package gateway import ( "context" "encoding/json" "io" "net" "net/http" "strconv" "strings" "time" "github.com/DeBrosOfficial/network/pkg/client" "github.com/DeBrosOfficial/network/pkg/deployments" "github.com/DeBrosOfficial/network/pkg/gateway/auth" "github.com/DeBrosOfficial/network/pkg/logging" "go.uber.org/zap" ) // Note: context keys (ctxKeyAPIKey, ctxKeyJWT, CtxKeyNamespaceOverride) are now defined in context.go // withMiddleware adds CORS, security headers, rate limiting, and logging middleware func (g *Gateway) withMiddleware(next http.Handler) http.Handler { // Order: logging -> security headers -> rate limit -> CORS -> domain routing -> auth -> handler return g.loggingMiddleware( g.securityHeadersMiddleware( g.rateLimitMiddleware( g.corsMiddleware( g.domainRoutingMiddleware( g.authMiddleware( g.authorizationMiddleware(next))))))) } // securityHeadersMiddleware adds standard security headers to all responses func (g *Gateway) securityHeadersMiddleware(next http.Handler) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { w.Header().Set("X-Content-Type-Options", "nosniff") w.Header().Set("X-Frame-Options", "DENY") w.Header().Set("X-XSS-Protection", "0") w.Header().Set("Referrer-Policy", "strict-origin-when-cross-origin") w.Header().Set("Permissions-Policy", "camera=(), microphone=(), geolocation=()") // HSTS only when behind TLS (Caddy) if r.TLS != nil || r.Header.Get("X-Forwarded-Proto") == "https" { w.Header().Set("Strict-Transport-Security", "max-age=31536000; includeSubDomains") } next.ServeHTTP(w, r) }) } // loggingMiddleware logs basic request info and duration func (g *Gateway) loggingMiddleware(next http.Handler) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { start := time.Now() srw := &statusResponseWriter{ResponseWriter: w, status: http.StatusOK} next.ServeHTTP(srw, r) dur := time.Since(start) g.logger.ComponentInfo(logging.ComponentGeneral, "request", zap.String("method", r.Method), zap.String("path", r.URL.Path), zap.Int("status", srw.status), zap.Int("bytes", srw.bytes), zap.String("duration", dur.String()), ) // Persist request log asynchronously (best-effort) go g.persistRequestLog(r, srw, dur) }) } // authMiddleware enforces auth when enabled via config. // Accepts: // - Authorization: Bearer (RS256 issued by this gateway) // - Authorization: Bearer or ApiKey // - X-API-Key: func (g *Gateway) authMiddleware(next http.Handler) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { // Allow preflight without auth if r.Method == http.MethodOptions { next.ServeHTTP(w, r) return } isPublic := isPublicPath(r.URL.Path) // 1) Try JWT Bearer first if Authorization looks like one if auth := r.Header.Get("Authorization"); auth != "" { lower := strings.ToLower(auth) if strings.HasPrefix(lower, "bearer ") { tok := strings.TrimSpace(auth[len("Bearer "):]) if strings.Count(tok, ".") == 2 { if claims, err := g.authService.ParseAndVerifyJWT(tok); err == nil { // Attach JWT claims and namespace to context ctx := context.WithValue(r.Context(), ctxKeyJWT, claims) if ns := strings.TrimSpace(claims.Namespace); ns != "" { ctx = context.WithValue(ctx, CtxKeyNamespaceOverride, ns) } next.ServeHTTP(w, r.WithContext(ctx)) return } // If it looked like a JWT but failed verification, fall through to API key check } } } // 2) Fallback to API key (validate against DB) key := extractAPIKey(r) if key == "" { if isPublic { next.ServeHTTP(w, r) return } w.Header().Set("WWW-Authenticate", "Bearer realm=\"gateway\", charset=\"UTF-8\"") writeError(w, http.StatusUnauthorized, "missing API key") return } // Look up API key in DB and derive namespace db := g.client.Database() // Use internal auth for DB validation (auth not established yet) internalCtx := client.WithInternalAuth(r.Context()) // Join to namespaces to resolve name in one query q := "SELECT namespaces.name FROM api_keys JOIN namespaces ON api_keys.namespace_id = namespaces.id WHERE api_keys.key = ? LIMIT 1" res, err := db.Query(internalCtx, q, key) if err != nil || res == nil || res.Count == 0 || len(res.Rows) == 0 || len(res.Rows[0]) == 0 { if isPublic { next.ServeHTTP(w, r) return } w.Header().Set("WWW-Authenticate", "Bearer error=\"invalid_token\"") writeError(w, http.StatusUnauthorized, "invalid API key") return } // Extract namespace name var ns string if s, ok := res.Rows[0][0].