Search code examples
authenticationwebsocketknox-gateway

How to configure Knox to make it pass Authorization header to a backend service?


As discussed in my other question there is no support for websockets authentication in Knox, but as a temporary solution we could handle authentication in our backend service. Our test has shown however that Knox does not pass Authorization header to the backend.

[client]$ curl -i -u '<user>:<password>' https://knox-server/gateway/default/myservice/ping

# 8090 is our backend port
[knox-server]$ ngrep -W byline port 8090
interface: eth0
filter: ( port 8090 ) and ((ip || ip6) || (vlan && (ip || ip6)))

#
T <knox-server>:59118 -> <myservice>:8090 [AP]
GET /ping?doAs=<user> HTTP/1.1.
X-Forwarded-For: <client>.
X-Forwarded-Proto: https.
X-Forwarded-Port: 443.
X-Forwarded-Host: <knox-server>.
X-Forwarded-Server: <knox-server>.
X-Forwarded-Context: /gateway/default.
User-Agent: curl/7.54.0.
Accept: */*.
Host: <myservice>:8090.
Connection: Keep-Alive.
Accept-Encoding: gzip,deflate.
.

#
T <myservice>:8090 -> <knox-server>:59118 [AP]
HTTP/1.1 200 OK.
Date: Sat, 14 Oct 2017 14:27:58 GMT.
X-Application-Context: myservice:prod:8090.
Content-Type: text/plain;charset=utf-8.
Content-Length: 4.
.
PONG

How should I configure Knox (0.12.0 from HDP 2.6.2) to make it pass Authorization header to the backend for websocket connection?


Solution

  • While writing this question I realised that there is a ticket KNOX-895 resolving the issue of passing cookies and headers to a backend service in Knox 0.14.0.

    [EDIT]

    I cloned knox git repo (commit 92b1505a), which includes KNOX-895 (2d236e78), run it locally with added websocket service to sandbox topology.

    [tulinski]$ wscat -n --auth 'user:password' -c wss://localhost:8443/gateway/sandbox/echows
    [tulinski]$ sudo ngrep -W byline host echo.websocket.org
    #
    T 192.168.0.16:59952 -> 174.129.224.73:80 [AP]
    GET / HTTP/1.1.
    Host: echo.websocket.org.
    Upgrade: websocket.
    Connection: Upgrade.
    Sec-WebSocket-Key: Z4Qa9Dxwr6Qvq2QAicsT5Q==.
    Sec-WebSocket-Version: 13.
    Pragma: no-cache.
    Cache-Control: no-cache.
    Authorization: Basic dXNlcjpwYXNzd29yZA==.
    .
    
    ##
    T 174.129.224.73:80 -> 192.168.0.16:59952 [AP]
    HTTP/1.1 101 Web Socket Protocol Handshake.
    Connection: Upgrade.
    Date: Mon, 16 Oct 2017 14:23:49 GMT.
    Sec-WebSocket-Accept: meply+6cIyjbH+Vk2OsAqKJDWic=.
    Server: Kaazing Gateway.
    Upgrade: websocket.
    .
    

    Authorization header is passed to the backend service.