mirror of
https://github.com/lensapp/lens.git
synced 2025-05-20 05:10:56 +00:00
* Use electron.clipboard for all clipboard uses (#4535) Signed-off-by: Jim Ehrismann <jehrismann@mirantis.com> * Fix ERR_UNSAFE_PORT from LensProxy (#4558) * Fix ERR_UNSAFE_PORT from LensProxy - Use the current list of ports from chromium as it is much easier to just reject using one of those instead of trying to handle the ERR_UNSAFE_PORT laod error from a BrowserWindow.on("did-fail-load") Signed-off-by: Sebastian Malton <sebastian@malton.name> * Move all port handling into LensProxy Signed-off-by: Sebastian Malton <sebastian@malton.name> * don't use so many exceptions Signed-off-by: Sebastian Malton <sebastian@malton.name> Signed-off-by: Jim Ehrismann <jehrismann@mirantis.com> * Fix not being able to clear set cluster icon (#4555) Signed-off-by: Jim Ehrismann <jehrismann@mirantis.com> * Fix extension engine range not working for some ^ ranges (#4554) Signed-off-by: Jim Ehrismann <jehrismann@mirantis.com> * Fix crash on NetworkPolicy when matchLabels is missing (#4500) Signed-off-by: Jim Ehrismann <jehrismann@mirantis.com> * Replace all uses of promiseExec with promiseExecFile (#4514) Signed-off-by: Jim Ehrismann <jehrismann@mirantis.com> * Less noisy metrics-not-available error logging (#4602) Signed-off-by: Jari Kolehmainen <jari.kolehmainen@gmail.com> Signed-off-by: Jim Ehrismann <jehrismann@mirantis.com> * Fix close button overflow in Preferences (#4611) * Adding basic colors to tailwind theme Signed-off-by: Alex Andreev <alex.andreev.email@gmail.com> * Using tailwind inline to style close button Signed-off-by: Alex Andreev <alex.andreev.email@gmail.com> * Make Select look similar to inputs Signed-off-by: Alex Andreev <alex.andreev.email@gmail.com> * Moving styles into separate module Signed-off-by: Alex Andreev <alex.andreev.email@gmail.com> * Convert tailwind commands to css Signed-off-by: Alex Andreev <alex.andreev.email@gmail.com> Signed-off-by: Jim Ehrismann <jehrismann@mirantis.com> * Fix prometheus operator metrics work out of the box (#4617) Signed-off-by: Lauri Nevala <lauri.nevala@gmail.com> Signed-off-by: Jim Ehrismann <jehrismann@mirantis.com> * Fix CRD.getPreferedVersion() to work based on apiVersion (#4553) * Fix CRD.getPreferedVersion() to work based on apiVersion Signed-off-by: Sebastian Malton <sebastian@malton.name> * Add tests Signed-off-by: Sebastian Malton <sebastian@malton.name> Signed-off-by: Jim Ehrismann <jehrismann@mirantis.com> * Fix crash for KubeObjectStore.loadAll() (#4675) Signed-off-by: Sebastian Malton <sebastian@malton.name> Signed-off-by: Jim Ehrismann <jehrismann@mirantis.com> * Convert CloseButton styles out from css modules (#4723) * Convert CloseButton styles out from css modules Signed-off-by: Alex Andreev <alex.andreev.email@gmail.com> * Fix close button styling Signed-off-by: Alex Andreev <alex.andreev.email@gmail.com> * release v5.3.4 Signed-off-by: Jim Ehrismann <jehrismann@mirantis.com> Co-authored-by: Sebastian Malton <sebastian@malton.name> Co-authored-by: Jari Kolehmainen <jari.kolehmainen@gmail.com> Co-authored-by: Alex Andreev <alex.andreev.email@gmail.com> Co-authored-by: Lauri Nevala <lauri.nevala@gmail.com>
268 lines
9.1 KiB
TypeScript
268 lines
9.1 KiB
TypeScript
/**
|
|
* Copyright (c) 2021 OpenLens Authors
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
|
* this software and associated documentation files (the "Software"), to deal in
|
|
* the Software without restriction, including without limitation the rights to
|
|
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
|
* the Software, and to permit persons to whom the Software is furnished to do so,
|
|
* subject to the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be included in all
|
|
* copies or substantial portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
|
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
|
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
|
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
*/
|
|
|
|
import type net from "net";
|
|
import type http from "http";
|
|
import spdy from "spdy";
|
|
import httpProxy from "http-proxy";
|
|
import { apiPrefix, apiKubePrefix } from "../common/vars";
|
|
import type { Router } from "./router";
|
|
import type { ContextHandler } from "./context-handler";
|
|
import logger from "./logger";
|
|
import { Singleton } from "../common/utils";
|
|
import type { Cluster } from "./cluster";
|
|
import type { ProxyApiRequestArgs } from "./proxy-functions";
|
|
import { appEventBus } from "../common/event-bus";
|
|
import { getBoolean } from "./utils/parse-query";
|
|
|
|
type GetClusterForRequest = (req: http.IncomingMessage) => Cluster | null;
|
|
|
|
export interface LensProxyFunctions {
|
|
getClusterForRequest: GetClusterForRequest,
|
|
shellApiRequest: (args: ProxyApiRequestArgs) => void | Promise<void>;
|
|
kubeApiRequest: (args: ProxyApiRequestArgs) => void | Promise<void>;
|
|
}
|
|
|
|
const watchParam = "watch";
|
|
const followParam = "follow";
|
|
|
|
export function isLongRunningRequest(reqUrl: string) {
|
|
const url = new URL(reqUrl, "http://localhost");
|
|
|
|
return getBoolean(url.searchParams, watchParam) || getBoolean(url.searchParams, followParam);
|
|
}
|
|
|
|
/**
|
|
* This is the list of ports that chrome considers unsafe to allow HTTP
|
|
* conntections to. Because they are the standard ports for processes that are
|
|
* too forgiving in the connection types they accept.