(string); ok { ns = strings.TrimSpace(s) } else { b, _ := json.Marshal(res.Rows[0][0]) _ = json.Unmarshal(b, &ns) ns = strings.TrimSpace(ns) } if ns == "" { if isPublic { next.ServeHTTP(w, r) return } w.Header().Set("WWW-Authenticate", "Bearer error=\"invalid_token\"") writeError(w, http.StatusUnauthorized, "invalid API key") return } // Attach auth metadata to context for downstream use reqCtx := context.WithValue(r.Context(), ctxKeyAPIKey, key) reqCtx = context.WithValue(reqCtx, CtxKeyNamespaceOverride, ns) next.ServeHTTP(w, r.WithContext(reqCtx)) }) } // extractAPIKey extracts API key from Authorization, X-API-Key header, or query parameters // Note: Bearer tokens that look like JWTs (have 2 dots) are skipped (they're JWTs, handled separately) // X-API-Key header is preferred when both Authorization and X-API-Key are present func extractAPIKey(r *http.Request) string { // Prefer X-API-Key header (most explicit) - check this first if v := strings.TrimSpace(r.Header.Get("X-API-Key")); v != "" { return v } // Check Authorization header for ApiKey scheme or non-JWT Bearer tokens auth := r.Header.Get("Authorization") if auth != "" { lower := strings.ToLower(auth) if strings.HasPrefix(lower, "bearer ") { tok := strings.TrimSpace(auth[len("Bearer "):]) // Skip Bearer tokens that look like JWTs (have 2 dots) - they're JWTs // But allow Bearer tokens that don't look like JWTs (for backward compatibility) if strings.Count(tok, ".") == 2 { // This is a JWT, skip it } else { // This doesn't look like a JWT, treat as API key (backward compatibility) return tok } } else if strings.HasPrefix(lower, "apikey ") { return strings.TrimSpace(auth[len("ApiKey "):]) } else if !strings.Contains(auth, " ") { // If header has no scheme, treat the whole value as token (lenient for dev) // But skip if it looks like a JWT (has 2 dots) tok := strings.TrimSpace(auth) if strings.Count(tok, ".") != 2 { return tok } } } // Fallback to query parameter (for WebSocket support) if v := strings.TrimSpace(r.URL.Query().Get("api_key")); v != "" { return v } // Also check token query parameter (alternative name) if v := strings.TrimSpace(r.URL.Query().Get("token")); v != "" { return v } return "" } // isPublicPath returns true for routes that should be accessible without API key auth func isPublicPath(p string) bool { // Allow ACME challenges for Let's Encrypt certificate provisioning if strings.HasPrefix(p, "/.well-known/acme-challenge/") { return true } // Serverless invocation is public (authorization is handled within the invoker) if strings.HasPrefix(p, "/v1/invoke/") || (strings.HasPrefix(p, "/v1/functions/") && strings.HasSuffix(p, "/invoke")) { return true } // Internal replica coordination endpoints (auth handled by replica handler) if strings.HasPrefix(p, "/v1/internal/deployments/replica/") { return true } // WireGuard peer exchange (auth handled by cluster secret in handler) if strings.HasPrefix(p, "/v1/internal/wg/") { return true } // Node join endpoint (auth handled by invite token in handler) if p == "/v1/internal/join" { return true } switch p { case "/health", "/v1/health", "/status", "/v1/status", "/v1/auth/jwks", "/.well-known/jwks.json", "/v1/version", "/v1/auth/login", "/v1/auth/challenge", "/v1/auth/verify", "/v1/auth/register", "/v1/auth/refresh", "/v1/auth/logout", "/v1/auth/api-key", "/v1/auth/simple-key", "/v1/network/status", "/v1/network/peers", "/v1/internal/tls/check", "/v1/internal/acme/present", "/v1/internal/acme/cleanup": return true default: // Also exempt namespace status polling endpoint if strings.HasPrefix(p, "/v1/namespace/status") { return true } return false } } // authorizationMiddleware enforces that the authenticated actor owns the namespace // for certain protected paths (e.g., apps CRUD and storage APIs). // Also enforces cross-namespace access control: // - "default" namespace: accessible by any valid API key // - Other namespaces: API key must belong to that specific namespace func (g *Gateway) authorizationMiddleware(next http.Handler) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { // Skip for public/OPTIONS paths only if r.Method == http.MethodOptions || isPublicPath(r.URL.Path) { next.ServeHTTP(w, r) return } // Exempt whoami from ownership enforcement so users can inspect their session if r.URL.Path == "/v1/auth/whoami" { next.ServeHTTP(w, r) return } // Exempt namespace status endpoint if strings.HasPrefix(r.URL.Path, "/v1/namespace/status") { next.ServeHTTP(w, r) return } // Cross-namespace access control for namespace gateways // The gateway's ClientNamespace determines which namespace this gateway serves gatewayNamespace := "default" if g.cfg != nil && g.cfg.ClientNamespace != "" { gatewayNamespace = strings.TrimSpace(g.cfg.ClientNamespace) } // Get user's namespace from context (derived from API key/JWT) userNamespace := "" if v := r.Context().Value(CtxKeyNamespaceOverride); v != nil { if s, ok := v.