mirror of
https://github.com/alibaba/higress.git
synced 2026-05-05 02:47:26 +08:00
Add plugins (#27)
This commit is contained in:
461
plugins/wasm-cpp/common/route_rule_matcher.h
Normal file
461
plugins/wasm-cpp/common/route_rule_matcher.h
Normal file
@@ -0,0 +1,461 @@
|
||||
/*
|
||||
* Copyright (c) 2022 Alibaba Group Holding Ltd.
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
#pragma once
|
||||
|
||||
#include <optional>
|
||||
#include <string>
|
||||
#include <unordered_map>
|
||||
#include <unordered_set>
|
||||
#include <utility>
|
||||
#include <vector>
|
||||
|
||||
#include "absl/strings/match.h"
|
||||
#include "absl/strings/str_cat.h"
|
||||
#include "common/json_util.h"
|
||||
#include "http_util.h"
|
||||
|
||||
#ifndef NULL_PLUGIN
|
||||
|
||||
#include "proxy_wasm_intrinsics.h"
|
||||
|
||||
#else
|
||||
|
||||
#include "include/proxy-wasm/null_plugin.h"
|
||||
using namespace proxy_wasm::null_plugin;
|
||||
using proxy_wasm::FilterDataStatus;
|
||||
using proxy_wasm::FilterHeadersStatus;
|
||||
|
||||
#endif
|
||||
|
||||
#define GET_HEADER_VIEW(key, name) \
|
||||
auto name##_ptr = getRequestHeader(key); \
|
||||
auto name = name##_ptr->view();
|
||||
|
||||
#define GET_RESPONSE_HEADER_VIEW(key, name) \
|
||||
auto name##_ptr = getResponseHeader(key); \
|
||||
auto name = name##_ptr->view();
|
||||
|
||||
using ::nlohmann::json;
|
||||
using ::Wasm::Common::JsonArrayIterate;
|
||||
using ::Wasm::Common::JsonGetField;
|
||||
using ::Wasm::Common::JsonObjectIterate;
|
||||
using ::Wasm::Common::JsonValueAs;
|
||||
|
||||
template <typename PluginConfig>
|
||||
class RouteRuleMatcher {
|
||||
public:
|
||||
enum CATEGORY { Route, Host };
|
||||
enum MATCH_TYPE { Prefix, Exact, Suffix };
|
||||
struct RuleConfig {
|
||||
CATEGORY category;
|
||||
std::unordered_set<std::string> routes;
|
||||
std::vector<std::pair<MATCH_TYPE, std::string>> hosts;
|
||||
PluginConfig config;
|
||||
};
|
||||
struct AuthRuleConfig {
|
||||
RuleConfig rule_config;
|
||||
std::unordered_set<std::string> allow_set;
|
||||
bool has_local_config = false;
|
||||
};
|
||||
RouteRuleMatcher() = default;
|
||||
virtual ~RouteRuleMatcher() = default;
|
||||
|
||||
void setInvalidConfig() { invalid_config_ = true; }
|
||||
|
||||
std::vector<std::pair<int, std::reference_wrapper<PluginConfig>>> getRules() {
|
||||
std::vector<std::pair<int, std::reference_wrapper<PluginConfig>>> rules;
|
||||
rules.reserve(rule_config_.size() + 1);
|
||||
if (global_config_) {
|
||||
rules.emplace_back(0, global_config_.value());
|
||||
}
|
||||
for (int i = 0; i < rule_config_.size(); i++) {
|
||||
rules.emplace_back(i + 1, rule_config_[i].config);
|
||||
}
|
||||
return rules;
|
||||
}
|
||||
|
||||
FilterHeadersStatus onHeaders(
|
||||
const std::function<FilterHeadersStatus(const PluginConfig&)> process) {
|
||||
if (invalid_config_) {
|
||||
return FilterHeadersStatus::Continue;
|
||||
}
|
||||
auto config = getMatchConfig();
|
||||
if (!config.second) {
|
||||
return FilterHeadersStatus::Continue;
|
||||
}
|
||||
return process(config.second.value());
|
||||
}
|
||||
|
||||
bool checkRule(const std::function<bool(const PluginConfig&)> checkPlugin) {
|
||||
if (invalid_config_) {
|
||||
return true;
|
||||
}
|
||||
auto config = getMatchConfig();
|
||||
if (!config.second) {
|
||||
// No config need to check
|
||||
return true;
|
||||
}
|
||||
return checkPlugin(config.second.value());
|
||||
}
|
||||
|
||||
bool checkAuthRule(
|
||||
const std::function<
|
||||
bool(const PluginConfig&,
|
||||
const std::optional<std::unordered_set<std::string>>& allow_set)>
|
||||
checkPlugin) {
|
||||
if (invalid_config_) {
|
||||
return true;
|
||||
}
|
||||
auto config = getMatchAuthConfig();
|
||||
if (!config.first) {
|
||||
// No config need to check
|
||||
LOG_DEBUG("no match config");
|
||||
return true;
|
||||
}
|
||||
return checkPlugin(config.first.value(), config.second);
|
||||
}
|
||||
|
||||
bool checkRuleWithId(
|
||||
const std::function<bool(int, const PluginConfig&)> checkPlugin) {
