Fix NPM integration: correct forward host, SSL, and add UDP stream
- Forward proxy to host IP + dashboard_port instead of container name - Remove redundant advanced_config (Caddy handles internal routing) - Add provider: letsencrypt to SSL certificate request - Add NPM UDP stream creation/deletion for STUN/TURN relay ports - Add npm_stream_id to Deployment model with migration - Fix API docs URL in README (/api/docs) Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
@@ -8,10 +8,13 @@ subsequent requests.
|
||||
Creates, updates, and deletes proxy host entries so each customer's NetBird
|
||||
dashboard is accessible at ``{subdomain}.{base_domain}`` with automatic
|
||||
Let's Encrypt SSL certificates.
|
||||
|
||||
Also manages NPM streams for STUN/TURN relay UDP ports.
|
||||
"""
|
||||
|
||||
import logging
|
||||
from typing import Any
|
||||
from urllib.parse import urlparse
|
||||
|
||||
import httpx
|
||||
|
||||
@@ -21,6 +24,35 @@ logger = logging.getLogger(__name__)
|
||||
NPM_TIMEOUT = 30
|
||||
|
||||
|
||||
def _get_forward_host(npm_api_url: str) -> str:
|
||||
"""Determine the IP/hostname to forward traffic to.
|
||||
|
||||
The NPM proxy host must forward to the MSP appliance's host IP,
|
||||
NOT to a Docker container name, because the customer's Caddy
|
||||
container exposes its port on the host via Docker port mapping.
|
||||
|
||||
We extract the host from the NPM API URL — if the admin configured
|
||||
``http://10.0.0.5:81/api``, we forward to ``10.0.0.5``.
|
||||
If the admin configured ``http://npm:81/api`` (container name),
|
||||
we fall back to the Docker gateway IP ``172.17.0.1``.
|
||||
|
||||
Args:
|
||||
npm_api_url: The NPM API base URL from system config.
|
||||
|
||||
Returns:
|
||||
IP address or hostname to forward to.
|
||||
"""
|
||||
parsed = urlparse(npm_api_url)
|
||||
host = parsed.hostname or "172.17.0.1"
|
||||
|
||||
# If the host looks like a container name (no dots, not an IP), use Docker gateway
|
||||
if not any(c == "." for c in host) and not host.startswith("172.") and host != "localhost":
|
||||
logger.info("NPM URL host '%s' looks like a container name, using Docker gateway 172.17.0.1", host)
|
||||
return "172.17.0.1"
|
||||
|
||||
return host
|
||||
|
||||
|
||||
async def _npm_login(client: httpx.AsyncClient, api_url: str, email: str, password: str) -> str:
|
||||
"""Authenticate with NPM and return a JWT token.
|
||||
|
||||
@@ -96,60 +128,25 @@ async def create_proxy_host(
|
||||
forward_host: str,
|
||||
forward_port: int = 80,
|
||||
admin_email: str = "",
|
||||
subdomain: str = "",
|
||||
customer_id: int = 0,
|
||||
) -> dict[str, Any]:
|
||||
"""Create a proxy host entry in NPM with SSL for a customer.
|
||||
|
||||
Logs in first to get a JWT, then creates the proxy host with advanced
|
||||
routing config for management, signal, and relay containers.
|
||||
Forwards traffic to the host IP + dashboard_port where the customer's
|
||||
Caddy reverse proxy is listening. Caddy handles internal routing to
|
||||
management, signal, relay, and dashboard containers.
|
||||
|
||||
Args:
|
||||
api_url: NPM API base URL.
|
||||
npm_email: NPM login email.
|
||||
npm_password: NPM login password.
|
||||
domain: Full domain (e.g. ``kunde1.example.com``).
|
||||
forward_host: Container name for the dashboard.
|
||||
forward_port: Port to forward to (default 80).
|
||||
forward_host: IP/hostname to forward to (host IP, not container name).
