2016-12-20 06:05:39 -05:00
# Web terminals
2016-12-19 14:18:16 -05:00
2018-09-06 12:52:18 -04:00
> [Introduced](https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/7690)
2018-05-25 02:18:42 -04:00
in GitLab 8.15. Only project maintainers and owners can access web terminals.
2016-12-19 14:18:16 -05:00
2018-05-09 03:04:06 -04:00
With the introduction of the [Kubernetes integration ](../../user/project/clusters/index.md ),
GitLab gained the ability to store and use credentials for a Kubernetes cluster.
One of the things it uses these credentials for is providing access to
[web terminals ](../../ci/environments.md#web-terminals ) for environments.
2016-12-19 14:18:16 -05:00
## How it works
2016-12-20 06:05:39 -05:00
A detailed overview of the architecture of web terminals and how they work
2019-04-10 02:29:36 -04:00
can be found in [this document ](https://gitlab.com/gitlab-org/gitlab-workhorse/blob/master/doc/channel.md ).
2016-12-19 14:18:16 -05:00
In brief:
2018-11-13 01:07:16 -05:00
- GitLab relies on the user to provide their own Kubernetes credentials, and to
2016-12-19 14:18:16 -05:00
appropriately label the pods they create when deploying.
2018-11-13 01:07:16 -05:00
- When a user navigates to the terminal page for an environment, they are served
2016-12-19 14:18:16 -05:00
a JavaScript application that opens a WebSocket connection back to GitLab.
2018-11-13 01:07:16 -05:00
- The WebSocket is handled in [Workhorse ](https://gitlab.com/gitlab-org/gitlab-workhorse ),
2016-12-19 14:18:16 -05:00
rather than the Rails application server.
2018-11-13 01:07:16 -05:00
- Workhorse queries Rails for connection details and user permissions. Rails
queries Kubernetes for them in the background using [Sidekiq ](../troubleshooting/sidekiq.md ).
- Workhorse acts as a proxy server between the user's browser and the Kubernetes
2016-12-19 14:18:16 -05:00
API, passing WebSocket frames between the two.
2018-11-13 01:07:16 -05:00
- Workhorse regularly polls Rails, terminating the WebSocket connection if the
2016-12-19 14:18:16 -05:00
user no longer has permission to access the terminal, or if the connection
details have changed.
2018-12-31 12:44:15 -05:00
## Security
GitLab and [GitLab Runner ](https://docs.gitlab.com/runner/ ) take some
precautions to keep interactive web terminal data encrypted between them, and
everything protected with authorization guards. This is described in more
detail below.
- Interactive web terminals are completely disabled unless [`[session_server]`](https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-session_server-section) is configured.
- Every time the runner starts, it will generate an `x509` certificate that will be used for a `wss` (Web Socket Secure) connection.
- For every created job, a random URL is generated which is discarded at the end of the job. This URL is used to establish a web socket connection. The URL for the session is in the format `(IP|HOST):PORT/session/$SOME_HASH` , where the `IP/HOST` and `PORT` are the configured [`listen_address` ](https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-session_server-section ).
- Every session URL that is created has an authorization header that needs to be sent, to establish a `wss` connection.
- The session URL is not exposed to the users in any way. GitLab holds all the state internally and proxies accordingly.
2016-12-19 14:18:16 -05:00
## Enabling and disabling terminal support
2019-05-02 16:39:41 -04:00
NOTE: **Note:** AWS Elastic Load Balancers (ELBs) do not support web sockets.
AWS Application Load Balancers (ALBs) must be used if you want web terminals
to work. See [AWS Elastic Load Balancing Product Comparison ](https://aws.amazon.com/elasticloadbalancing/features/#compare )
for more information.
2016-12-20 06:05:39 -05:00
As web terminals use WebSockets, every HTTP/HTTPS reverse proxy in front of
2016-12-19 14:18:16 -05:00
Workhorse needs to be configured to pass the `Connection` and `Upgrade` headers
2017-04-26 22:03:29 -04:00
through to the next one in the chain. If you installed GitLab using Omnibus, or
2016-12-19 14:18:16 -05:00
from source, starting with GitLab 8.15, this should be done by the default
configuration, so there's no need for you to do anything.
However, if you run a [load balancer ](../high_availability/load_balancer.md ) in
front of GitLab, you may need to make some changes to your configuration. These
guides document the necessary steps for a selection of popular reverse proxies:
2018-11-13 01:07:16 -05:00
- [Apache ](https://httpd.apache.org/docs/2.4/mod/mod_proxy_wstunnel.html )
- [NGINX ](https://www.nginx.com/blog/websocket-nginx/ )
- [HAProxy ](http://blog.haproxy.com/2012/11/07/websockets-load-balancing-with-haproxy/ )
- [Varnish ](https://www.varnish-cache.org/docs/4.1/users-guide/vcl-example-websockets.html )
2016-12-19 14:18:16 -05:00
Workhorse won't let WebSocket requests through to non-WebSocket endpoints, so
it's safe to enable support for these headers globally. If you'd rather had a
narrower set of rules, you can restrict it to URLs ending with `/terminal.ws`
(although this may still have a few false positives).
If you installed from source, or have made any configuration changes to your
2019-02-08 08:24:31 -05:00
Omnibus installation before upgrading to 8.15, you may need to make some changes
to your configuration. See the [Upgrading Community Edition and Enterprise
Edition from source](../../update/upgrading_from_source.md#nginx-configuration)
2016-12-19 14:18:16 -05:00
document for more details.
2016-12-20 06:05:39 -05:00
If you'd like to disable web terminal support in GitLab, just stop passing
2016-12-19 14:18:16 -05:00
the `Connection` and `Upgrade` hop-by-hop headers in the *first* HTTP reverse
proxy in the chain. For most users, this will be the NGINX server bundled with
2017-04-26 22:03:29 -04:00
Omnibus GitLab, in which case, you need to:
2016-12-19 14:18:16 -05:00
2018-11-13 01:07:16 -05:00
- Find the `nginx['proxy_set_headers']` section of your `gitlab.rb` file
- Ensure the whole block is uncommented, and then comment out or remove the
2016-12-19 14:18:16 -05:00
`Connection` and `Upgrade` lines.
For your own load balancer, just reverse the configuration changes recommended
by the above guides.
When these headers are not passed through, Workhorse will return a
2016-12-20 06:05:39 -05:00
`400 Bad Request` response to users attempting to use a web terminal. In turn,
they will receive a `Connection failed` message.
2017-02-03 13:41:35 -05:00
2017-01-26 13:16:50 -05:00
## Limiting WebSocket connection time
> [Introduced](https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/8413)
in GitLab 8.17.
Terminal sessions use long-lived connections; by default, these may last
forever. You can configure a maximum session time in the Admin area of your
GitLab instance if you find this undesirable from a scalability or security
point of view.