RabbitMQHttpAuthBackend
Mountable Rack application that implements a configurable API for RabbitMQ's rabbitmq-auth-backend-http.
Purpose
RabbitMQ comes bundled with the rabbitmq-auth-backend-http plug-in. The purpose of this plug-in is to authorize each action of an user connected to RabbitMQ by asking a server over HTTP if the user is allowed to do that action.
The plugin expects the server to implement four endpoints - one for
login (/user), one for vhost access, one for general resources (exchanges,
queues, topics) and one for topics.
Each endpoint has to respond with a custom format to either allow or deny the action.
This library implements all of this as a mountable Rack application. Meaning, after minimal configuration your application can implement the four required endpoints and respond with correctly formated responses.
Index
- Usage
- Mounting the endpoint
- Configuration
- Resolvers
- Versioning
- Default configuration
- Installation
- FAQ
- Change log
- Development
- Contributing
- License
Usage
- Mounting the endpoint
- Configuration
- Resolvers
- Versioning
- Default configuration
Mounting the endpoint
To use RabbitMQHttpAuthBackend, you will have to mount it within your
Rack application. This will expose it's endpoints from your application,
name spaced with by any prefix of your choosing.
The following are examples for some popular Rack based frameworks. Note that
/rabbitmq/auth is only a prefix and can be changed to whatever you desire.
For Rails applications, add the following line to your routes.rb file:
# /config/routes.rb
Rails.application.routes.draw do
mount RabbitMQHttpAuthBackend.app => '/rabbitmq/auth', as: 'rmq_auth_api'
endFor Sinatra applications, add the following to config.ru:
# config.ru
map '/rabbitmq/auth' do
run RabbitMQHttpAuthBackend.app
endFor Hanami applications, add the following to config/environment.rb:
Hanami.configure do
mount RabbitMQHttpAuthBackend.app, at: '/rabbitmq/auth'
endFor Roda applications, you have to call run from within your routing tree:
class MyApp < Roda
route do |r|
r.on '/rabbitmq/auth' do
r.run RabbitMQHttpAuthBackend.app
end
end
endConfiguration
RabbitMQHttpAuthBackend can be configured to suite your needs. Both the
HTTP method as well as the names of all the endpoints are configurable in the
following manner.
# /config/initializers/rabbitmq_http_auth_backend.rb
RabbitMQHttpAuthBackend.configure! do
http_method :post
user do
path '/anvandare'
end
vhost do
path '/vhost'
end
resource do
path '/resurs'
end
topic do
path '/amne'
end
endResolvers
Resolvers are used to determine whether or not a user is allowed access to a
particular resource. Resolvers are passed as part of the configuration. They
can be any callable object - any object that responds to a call method that
takes one argument (the params, a hash containing RabbitMQ query information).
The return value of the resolver can be either :allow or :deny. If
additional tags need to be returned alongside :allow return an Array
containing :allow and an Array of tags - e.g. [:allow, ['admin']].
# /config/initializers/rabbitmq_http_auth_backend.rb
RabbitMQHttpAuthBackend.configure! do
http_method :post
user do
path '/anvandare'
resolver(lambda do |params|
if params['username'] == 'admin'
return :allow, [:admin, :moderator]
end
:deny
end)
end
topic do
resolver TopicsResolver
end
end
class TopicsResolver
def self.call(params)
if params['username'] == 'admin'
return :allow
end
if params['permission'] == 'read' && params['name'] == 'messages'
return :allow
end
:deny
end
endMost commonly used methods related to resolvers are extracted to the
BasicResolver class. Any class inheriting from it becomes a callable object
on the class and instance level. The user is expected to implement the #call
method.
The following methods are available within a class inheriting from
BasicResolver:
| Method | Description |
|---|---|
username |
Returns the user's username |
password |
Returns the user's password |
name |
Returns the name of the resource |
queue? |
Returns true if the queried resource is a queue |
exchange? |
Returns true if the queried resource is an exchange |
topic? |
Returns true if the queried resource is a topic |
resource |
Returns the resource type (as a String, e.g. 'exchange') |
read? |
Returns true if the queried permission is read |
write? |
Returns true if the queried permission is write |
configure? |
Returns true if the queried permission is write |
permission |
Returns the requested permission (as a String, e.g. 'read') |
routing_key |
Returns the queried routing key |
vhost |
Returns the queried vhost |
ip |
Returns the IP address of the client querying |
The following is the same as the TopicsResolver from the previous example, but
rewritten using BasicResolver:
class TopicsResolver < RabbitMQHttpAuthBackend::BasicResolver
def call
return :allow if username == 'admin'
return :allow if name == 'messages' && read?
:deny
end
end
# This makes `TopicsResolver` a callable object on the class level
# > TopicsResolver.call(params)
# And it's callable on the instance level
# > TopicsResolver.new(params).callA "native" configuration DSL is also provided. The DSL provides the same utility
methods as BasicResolver as well as allow!, deny!, tags, allowed? and
denised? which can be used to set the result or to query it - note that they
don't stop execution!
# /config/initializers/rabbitmq_http_auth_backend.rb
RabbitMQHttpAuthBackend.configure! do
http_method :post
topic do
resolver do
if username == 'admin'
allow! ['admin', 'manager']
else
deny!
end
end
end
endNot all methods return usable values for all resources. Here's a list:
- user
usernamepassword
- vhost
usernamevhostip
- resource
usernamevhost-
resource(can return:exchange,:queueor:topic) name-
permission(can return:configure,:reador:write)
- topic
usernamevhost-
resource(can return:topic) name-
permission(can return:configure,:reador:write) -
routing_key(of the published message if the permission is:write, else of the queue binding)
Versioning
Everybody makes mistakes and changes their minds. Therefore this library enables you to create multiple versions of itself and mount them.
