Files
godoxy/internal/entrypoint/README.md
yusing 2a3823091d feat(entrypoint): add inbound mTLS profiles for HTTPS
Add root-level inbound_mtls_profiles combining optional system CAs with PEM
CA files, and entrypoint.inbound_mtls_profile to require client certificates
on every HTTPS connection. Route-level inbound_mtls_profile is allowed only
without a global profile; per-handshake TLS picks ClientCAs from SNI, and
requests fail with 421 when Host and SNI would select different mTLS routes.

Compile pools at init (SetInboundMTLSProfiles from state.initEntrypoint) and
reject unknown profile refs or mixed global-plus-route configuration.

Extend config.example.yml and package READMEs; add entrypoint and config
tests for TLS mutation, handshakes, and validation.
2026-04-13 15:14:57 +08:00

16 KiB

internal/entrypoint

The entrypoint package provides the main HTTP entry point for GoDoxy, handling domain-based routing, middleware application, short link matching, access logging, and HTTP server lifecycle management.

Overview

The entrypoint package implements the primary HTTP handler that receives all incoming requests, manages the lifecycle of HTTP servers, determines the target route based on hostname, applies middleware, and forwards requests to the appropriate route handler.

Key Features

  • Domain-based route lookup with subdomain support
  • Short link (go/<alias> domain) handling
  • Middleware chain application
  • Access logging for all requests
  • Configurable not-found handling
  • Per-domain route resolution
  • HTTP server management (HTTP/HTTPS)
  • Route pool abstractions via PoolLike and RWPoolLike interfaces

Primary Consumers

  • HTTP servers: Per-listen-addr servers dispatch requests to routes
  • Route providers: Register routes via StartAddRoute
  • Configuration layer: Validates and applies middleware/access-logging config

Non-goals

  • Does not implement route discovery (delegates to providers)
  • Does not handle TLS certificate management (delegates to autocert)
  • Does not implement health checks (delegates to internal/health/monitor)
  • Does not manage TCP/UDP listeners directly (only HTTP/HTTPS via goutils/server)

Stability

Internal package with stable core interfaces. The Entrypoint interface is the public contract.

Public API

Entrypoint Interface

type Entrypoint interface {
    // Server capabilities
    SupportProxyProtocol() bool
    DisablePoolsLog(v bool)

    // Route registry access
    GetRoute(alias string) (types.Route, bool)
    StartAddRoute(r types.Route) error
    IterRoutes(yield func(r types.Route) bool)
    NumRoutes() int
    RoutesByProvider() map[string][]types.Route

    // Route pool accessors
    HTTPRoutes() PoolLike[types.HTTPRoute]
    StreamRoutes() PoolLike[types.StreamRoute]
    ExcludedRoutes() RWPoolLike[types.Route]

    // Health info queries
    GetHealthInfo() map[string]types.HealthInfo
    GetHealthInfoWithoutDetail() map[string]types.HealthInfoWithoutDetail
    GetHealthInfoSimple() map[string]types.HealthStatus

    // Configuration
    SetFindRouteDomains(domains []string)
    SetMiddlewares(mws []map[string]any) error
    SetNotFoundRules(rules rules.Rules)
    SetAccessLogger(parent task.Parent, cfg *accesslog.RequestLoggerConfig) error

    // Context integration
    ShortLinkMatcher() *ShortLinkMatcher
}

Pool Interfaces

type PoolLike[Route types.Route] interface {
    Get(alias string) (Route, bool)
    Iter(yield func(alias string, r Route) bool)
    Size() int
}

type RWPoolLike[Route types.Route] interface {
    PoolLike[Route]
    Add(r Route)
    Del(r Route)
}

Configuration

type Config struct {
    SupportProxyProtocol bool                     `json:"support_proxy_protocol"`
    InboundMTLSProfile   string                   `json:"inbound_mtls_profile,omitempty"`
    Rules                struct {
        NotFound rules.Rules                     `json:"not_found"`
    }                                               `json:"rules"`
    Middlewares          []map[string]any          `json:"middlewares"`
    AccessLog            *accesslog.RequestLoggerConfig `json:"access_log" validate:"omitempty"`
}

InboundMTLSProfile references a named root-level inbound mTLS profile and enables Go's built-in client-certificate verification (tls.RequireAndVerifyClientCert) for all HTTPS traffic on the entrypoint.

  • When configured, route-level inbound mTLS overrides are not supported.
  • Without a global profile, route-level inbound mTLS may still select profiles by TLS SNI.
  • For a route that enforces client certificates, the route matched from the HTTP Host and the route matched from TLS SNI must be the same route (compared by route identity/key after FindRoute). That resolution is the entrypoint's route table, not DNS or any external name resolution.

Inbound mTLS profiles

Root config provides reusable named inbound mTLS profiles via config.Config.InboundMTLSProfiles. Each profile is a types.InboundMTLSProfile: optional system trust roots plus zero or more PEM CA certificate files on disk (ca_files). SetInboundMTLSProfiles compiles those profiles into certificate pools, and the TLS server sets ClientCAs from the selected pool.