(string); ok { userNamespace = strings.TrimSpace(s) } } // For non-default namespace gateways, the API key must belong to this namespace // This enforces physical isolation: alice's gateway only accepts alice's API keys if gatewayNamespace != "default" && userNamespace != "" && userNamespace != gatewayNamespace { g.logger.ComponentWarn(logging.ComponentGeneral, "cross-namespace access denied", zap.String("user_namespace", userNamespace), zap.String("gateway_namespace", gatewayNamespace), zap.String("path", r.URL.Path), ) writeError(w, http.StatusForbidden, "API key does not belong to this namespace") return } // Only enforce ownership for specific resource paths if !requiresNamespaceOwnership(r.URL.Path) { next.ServeHTTP(w, r) return } // Determine namespace from context ctx := r.Context() ns := "" if v := ctx.Value(CtxKeyNamespaceOverride); v != nil { if s, ok := v.(string); ok { ns = strings.TrimSpace(s) } } if ns == "" && g.cfg != nil { ns = strings.TrimSpace(g.cfg.ClientNamespace) } if ns == "" { writeError(w, http.StatusForbidden, "namespace not resolved") return } // Identify actor from context ownerType := "" ownerID := "" apiKeyFallback := "" if v := ctx.Value(ctxKeyJWT); v != nil { if claims, ok := v.(*auth.JWTClaims); ok && claims != nil && strings.TrimSpace(claims.Sub) != "" { // Determine subject type. // If subject looks like an API key (e.g., ak_:), // treat it as an API key owner; otherwise assume a wallet subject. subj := strings.TrimSpace(claims.Sub) lowerSubj := strings.ToLower(subj) if strings.HasPrefix(lowerSubj, "ak_") || strings.Contains(subj, ":") { ownerType = "api_key" ownerID = subj } else { ownerType = "wallet" ownerID = subj } } } if ownerType == "" && ownerID == "" { if v := ctx.Value(ctxKeyAPIKey); v != nil { if s, ok := v.(string); ok && strings.TrimSpace(s) != "" { ownerType = "api_key" ownerID = strings.TrimSpace(s) } } } else if ownerType == "wallet" { // If we have a JWT wallet, also capture the API key as fallback if v := ctx.Value(ctxKeyAPIKey); v != nil { if s, ok := v.(string); ok && strings.TrimSpace(s) != "" { apiKeyFallback = strings.TrimSpace(s) } } } if ownerType == "" || ownerID == "" { writeError(w, http.StatusForbidden, "missing identity") return } g.logger.ComponentInfo("gateway", "namespace auth check", zap.String("namespace", ns), zap.String("owner_type", ownerType), zap.String("owner_id", ownerID), ) // Check ownership in DB using internal auth context db := g.client.Database() internalCtx := client.WithInternalAuth(ctx) // Ensure namespace exists and get id if _, err := db.Query(internalCtx, "INSERT OR IGNORE INTO namespaces(name) VALUES (?)", ns); err != nil { writeError(w, http.StatusInternalServerError, err.Error()) return } nres, err := db.Query(internalCtx, "SELECT id FROM namespaces WHERE name = ? LIMIT 1", ns) if err != nil || nres == nil || nres.Count == 0 || len(nres.Rows) == 0 || len(nres.Rows[0]) == 0 { writeError(w, http.StatusForbidden, "namespace not found") return } nsID := nres.Rows[0][0] q := "SELECT 1 FROM namespace_ownership WHERE namespace_id = ? AND owner_type = ? AND owner_id = ? LIMIT 1" res, err := db.Query(internalCtx, q, nsID, ownerType, ownerID) // If primary owner check fails and we have a JWT wallet with API key fallback, try the API key if (err != nil || res == nil || res.Count == 0) && ownerType == "wallet" && apiKeyFallback != "" { res, err = db.Query(internalCtx, q, nsID, "api_key", apiKeyFallback) } if err != nil || res == nil || res.Count == 0 { writeError(w, http.StatusForbidden, "forbidden: not an owner of namespace") return } next.ServeHTTP(w, r) }) } // requiresNamespaceOwnership returns true if the path should be guarded by // namespace ownership checks. func requiresNamespaceOwnership(p string) bool { if p == "/rqlite" || p == "/v1/rqlite" || strings.HasPrefix(p, "/v1/rqlite/") { return true } if strings.HasPrefix(p, "/v1/pubsub") { return true } if strings.HasPrefix(p, "/v1/rqlite/") { return true } if strings.HasPrefix(p, "/v1/proxy/") { return true } if strings.HasPrefix(p, "/v1/functions") { return true } return false } // corsMiddleware applies permissive CORS headers suitable for early development func (g *Gateway) corsMiddleware(next http.Handler) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { w.Header().Set("Access-Control-Allow-Origin", "*") w.Header().Set("Access-Control-Allow-Methods", "GET, PUT, POST, DELETE, OPTIONS") w.Header().Set("Access-Control-Allow-Headers", "Content-Type, Authorization, X-API-Key") w.Header().Set("Access-Control-Max-Age", strconv.Itoa(600)) if r.Method == http.MethodOptions { w.WriteHeader(http.StatusNoContent) return } next.ServeHTTP(w, r) }) } // persistRequestLog writes request metadata to the database (best-effort) func (g *Gateway) persistRequestLog(r *http.Request, srw *statusResponseWriter, dur time.Duration) { if g.client == nil { return } // Use a short timeout to avoid blocking shutdowns ctx, cancel := context.WithTimeout(context.Background(), 2*time.Second) defer cancel() db := g.client.Database() // Resolve API key ID if available var apiKeyID interface{} = nil if v := r.Context().Value(ctxKeyAPIKey); v != nil { if key, ok := v.(string); ok && key != "" { if res, err := db.Query(ctx, "SELECT id FROM api_keys WHERE key = ? LIMIT 1", key); err == nil { if res != nil && res.Count > 0 && len(res.Rows) > 0 && len(res.Rows[0]) > 0 { switch idv := res.Rows[0][0].(type) { case int64: apiKeyID = idv case float64: apiKeyID = int64(idv) case int: apiKeyID = int64(idv) case string: // best effort parse if n, err := strconv.Atoi(idv); err == nil { apiKeyID = int64(n) } } } } } } ip := getClientIP(r) // Insert the log row _, _ = db.Query(ctx, "INSERT INTO request_logs (method, path, status_code, bytes_out, duration_ms, ip, api_key_id) VALUES (?, ?, ?, ?, ?, ?, ?)", r.Method, r.URL.Path, srw.status, srw.bytes, dur.Milliseconds(), ip, apiKeyID, ) // Update last_used_at for the API key if present if apiKeyID != nil { _, _ = db.Query(ctx, "UPDATE api_keys SET last_used_at = CURRENT_TIMESTAMP WHERE id = ?", apiKeyID) } } // getClientIP extracts the client IP from headers or RemoteAddr func getClientIP(r *http.Request) string { // X-Forwarded-For may contain a list of IPs, take the first if xff := strings.TrimSpace(r.Header.Get("X-Forwarded-For")); xff != "" { parts := strings.Split(xff, ",") if len(parts) > 0 { return strings.TrimSpace(parts[0]) } } if xr := strings.TrimSpace(r.Header.Get("X-Real-IP")); xr != "" { return xr } host, _, err := net.SplitHostPort(r.RemoteAddr) if err != nil { return r.RemoteAddr } return host } // domainRoutingMiddleware handles requests to deployment domains and namespace gateways // This must come BEFORE auth middleware so deployment domains work without API keys // // Domain routing patterns: // - ns-{namespace}.{baseDomain} -> Namespace gateway (proxy to namespace cluster) // - {name}-{random}.{baseDomain} -> Deployment domain // - {name}.{baseDomain} -> Deployment domain (legacy) // - {name}.node-xxx.{baseDomain} -> Legacy format (deprecated, returns 404 for new deployments) func (g *Gateway) domainRoutingMiddleware(next http.Handler) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { host := strings.Split(r.Host, ":")[0] // Strip port // Get base domain from config (default to dbrs.space) baseDomain := "dbrs.space" if g.cfg != nil && g.cfg.BaseDomain != "" { baseDomain = g.cfg.BaseDomain } // Only process base domain and its subdomains if !strings.HasSuffix(host, "."+baseDomain) && host != baseDomain { next.ServeHTTP(w, r) return } // Skip API paths (they should use JWT/API key auth) if strings.HasPrefix(r.URL.Path, "/v1/") || strings.HasPrefix(r.URL.Path, "/.well-known/") { next.ServeHTTP(w, r) return } // Check for namespace gateway domain: ns-{namespace}.{baseDomain} suffix := "." + baseDomain if strings.HasSuffix(host, suffix) { subdomain := strings.TrimSuffix(host, suffix) if strings.HasPrefix(subdomain, "ns-") { // This is a namespace gateway request namespaceName := strings.TrimPrefix(subdomain, "ns-") g.handleNamespaceGatewayRequest(w, r, namespaceName) return } } // Check if deployment handlers are available if g.deploymentService == nil || g.staticHandler == nil { next.ServeHTTP(w, r) return } // Try to find deployment by domain deployment, err := g.getDeploymentByDomain(r.Context(), host) if err != nil { http.Error(w, "Internal server error", http.StatusInternalServerError) return } if deployment == nil { // Domain matches .