
if err != nil {
|
next.ServeHTTP(w, r)
|
||||||
http.Error(w, err.Error(), http.StatusForbidden)
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
r = r.WithContext(ctx)
|
|
||||||
next.ServeHTTP(w, r)
|
|
||||||
}
|
}
|
||||||
|
ctx, err := setInstance(r, a.verifier, a.headerName)
|
||||||
|
if err != nil {
|
||||||
|
caosErr := new(caos_errors.NotFoundError)
|
||||||
|
if errors.As(err, &caosErr) {
|
||||||
|
caosErr.Message = a.translator.LocalizeFromRequest(r, caosErr.GetMessage(), nil)
|
||||||
|
}
|
||||||
|
http.Error(w, err.Error(), http.StatusNotFound)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
r = r.WithContext(ctx)
|
||||||
|
next.ServeHTTP(w, r)
|
||||||
}
|
}
|
||||||
|
|
||||||
func setInstance(r *http.Request, verifier authz.InstanceVerifier, headerName string) (_ context.Context, err error) {
|
func setInstance(r *http.Request, verifier authz.InstanceVerifier, headerName string) (_ context.Context, err error) {
|
||||||
@ -89,3 +94,12 @@ func HostFromRequest(r *http.Request, headerName string) (string, error) {
|
|||||||
}
|
}
|
||||||
return host, nil
|
return host, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func newZitadelTranslator() *i18n.Translator {
|
||||||
|
dir, err := fs.NewWithNamespace("zitadel")
|
||||||
|
logging.WithFields("namespace", "zitadel").OnError(err).Panic("unable to get namespace")
|
||||||
|
|
||||||
|
translator, err := i18n.NewTranslator(dir, language.English, "")
|
||||||
|
logging.OnError(err).Panic("unable to get translator")
|
||||||
|
return translator
|
||||||
|
}
|
||||||
|
@ -42,7 +42,7 @@ func Test_instanceInterceptor_Handler(t *testing.T) {
|
|||||||
request: httptest.NewRequest("", "/url", nil),
|
request: httptest.NewRequest("", "/url", nil),
|
||||||
},
|
},
|
||||||
res{
|
res{
|
||||||
statusCode: 403,
|
statusCode: 404,
|
||||||
context: nil,
|
context: nil,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@ -109,7 +109,7 @@ func Test_instanceInterceptor_HandlerFunc(t *testing.T) {
|
|||||||
request: httptest.NewRequest("", "/url", nil),
|
request: httptest.NewRequest("", "/url", nil),
|
||||||
},
|
},
|
||||||
res{
|
res{
|
||||||
statusCode: 403,
|
statusCode: 404,
|
||||||
context: nil,
|
context: nil,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@ -229,7 +229,7 @@ type testHandler struct {
|
|||||||
context context.Context
|
context context.Context
|
||||||
}
|
}
|
||||||
|
|
||||||
func (t *testHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
func (t *testHandler) ServeHTTP(_ http.ResponseWriter, r *http.Request) {
|
||||||
t.context = r.Context()
|
t.context = r.Context()
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -237,7 +237,7 @@ type mockInstanceVerifier struct {
|
|||||||
host string
|
host string
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *mockInstanceVerifier) InstanceByHost(ctx context.Context, host string) (authz.Instance, error) {
|
func (m *mockInstanceVerifier) InstanceByHost(_ context.Context, host string) (authz.Instance, error) {
|
||||||
if host != m.host {
|
if host != m.host {
|
||||||
return nil, fmt.Errorf("invalid host")
|
return nil, fmt.Errorf("invalid host")
|
||||||
}
|
}
|
||||||
|
@ -98,22 +98,18 @@ func Start(config Config, externalSecure bool, issuer op.IssuerFromRequest, inst
|
|||||||
security := middleware.SecurityHeaders(csp(), nil)
|
security := middleware.SecurityHeaders(csp(), nil)
|
||||||
|
|
||||||
handler := mux.NewRouter()
|
handler := mux.NewRouter()
|
||||||
handler.Use(security)
|
|
||||||
handler.Handle(envRequestPath, middleware.TelemetryHandler()(instanceHandler(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
handler.Use(security, instanceHandler)
|
||||||
instance := authz.GetInstance(r.Context())
|
handler.Handle(envRequestPath, middleware.TelemetryHandler()(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
if instance.InstanceID() == "" {
|
|
||||||
http.Error(w, "empty instanceID", http.StatusInternalServerError)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
url := http_util.BuildOrigin(r.Host, externalSecure)
|
url := http_util.BuildOrigin(r.Host, externalSecure)
|
||||||
environmentJSON, err := createEnvironmentJSON(url, issuer(r), instance.ConsoleClientID(), customerPortal)
|
environmentJSON, err := createEnvironmentJSON(url, issuer(r), authz.GetInstance(r.Context()).ConsoleClientID(), customerPortal)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
http.Error(w, fmt.Sprintf("unable to marshal env for console: %v", err), http.StatusInternalServerError)
