Add L7 policies for user-agent blocking and required headers
Per-route HTTP-level blocking policies for L7 routes. Two rule types: block_user_agent (substring match against User-Agent, returns 403) and require_header (named header must be present, returns 403). Config: L7Policy struct with type/value fields, added as L7Policies slice on Route. Validated in config (type enum, non-empty value, warning if set on L4 routes). DB: Migration 4 creates l7_policies table with route_id FK (cascade delete), type CHECK constraint, UNIQUE(route_id, type, value). New l7policies.go with ListL7Policies, CreateL7Policy, DeleteL7Policy, GetRouteID. Seed updated to persist policies from config. L7 middleware: PolicyMiddleware in internal/l7/policy.go evaluates rules in order, returns 403 on first match, no-op if empty. Composed into the handler chain between context injection and reverse proxy. Server: L7PolicyRule type on RouteInfo with AddL7Policy/RemoveL7Policy mutation methods on ListenerState. handleL7 threads policies into l7.RouteConfig. Startup loads policies per L7 route from DB. Proto: L7Policy message, repeated l7_policies on Route. Three new RPCs: ListL7Policies, AddL7Policy, RemoveL7Policy. All follow the write-through pattern. Client: L7Policy type, ListL7Policies/AddL7Policy/RemoveL7Policy methods. CLI: mcproxyctl policies list/add/remove subcommands. Tests: 6 PolicyMiddleware unit tests (no policies, UA match/no-match, header present/absent, multiple rules). 4 DB tests (CRUD, cascade, duplicate, GetRouteID). 3 gRPC tests (add+list, remove, validation). 2 end-to-end L7 tests (UA block, required header with allow/deny). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
@@ -45,13 +45,20 @@ type Listener struct {
|
||||
|
||||
// Route is a proxy route within a listener.
|
||||
type Route struct {
|
||||
Hostname string `toml:"hostname"`
|
||||
Backend string `toml:"backend"`
|
||||
Mode string `toml:"mode"` // "l4" (default) or "l7"
|
||||
TLSCert string `toml:"tls_cert"` // PEM certificate path (L7 only)
|
||||
TLSKey string `toml:"tls_key"` // PEM private key path (L7 only)
|
||||
BackendTLS bool `toml:"backend_tls"` // re-encrypt to backend (L7 only)
|
||||
SendProxyProtocol bool `toml:"send_proxy_protocol"` // send PROXY v2 header to backend
|
||||
Hostname string `toml:"hostname"`
|
||||
Backend string `toml:"backend"`
|
||||
Mode string `toml:"mode"` // "l4" (default) or "l7"
|
||||
TLSCert string `toml:"tls_cert"` // PEM certificate path (L7 only)
|
||||
TLSKey string `toml:"tls_key"` // PEM private key path (L7 only)
|
||||
BackendTLS bool `toml:"backend_tls"` // re-encrypt to backend (L7 only)
|
||||
SendProxyProtocol bool `toml:"send_proxy_protocol"` // send PROXY v2 header to backend
|
||||
L7Policies []L7Policy `toml:"l7_policies"` // HTTP-level policies (L7 only)
|
||||
}
|
||||
|
||||
// L7Policy is an HTTP-level blocking policy for L7 routes.
|
||||
type L7Policy struct {
|
||||
Type string `toml:"type"` // "block_user_agent" or "require_header"
|
||||
Value string `toml:"value"` // UA substring or header name
|
||||
}
|
||||
|
||||
// Firewall holds the global firewall configuration.
|
||||
@@ -168,6 +175,22 @@ func (c *Config) validate() error {
|
||||
i, l.Addr, j, r.Hostname, err)
|
||||
}
|
||||
}
|
||||
|
||||
// Validate L7 policies.
|
||||
if r.Mode == "l4" && len(r.L7Policies) > 0 {
|
||||
slog.Warn("L4 route has l7_policies set (ignored)",
|
||||
"listener", l.Addr, "hostname", r.Hostname)
|
||||
}
|
||||
for k, p := range r.L7Policies {
|
||||
if p.Type != "block_user_agent" && p.Type != "require_header" {
|
||||
return fmt.Errorf("listener %d (%s), route %d (%s), policy %d: type must be \"block_user_agent\" or \"require_header\", got %q",
|
||||
i, l.Addr, j, r.Hostname, k, p.Type)
|
||||
}
|
||||
if p.Value == "" {
|
||||
return fmt.Errorf("listener %d (%s), route %d (%s), policy %d: value is required",
|
||||
i, l.Addr, j, r.Hostname, k)
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user