|
||||
forward_port: Port to forward to (dashboard_port, e.g. 9001).
|
||||
admin_email: Email for Let's Encrypt.
|
||||
subdomain: Customer subdomain for building container names.
|
||||
customer_id: Customer ID for building container names.
|
||||
|
||||
Returns:
|
||||
Dict with ``proxy_id`` on success or ``error`` on failure.
|
||||
"""
|
||||
# Build advanced Nginx config to route sub-paths to different containers
|
||||
mgmt_container = f"netbird-kunde{customer_id}-management"
|
||||
signal_container = f"netbird-kunde{customer_id}-signal"
|
||||
relay_container = f"netbird-kunde{customer_id}-relay"
|
||||
|
||||
advanced_config = f"""
|
||||
# NetBird Management API
|
||||
location /api {{
|
||||
proxy_pass http://{mgmt_container}:80;
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
}}
|
||||
|
||||
# NetBird Signal (gRPC-Web)
|
||||
location /signalexchange. {{
|
||||
grpc_pass grpc://{signal_container}:80;
|
||||
grpc_set_header Host $host;
|
||||
}}
|
||||
|
||||
# NetBird Relay (WebSocket)
|
||||
location /relay {{
|
||||
proxy_pass http://{relay_container}:80;
|
||||
proxy_http_version 1.1;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
}}
|
||||
"""
|
||||
|
||||
payload = {
|
||||
"domain_names": [domain],
|
||||
"forward_scheme": "http",
|
||||
@@ -163,7 +160,7 @@ location /relay {{
|
||||
"block_exploits": True,
|
||||
"allow_websocket_upgrade": True,
|
||||
"access_list_id": 0,
|
||||
"advanced_config": advanced_config.strip(),
|
||||
"advanced_config": "",
|
||||
"meta": {
|
||||
"letsencrypt_agree": True,
|
||||
"letsencrypt_email": admin_email,
|
||||
@@ -187,7 +184,8 @@ location /relay {{
|
||||
if resp.status_code in (200, 201):
|
||||
data = resp.json()
|
||||
proxy_id = data.get("id")
|
||||
logger.info("Created NPM proxy host %s (id=%s)", domain, proxy_id)
|
||||
logger.info("Created NPM proxy host %s -> %s:%d (id=%s)",
|
||||
domain, forward_host, forward_port, proxy_id)
|
||||
|
||||
# Step 3: Request SSL certificate
|
||||
await _request_ssl(client, api_url, headers, proxy_id, domain, admin_email)
|
||||
@@ -225,6 +223,8 @@ async def _request_ssl(
|
||||
"""
|
||||
ssl_payload = {
|
||||
"domain_names": [domain],
|
||||
"provider": "letsencrypt",
|
||||
"nice_name": domain,
|
||||
"meta": {
|
||||
"letsencrypt_agree": True,
|
||||
"letsencrypt_email": admin_email,
|
||||
@@ -243,13 +243,111 @@ async def _request_ssl(
|
||||
json={"certificate_id": cert_id},
|
||||
headers=headers,
|
||||
)
|
||||
logger.info("SSL certificate assigned to proxy host %s", proxy_id)
|
||||
logger.info("SSL certificate %s assigned to proxy host %s", cert_id, proxy_id)
|
||||
else:
|
||||
logger.warning("SSL request returned %s: %s", resp.status_code, resp.text[:200])
|
||||
except Exception as exc:
|
||||
logger.warning("SSL certificate request failed: %s", exc)
|
||||
|
||||
|
||||
async def create_stream(
|
||||
api_url: str,
|
||||
npm_email: str,
|
||||
npm_password: str,
|
||||
incoming_port: int,
|
||||
forwarding_host: str,
|
||||
forwarding_port: int,
|
||||
) -> dict[str, Any]:
|
||||
"""Create a UDP stream in NPM for STUN/TURN relay forwarding.
|
||||
|
||||
NPM streams forward raw TCP/UDP traffic (Layer 4) without HTTP processing.