{baseDomain} but no deployment found http.NotFound(w, r) return } // Inject deployment context ctx := context.WithValue(r.Context(), CtxKeyNamespaceOverride, deployment.Namespace) ctx = context.WithValue(ctx, "deployment", deployment) // Route based on deployment type if deployment.Port == 0 { // Static deployment - serve from IPFS g.staticHandler.HandleServe(w, r.WithContext(ctx), deployment) } else { // Dynamic deployment - proxy to local port g.proxyToDynamicDeployment(w, r.WithContext(ctx), deployment) } }) } // handleNamespaceGatewayRequest proxies requests to a namespace's dedicated gateway cluster // This enables physical isolation where each namespace has its own RQLite, Olric, and Gateway func (g *Gateway) handleNamespaceGatewayRequest(w http.ResponseWriter, r *http.Request, namespaceName string) { // Look up namespace cluster gateway IPs from DNS records db := g.client.Database() internalCtx := client.WithInternalAuth(r.Context()) baseDomain := "dbrs.space" if g.cfg != nil && g.cfg.BaseDomain != "" { baseDomain = g.cfg.BaseDomain } // Query DNS records for the namespace gateway fqdn := "ns-" + namespaceName + "." + baseDomain + "." query := `SELECT value FROM dns_records WHERE fqdn = ? AND record_type = 'A' AND is_active = TRUE ORDER BY RANDOM() LIMIT 1` result, err := db.Query(internalCtx, query, fqdn) if err != nil || result == nil || len(result.Rows) == 0 { // No gateway found for this namespace g.logger.ComponentWarn(logging.ComponentGeneral, "namespace gateway not found", zap.String("namespace", namespaceName), zap.String("fqdn", fqdn), ) http.Error(w, "Namespace gateway not found", http.StatusNotFound) return } gatewayIP := getString(result.Rows[0][0]) if gatewayIP == "" { http.Error(w, "Namespace gateway not available", http.StatusServiceUnavailable) return } // Get the gateway port from namespace_port_allocations // Gateway HTTP port is port_start + 4 portQuery := ` SELECT npa.gateway_http_port FROM namespace_port_allocations npa JOIN namespace_clusters nc ON npa.namespace_cluster_id = nc.id WHERE nc.namespace_name = ? LIMIT 1 ` portResult, err := db.Query(internalCtx, portQuery, namespaceName) gatewayPort := 10004 // Default to first namespace's gateway port if err == nil && portResult != nil && len(portResult.Rows) > 0 { if p := getInt(portResult.Rows[0][0]); p > 0 { gatewayPort = p } } // Proxy request to the namespace gateway targetURL := "http://" + gatewayIP + ":" + strconv.Itoa(gatewayPort) + r.URL.Path if r.URL.RawQuery != "" { targetURL += "?" + r.URL.RawQuery } proxyReq, err := http.NewRequest(r.Method, targetURL, r.Body) if err != nil { g.logger.ComponentError(logging.ComponentGeneral, "failed to create namespace gateway proxy request", zap.String("namespace", namespaceName), zap.Error(err), ) http.Error(w, "Internal server error", http.StatusInternalServerError) return } // Copy headers for key, values := range r.Header { for _, value := range values { proxyReq.Header.Add(key, value) } } proxyReq.Header.Set("X-Forwarded-For", getClientIP(r)) proxyReq.Header.Set("X-Forwarded-Proto", "https") proxyReq.Header.Set("X-Forwarded-Host", r.Host) proxyReq.Header.Set("X-Original-Host", r.Host) // Execute proxy request httpClient := &http.Client{Timeout: 30 * time.Second} resp, err := httpClient.Do(proxyReq) if err != nil { g.logger.ComponentError(logging.ComponentGeneral, "namespace gateway proxy request failed", zap.String("namespace", namespaceName), zap.String("target", gatewayIP), zap.Error(err), ) http.Error(w, "Namespace gateway unavailable", http.StatusServiceUnavailable) return } defer resp.Body.Close() // Copy response headers for key, values := range resp.Header { for _, value := range values { w.Header().Add(key, value) } } // Write status code and body w.WriteHeader(resp.StatusCode) io.Copy(w, resp.Body) } // getDeploymentByDomain looks up a deployment by its domain // Supports formats like: // - {name}-{random}.{baseDomain} (e.g., myapp-f3o4if.dbrs.space) - new format with random suffix // - {name}.