|
http.Error(w, fmt.Sprintf("unable to marshal env for console: %v", err), http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
_, err = w.Write(environmentJSON)
|
_, err = w.Write(environmentJSON)
|
||||||
logging.OnError(err).Error("error serving environment.json")
|
logging.OnError(err).Error("error serving environment.json")
|
||||||
}))))
|
})))
|
||||||
handler.SkipClean(true).PathPrefix("").Handler(cache(http.FileServer(&spaHandler{http.FS(fSys)})))
|
handler.SkipClean(true).PathPrefix("").Handler(cache(http.FileServer(&spaHandler{http.FS(fSys)})))
|
||||||
return handler, nil
|
return handler, nil
|
||||||
}
|
}
|
||||||
|
@ -400,9 +400,6 @@ func prepareInstanceDomainQuery(host string) (sq.SelectBuilder, func(*sql.Rows)
|
|||||||
&sequence,
|
&sequence,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if errs.Is(err, sql.ErrNoRows) {
|
|
||||||
return nil, errors.ThrowNotFound(err, "QUERY-n0wng", "Errors.IAM.NotFound")
|
|
||||||
}
|
|
||||||
return nil, errors.ThrowInternal(err, "QUERY-d9nw", "Errors.Internal")
|
return nil, errors.ThrowInternal(err, "QUERY-d9nw", "Errors.Internal")
|
||||||
}
|
}
|
||||||
if !domain.Valid {
|
if !domain.Valid {
|
||||||
@ -418,6 +415,9 @@ func prepareInstanceDomainQuery(host string) (sq.SelectBuilder, func(*sql.Rows)
|
|||||||
InstanceID: instance.ID,
|
InstanceID: instance.ID,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
if instance.ID == "" {
|
||||||
|
return nil, errors.ThrowNotFound(nil, "QUERY-n0wng", "Errors.IAM.NotFound")
|
||||||
|
}
|
||||||
instance.DefaultLang = language.Make(lang)
|
instance.DefaultLang = language.Make(lang)
|
||||||
if err := rows.Close(); err != nil {
|
if err := rows.Close(); err != nil {
|
||||||
return nil, errors.ThrowInternal(err, "QUERY-Dfbe2", "Errors.Query.CloseRows")
|
return nil, errors.ThrowInternal(err, "QUERY-Dfbe2", "Errors.Query.CloseRows")
|
||||||
|
@ -265,6 +265,7 @@ Errors:
|
|||||||
NotActive: Projekt Grant ist nicht aktiv
|
NotActive: Projekt Grant ist nicht aktiv
|
||||||
NotInactive: Projekt Grant ist nicht inaktiv
|
NotInactive: Projekt Grant ist nicht inaktiv
|
||||||
IAM:
|
IAM:
|
||||||
|
NotFound: Instanz nicht gefunden
|
||||||
Member:
|
Member:
|
||||||
RolesNotChanged: Rollen wurden nicht verändert
|
RolesNotChanged: Rollen wurden nicht verändert
|
||||||
MemberInvalid: Member ist ungültig
|
MemberInvalid: Member ist ungültig
|
||||||
|
@ -265,6 +265,7 @@ Errors:
|
|||||||
NotActive: Project grant is not active
|
NotActive: Project grant is not active
|
||||||
NotInactive: Project grant is not inactive
|
NotInactive: Project grant is not inactive
|
||||||
IAM:
|
IAM:
|
||||||
|
NotFound: Instance not found
|
||||||
Member:
|
Member:
|
||||||
RolesNotChanged: Roles have not been changed
|
RolesNotChanged: Roles have not been changed
|
||||||
MemberInvalid: Member is invalid
|
MemberInvalid: Member is invalid
|
||||||
|
@ -265,6 +265,7 @@ Errors:
|
|||||||
NotActive: La subvention de projet n'est pas active
|
NotActive: La subvention de projet n'est pas active
|
||||||
NotInactive: La subvention du projet n'est pas inactive
|
NotInactive: La subvention du projet n'est pas inactive
|
||||||
IAM:
|
IAM:
|
||||||
|
NotFound: Instance non trouvée
|
||||||
Member:
|
Member:
|
||||||
RolesNotChanged: Les rôles n'ont pas été modifiés
|
RolesNotChanged: Les rôles n'ont pas été modifiés
|
||||||
MemberInvalid: Le membre n'est pas valide
|
MemberInvalid: Le membre n'est pas valide
|
||||||
|
@ -265,6 +265,7 @@ Errors:
|
|||||||
NotActive: Grant del progetto non è attivo
|
NotActive: Grant del progetto non è attivo
|
||||||
NotInactive: Grant del progetto non è inattivo
|
NotInactive: Grant del progetto non è inattivo
|
||||||
IAM:
|
IAM:
|
||||||
|
NotFound: Istanza non trovata
|
||||||
Member:
|
Member:
|
||||||
RolesNotChanged: I ruoli non sono stati cambiati
|
RolesNotChanged: I ruoli non sono stati cambiati
|
||||||
MemberInvalid: Il membro non è valido
|
MemberInvalid: Il membro non è valido
|
||||||
|
@ -9,8 +9,8 @@ import (
|
|||||||
io "io"
|
io "io"
|
||||||
reflect "reflect"
|
reflect "reflect"
|
||||||
|
|
||||||
static "github.com/zitadel/zitadel/internal/static"
|
|
||||||
gomock "github.com/golang/mock/gomock"
|
gomock "github.com/golang/mock/gomock"
|
||||||
|
static "github.com/zitadel/zitadel/internal/static"
|
||||||
)
|
)
|
||||||
|
|
||||||
// MockStorage is a mock of Storage interface.
|
// MockStorage is a mock of Storage interface.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user