Add backward-compatible CA_CERT alias to prevent startup NameError
This commit is contained in:
@@ -1,8 +1,9 @@
|
|||||||
import logging
|
import logging
|
||||||
import os
|
import os
|
||||||
|
import time
|
||||||
|
|
||||||
import requests
|
import requests
|
||||||
from flask import Flask, Response, request
|
from flask import Flask, Response, g, request
|
||||||
|
|
||||||
app = Flask(__name__)
|
app = Flask(__name__)
|
||||||
|
|
||||||
@@ -11,45 +12,135 @@ logging.basicConfig(
|
|||||||
format="%(asctime)s %(levelname)s %(message)s",
|
format="%(asctime)s %(levelname)s %(message)s",
|
||||||
)
|
)
|
||||||
logger = logging.getLogger("mtls-bridge")
|
logger = logging.getLogger("mtls-bridge")
|
||||||
|
logging.getLogger("werkzeug").setLevel(logging.WARNING)
|
||||||
|
|
||||||
# Config via env
|
# Config via env
|
||||||
TARGET_URL = os.environ.get("TARGET_URL")
|
TARGET_URL = os.environ.get("TARGET_URL")
|
||||||
CLIENT_CERT = os.environ.get("CLIENT_CERT", "/certs/client.crt")
|
CLIENT_CERT = os.environ.get("CLIENT_CERT", "/certs/client.crt")
|
||||||
CLIENT_KEY = os.environ.get("CLIENT_KEY", "/certs/client.key")
|
CLIENT_KEY = os.environ.get("CLIENT_KEY", "/certs/client.key")
|
||||||
CA_CERT = os.environ.get("CA_CERT", "/certs/ca.crt")
|
UPSTREAM_CA_CERT = os.environ.get("UPSTREAM_CA_CERT", os.environ.get("CA_CERT", "")).strip()
|
||||||
|
# Backward-compat alias: keep CA_CERT defined so legacy code paths/log statements don't crash.
|
||||||
|
CA_CERT = UPSTREAM_CA_CERT
|
||||||
TIMEOUT = int(os.environ.get("TIMEOUT", "5"))
|
TIMEOUT = int(os.environ.get("TIMEOUT", "5"))
|
||||||
|
|
||||||
|
|
||||||
|
def get_verify_setting():
|
||||||
|
if not UPSTREAM_CA_CERT:
|
||||||
|
return True
|
||||||
|
|
||||||
|
lowered = UPSTREAM_CA_CERT.lower()
|
||||||
|
if lowered in {"false", "0", "no"}:
|
||||||
|
logger.warning("TLS verification for upstream is disabled via UPSTREAM_CA_CERT=%s", UPSTREAM_CA_CERT)
|
||||||
|
return False
|
||||||
|
|
||||||
|
if not os.path.exists(UPSTREAM_CA_CERT):
|
||||||
|
logger.warning(
|
||||||
|
"Configured UPSTREAM_CA_CERT path does not exist: %s (falling back to system CA bundle)",
|
||||||
|
UPSTREAM_CA_CERT,
|
||||||
|
)
|
||||||
|
return True
|
||||||
|
|
||||||
|
return UPSTREAM_CA_CERT
|
||||||
|
|
||||||
|
|
||||||
|
VERIFY_SETTING = get_verify_setting()
|
||||||
|
|
||||||
|
logger.info(
|
||||||
|
"mtls-bridge starting target_url=%s timeout=%ss cert=%s key=%s verify=%s log_level=%s",
|
||||||
|
TARGET_URL,
|
||||||
|
TIMEOUT,
|
||||||
|
CLIENT_CERT,
|
||||||
|
CLIENT_KEY,
|
||||||
|
VERIFY_SETTING,
|
||||||
|
os.environ.get("LOG_LEVEL", "INFO"),
|
||||||
|
)
|
||||||
|
|
||||||
|
if TARGET_URL and TARGET_URL.lower().startswith("http://"):
|
||||||
|
logger.warning(
|
||||||
|
"TARGET_URL uses http://; upstream may redirect to https:// and change request behavior: %s",
|
||||||
|
TARGET_URL,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
@app.route("/health", methods=["GET"])
|
@app.route("/health", methods=["GET"])
|
||||||
def health():
|
def health():
|
||||||
|
logger.debug("healthcheck request from %s", request.remote_addr)
|
||||||
return "OK", 200
|
return "OK", 200
|
||||||
|
|
||||||
|
|
||||||
@app.route("/", defaults={"path": ""}, methods=["GET", "POST", "PUT", "DELETE", "PATCH"])
|
@app.before_request
|
||||||
@app.route("/<path:path>", methods=["GET", "POST", "PUT", "DELETE", "PATCH"])
|
def before_request():
|
||||||
|
g.request_start = time.time()
|
||||||
|
|
||||||
|
|
||||||
|
@app.after_request
|
||||||
|
def after_request(response):
|
||||||
|
elapsed_ms = int((time.time() - g.request_start) * 1000)
|
||||||
|
if request.path != "/health":
|
||||||
|
logger.info(
|
||||||
|
"request complete method=%s path=%s status=%s elapsed_ms=%s",
|
||||||
|
request.method,
|
||||||