{baseDomain} (e.g., myapp.dbrs.space) - legacy format (backwards compatibility) // - {name}.node-{shortID}.{baseDomain} (legacy format for backwards compatibility) // - custom domains via deployment_domains table func (g *Gateway) getDeploymentByDomain(ctx context.Context, domain string) (*deployments.Deployment, error) { if g.deploymentService == nil { return nil, nil } // Strip trailing dot if present domain = strings.TrimSuffix(domain, ".") // Get base domain from config (default to dbrs.space) baseDomain := "dbrs.space" if g.cfg != nil && g.cfg.BaseDomain != "" { baseDomain = g.cfg.BaseDomain } db := g.client.Database() internalCtx := client.WithInternalAuth(ctx) // Parse domain to extract deployment subdomain/name suffix := "." + baseDomain if strings.HasSuffix(domain, suffix) { subdomain := strings.TrimSuffix(domain, suffix) parts := strings.Split(subdomain, ".") // Primary format: {subdomain}.{baseDomain} (e.g., myapp-f3o4if.dbrs.space) // The subdomain can be either: // - {name}-{random} (new format) // - {name} (legacy format) if len(parts) == 1 { subdomainOrName := parts[0] // First, try to find by subdomain (new format: name-random) query := ` SELECT id, namespace, name, type, port, content_cid, status, home_node_id, subdomain FROM deployments WHERE subdomain = ? AND status = 'active' LIMIT 1 ` result, err := db.Query(internalCtx, query, subdomainOrName) if err == nil && len(result.Rows) > 0 { row := result.Rows[0] return &deployments.Deployment{ ID: getString(row[0]), Namespace: getString(row[1]), Name: getString(row[2]), Type: deployments.DeploymentType(getString(row[3])), Port: getInt(row[4]), ContentCID: getString(row[5]), Status: deployments.DeploymentStatus(getString(row[6])), HomeNodeID: getString(row[7]), Subdomain: getString(row[8]), }, nil } // Fallback: try by name for legacy deployments (without random suffix) query = ` SELECT id, namespace, name, type, port, content_cid, status, home_node_id, subdomain FROM deployments WHERE name = ? AND status = 'active' LIMIT 1 ` result, err = db.Query(internalCtx, query, subdomainOrName) if err == nil && len(result.Rows) > 0 { row := result.Rows[0] return &deployments.Deployment{ ID: getString(row[0]), Namespace: getString(row[1]), Name: getString(row[2]), Type: deployments.DeploymentType(getString(row[3])), Port: getInt(row[4]), ContentCID: getString(row[5]), Status: deployments.DeploymentStatus(getString(row[6])), HomeNodeID: getString(row[7]), Subdomain: getString(row[8]), }, nil } } // Legacy format: {name}.node-{shortID}.{baseDomain} (backwards compatibility) if len(parts) == 2 && strings.HasPrefix(parts[1], "node-") { deploymentName := parts[0] shortNodeID := parts[1] // e.g., "node-kv4la8" // Query by name and matching short node ID query := ` SELECT id, namespace, name, type, port, content_cid, status, home_node_id FROM deployments WHERE name = ? AND ('node-' || substr(home_node_id, 9, 6) = ? OR home_node_id = ?) AND status = 'active' LIMIT 1 ` result, err := db.Query(internalCtx, query, deploymentName, shortNodeID, shortNodeID) if err == nil && len(result.Rows) > 0 { row := result.Rows[0] return &deployments.Deployment{ ID: getString(row[0]), Namespace: getString(row[1]), Name: getString(row[2]), Type: deployments.DeploymentType(getString(row[3])), Port: getInt(row[4]), ContentCID: getString(row[5]), Status: deployments.DeploymentStatus(getString(row[6])), HomeNodeID: getString(row[7]), }, nil } } } // Try custom domain from deployment_domains table query := ` SELECT d.id, d.namespace, d.name, d.type, d.port, d.content_cid, d.status, d.home_node_id FROM deployments d JOIN deployment_domains dd ON d.id = dd.deployment_id WHERE dd.domain = ? AND dd.verified_at IS NOT NULL AND d.status = 'active' LIMIT 1 ` result, err := db.Query(internalCtx, query, domain) if err == nil && len(result.Rows) > 0 { row := result.Rows[0] return &deployments.Deployment{ ID: getString(row[0]), Namespace: getString(row[1]), Name: getString(row[2]), Type: deployments.DeploymentType(getString(row[3])), Port: getInt(row[4]), ContentCID: getString(row[5]), Status: deployments.DeploymentStatus(getString(row[6])), HomeNodeID: getString(row[7]), }, nil } return nil, nil } // proxyToDynamicDeployment proxies requests to a dynamic deployment's local port // If the deployment is on a different node, it forwards the request to that node. // With replica support, it first checks if the