|
||||
if (invalid_config_) {
|
||||
return true;
|
||||
}
|
||||
auto config = getMatchConfig();
|
||||
if (!config.second) {
|
||||
// No config need to check
|
||||
return true;
|
||||
}
|
||||
return checkPlugin(config.first, config.second.value());
|
||||
}
|
||||
|
||||
std::pair<int, std::optional<std::reference_wrapper<PluginConfig>>>
|
||||
getMatchConfig() {
|
||||
auto request_host_header = getRequestHeader(":authority");
|
||||
auto request_host = request_host_header->view();
|
||||
std::string route_name;
|
||||
getValue({"route_name"}, &route_name);
|
||||
std::optional<std::reference_wrapper<PluginConfig>> match_config;
|
||||
int rule_id;
|
||||
if (global_config_) {
|
||||
rule_id = 0;
|
||||
match_config = global_config_.value();
|
||||
}
|
||||
for (int i = 0; i < rule_config_.size(); ++i) {
|
||||
auto& rule = rule_config_[i];
|
||||
if (rule.category == CATEGORY::Host) {
|
||||
if (hostMatch(rule, request_host)) {
|
||||
rule_id = i + 1;
|
||||
match_config = rule.config;
|
||||
break;
|
||||
}
|
||||
}
|
||||
// category == Route
|
||||
if (rule.routes.find(route_name) != rule.routes.end()) {
|
||||
rule_id = i + 1;
|
||||
match_config = rule.config;
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (match_config) {
|
||||
return std::make_pair(rule_id, match_config);
|
||||
}
|
||||
return std::make_pair(-1, match_config);
|
||||
}
|
||||
|
||||
std::pair<
|
||||
std::optional<std::reference_wrapper<PluginConfig>>,
|
||||
std::optional<std::reference_wrapper<std::unordered_set<std::string>>>>
|
||||
getMatchAuthConfig() {
|
||||
auto request_host_header = getRequestHeader(":authority");
|
||||
auto request_host = request_host_header->view();
|
||||
std::string route_name;
|
||||
getValue({"route_name"}, &route_name);
|
||||
std::optional<std::reference_wrapper<PluginConfig>> match_config;
|
||||
std::optional<std::reference_wrapper<std::unordered_set<std::string>>>
|
||||
allow_set;
|
||||
if (global_config_) {
|
||||
match_config = global_config_.value();
|
||||
}
|
||||
if (auth_rule_config_.empty()) {
|
||||
return std::make_pair(match_config, std::nullopt);
|
||||
}
|
||||
bool is_matched = false;
|
||||
for (auto& auth_rule : auth_rule_config_) {
|
||||
if (auth_rule.rule_config.category == CATEGORY::Host) {
|
||||
if (hostMatch(auth_rule.rule_config, request_host)) {
|
||||
is_matched = true;
|
||||
if (auth_rule.has_local_config) {
|
||||
LOG_DEBUG("has local config");
|
||||
match_config = auth_rule.rule_config.config;
|
||||
} else {
|
||||
LOG_DEBUG("has not local config");
|
||||
allow_set = auth_rule.allow_set;
|
||||
}
|
||||
break;
|
||||
}
|
||||
}
|
||||
// category == Route
|
||||
if (auth_rule.rule_config.routes.find(route_name) !=
|
||||
auth_rule.rule_config.routes.end()) {
|
||||
is_matched = true;
|
||||
if (auth_rule.has_local_config) {
|
||||
match_config = auth_rule.rule_config.config;
|
||||
} else {
|
||||
allow_set = auth_rule.allow_set;
|
||||
}
|
||||
break;
|
||||
}
|
||||
}
|
||||
return is_matched ? std::make_pair(match_config, allow_set)
|
||||
: std::make_pair(std::nullopt, std::nullopt);
|
||||
}
|
||||
|
||||
void setEmptyGlobalConfig() { global_config_ = PluginConfig{}; }
|
||||
|
||||
bool parseRuleConfig(const json& config) {
|
||||
bool has_rules = false;
|
||||
int32_t key_count = config.size();
|
||||
auto it = config.find("_rules_");
|
||||
if (it != config.end()) {
|
||||
has_rules = true;
|
||||
key_count--;
|
||||
}
|
||||
PluginConfig plugin_config;
|
||||
// has other config fields
|
||||
if (key_count > 0 && parsePluginConfig(config, plugin_config)) {
|
||||
global_config_ = std::move(plugin_config);
|
||||
}
|
||||
if (!has_rules) {
|
||||
return global_config_ ? true : false;
|
||||
}
|
||||
auto rules = it.value();
|
||||
if (!rules.is_array()) {
|
||||
LOG_WARN("'_rules_' field is not an array");
|
||||
return false;
|
||||
}
|
||||
for (const auto& item : rules.items()) {
|
||||
RuleConfig rule;
|
||||
auto config = item.value();
