|
| 1 | +From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 |
| 2 | +From: Nick Larsen < [email protected]> |
| 3 | +Date: Mon, 17 Feb 2025 15:19:01 +0100 |
| 4 | +Subject: allow bypassing check for host header |
| 5 | + |
| 6 | +NiFi has the configuration option 'nifi.web.proxy.host' which controls allowed |
| 7 | +values for the host header field in any incoming request for the web ui. |
| 8 | + |
| 9 | +This frequently causes issues when trying to expose the NiFi UI via for example |
| 10 | +an ingress, loadbalancer or any similar type of mechanism. |
| 11 | + |
| 12 | +NiFi does not allow to disable this behavior, so at the moment the nifi operator |
| 13 | +simply hardcodes all even remotely possible values into this field. |
| 14 | +But in order to allow putting for example in ingress in front of NiFi this means |
| 15 | +using config overrides to change the value of this option, copy all the values |
| 16 | +the operator put in there and add the extra value you need. |
| 17 | + |
| 18 | +This is less than ideal, the proper solution would probably be |
| 19 | +https://github.com/stackabletech/nifi-operator/issues/604 |
| 20 | + |
| 21 | +But until that is merged this is a simple workaround that allows overriding the list of allowed |
| 22 | +hostnames by just setting it to "*" and this will effectively bypass the hostname check entirely if set. |
| 23 | + |
| 24 | +This allows us to keep the default behavior in place for those users where it works and not remove |
| 25 | +security features, but also enables users to disable this check if they know what they are doing. |
| 26 | +--- |
| 27 | + .../org/apache/nifi/web/server/HostHeaderHandler.java | 8 +++++++- |
| 28 | + 1 file changed, 7 insertions(+), 1 deletion(-) |
| 29 | + |
| 30 | +diff --git a/nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-jetty/src/main/java/org/apache/nifi/web/server/HostHeaderHandler.java b/nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-jetty/src/main/java/org/apache/nifi/web/server/HostHeaderHandler.java |
| 31 | +index dd4bbf54c0..ea1b5b2da1 100644 |
| 32 | +--- a/nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-jetty/src/main/java/org/apache/nifi/web/server/HostHeaderHandler.java |
| 33 | ++++ b/nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-jetty/src/main/java/org/apache/nifi/web/server/HostHeaderHandler.java |
| 34 | +@@ -47,6 +47,7 @@ public class HostHeaderHandler extends ScopedHandler { |
| 35 | + private final String serverName; |
| 36 | + private final int serverPort; |
| 37 | + private final List<String> validHosts; |
| 38 | ++ private boolean allowAllHosts = false; |
| 39 | + |
| 40 | + /** |
| 41 | + * Instantiates a handler with a given server name and port 0. |
| 42 | +@@ -107,6 +108,11 @@ public class HostHeaderHandler extends ScopedHandler { |
| 43 | + // The value(s) from nifi.web.proxy.host |
| 44 | + hosts.addAll(parseCustomHostnames(niFiProperties)); |
| 45 | + |
| 46 | ++ // Check if the setting for allowed hosts has only the wildcard entry and |
| 47 | ++ // if so store this in allowAllHost for later use |
| 48 | ++ List<String> configuredHostNames = niFiProperties.getAllowedHostsAsList(); |
| 49 | ++ this.allowAllHosts = configuredHostNames.size() == 1 && configuredHostNames.contains("*"); |
| 50 | ++ |
| 51 | + // empty is ok here |
| 52 | + hosts.add(""); |
| 53 | + |
| 54 | +@@ -205,7 +211,7 @@ public class HostHeaderHandler extends ScopedHandler { |
| 55 | + } |
| 56 | + |
| 57 | + boolean hostHeaderIsValid(String hostHeader) { |
| 58 | +- return validHosts.contains(hostHeader.toLowerCase().trim()); |
| 59 | ++ return this.allowAllHosts || validHosts.contains(hostHeader.toLowerCase().trim()); |
| 60 | + } |
| 61 | + |
| 62 | + @Override |
| 63 | +-- |
| 64 | +2.40.1 |
| 65 | + |
0 commit comments