Internet-Draft | HTTP Gateway Description Format | August 2023 |
Nottingham | Expires 22 February 2024 | [Page] |
This document specifies a format for describing the capabilities and configuration of a HTTP gateway (such as a content delivery network) to the origin server and any software on it (such as a content management system).¶
This note is to be removed before publishing as an RFC.¶
Status information for this document may be found at https://datatracker.ietf.org/doc/draft-nottingham-gateway-description/.¶
information can be found at https://mnot.github.io/I-D/.¶
Source for this draft and an issue tracker can be found at https://github.com/mnot/I-D/labels/gateway-description.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 22 February 2024.¶
Copyright (c) 2023 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
To allow origin servers and tools that they use to be easily configured, this document defines a Gateway Description Format that describes the configuration of an HTTP gateway (commonly, a "reverse proxy" or content delivery network). It is intended to be generated by gateways and made available out-of-band to origin servers using them.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
The Gateway Description Format is a JSON [JSON] document. The root object SHOULD contain members with the following names and values:¶
For example, a very simple (and not very helpful) description document:¶
{ "description": "The Example CDN configuration for example.com", "generated": "2023-08-21T23:20:50.52Z" }¶
Processors SHOULD NOT fail if these members are not present.¶
Additionally, the root object MAY contain any number of gateway descriptors; see Section 3.¶
Unrecognised members of the root object MUST be ignored.¶
The following subsections list OPTIONAL information that may be included in the root object of a gateway description document.¶
New gateway descriptors may be introduced by updating this specification.¶
The "site" descriptor is a JSON object containing information about the HTTP server that the gateway exposes on behalf of the origin. It is a JSON object that contains zero or more of the following members:¶
For example:¶
{ "description": "The Example CDN configuration for example.com", "generated": "2023-08-21T23:20:50.52Z", "site": { "exposed-origins": ["https://www.example.com", "https://www.example.com"], "backend-origins": ["https://backend1.example.com", "https://backend2.example.com"] } }¶
Note that this descriptor allows but is not sufficient to describe more complex arrangements; for example, different backend-origins for different URL path locations, or when one exposed-origin redirects all requests to the other.¶
The "gateway-sourcelists" descriptor is a JSON array of strings containing one or more URLs that can be used to fetch gateway source address lists.¶
Their URLs MUST have a scheme of "https". If multiple URLs are listed, their contents are combined to reconstruct the full list of source IP addresses for the gateway. Consumers SHOULD respect HTTP caching rules when fetching lists, refreshing their contents as necessary once they become stale.¶
For example:¶
{ "description": "The Example CDN configuration for example.com", "generated": "2023-08-21T23:20:50.52Z", "gateway-sourcelists": [ "https://cdn.example.com/source-addresess/ipv4", "https://cdn.example.com/source-addresses/ipv6" ] }¶
Gateway source address lists are textual documents (with a RECOMMENDED media type of "text/plain") whose format is one entry per line, with all whitespace being ignored and all content on a line after the "#" being ignored. Each entry contains an IPv4 or IPv6 address block, using "/" notation.¶
For example:¶
# My IP addresses 192.0.2.0/24 198.51.100.0/24 # TEST-NET-2 2001:db8::/32¶
... contains three entries, "192.0.2.0/24", "198.51.100.0/24", and "2001:db8::/32".¶
The "gateway-header-auth" descriptor is a JSON array of two strings representing a HTTP header field name and value that it will send in all HTTP requests to the origin, allowing the origin to discriminate them from other requests.¶
For example:¶
{ "description": "The Example CDN configuration for example.com", "generated": "2023-08-21T23:20:50.52Z", "gateway-header-auth": ["Secret", "my$ecret"] }¶
would imply that the gateway would send this HTTP header field in all requests to the origin:¶
The "forwarded-host" descriptor is a boolean that indicates whether the Host request header field sent by the gateway is that which it received (one of the exposed origins) if true, or that of the backend origin selected if false.¶
For example:¶
{ "description": "The Example CDN configuration for example.com", "generated": "2023-08-21T23:20:50.52Z", "forwarded-host": false }¶
would imply that the gateway has rewritten the Host request header field will be rewritten to be that of the backend origin.¶
The "methods-allow" descriptor is a JSON array of case-sensitive strings that indicate the HTTP methods that the gateway will accept in requests, forwarding them to the backend origin or handling them locally as appropriate.¶
The value "*" indicates that unrecognised methods are forwarded to the backend origin server.¶
For example:¶
{ "description": "The Example CDN configuration for example.com", "generated": "2023-08-21T23:20:50.52Z", "methods-allow": ["GET", "HEAD", "POST", "PUT", "DELETE", "OPTIONS"] }¶
The "targeted-cc" descriptor is a JSON array of strings indicating the targeted cache-control header field(s) [TARGETED] supported by the gateway, in order of precedence (i.e., first entry overrides later entries)¶
For example:¶
{ "description": "The Example CDN configuration for example.com", "generated": "2023-08-21T23:20:50.52Z", "targeted-cc": [ "ExampleCDN-Cache-Control", "CDN-Cache-Control" ] }¶
The "invalidation-api" descriptor is a JSON object that contains information about the gateway's deployment of [INVALIDATION].¶
These objects can contain the following members and values:¶
For example:¶
{ "description": "The Example CDN configuration for example.com", "generated": "2023-08-21T23:20:50.52Z", "invalidation-api": { "uri": "https://api.cdn.example.com/invalidate", "selectors": ["uri", "uri-prefix", "group"], "purge": true, "p95-latency": 2000 } }¶
If the "api-auth" descriptor (Section 3.8) is present, the authentication details there SHOULD be sent on all requests to the invalidation API.¶
The "api-auth" descriptor is a string representing a Bearer HTTP authentication (Section 2.1 of [BEARER]) to be used to authenticate the backend origin in interaction with Gateway APIs.¶
For example:¶
{ "description": "The Example CDN configuration for example.com", "generated": "2023-08-21T23:20:50.52Z", "bearer": "mF_9.B5f-4.1JqM" }¶
The "vendor" descriptor is a JSON object that can be use for gateway- and vendor-specific extensions to the format. Its members' names MUST be in internet hostname format, associating a name associated with the gateway and/or its vendor. The contents of member values are under the control of that party.¶
For example:¶
{ "description": "The Example CDN configuration for example.com", "generated": "2023-08-21T23:20:50.52Z", "vendor": { "cdn.example.com": { "foo": "bar", "1": 2 } } }¶