|
||||
if (!parsePluginConfig(config, rule.config)) {
|
||||
LOG_WARN("parse rule's config failed");
|
||||
return false;
|
||||
}
|
||||
if (!parseRouteMatchConfig(config, rule.routes)) {
|
||||
LOG_WARN("failed to parse configuration for _match_route_");
|
||||
return false;
|
||||
}
|
||||
if (!parseDomainMatchConfig(config, rule.hosts)) {
|
||||
LOG_WARN("failed to parse configuration for _match_domain_");
|
||||
return false;
|
||||
}
|
||||
auto no_route = rule.routes.empty();
|
||||
auto no_host = rule.hosts.empty();
|
||||
if ((no_route && no_host) || (!no_route && !no_host)) {
|
||||
LOG_WARN(
|
||||
"there is only one of '_match_route_' and '_match_domain_' can "
|
||||
"present in configuration.");
|
||||
return false;
|
||||
}
|
||||
if (!no_route) {
|
||||
rule.category = CATEGORY::Route;
|
||||
} else {
|
||||
rule.category = CATEGORY::Host;
|
||||
}
|
||||
rule_config_.push_back(std::move(rule));
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
bool parseAuthRuleConfig(const json& config) {
|
||||
bool has_rules = false;
|
||||
int32_t key_count = config.size();
|
||||
auto it = config.find("_rules_");
|
||||
if (it != config.end()) {
|
||||
has_rules = true;
|
||||
key_count--;
|
||||
}
|
||||
PluginConfig plugin_config;
|
||||
// has other config fields
|
||||
if (key_count > 0 && parsePluginConfig(config, plugin_config)) {
|
||||
global_config_ = std::move(plugin_config);
|
||||
}
|
||||
if (!has_rules) {
|
||||
return global_config_ ? true : false;
|
||||
}
|
||||
auto rules = it.value();
|
||||
if (!rules.is_array()) {
|
||||
LOG_WARN("'_rules_' field is not an array");
|
||||
return false;
|
||||
}
|
||||
for (const auto& item : rules.items()) {
|
||||
AuthRuleConfig auth_rule;
|
||||
auto config = item.value();
|
||||
auto has_allow = config.find("allow");
|
||||
if (has_allow != config.end()) {
|
||||
LOG_DEBUG("has allow filed");
|
||||
if (!JsonArrayIterate(config, "allow", [&](const json& allow) -> bool {
|
||||
auto parse_result = JsonValueAs<std::string>(allow);
|
||||
if (parse_result.second !=
|
||||
Wasm::Common::JsonParserResultDetail::OK ||
|
||||
!parse_result.first) {
|
||||
LOG_WARN(
|
||||
"failed to parse 'allow' field in filter configuration.");
|
||||
return false;
|
||||
}
|
||||
LOG_DEBUG(parse_result.first.value());
|
||||
auth_rule.allow_set.insert(parse_result.first.value());
|
||||
return true;
|
||||
})) {
|
||||
LOG_WARN("failed to parse configuration for allow");
|
||||
return false;
|
||||
}
|
||||
}
|
||||
if (!parsePluginConfig(config, auth_rule.rule_config.config)) {
|
||||
if (has_allow == config.end()) {
|
||||
LOG_WARN("parse rule's config failed");
|
||||
return false;
|
||||
}
|
||||
} else {
|
||||
auth_rule.has_local_config = true;
|
||||
}
|
||||
if (!parseRouteMatchConfig(config, auth_rule.rule_config.routes)) {
|
||||
LOG_WARN("failed to parse configuration for _match_route_");
|
||||
return false;
|
||||
}
|
||||
if (!parseDomainMatchConfig(config, auth_rule.rule_config.hosts)) {
|
||||
LOG_WARN("failed to parse configuration for _match_domain_");
|
||||
return false;
|
||||
}
|
||||
auto no_route = auth_rule.rule_config.routes.empty();
|
||||
auto no_host = auth_rule.rule_config.hosts.empty();
|
||||
if ((no_route && no_host) || (!no_route && !no_host)) {
|
||||
LOG_WARN(
|
||||
"there is only one of '_match_route_' and '_match_domain_' can "
|
||||
"present in configuration.");
|
||||
return false;
|
||||
}
|
||||
if (!no_route) {
|
||||
auth_rule.rule_config.category = CATEGORY::Route;
|
||||
} else {
|
||||
auth_rule.rule_config.category = CATEGORY::Host;
|
||||
}
|
||||
auth_rule_config_.push_back(std::move(auth_rule));
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
protected:
|
||||
virtual bool parsePluginConfig(const json&, PluginConfig&) = 0;
|
||||
|
||||
private:
|
||||
bool hostMatch(const RuleConfig& rule, std::string_view request_host) {
|
||||
if (rule.hosts.empty()) {
|
||||
// If no host specified, consider this rule applies to all host.
