rabbitmq-server/deps/rabbitmq_auth_backend_http/README.md

171 lines
6.2 KiB
Markdown
Raw Normal View History

2011-03-25 19:18:40 +08:00
# Overview
This plugin provides the ability for your RabbitMQ server to perform
authentication (determining who can log in) and authorisation
(determining what permissions they have) by making requests to an HTTP
server.
This plugin can put a significant amount of load on its backing service.
We recommend using it together with [rabbitmq_auth_backend_cache](http://github.com/rabbitmq/rabbitmq-auth-backend-cache)
with a reasonable caching interval (e.g. 1-3 minutes).
## Project Maturity
As of 3.7.0, this plugin is distributed with RabbitMQ.
## RabbitMQ Version Requirements
As of 3.7.0, this plugin is distributed with RabbitMQ.
2016-03-23 16:25:30 +08:00
As with all [authentication plugins](http://rabbitmq.com/access-control.html), this one requires RabbitMQ server
2011-03-26 21:04:22 +08:00
2.3.1 or later.
## Using with RabbitMQ 3.6.x
2014-04-10 21:33:30 +08:00
2017-01-27 20:55:39 +08:00
Install the corresponding .ez files from our
2017-03-18 06:20:37 +08:00
[Community Plugins page](http://www.rabbitmq.com/community-plugins.html). Note that different
releases of this plugin support different versions of RabbitMQ.
2011-03-25 19:36:41 +08:00
2016-04-28 23:56:24 +08:00
## Enabling the Plugin
2011-03-25 19:18:40 +08:00
2018-03-19 19:40:38 +08:00
First enable the plugin using `rabbitmq-plugins`:
2011-03-25 19:18:40 +08:00
2018-03-19 19:40:38 +08:00
rabbitmq-plugins enable rabbitmq_auth_backend_http
## Configuring the Plugin
2011-03-25 19:18:40 +08:00
2016-03-23 16:25:30 +08:00
To use this backend exclusively, use the following snippet in `rabbitmq.conf` (currently
in master)
2016-02-29 21:12:54 +08:00
auth_backends.1 = http
2016-03-23 16:25:30 +08:00
Or, in the classic config format (`rabbitmq.config`, prior to 3.7.0) or `advanced.config`:
2016-02-29 21:12:54 +08:00
2011-03-25 19:18:40 +08:00
[{rabbit, [{auth_backends, [rabbit_auth_backend_http]}]}].
2018-03-19 19:40:38 +08:00
See [RabbitMQ Configuration guide](http://www.rabbitmq.com/configure.html) and
[Access Control guide](http://rabbitmq.com/access-control.html) for more information.
2011-03-25 19:18:40 +08:00
You need to configure the plugin to know which URIs to point at
and which HTTP method to use.
2011-03-25 19:18:40 +08:00
2016-03-23 16:25:30 +08:00
Below is a minimal configuration file example.
2011-03-25 19:18:40 +08:00
In `rabbitmq.conf`:
2017-02-09 18:55:10 +08:00
2016-03-17 19:36:14 +08:00
auth_backends.1 = http
auth_http.http_method = post
2017-02-09 18:55:10 +08:00
auth_http.user_path = http://some-server/auth/user
auth_http.vhost_path = http://some-server/auth/vhost
auth_http.resource_path = http://some-server/auth/resource
auth_http.topic_path = http://some-server/auth/topic
2016-02-29 21:12:54 +08:00
In the [classic config format](http://www.rabbitmq.com/configure.html) (`rabbitmq.config` prior to 3.7.0 or `advanced.config`):
2016-02-29 21:12:54 +08:00
2011-03-25 19:18:40 +08:00
[
{rabbit, [{auth_backends, [rabbit_auth_backend_http]}]},
2011-04-15 22:44:39 +08:00
{rabbitmq_auth_backend_http,
[{http_method, post},
{user_path, "http(s)://some-server/auth/user"},
{vhost_path, "http(s)://some-server/auth/vhost"},
{resource_path, "http(s)://some-server/auth/resource"},
{topic_path, "http(s)://some-server/auth/topic"}]}
2011-03-25 19:18:40 +08:00
].
2016-04-28 23:56:24 +08:00
By default `http_method` configuration is `GET` for backwards compatibility. It's recommended
to use `POST` requests to avoid credentials logging.