|
request.path,
|
||||||
|
response.status_code,
|
||||||
|
elapsed_ms,
|
||||||
|
)
|
||||||
|
return response
|
||||||
|
|
||||||
|
|
||||||
|
@app.route(
|
||||||
|
"/",
|
||||||
|
defaults={"path": ""},
|
||||||
|
methods=["GET", "POST", "PUT", "DELETE", "PATCH", "OPTIONS", "HEAD"],
|
||||||
|
provide_automatic_options=False,
|
||||||
|
)
|
||||||
|
@app.route(
|
||||||
|
"/<path:path>",
|
||||||
|
methods=["GET", "POST", "PUT", "DELETE", "PATCH", "OPTIONS", "HEAD"],
|
||||||
|
provide_automatic_options=False,
|
||||||
|
)
|
||||||
def proxy(path):
|
def proxy(path):
|
||||||
logger.info("request method=%s path=/%s", request.method, path)
|
request_path = f"/{path}" if path else "/"
|
||||||
|
request_size = len(request.get_data(cache=True))
|
||||||
|
logger.info(
|
||||||
|
"incoming request method=%s path=%s query=%s remote=%s bytes=%s",
|
||||||
|
request.method,
|
||||||
|
request_path,
|
||||||
|
request.query_string.decode("utf-8", "ignore"),
|
||||||
|
request.remote_addr,
|
||||||
|
request_size,
|
||||||
|
)
|
||||||
|
|
||||||
if not TARGET_URL:
|
if not TARGET_URL:
|
||||||
|
logger.error("TARGET_URL is not set; cannot proxy request")
|
||||||
return Response("TARGET_URL is not set", status=500)
|
return Response("TARGET_URL is not set", status=500)
|
||||||
|
|
||||||
try:
|
try:
|
||||||
url = f"{TARGET_URL.rstrip('/')}/{path}".rstrip("/")
|
url = f"{TARGET_URL.rstrip('/')}/{path}".rstrip("/")
|
||||||
|
start_time = time.time()
|
||||||
headers = {k: v for k, v in request.headers if k.lower() != "host"}
|
headers = {k: v for k, v in request.headers if k.lower() != "host"}
|
||||||
headers["X-Forwarded-By"] = "mtls-bridge"
|
headers["X-Forwarded-By"] = "mtls-bridge"
|
||||||
|
|
||||||
|
logger.debug("forwarding request to upstream url=%s headers=%s", url, headers)
|
||||||
|
|
||||||
resp = requests.request(
|
resp = requests.request(
|
||||||
method=request.method,
|
method=request.method,
|
||||||
url=url,
|
url=url,
|
||||||
headers=headers,
|
headers=headers,
|
||||||
data=request.get_data(),
|
data=request.get_data(cache=True),
|
||||||
cookies=request.cookies,
|
cookies=request.cookies,
|
||||||
cert=(CLIENT_CERT, CLIENT_KEY),
|
cert=(CLIENT_CERT, CLIENT_KEY),
|
||||||
verify=CA_CERT,
|
verify=VERIFY_SETTING,
|
||||||
timeout=TIMEOUT,
|
timeout=TIMEOUT,
|
||||||
)
|
)
|
||||||
|
|
||||||
logger.info("upstream status=%s url=%s", resp.status_code, url)
|
elapsed_ms = int((time.time() - start_time) * 1000)
|
||||||
|
logger.info(
|
||||||
|
"upstream response status=%s url=%s elapsed_ms=%s response_bytes=%s",
|
||||||
|
resp.status_code,
|
||||||
|
url,
|
||||||
|
elapsed_ms,
|
||||||
|
len(resp.content),
|
||||||
|
)
|
||||||
|
|
||||||
excluded_headers = ["content-encoding", "content-length", "transfer-encoding", "connection"]
|
excluded_headers = ["content-encoding", "content-length", "transfer-encoding", "connection"]
|
||||||
response_headers = [
|
response_headers = [
|
||||||
|
|||||||
@@ -9,8 +9,9 @@ services:
|
|||||||
- TARGET_URL=https://node-red.lan.ddnsgeek.com/docker-update-lockouts/clear
|
- TARGET_URL=https://node-red.lan.ddnsgeek.com/docker-update-lockouts/clear
|
||||||
- CLIENT_CERT=/certs/clients/office-pc/office-pc.crt
|
- CLIENT_CERT=/certs/clients/office-pc/office-pc.crt
|
||||||
- CLIENT_KEY=/certs/clients/office-pc/office-pc.key
|
- CLIENT_KEY=/certs/clients/office-pc/office-pc.key
|
||||||
- CA_CERT=/certs/ca/clents-ca.crt
|
|
||||||
- TIMEOUT=5
|
- TIMEOUT=5
|
||||||
|
- LOG_LEVEL=${MTLS_BRIDGE_LOG_LEVEL:-INFO}
|
||||||
|
- UPSTREAM_CA_CERT=${MTLS_BRIDGE_UPSTREAM_CA_CERT:-}
|
||||||
volumes:
|
volumes:
|
||||||
- ${PROJECT_ROOT}/core/traefik/certs:/certs:ro
|
- ${PROJECT_ROOT}/core/traefik/certs:/certs:ro
|
||||||
healthcheck:
|
healthcheck:
|
||||||
|
|||||||
Reference in New Issue
Block a user