|
||||
return true;
|
||||
}
|
||||
|
||||
for (const auto& host_match : rule.hosts) {
|
||||
const auto& host = host_match.second;
|
||||
switch (host_match.first) {
|
||||
case MATCH_TYPE::Suffix:
|
||||
if (absl::EndsWith(
|
||||
absl::string_view(request_host.data(), request_host.size()),
|
||||
absl::string_view(host.data(), host.size()))) {
|
||||
return true;
|
||||
}
|
||||
break;
|
||||
case MATCH_TYPE::Prefix:
|
||||
if (absl::StartsWith(
|
||||
absl::string_view(request_host.data(), request_host.size()),
|
||||
absl::string_view(host.data(), host.size()))) {
|
||||
return true;
|
||||
}
|
||||
break;
|
||||
case MATCH_TYPE::Exact:
|
||||
if (request_host == host_match.second) {
|
||||
return true;
|
||||
}
|
||||
break;
|
||||
default:
|
||||
LOG_WARN(absl::StrCat("unexpected host match pattern"));
|
||||
return false;
|
||||
}
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
bool parseRouteMatchConfig(const json& config,
|
||||
std::unordered_set<std::string>& routes) {
|
||||
return JsonArrayIterate(
|
||||
config, "_match_route_", [&](const json& route) -> bool {
|
||||
auto parse_result = JsonValueAs<std::string>(route);
|
||||
if (parse_result.second != Wasm::Common::JsonParserResultDetail::OK ||
|
||||
!parse_result.first) {
|
||||
LOG_WARN(
|
||||
"failed to parse '_match_route_' field in filter "
|
||||
"configuration.");
|
||||
return false;
|
||||
}
|
||||
routes.insert(parse_result.first.value());
|
||||
return true;
|
||||
});
|
||||
}
|
||||
|
||||
bool parseDomainMatchConfig(
|
||||
const json& config,
|
||||
std::vector<std::pair<MATCH_TYPE, std::string>>& hosts) {
|
||||
return JsonArrayIterate(
|
||||
config, "_match_domain_", [&](const json& host) -> bool {
|
||||
auto parse_result = JsonValueAs<std::string>(host);
|
||||
if (parse_result.second != Wasm::Common::JsonParserResultDetail::OK ||
|
||||
!parse_result.first) {
|
||||
LOG_WARN(
|
||||
"failed to parse '_match_domain_' field in filter "
|
||||
"configuration.");
|
||||
return false;
|
||||
}
|
||||
auto& host_str = parse_result.first.value();
|
||||
std::pair<MATCH_TYPE, std::string> host_match;
|
||||
if (absl::StartsWith(host_str, "*")) {
|
||||
// suffix match
|
||||
host_match.first = MATCH_TYPE::Suffix;
|
||||
host_match.second = host_str.substr(1);
|
||||
// if (absl::StartsWith(host_match.second, ".")) {
|
||||
// host_match.second = host_match.second.substr(1);
|
||||
// }
|
||||
} else if (absl::EndsWith(host_str, "*")) {
|
||||
// prefix match
|
||||
host_match.first = MATCH_TYPE::Prefix;
|
||||
host_match.second = host_str.substr(0, host_str.size() - 1);
|
||||
// if (absl::EndsWith(host_match.second, ".")) {
|
||||
// host_match.second = host_match.second.substr(
|
||||
// 0, host_match.second.size() - 1);
|
||||
// }
|
||||
} else {
|
||||
host_match.first = MATCH_TYPE::Exact;
|
||||
host_match.second = host_str;
|
||||
}
|
||||
hosts.push_back(host_match);
|
||||
return true;
|
||||
});
|
||||
}
|
||||
|
||||
bool invalid_config_ = false;
|
||||
std::vector<RuleConfig> rule_config_;
|
||||
std::vector<AuthRuleConfig> auth_rule_config_;
|
||||
std::optional<PluginConfig> global_config_ = std::nullopt;
|
||||
};
|
||||
Reference in New Issue
Block a user