There is little difference to the regular usage.
Mounting:
# /config/routes.rb
Rails.application.routes.draw do
mount RabbitMQHttpAuthBackend.app(:v1) => '/rabbitmq/auth'
# ^^^^^
endConfiguration:
# /config/initializers/rabbitmq_http_auth_backend.rb
RabbitMQHttpAuthBackend.configure!(:v1) do
# ^^^^^
# ...
endIf no version is given the :default or global configuration is edited.
Default configuration
The global default configuration can be changed by altering the configuration
for the :default version.
Here is the full default configuration
# /config/initializers/rabbitmq_http_auth_backend.rb
RabbitMQHttpAuthBackend.configure!(:default) do
http_method :get
user do
path '/user'
resolver do
deny!
end
end
vhost do
path '/vhost'
resolver do
deny!
end
end
resource do
path '/resource'
resolver do
deny!
end
end
topic do
path '/topic'
resolver do
deny!
end
end
endInstallation
Add this line to your application's Gemfile:
# Gemfile
gem 'rabbitmq_http_auth_backend'Configure the library:
# /config/initializers/rabbitmq_http_auth_backend.rb
RabbitMQHttpAuthBackend.configure!(:v1) do
http_method :get
user do
path '/user'
resolver do
deny!
end
end
vhost do
path '/vhost'
resolver do
deny!
end
end
resource do
path '/resource'
resolver do
deny!
end
end
topic do
path '/topic'
resolver do
deny!
end
end
endMount the application:
# /config/routes.rb
Rails.application.routes.draw do
mount RabbitMQHttpAuthBackend.app => '/rabbitmq/auth', as: 'rmq_auth_api'
endYou are done!
bash-4.4$ curl localhost:3000/rabbitmq/auth/user && echo
deny
FAQ
You don't have to, but I would advise you do. Editing the default configuration might cause you problems in the future when you would like to have a clean slate.
To provide a simple configuration language to accomplish basic tasks. I would advise you to use `BasicResolver` or a custom resolver callable object for anything other than the most basic use case e.g. check a username or IP.
Yes they can.
At the moment, no.
No. This feature was removed from the original implementation of this library.
Caching is a tricky topic. It's hard to get right. I couldn't find an expressive enough interface for handling cache invalidation that would satisfy my needs or be flexible enough to accommodate the use cases I think are common. Therefore I decided against implementing caching within this library.
I recommend that you implement your custom caching and invalidation logic in a custom resolver.
Also, use the rabbitmq-auth-backend-cache plugin. It provides time based client-side caching and comes standard with RabbitMQ 3.7+
Here is an example of a fully configured HTTP auth backend plugin in conjunction with the caching plugin:
auth_backends.1 = internal
auth_backends.2 = cache
auth_cache.cached_backend = http
auth_http.http_method = get
auth_http.user_path = http://localhost:3000/rabbitmq/auth/user
auth_http.vhost_path = http://localhost:3000/rabbitmq/auth/vhost
auth_http.resource_path = http://localhost:3000/rabbitmq/auth/resource
auth_http.topic_path = http://localhost:3000/rabbitmq/auth/topic
Follow the installation instructions in this guide to setup your Rack (Rails/Roda/Sinatra/...) application as an HTTP auth backend. Then add the following to your `rabbitmq.conf`, located within `/etc/rabbitmq` (if it's not there, create it).
auth_backends.1 = internal
auth_backends.2 = http
auth_http.http_method = get
auth_http.user_path = http://localhost:3000/rabbitmq/auth/user
auth_http.vhost_path = http://localhost:3000/rabbitmq/auth/vhost
auth_http.resource_path = http://localhost:3000/rabbitmq/auth/resource
auth_http.topic_path = http://localhost:3000/rabbitmq/auth/topic
Assuming that your application and RabbitMQ instance are on the same machine, and that your application is exposed on port 3000 everything should just work™️.
If it doesn't work try restarting RabbitMQ and your application.
If your application and RabbitMQ instance aren't on the same machine, make sure that the RabbitMQ instance can access your application, the easiest way to do this is to connect to the RabbitMQ server and using `ping ` or `curl :`. Remember to change the `localhost:3000` in `rabbitmq.conf` to your application's URL or IP.
Change log
All changes between versions are logged to the change log available in the CHANGELOG.md file.
This project follows the semantic versioning schema.
Development
After checking out the repo, run bin/setup to install dependencies.
Then, run rake spec to run the tests.
You can also run bin/console for an interactive prompt that will allow you
to experiment.
To install this gem onto your local machine, run bundle exec rake install.
To release a new version, update the version number in version.rb, and then
run bundle exec rake release, which will create a git tag for the version,
push git commits and tags, and push the .gem file
to rubygems.org.
Contributing
Bug reports and pull requests are welcome on GitHub at https://github.com/monorkin/rabbitmq_http_auth_backend/.
License
This software is licensed under the MIT license. A copy of the license can be found in the LICENSE.txt file included with this software.
TL;DR this software comes with absolutely no warranty of any kind. You are free to redistribute and modify the software as long as the original copyright notice is present in your derivative work.