PEM content is not embedded in YAML: list file paths under ca_files; each file should contain one or more PEM-encoded CA certificates.

inbound_mtls_profiles:
  corp-clients:
    use_system_cas: false
    ca_files:
      - /etc/godoxy/mtls/corp-root-ca.pem
      - /etc/godoxy/mtls/corp-issuing-ca.pem
  corp-plus-extra:
    use_system_cas: true
    ca_files:
      - /etc/godoxy/mtls/private-intermediate.pem

Apply one profile to all HTTPS listeners by naming it on the entrypoint:

entrypoint:
  inbound_mtls_profile: corp-clients

Security considerations

  • Client certificates and chain verification — The server requires a client certificate and verifies it with Go's TLS stack. The chain must build to one of the CAs in the selected pool (custom PEMs from ca_files, and optionally the OS trust store when use_system_cas is true). Leaf validity (time, EKU, and related checks) follows standard Go behavior for client-auth verification.
  • CA management and rotation — CA material is read from the filesystem when profiles are compiled during config load / entrypoint setup. Updating trust for a running process requires a config reload or restart so the new PEM files are read.
  • CRL / OCSP revocation — Go's standard inbound mTLS verification does not perform CRL or OCSP checks for client certificates, and GoDoxy does not add a custom revocation layer.
  • Misconfigured trust pools — A pool that is too broad (for example use_system_cas: true with few constraints) can trust far more clients than intended. A pool that omits required intermediates can reject otherwise valid clients.

Failure modes

  • Invalid or unreadable CA material — Missing files, non-PEM content, or PEM that does not parse as CA certificates cause profile compilation to fail. SetInboundMTLSProfiles returns collected per-profile errors.
  • Missing profile referenced by entrypoint — If entrypoint.inbound_mtls_profile names a profile that is not present in inbound_mtls_profiles, initialization returns entrypoint inbound mTLS profile "<name>" not found.
  • Client certificate validation failures — Clients that omit a cert, present a cert that does not chain to the configured pool, or fail other TLS checks see a failed TLS handshake before HTTP handling starts.

Context Functions

func SetCtx(ctx interface{ SetValue(any, any) }, ep Entrypoint)
func FromCtx(ctx context.Context) Entrypoint

Architecture

Core Components

classDiagram
    class Entrypoint {
        +task *task.new_task
        +cfg *Config
        +middleware *middleware.Middleware
        +notFoundHandler http.Handler
        +accessLogger AccessLogger
        +findRouteFunc findRouteFunc
        +shortLinkMatcher *ShortLinkMatcher
        +streamRoutes *pool.Pool\[types.StreamRoute\]
        +excludedRoutes *pool.Pool\[types.Route\]
        +servers *xsync.Map\[string, *httpServer\]
        +SupportProxyProtocol() bool
        +StartAddRoute(r) error
        +IterRoutes(yield)
        +HTTPRoutes() PoolLike
    }

    class httpServer {
        +routes *pool.Pool\[types.HTTPRoute\]
        +ServeHTTP(w, r)
        +AddRoute(route)
        +DelRoute(route)
        +FindRoute(s) types.HTTPRoute
    }

    class PoolLike {
        <<interface>>
        +Get(alias) (Route, bool)
        +Iter(yield) bool
        +Size() int
    }

    class RWPoolLike {
        <<interface>>
        +PoolLike
        +Add(r Route)
        +Del(r Route)
    }

    class ShortLinkMatcher {
        +fqdnRoutes *xsync.Map\[string, string\]
        +subdomainRoutes *xsync.Map\[string, emptyStruct\]
        +ServeHTTP(w, r)
        +AddRoute(alias)
        +DelRoute(alias)
        +SetDefaultDomainSuffix(suffix)
    }

    Entrypoint --> httpServer : manages
    Entrypoint --> ShortLinkMatcher : owns
    Entrypoint --> PoolLike : HTTPRoutes()
    Entrypoint --> RWPoolLike : ExcludedRoutes()
    httpServer --> PoolLike : routes pool

Request Processing Pipeline

flowchart TD
    A[HTTP Request] --> B[Find Route by Host]
    B --> C{Route Found?}
    C -->|Yes| D{Middleware?}
    C -->|No| E{Short Link?}
    E -->|Yes| F[Short Link Handler]
    E -->|No| G{Not Found Handler?}
    G -->|Yes| H[Not Found Handler]
    G -->|No| I[Serve 404]

    D -->|Yes| J[Apply Middleware Chain]
    D -->|No| K[Direct Route Handler]
    J --> K

    K --> L[Route ServeHTTP]
    L --> M[Response]

    F --> M
    H --> N[404 Response]
    I --> N

Server Lifecycle

stateDiagram-v2
    [*] --> Empty: NewEntrypoint()

    Empty --> Listening: StartAddRoute()
    Listening --> Listening: StartAddRoute()
    Listening --> Listening: delHTTPRoute()
    Listening --> [*]: Cancel()