|
|
*
|
|
* If we get one of these ports, the easiest thing to do is to just try again.
|
|
*
|
|
* Source: https://chromium.googlesource.com/chromium/src.git/+/refs/heads/main/net/base/port_util.cc
|
|
*/
|
|
const disallowedPorts = new Set([
|
|
1, 7, 9, 11, 13, 15, 17, 19, 20, 21, 22, 23, 25, 37, 42, 43, 53, 69, 77, 79,
|
|
87, 95, 101, 102, 103, 104, 109, 110, 111, 113, 115, 117, 119, 123, 135, 137,
|
|
139, 143, 161, 179, 389, 427, 465, 512, 513, 514, 515, 526, 530, 531, 532,
|
|
540, 548, 554, 556, 563, 587, 601, 636, 989, 990, 993, 995, 1719, 1720, 1723,
|
|
2049, 3659, 4045, 5060, 5061, 6000, 6566, 6665, 6666, 6667, 6668, 6669, 6697,
|
|
10080,
|
|
]);
|
|
|
|
export class LensProxy extends Singleton {
|
|
protected origin: string;
|
|
protected proxyServer: http.Server;
|
|
protected closed = false;
|
|
protected retryCounters = new Map<string, number>();
|
|
protected proxy = this.createProxy();
|
|
protected getClusterForRequest: GetClusterForRequest;
|
|
|
|
public port: number;
|
|
|
|
constructor(protected router: Router, { shellApiRequest, kubeApiRequest, getClusterForRequest }: LensProxyFunctions) {
|
|
super();
|
|
|
|
this.getClusterForRequest = getClusterForRequest;
|
|
|
|
this.proxyServer = spdy.createServer({
|
|
spdy: {
|
|
plain: true,
|
|
protocols: ["http/1.1", "spdy/3.1"],
|
|
},
|
|
}, (req: http.IncomingMessage, res: http.ServerResponse) => {
|
|
this.handleRequest(req, res);
|
|
});
|
|
|
|
this.proxyServer
|
|
.on("upgrade", (req: http.IncomingMessage, socket: net.Socket, head: Buffer) => {
|
|
const isInternal = req.url.startsWith(`${apiPrefix}?`);
|
|
const cluster = getClusterForRequest(req);
|
|
|
|
if (!cluster) {
|
|
return void logger.error(`[LENS-PROXY]: Could not find cluster for upgrade request from url=${req.url}`);
|
|
}
|
|
|
|
const reqHandler = isInternal ? shellApiRequest : kubeApiRequest;
|
|
|
|
(async () => reqHandler({ req, socket, head, cluster }))()
|
|
.catch(error => logger.error("[LENS-PROXY]: failed to handle proxy upgrade", error));
|
|
});
|
|
}
|
|
|
|
/**
|
|
* Starts to listen on an OS provided port. Will reject if the server throws
|
|
* an error.
|
|
*
|
|
* Resolves with the port number that was picked
|
|
*/
|
|
private attemptToListen(): Promise<number> {
|
|
return new Promise<number>((resolve, reject) => {
|
|
this.proxyServer.listen(0, "127.0.0.1");
|
|
|
|
this.proxyServer
|
|
.once("listening", () => {
|
|
this.proxyServer.removeAllListeners("error"); // don't reject the promise
|
|
|
|
const { address, port } = this.proxyServer.address() as net.AddressInfo;
|
|
|
|
logger.info(`[LENS-PROXY]: Proxy server has started at ${address}:${port}`);
|
|
|
|
this.proxyServer.on("error", (error) => {
|
|
logger.info(`[LENS-PROXY]: Subsequent error: ${error}`);
|
|
});
|
|
|
|
this.port = port;
|
|
appEventBus.emit({ name: "lens-proxy", action: "listen", params: { port }});
|
|
resolve(port);
|
|
})
|
|
.once("error", (error) => {
|
|
logger.info(`[LENS-PROXY]: Proxy server failed to start: ${error}`);
|
|
reject(error);
|
|
});
|
|
});
|
|
}
|
|
|
|
/**
|
|
* Starts the lens proxy.