current node is a replica and can // serve the request locally using the replica's port. func (g *Gateway) proxyToDynamicDeployment(w http.ResponseWriter, r *http.Request, deployment *deployments.Deployment) { if deployment.Port == 0 { http.Error(w, "Deployment has no assigned port", http.StatusServiceUnavailable) return } // Check if request was already forwarded by another node (loop prevention) proxyNode := r.Header.Get("X-Orama-Proxy-Node") // Check if this deployment is on the current node (primary) if g.nodePeerID != "" && deployment.HomeNodeID != "" && deployment.HomeNodeID != g.nodePeerID && proxyNode == "" { // Check if this node is a replica and can serve locally if g.replicaManager != nil { replicaPort, err := g.replicaManager.GetReplicaPort(r.Context(), deployment.ID, g.nodePeerID) if err == nil && replicaPort > 0 { // This node is a replica — serve locally using the replica's port g.logger.Debug("Serving from local replica", zap.String("deployment", deployment.Name), zap.Int("replica_port", replicaPort), ) deployment.Port = replicaPort // Fall through to local proxy below goto serveLocal } } // Not a replica on this node — proxy to a healthy replica node if g.proxyCrossNodeWithReplicas(w, r, deployment) { return } // Fall through if cross-node proxy failed - try local anyway g.logger.Warn("Cross-node proxy failed, attempting local fallback", zap.String("deployment", deployment.Name), zap.String("home_node", deployment.HomeNodeID), ) } serveLocal: // Create a simple reverse proxy to localhost target := "http://localhost:" + strconv.Itoa(deployment.Port) // Set proxy headers r.Header.Set("X-Forwarded-For", getClientIP(r)) r.Header.Set("X-Forwarded-Proto", "https") r.Header.Set("X-Forwarded-Host", r.Host) // Create a new request to the backend backendURL := target + r.URL.Path if r.URL.RawQuery != "" { backendURL += "?" + r.URL.RawQuery } proxyReq, err := http.NewRequest(r.Method, backendURL, r.Body) if err != nil { http.Error(w, "Failed to create proxy request", http.StatusInternalServerError) return } // Copy headers for key, values := range r.Header { for _, value := range values { proxyReq.Header.Add(key, value) } } // Execute proxy request httpClient := &http.Client{Timeout: 30 * time.Second} resp, err := httpClient.Do(proxyReq) if err != nil { g.logger.ComponentError(logging.ComponentGeneral, "local proxy request failed", zap.String("target", target), zap.Error(err), ) // Local process is down — try other replica nodes before giving up if g.replicaManager != nil { if g.proxyCrossNodeWithReplicas(w, r, deployment) { return } } http.Error(w, "Service unavailable", http.StatusServiceUnavailable) return } defer resp.Body.Close() // Copy response headers for key, values := range resp.Header { for _, value := range values { w.Header().Add(key, value) } } // Write status code and body w.WriteHeader(resp.StatusCode) if _, err := w.(io.Writer).Write([]byte{}); err == nil { io.Copy(w, resp.Body) } } // proxyCrossNode forwards a request to the home node of a deployment // Returns true if the request was successfully forwarded, false otherwise func (g *Gateway) proxyCrossNode(w http.ResponseWriter, r *http.Request, deployment *deployments.Deployment) bool { // Get home node IP from dns_nodes table db := g.client.Database() internalCtx := client.WithInternalAuth(r.Context()) query := "SELECT COALESCE(internal_ip, ip_address) FROM dns_nodes WHERE id = ? LIMIT 1" result, err := db.Query(internalCtx, query, deployment.HomeNodeID) if err != nil || result == nil || len(result.Rows) == 0 { g.logger.Warn("Failed to get home node IP", zap.String("home_node_id", deployment.HomeNodeID), zap.Error(err)) return false } homeIP := getString(result.Rows[0][0]) if homeIP == "" { g.logger.Warn("Home node IP is empty", zap.String("home_node_id", deployment.HomeNodeID)) return false } g.logger.Info("Proxying request to home node", zap.String("deployment", deployment.Name), zap.String("home_node_id", deployment.HomeNodeID), zap.String("home_ip", homeIP), zap.String("current_node", g.nodePeerID), ) // Proxy to home node via internal HTTP port (6001) // This is node-to-node internal communication - no TLS needed targetURL := "http://" + homeIP + ":6001" + r.URL.Path if r.URL.RawQuery != "" { targetURL += "?" + r.URL.RawQuery } proxyReq, err := http.NewRequest(r.Method, targetURL, r.Body) if