Writing a new auth module - request for comments

Andrew Hutchings ahutchings at nginx.com
Thu Jun 18 10:33:23 UTC 2015


Hi Senko,

I am Andrew Hutchings and am a Developer Advocate for Nginx. Part of my job is to help the community writing such modules and aiding communication between the community and Nginx's internal teams.

It is worth noting that at some point in the 1.9.x mainline release we will be adding dynamic modules which will let you compile modules out-of-tree and load them on starting Nginx. I'll reply as best I can inline.

> On 17 Jun 2015, at 12:25, Senko Rasic <senko.rasic at gmail.com> wrote:
> 
> Hi,
> 
> I'm writing a new module (out-of-tree) for supporting authentication
> using Stormpath's user management API (https://stormpath.com/).
> 
> Basically, the module makes one or more HTTP requests to the
> Stormpath API to determine if the client request should be authorized
> to access a location or not.

Excellent :)

> Since this is somewhat different than other modules I could learn from, and
> since all my knowledge about nginx internals is from looking at how other
> modules & core is written, I'm wondering if anyone could comment on how I
> designed the module and raise any issues if I did anything problematic,
> wrong or weird.

I have scanned through some of the module so far and there doesn't appear to be anything wrong or weird.

> For reference, the work-in-progress code for the module is available
> here: https://github.com/stormpath/stormpath-nginx-module
> 
> Since I have to contact the external API I'm using the upstream module to
> do it. But I don't want the users (admins) to have to define an upstream
> block in nginx.conf so my module creates and configures an upstrem
> configuration internally instead.
> 
> https://github.com/stormpath/stormpath-nginx-module/blob/master/src/ngx_http_auth_stormpath_module.c#L864
> 
> I haven't seen any other module do that, but I don't see that
> it's possible to avoid users having to define upstream manually otherwise.

I agree I have not seen anyone else do this so far. That isn't to say it is a bad thing. It is an interesting take on it.

> For the above reasons (wanting to handle everything invisible to the user),
> I'm not using nginx_http_proxy_module, but implement the upstream handler
> (create_request & friends) myself. But since I have to construct a HTTP
> request, parse status line, parse headers, parse body (eg. if it's chunked
> transfer-encoding), I end up duplicating a lot of functionality already
> in http proxy (although greatly simplified because I know exactly how to
> talk to the upstream server and what to expect in return).
> 
> One example is I parse the headers manually, because I haven't found a way
> to init the http_upstream header parser hash, and to reuse the parser
> (originally the init is done in ngx_http_upstream_init_main_conf).
> 
> https://github.com/stormpath/stormpath-nginx-module/blob/master/src/ngx_http_auth_stormpath_module.c#L304

This appears to be the correct way to do it as far as I can see, but I'm happy to defer to the main Nginx developers on this.

> (I'll also hit similar problems with caching the requests to the upstream.
> I'd like to reuse the caching functionality already in nginx, but it seems
> to me like http_proxy_module does a lot of manual heavy lifting in that
> regard that I'd have to reimplement (or *shudder* copy-paste) to
> support it?)
> 
> Does the above make sense? Is there an obvious way to do it differently that
> I've missed? Are there any guides or documentation on how this should be
> done (besides Evan Miller's obsolete-but-useful guides I went through
> already)?

At the moment there isn't much beyond Evan Miller's guides and the Nginx Wiki. I will be creating more up-to-date documentation as we head towards the dynamic modules feature being released.

> Any comments, suggestions, warnings or flames are welcome.

If you have any questions feel free to contact me directly.

Kind Regards
-- 
Andrew Hutchings (LinuxJedi)
Senior Developer Advocate
Nginx Inc.



More information about the nginx mailing list