mirror of
https://github.com/netbirdio/netbird.git
synced 2026-05-21 08:09:55 +00:00
Adds a new "private" service mode for the reverse proxy: services reachable exclusively over the embedded WireGuard tunnel, gated by per-peer group membership instead of operator auth schemes. Wire contract - ProxyMapping.private (field 13): the proxy MUST call ValidateTunnelPeer and fail closed; operator schemes are bypassed. - ProxyCapabilities.private (4) + supports_private_service (5): capability gate. Management never streams private mappings to proxies that don't claim the capability; the broadcast path applies the same filter via filterMappingsForProxy. - ValidateTunnelPeer RPC: resolves an inbound tunnel IP to a peer, checks the peer's groups against service.AccessGroups, and mints a session JWT on success. checkPeerGroupAccess fails closed when a private service has empty AccessGroups. - ValidateSession/ValidateTunnelPeer responses now carry peer_group_ids + peer_group_names so the proxy can authorise policy-aware middlewares without an extra management round-trip. - ProxyInboundListener + SendStatusUpdate.inbound_listener: per-account inbound listener state surfaced to dashboards. - PathTargetOptions.direct_upstream (11): bypass the embedded NetBird client and dial the target via the proxy host's network stack for upstreams reachable without WireGuard. Data model - Service.Private (bool) + Service.AccessGroups ([]string, JSON- serialised). Validate() rejects bearer auth on private services. Copy() deep-copies AccessGroups. pgx getServices loads the columns. - DomainConfig.Private threaded into the proxy auth middleware. Request handler routes private services through forwardWithTunnelPeer and returns 403 on validation failure. - Account-level SynthesizePrivateServiceZones (synthetic DNS) and injectPrivateServicePolicies (synthetic ACL) gate on len(svc.AccessGroups) > 0. Proxy - /netbird proxy --private (embedded mode) flag; Config.Private in proxy/lifecycle.go. - Per-account inbound listener (proxy/inbound.go) binding HTTP/HTTPS on the embedded NetBird client's WireGuard tunnel netstack. - proxy/internal/auth/tunnel_cache: ValidateTunnelPeer response cache with single-flight de-duplication and per-account eviction. - Local peerstore short-circuit: when the inbound IP isn't in the account roster, deny fast without an RPC. - proxy/server.go reports SupportsPrivateService=true and redacts the full ProxyMapping JSON from info logs (auth_token + header-auth hashed values now only at debug level). Identity forwarding - ValidateSessionJWT returns user_id, email, method, groups, group_names. sessionkey.Claims carries Email + Groups + GroupNames so the proxy can stamp identity onto upstream requests without an extra management round-trip on every cookie-bearing request. - CapturedData carries userEmail / userGroups / userGroupNames; the proxy stamps X-NetBird-User and X-NetBird-Groups on r.Out from the authenticated identity (strips client-supplied values first to prevent spoofing). - AccessLog.UserGroups: access-log enrichment captures the user's group memberships at write time so the dashboard can render group context without reverse-resolving stale memberships. OpenAPI/dashboard surface - ReverseProxyService gains private + access_groups; ReverseProxyCluster gains private + supports_private. ReverseProxyTarget target_type enum gains "cluster". ServiceTargetOptions gains direct_upstream. ProxyAccessLog gains user_groups.
108 lines
3.1 KiB
Go
108 lines
3.1 KiB
Go
// Package auth contains exported proxy auth values.
|
|
// These are used to ensure coherent usage across management and proxy implementations.
|
|
package auth
|
|
|
|
import (
|
|
"crypto/ed25519"
|
|
"crypto/tls"
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/golang-jwt/jwt/v5"
|
|
)
|
|
|
|
type Method string
|
|
|
|
const (
|
|
MethodPassword Method = "password"
|
|
MethodPIN Method = "pin"
|
|
MethodOIDC Method = "oidc"
|
|
MethodHeader Method = "header"
|
|
)
|
|
|
|
func (m Method) String() string {
|
|
return string(m)
|
|
}
|
|
|
|
const (
|
|
SessionCookieName = "nb_session"
|
|
DefaultSessionExpiry = 24 * time.Hour
|
|
SessionJWTIssuer = "netbird-management"
|
|
)
|
|
|
|
// ResolveProto determines the protocol scheme based on the forwarded proto
|
|
// configuration. When set to "http" or "https" the value is used directly.
|
|
// Otherwise TLS state is used: if conn is non-nil "https" is returned, else "http".
|
|
func ResolveProto(forwardedProto string, conn *tls.ConnectionState) string {
|
|
switch forwardedProto {
|
|
case "http", "https":
|
|
return forwardedProto
|
|
default:
|
|
if conn != nil {
|
|
return "https"
|
|
}
|
|
return "http"
|
|
}
|
|
}
|
|
|
|
// ValidateSessionJWT validates a session JWT and returns the user ID, the
|
|
// user's email (when carried), the authentication method, any embedded
|
|
// group memberships, and the parallel group display names. email,
|
|
// groups, and groupNames may be empty for tokens minted before those
|
|
// claims were introduced. groupNames pairs positionally with groups.
|
|
func ValidateSessionJWT(tokenString, domain string, publicKey ed25519.PublicKey) (userID, email, method string, groups, groupNames []string, err error) {
|
|
if publicKey == nil {
|
|
return "", "", "", nil, nil, fmt.Errorf("no public key configured for domain")
|
|
}
|
|
|
|
token, err := jwt.Parse(tokenString, func(t *jwt.Token) (interface{}, error) {
|
|
if _, ok := t.Method.(*jwt.SigningMethodEd25519); !ok {
|
|
return nil, fmt.Errorf("unexpected signing method: %v", t.Header["alg"])
|
|
}
|
|
return publicKey, nil
|
|
}, jwt.WithAudience(domain), jwt.WithIssuer(SessionJWTIssuer))
|
|
if err != nil {
|
|
return "", "", "", nil, nil, fmt.Errorf("parse token: %w", err)
|
|
}
|
|
|
|
claims, ok := token.Claims.(jwt.MapClaims)
|
|
if !ok || !token.Valid {
|
|
return "", "", "", nil, nil, fmt.Errorf("invalid token claims")
|
|
}
|
|
|
|
sub, _ := claims.GetSubject()
|
|
if sub == "" {
|
|
return "", "", "", nil, nil, fmt.Errorf("missing subject claim")
|
|
}
|
|
|
|
methodClaim, _ := claims["method"].(string)
|
|
emailClaim, _ := claims["email"].(string)
|
|
groups = extractGroupsClaim(claims["groups"])
|
|
groupNames = extractGroupsClaim(claims["group_names"])
|
|
|
|
return sub, emailClaim, methodClaim, groups, groupNames, nil
|
|
}
|
|
|
|
// extractGroupsClaim decodes the "groups" claim into a string slice. The JWT
|
|
// library decodes JSON arrays as []interface{}, so we coerce element-wise
|
|
// and skip non-string entries silently.
|
|
func extractGroupsClaim(claim interface{}) []string {
|
|
raw, ok := claim.([]interface{})
|
|
if !ok {
|
|
return nil
|
|
}
|
|
if len(raw) == 0 {
|
|
return nil
|
|
}
|
|
groups := make([]string, 0, len(raw))
|
|
for _, v := range raw {
|
|
if s, ok := v.(string); ok && s != "" {
|
|
groups = append(groups, s)
|
|
}
|
|
}
|
|
if len(groups) == 0 {
|
|
return nil
|
|
}
|
|
return groups
|
|
}
|