    Listening --> AddingServer: addHTTPRoute()
    AddingServer --> Listening: Server starts

    note right of Listening
        servers map: addr -> httpServer
        For HTTPS, routes are added to ProxyHTTPSAddr
        Default routes added to both HTTP and HTTPS
    end note

Data Flow

sequenceDiagram
    participant Client
    participant httpServer
    participant Entrypoint
    participant Middleware
    participant Route

    Client->>httpServer: GET /path
    httpServer->>Entrypoint: FindRoute(host)

    alt Route Found
        Entrypoint-->>httpServer: HTTPRoute
        httpServer->>Middleware: ServeHTTP(routeHandler)
        alt Has Middleware
            Middleware->>Middleware: Process Chain
        end
        Middleware->>Route: Forward Request
        Route-->>Middleware: Response
        Middleware-->>httpServer: Response
    else Short Link (go.example.com/alias)
        httpServer->>ShortLinkMatcher: Match short code
        ShortLinkMatcher-->>httpServer: Redirect
    else Not Found
        httpServer->>NotFoundHandler: Serve 404
        NotFoundHandler-->>httpServer: 404 Page
    end

    httpServer-->>Client: Response

Route Registry

Routes are managed per-entrypoint:

// Adding a route (main entry point for providers)
if err := ep.StartAddRoute(route); err != nil {
    return err
}

// Iterating all routes including excluded
ep.IterRoutes(func(r types.Route) bool {
    log.Info().Str("alias", r.Name()).Msg("route")
    return true // continue iteration
})

// Querying by alias
route, ok := ep.GetRoute("myapp")

// Grouping by provider
byProvider := ep.RoutesByProvider()

Configuration Surface

Config Source

Environment variables and YAML config file:

entrypoint:
  support_proxy_protocol: true
  middlewares:
    - rate_limit:
        requests_per_second: 100
  rules:
    not_found:
      # not-found rules configuration
  access_log:
    path: /var/log/godoxy/access.log

Environment Variables

Variable Description
PROXY_SUPPORT_PROXY_PROTOCOL Enable PROXY protocol support

Dependency and Integration Map

Dependency Purpose
internal/route Route types and handlers
internal/route/rules Not-found rules processing
internal/logging/accesslog Request logging
internal/net/gphttp/middleware Middleware chain
internal/types Route and health types
github.com/puzpuzpuz/xsync/v4 Concurrent server map
github.com/yusing/goutils/pool Route pool implementations
github.com/yusing/goutils/task Lifecycle management
github.com/yusing/goutils/server HTTP/HTTPS server lifecycle

Observability

Logs

Level Context Description
DEBUG route, listen_url Route addition/removal
DEBUG addr, proto Server lifecycle
ERROR route, listen_url Server startup failures

Metrics

Route metrics exposed via GetHealthInfo methods:

// Health info for all routes
healthMap := ep.GetHealthInfo()
// {
//   "myapp": {Status: "healthy", Uptime: 3600, Latency: 5ms},
//   "excluded-route": {Status: "unknown", Detail: "n/a"},
// }

Security Considerations

  • Route lookup is read-only from route pools
  • Middleware chain is applied per-request
  • Proxy protocol support must be explicitly enabled
  • Access logger captures request metadata before processing
  • Short link matching is limited to configured domains

Failure Modes and Recovery

Failure Behavior Recovery
Server bind fails Error returned, route not added Fix port/address conflict
Route start fails Route excluded, error logged Fix route configuration
Middleware load fails SetMiddlewares returns error Fix middleware configuration
Context cancelled All servers stopped gracefully Restart entrypoint

Usage Examples

Basic Setup

ep := entrypoint.NewEntrypoint(parent, &entrypoint.Config{
    SupportProxyProtocol: false,
})

// Configure domain matching
ep.SetFindRouteDomains([]string{".example.com", "example.com"})

// Configure middleware
err := ep.SetMiddlewares([]map[string]any{
    {"rate_limit": map[string]any{"requests_per_second": 100}},
})
if err != nil {
    return err
}

// Configure access logging
err = ep.SetAccessLogger(parent, &accesslog.RequestLoggerConfig{
    Path: "/var/log/godoxy/access.log",
})
if err != nil {
    return err
}

Route Querying

// Iterate all routes including excluded
ep.IterRoutes(func(r types.Route) bool {
    log.Info().
        Str("alias", r.Name()).
        Str("provider", r.ProviderName()).
        Bool("excluded", r.ShouldExclude()).
        Msg("route")
    return true // continue iteration
})

// Get health info for all routes
healthMap := ep.GetHealthInfoSimple()
for alias, status := range healthMap {
    log.Info().Str("alias", alias).Str("status", string(status)).Msg("health")
}

Route Addition

Routes are typically added by providers via StartAddRoute:

// StartAddRoute handles route registration and server creation
if err := ep.StartAddRoute(route); err != nil {
    return err
}

Context Integration

Routes can access the entrypoint from request context:

// Set entrypoint in context (typically during initialization)
entrypoint.SetCtx(task, ep)

// Get entrypoint from context
if ep := entrypoint.FromCtx(r.Context()); ep != nil {
    route, ok := ep.GetRoute("alias")
}

Testing Notes