err != nil { g.logger.Error("Failed to create cross-node proxy request", zap.Error(err)) return false } // Copy headers and set Host header to original domain for routing for key, values := range r.Header { for _, value := range values { proxyReq.Header.Add(key, value) } } proxyReq.Host = r.Host // Keep original host for domain routing on target node proxyReq.Header.Set("X-Forwarded-For", getClientIP(r)) proxyReq.Header.Set("X-Orama-Proxy-Node", g.nodePeerID) // Prevent loops // Simple HTTP client for internal node-to-node communication httpClient := &http.Client{ Timeout: 120 * time.Second, } resp, err := httpClient.Do(proxyReq) if err != nil { g.logger.Error("Cross-node proxy request failed", zap.String("target_ip", homeIP), zap.String("host", r.Host), zap.Error(err)) return false } defer resp.Body.Close() // Copy response headers for key, values := range resp.Header { for _, value := range values { w.Header().Add(key, value) } } // Write status code and body w.WriteHeader(resp.StatusCode) io.Copy(w, resp.Body) return true } // proxyCrossNodeWithReplicas tries to proxy a request to any healthy replica node. // It first tries the primary (home node), then falls back to other replicas. // Returns true if the request was successfully proxied. func (g *Gateway) proxyCrossNodeWithReplicas(w http.ResponseWriter, r *http.Request, deployment *deployments.Deployment) bool { if g.replicaManager == nil { // No replica manager — fall back to original single-node proxy return g.proxyCrossNode(w, r, deployment) } // Get all active replica nodes replicaNodes, err := g.replicaManager.GetActiveReplicaNodes(r.Context(), deployment.ID) if err != nil || len(replicaNodes) == 0 { // Fall back to original home node proxy return g.proxyCrossNode(w, r, deployment) } // Try each replica node (primary first if present) for _, nodeID := range replicaNodes { if nodeID == g.nodePeerID { continue // Skip self } nodeIP, err := g.replicaManager.GetNodeIP(r.Context(), nodeID) if err != nil { g.logger.Warn("Failed to get replica node IP", zap.String("node_id", nodeID), zap.Error(err), ) continue } // Proxy using the same logic as proxyCrossNode proxyDeployment := *deployment proxyDeployment.HomeNodeID = nodeID if g.proxyCrossNodeToIP(w, r, &proxyDeployment, nodeIP) { return true } } return false } // proxyCrossNodeToIP forwards a request to a specific node IP. // This is a variant of proxyCrossNode that takes a resolved IP directly. func (g *Gateway) proxyCrossNodeToIP(w http.ResponseWriter, r *http.Request, deployment *deployments.Deployment, nodeIP string) bool { g.logger.Info("Proxying request to replica node", zap.String("deployment", deployment.Name), zap.String("node_id", deployment.HomeNodeID), zap.String("node_ip", nodeIP), ) targetURL := "http://" + nodeIP + ":6001" + r.URL.Path if r.URL.RawQuery != "" { targetURL += "?" + r.URL.RawQuery } proxyReq, err := http.NewRequest(r.Method, targetURL, r.Body) if err != nil { g.logger.Error("Failed to create cross-node proxy request", zap.Error(err)) return false } for key, values := range r.Header { for _, value := range values { proxyReq.Header.Add(key, value) } } proxyReq.Host = r.Host proxyReq.Header.Set("X-Forwarded-For", getClientIP(r)) proxyReq.Header.Set("X-Orama-Proxy-Node", g.nodePeerID) httpClient := &http.Client{Timeout: 5 * time.Second} resp, err := httpClient.Do(proxyReq) if err != nil { g.logger.Warn("Replica proxy request failed", zap.String("target_ip", nodeIP), zap.Error(err), ) return false } defer resp.Body.Close() // If the remote node returned a gateway error, try the next replica if resp.StatusCode == http.StatusBadGateway || resp.StatusCode == http.StatusServiceUnavailable || resp.StatusCode == http.StatusGatewayTimeout { g.logger.Warn("Replica returned gateway error, trying next", zap.String("target_ip", nodeIP), zap.Int("status", resp.StatusCode), ) return false } for key, values := range resp.Header { for _, value := range values { w.Header().Add(key, value) } } w.WriteHeader(resp.StatusCode) io.Copy(w, resp.Body) return true } // Helper functions for type conversion func getString(v interface{}) string { if s, ok := v.(string); ok { return s } return "" } func getInt(v interface{}) int { if i, ok := v.(int); ok { return i } if i, ok := v.(int64); ok { return int(i) } if f, ok := v.(float64); ok { return int(f) } return 0 }