|
||||
Used for the relay STUN port (UDP 3478+).
|
||||
|
||||
Args:
|
||||
api_url: NPM API base URL.
|
||||
npm_email: NPM login email.
|
||||
npm_password: NPM login password.
|
||||
incoming_port: The public-facing port NPM listens on.
|
||||
forwarding_host: IP/hostname to forward to.
|
||||
forwarding_port: The port on the target host.
|
||||
|
||||
Returns:
|
||||
Dict with ``stream_id`` on success or ``error`` on failure.
|
||||
"""
|
||||
payload = {
|
||||
"incoming_port": incoming_port,
|
||||
"forwarding_host": forwarding_host,
|
||||
"forwarding_port": forwarding_port,
|
||||
"tcp_forwarding": False,
|
||||
"udp_forwarding": True,
|
||||
"meta": {},
|
||||
}
|
||||
|
||||
try:
|
||||
async with httpx.AsyncClient(timeout=NPM_TIMEOUT) as client:
|
||||
token = await _npm_login(client, api_url, npm_email, npm_password)
|
||||
headers = {
|
||||
"Authorization": f"Bearer {token}",
|
||||
"Content-Type": "application/json",
|
||||
}
|
||||
|
||||
resp = await client.post(
|
||||
f"{api_url}/nginx/streams", json=payload, headers=headers
|
||||
)
|
||||
if resp.status_code in (200, 201):
|
||||
data = resp.json()
|
||||
stream_id = data.get("id")
|
||||
logger.info(
|
||||
"Created NPM stream: UDP :%d -> %s:%d (id=%s)",
|
||||
incoming_port, forwarding_host, forwarding_port, stream_id,
|
||||
)
|
||||
return {"stream_id": stream_id}
|
||||
else:
|
||||
error_msg = f"NPM stream creation returned {resp.status_code}: {resp.text[:300]}"
|
||||
logger.error("Failed to create NPM stream: %s", error_msg)
|
||||
return {"error": error_msg}
|
||||
except RuntimeError as exc:
|
||||
logger.error("NPM login failed for stream creation: %s", exc)
|
||||
return {"error": f"NPM login failed: {exc}"}
|
||||
except Exception as exc:
|
||||
logger.error("NPM stream API error: %s", exc)
|
||||
return {"error": str(exc)}
|
||||
|
||||
|
||||
async def delete_stream(
|
||||
api_url: str, npm_email: str, npm_password: str, stream_id: int
|
||||
) -> bool:
|
||||
"""Delete a stream from NPM.
|
||||
|
||||
Args:
|
||||
api_url: NPM API base URL.
|
||||
npm_email: NPM login email.
|
||||
npm_password: NPM login password.
|
||||
stream_id: The stream ID to delete.
|
||||
|
||||
Returns:
|
||||
True on success.
|
||||
"""
|
||||
try:
|
||||
async with httpx.AsyncClient(timeout=NPM_TIMEOUT) as client:
|
||||
token = await _npm_login(client, api_url, npm_email, npm_password)
|
||||
headers = {"Authorization": f"Bearer {token}"}
|
||||
resp = await client.delete(
|
||||
f"{api_url}/nginx/streams/{stream_id}", headers=headers
|
||||
)
|
||||
if resp.status_code in (200, 204):
|
||||
logger.info("Deleted NPM stream %d", stream_id)
|
||||
return True
|
||||
logger.warning(
|
||||
"Failed to delete stream %d: %s %s",
|
||||
stream_id, resp.status_code, resp.text[:200],
|
||||
)
|
||||
return False
|
||||
except Exception as exc:
|
||||
logger.error("NPM stream delete error: %s", exc)
|
||||
return False
|
||||
|
||||
|
||||
async def delete_proxy_host(
|
||||
api_url: str, npm_email: str, npm_password: str, proxy_id: int
|
||||
) -> bool:
|
||||
|
||||
Reference in New Issue
Block a user