|
|
* @resolves After the server is listening on a good port
|
|
* @rejects if there is an error before that happens
|
|
*/
|
|
async listen(): Promise<void> {
|
|
const seenPorts = new Set<number>();
|
|
|
|
while(true) {
|
|
this.proxyServer?.close();
|
|
const port = await this.attemptToListen();
|
|
|
|
if (!disallowedPorts.has(port)) {
|
|
// We didn't get a port that would result in an ERR_UNSAFE_PORT error, use it
|
|
return;
|
|
}
|
|
|
|
logger.warn(`[LENS-PROXY]: Proxy server has with port known to be considered unsafe to connect to by chrome, restarting...`);
|
|
|
|
if (seenPorts.has(port)) {
|
|
/**
|
|
* Assume that if we have seen the port before, then the OS has looped
|
|
* through all the ports possible and we will not be able to get a safe
|
|
* port.
|
|
*/
|
|
throw new Error("Failed to start LensProxy due to seeing too many unsafe ports. Please restart Lens.");
|
|
} else {
|
|
seenPorts.add(port);
|
|
}
|
|
}
|
|
}
|
|
|
|
close() {
|
|
logger.info("[LENS-PROXY]: Closing server");
|
|
this.proxyServer.close();
|
|
this.closed = true;
|
|
}
|
|
|
|
protected createProxy(): httpProxy {
|
|
const proxy = httpProxy.createProxyServer();
|
|
|
|
proxy.on("proxyRes", (proxyRes, req, res) => {
|
|
const retryCounterId = this.getRequestId(req);
|
|
|
|
if (this.retryCounters.has(retryCounterId)) {
|
|
this.retryCounters.delete(retryCounterId);
|
|
}
|
|
|
|
if (!res.headersSent && req.url) {
|
|
const url = new URL(req.url, "http://localhost");
|
|
|
|
if (url.searchParams.has("watch")) {
|
|
res.statusCode = proxyRes.statusCode;
|
|
res.flushHeaders();
|
|
}
|
|
}
|
|
|
|
proxyRes.on("aborted", () => { // happens when proxy target aborts connection
|
|
res.end();
|
|
});
|
|
});
|
|
|
|
proxy.on("error", (error, req, res, target) => {
|
|
if (this.closed) {
|
|
return;
|
|
}
|
|
|
|
logger.error(`[LENS-PROXY]: http proxy errored for cluster: ${error}`, { url: req.url });
|
|
|
|
if (target) {
|
|
logger.debug(`Failed proxy to target: ${JSON.stringify(target, null, 2)}`);
|
|
|
|
if (req.method === "GET" && (!res.statusCode || res.statusCode >= 500)) {
|
|
const reqId = this.getRequestId(req);
|
|
const retryCount = this.retryCounters.get(reqId) || 0;
|
|
const timeoutMs = retryCount * 250;
|
|
|
|
if (retryCount < 20) {
|
|
logger.debug(`Retrying proxy request to url: ${reqId}`);
|
|
setTimeout(() => {
|
|
this.retryCounters.set(reqId, retryCount + 1);
|
|
this.handleRequest(req, res)
|
|
.catch(error => logger.error(`[LENS-PROXY]: failed to handle request on proxy error: ${error}`));
|
|
}, timeoutMs);
|
|
}
|
|
}
|
|
}
|
|
|
|
try {
|
|
res.writeHead(500).end(`Oops, something went wrong.\n${error}`);
|
|
} catch (e) {
|
|
logger.error(`[LENS-PROXY]: Failed to write headers: `, e);
|
|
}
|
|
});
|
|
|
|
return proxy;
|
|
}
|
|
|
|
protected async getProxyTarget(req: http.IncomingMessage, contextHandler: ContextHandler): Promise<httpProxy.ServerOptions | void> {
|
|
if (req.url.startsWith(apiKubePrefix)) {
|
|
delete req.headers.authorization;
|
|
req.url = req.url.replace(apiKubePrefix, "");
|
|
|
|
return contextHandler.getApiTarget(isLongRunningRequest(req.url));
|
|
}
|
|
}
|
|
|
|
protected getRequestId(req: http.IncomingMessage) {
|
|
return req.headers.host + req.url;
|
|
}
|
|
|
|
protected async handleRequest(req: http.IncomingMessage, res: http.ServerResponse) {
|
|
const cluster = this.getClusterForRequest(req);
|
|
|
|
if (cluster) {
|
|
const proxyTarget = await this.getProxyTarget(req, cluster.contextHandler);
|
|
|
|
if (proxyTarget) {
|
|
return this.proxy.web(req, res, proxyTarget);
|
|
}
|
|
}
|
|
this.router.route(cluster, req, res);
|
|
}
|
|
}
|