1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
|
package proxy
import (
"fmt"
"net/http"
"net/http/httputil"
"net/url"
"time"
"gitlab.com/gitlab-org/gitlab/workhorse/internal/helper"
)
var (
defaultTarget = helper.URLMustParse("http://localhost")
)
type Proxy struct {
Version string
reverseProxy *httputil.ReverseProxy
AllowResponseBuffering bool
customHeaders map[string]string
forceTargetHostHeader bool
}
func WithCustomHeaders(customHeaders map[string]string) func(*Proxy) {
return func(proxy *Proxy) {
proxy.customHeaders = customHeaders
}
}
func WithForcedTargetHostHeader() func(*Proxy) {
return func(proxy *Proxy) {
proxy.forceTargetHostHeader = true
}
}
func NewProxy(myURL *url.URL, version string, roundTripper http.RoundTripper, options ...func(*Proxy)) *Proxy {
p := Proxy{Version: version, AllowResponseBuffering: true, customHeaders: make(map[string]string)}
if myURL == nil {
myURL = defaultTarget
}
u := *myURL // Make a copy of p.URL
u.Path = ""
p.reverseProxy = httputil.NewSingleHostReverseProxy(&u)
p.reverseProxy.Transport = roundTripper
for _, option := range options {
option(&p)
}
if p.forceTargetHostHeader {
// because of https://github.com/golang/go/issues/28168, the
// upstream won't receive the expected Host header unless this
// is forced in the Director func here
previousDirector := p.reverseProxy.Director
p.reverseProxy.Director = func(request *http.Request) {
previousDirector(request)
request.Host = request.URL.Host
}
}
return &p
}
func (p *Proxy) ServeHTTP(w http.ResponseWriter, r *http.Request) {
// Clone request
req := *r
req.Header = helper.HeaderClone(r.Header)
// Set Workhorse version
req.Header.Set("Gitlab-Workhorse", p.Version)
req.Header.Set("Gitlab-Workhorse-Proxy-Start", fmt.Sprintf("%d", time.Now().UnixNano()))
for k, v := range p.customHeaders {
req.Header.Set(k, v)
}
if p.AllowResponseBuffering {
helper.AllowResponseBuffering(w)
}
// If the ultimate client disconnects when the response isn't fully written
// to them yet, httputil.ReverseProxy panics with a net/http.ErrAbortHandler
// error. We can catch and discard this to keep the error log clean
defer func() {
if err := recover(); err != nil {
if err != http.ErrAbortHandler {
panic(err)
}
}
}()
p.reverseProxy.ServeHTTP(w, &req)
}
|