/* Copyright 2015 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package template import ( "fmt" "net" "strconv" "strings" "time" "k8s.io/klog" "github.com/mitchellh/hashstructure" "github.com/mitchellh/mapstructure" "k8s.io/apimachinery/pkg/util/sets" "k8s.io/ingress-nginx/internal/ingress/controller/config" ing_net "k8s.io/ingress-nginx/internal/net" "k8s.io/ingress-nginx/internal/runtime" ) const ( customHTTPErrors = "custom-http-errors" skipAccessLogUrls = "skip-access-log-urls" whitelistSourceRange = "whitelist-source-range" proxyRealIPCIDR = "proxy-real-ip-cidr" bindAddress = "bind-address" httpRedirectCode = "http-redirect-code" blockCIDRs = "block-cidrs" blockUserAgents = "block-user-agents" blockReferers = "block-referers" proxyStreamResponses = "proxy-stream-responses" hideHeaders = "hide-headers" nginxStatusIpv4Whitelist = "nginx-status-ipv4-whitelist" nginxStatusIpv6Whitelist = "nginx-status-ipv6-whitelist" proxyHeaderTimeout = "proxy-protocol-header-timeout" workerProcesses = "worker-processes" ) var ( validRedirectCodes = sets.NewInt([]int{301, 302, 307, 308}...) ) // ReadConfig obtains the configuration defined by the user merged with the defaults. func ReadConfig(src map[string]string) config.Configuration { conf := map[string]string{} // we need to copy the configmap data because the content is altered for k, v := range src { conf[k] = v } to := config.NewDefault() errors := make([]int, 0) skipUrls := make([]string, 0) whiteList := make([]string, 0) proxyList := make([]string, 0) hideHeadersList := make([]string, 0) bindAddressIpv4List := make([]string, 0) bindAddressIpv6List := make([]string, 0) blockCIDRList := make([]string, 0) blockUserAgentList := make([]string, 0) blockRefererList := make([]string, 0) if val, ok := conf[customHTTPErrors]; ok { delete(conf, customHTTPErrors) for _, i := range strings.Split(val, ",") { j, err := strconv.Atoi(i) if err != nil { klog.Warningf("%v is not a valid http code: %v", i, err) } else { errors = append(errors, j) } } } if val, ok := conf[hideHeaders]; ok { delete(conf, hideHeaders) hideHeadersList = strings.Split(val, ",") } if val, ok := conf[skipAccessLogUrls]; ok { delete(conf, skipAccessLogUrls) skipUrls = strings.Split(val, ",") } if val, ok := conf[whitelistSourceRange]; ok { delete(conf, whitelistSourceRange) whiteList = append(whiteList, strings.Split(val, ",")...) } if val, ok := conf[proxyRealIPCIDR]; ok { delete(conf, proxyRealIPCIDR) proxyList = append(proxyList, strings.Split(val, ",")...) } else { proxyList = append(proxyList, "0.0.0.0/0") } if val, ok := conf[bindAddress]; ok { delete(conf, bindAddress) for _, i := range strings.Split(val, ",") { ns := net.ParseIP(i) if ns != nil { if ing_net.IsIPV6(ns) { bindAddressIpv6List = append(bindAddressIpv6List, fmt.Sprintf("[%v]", ns)) } else { bindAddressIpv4List = append(bindAddressIpv4List, fmt.Sprintf("%v", ns)) } } else { klog.Warningf("%v is not a valid textual representation of an IP address", i) } } } if val, ok := conf[blockCIDRs]; ok { delete(conf, blockCIDRs) blockCIDRList = strings.Split(val, ",") } if val, ok := conf[blockUserAgents]; ok { delete(conf, blockUserAgents) blockUserAgentList = strings.Split(val, ",") } if val, ok := conf[blockReferers]; ok { delete(conf, blockReferers) blockRefererList = strings.Split(val, ",") } if val, ok := conf[httpRedirectCode]; ok { delete(conf, httpRedirectCode) j, err := strconv.Atoi(val) if err != nil { klog.Warningf("%v is not a valid HTTP code: %v", val, err) } else { if validRedirectCodes.Has(j) { to.HTTPRedirectCode = j } else { klog.Warningf("The code %v is not a valid as HTTP redirect code. Using the default.", val) } } } // Verify that the configured timeout is parsable as a duration. if not, set the default value if val, ok := conf[proxyHeaderTimeout]; ok { delete(conf, proxyHeaderTimeout) duration, err := time.ParseDuration(val) if err != nil { klog.Warningf("proxy-protocol-header-timeout of %v encountered an error while being parsed %v. Switching to use default value instead.", val, err) } else { to.ProxyProtocolHeaderTimeout = duration } } streamResponses := 1 if val, ok := conf[proxyStreamResponses]; ok { delete(conf, proxyStreamResponses) j, err := strconv.Atoi(val) if err != nil { klog.Warningf("%v is not a valid number: %v", val, err) } else { streamResponses = j } } // Nginx Status whitelist if val, ok := conf[nginxStatusIpv4Whitelist]; ok { whitelist := make([]string, 0) whitelist = append(whitelist, strings.Split(val, ",")...) to.NginxStatusIpv4Whitelist = whitelist delete(conf, nginxStatusIpv4Whitelist) } if val, ok := conf[nginxStatusIpv6Whitelist]; ok { whitelist := make([]string, 0) whitelist = append(whitelist, strings.Split(val, ",")...) to.NginxStatusIpv6Whitelist = whitelist delete(conf, nginxStatusIpv6Whitelist) } if val, ok := conf[workerProcesses]; ok { to.WorkerProcesses = val if val == "auto" { to.WorkerProcesses = strconv.Itoa(runtime.NumCPU()) } delete(conf, workerProcesses) } to.CustomHTTPErrors = filterErrors(errors) to.SkipAccessLogURLs = skipUrls to.WhitelistSourceRange = whiteList to.ProxyRealIPCIDR = proxyList to.BindAddressIpv4 = bindAddressIpv4List to.BindAddressIpv6 = bindAddressIpv6List to.BlockCIDRs = blockCIDRList to.BlockUserAgents = blockUserAgentList to.BlockReferers = blockRefererList to.HideHeaders = hideHeadersList to.ProxyStreamResponses = streamResponses to.DisableIpv6DNS = !ing_net.IsIPv6Enabled() config := &mapstructure.DecoderConfig{ Metadata: nil, WeaklyTypedInput: true, Result: &to, TagName: "json", } decoder, err := mapstructure.NewDecoder(config) if err != nil { klog.Warningf("unexpected error merging defaults: %v", err) } err = decoder.Decode(conf) if err != nil { klog.Warningf("unexpected error merging defaults: %v", err) } hash, err := hashstructure.Hash(to, &hashstructure.HashOptions{ TagName: "json", }) if err != nil { klog.Warningf("unexpected error obtaining hash: %v", err) } to.Checksum = fmt.Sprintf("%v", hash) return to } func filterErrors(codes []int) []int { var fa []int for _, code := range codes { if code > 299 && code < 600 { fa = append(fa, code) } else { klog.Warningf("error code %v is not valid for custom error pages", code) } } return fa }