2016-04-28 23:56:24 +08:00
## What Must My Web Server Do?
2011-03-25 19:18:40 +08:00
2011-03-25 19:33:28 +08:00
This plugin requires that your web server respond to requests in a
certain predefined format. It will make GET (by default) or POST requests
against the URIs listed in the configuration file. It will add query string
2016-04-28 23:56:24 +08:00
(for `GET` requests) or a URL-encoded request body (for `POST` requests) parameters as follows:
2011-03-25 19:18:40 +08:00
### user_path
* `username` - the name of the user
* `password` - the password provided (may be missing if e.g. rabbitmq-auth-mechanism-ssl is used)
### vhost_path
* `username` - the name of the user
* `vhost` - the name of the virtual host being accessed
2016-03-29 17:07:25 +08:00
* `ip` - the client ip address
2011-03-25 19:18:40 +08:00
2011-04-05 00:35:48 +08:00
Note that you cannot create arbitrary virtual hosts using this plugin; you can only determine whether your users can see / access the ones that exist.
2011-03-25 19:18:40 +08:00
### resource_path
* `username` - the name of the user
* `vhost` - the name of the virtual host containing the resource
* `resource` - the type of resource (`exchange`, `queue`, `topic`)
* `name` - the name of the resource
* `permission` - the access level to the resource (`configure`, `write`, `read`) - see [the Access Control guide](http://www.rabbitmq.com/access-control.html) for their meaning
### topic_path
* `username` - the name of the user
* `vhost` - the name of the virtual host containing the resource
* `resource` - the type of resource (`topic` in this case)
* `name` - the name of the exchange
* `permission` - the access level to the resource (`write` or `read`)
* `routing_key` - the routing key of a published message (when the permission is `write`)
2017-02-16 06:56:38 +08:00
or routing key of the queue binding (when the permission is `read`)
See [topic authorisation](http://www.rabbitmq.com/access-control.html#topic-authorisation) for more information
about topic authorisation.
2011-03-25 19:18:40 +08:00
Your web server should always return HTTP 200 OK, with a body
containing:
2011-03-25 19:18:40 +08:00
* `deny` - deny access to the user / vhost / resource
* `allow` - allow access to the user / vhost / resource
* `allow [list of tags]` - (for `user_path` only) - allow access, and mark the user as an having the tags listed
2011-03-25 19:18:40 +08:00
2016-04-28 23:56:24 +08:00
## Using TLS/HTTPS
2016-04-28 23:56:24 +08:00
If your Web server uses HTTPS and certificate verification, you need to
configure the plugin to use a CA and client certificate/key pair using the `rabbitmq_auth_backend_http.ssl_options` config variable:
[
{rabbit, [{auth_backends, [rabbit_auth_backend_http]}]},
{rabbitmq_auth_backend_http,
[{http_method, post},
{user_path, "https://some-server/auth/user"},
{vhost_path, "https://some-server/auth/vhost"},
{resource_path, "https://some-server/auth/resource"},
{topic_path, "https://some-server/auth/topic"},
{ssl_options,
[{cacertfile, "/path/to/cacert.pem"},
{certfile, "/path/to/client/cert.pem"},
{keyfile, "/path/to/client/key.pem"},
{verify, verify_peer},
{fail_if_no_peer_cert, true}]}]}
].
2016-04-28 23:56:24 +08:00
It is recommended to use TLS for authentication and enable peer verification.
2016-03-23 16:25:30 +08:00
## Debugging
2011-03-25 19:18:40 +08:00
2011-03-25 19:33:28 +08:00
Check the RabbitMQ logs if things don't seem to be working
properly. Look for log messages containing "rabbit_auth_backend_http
failed".
2011-03-25 19:18:40 +08:00
2017-10-11 04:00:19 +08:00
## Example Apps
2018-04-01 04:51:21 +08:00
There are [example backend services](./examples) available in Python, PHP, Spring Boot, ASP.NET Web API.
2011-03-25 19:18:40 +08:00
2018-04-01 04:51:21 +08:00
See [examples README](./examples/README.md) for more information.
2017-01-27 20:55:39 +08:00
## Building from Source
You can build and install it like any other plugin (see
[the plugin development guide](http://www.rabbitmq.com/plugin-development.html)).
This plugin depends on the Erlang client (just to grab a URI parser).