Skip to content

cirruslabs/chacha

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Chacha

Chacha is an HTTP caching proxy aimed to speed-up cache retrieval operations for Cirrus Runners and VM image fetches through OCI for Tart.

It can store cached entries on local disk with bounded size and work in cluster mode to store cache entries on other Chacha nodes (sharding) to increase the overall storage capacity.

Chacha supports TLS interception to handle HTTPS requests that normally utilize the CONNECT method to connect to the target HTTPS server.

Chacha tries to build on:

With the following exceptions:

  • Chacha is always validating: latency is traded for simplicity and security
  • For certain URLs, you can specify rules to override the default standard-like behavior, for example, you can:
    • ignore the existence of Authorization header in the request for caching purposes
    • skip certain URL parameters (e.g. X-Amz-Date in S3 pre-signed URLs) from the cache key for caching purposes

Configuration

Address to listen on (addr, required)

Can be implicit (:8080, non-cluster mode only) or explicit (127.0.0.1:8080, normal and cluster modes).

Structure

  • addr (string, required)

Example

addr: 127.0.0.1:8080

Disk cache (disk, optional)

Enables caching of HTTP response bodies on local disk, with an optional limit after which evictions will occur.

Structure

  • disk (mapping, optional)
    • dir (string, required) — directory in which cache entries will be stored
    • limit (string, required) — limit (e.g. 50GB) after which Chacha will start dropping the least recently accessed entries to free up the space

Example

disk:
  dir: /chacha
  limit: 50GB

TLS interceptor (tls-interceptor, optional)

TLS interceptor functionality allows Chacha to support CONNECT method, which is usually what proxy clients use to establish the connection with an HTTPS server.

TLS interceptor configuration requires a CA certificate and a key, both of which can be generated using OpenSSL:

openssl req -x509 -newkey ec -pkeyopt ec_paramgen_curve:prime256v1 -keyout key.pem -out cert.pem -sha256 -days 365 -nodes -subj "/CN=Chacha Proxy Server"

Structure

  • tls-interceptor (mapping, optional)
    • cert (string, required) — path to a CA certificate in PEM format
    • key (string, required) — path to a CA private key in PEM format

Example

tls-interceptor:
  cert: /etc/chacha/root-ca.pem
  key: /etc/chacha/root-key.pem

Rules (rules, optional)

Offers an escape hatch for violating RFC specifications for certain URLs.

Structure

  • paths (sequence, optional)
    • pattern (string, required) — regular expression that matches the URL to be proxied
    • ignore-authorization-header (boolean, optional) — whether to ignore the existence of Authorization header for a given URL request, thus enabling its caching
    • ignore-parameters (sequence of strings, optional) — names of URL parameters to not include in the final cache key

Example

paths:
  - pattern: "https:\/\/ghcr.io\/v2\/.*\/blobs\/sha256:[^\/]+"
    ignore-authorization-header: true

  - pattern: "https:\/\/[^\/]+.r2.cloudflarestorage.com\/.*"
    ignore-parameters:
      - "X-Amz-Date"
      - "X-Amz-Signature"

Cluster cache (cluster, optional)

Enabling cluster mode distributes Chacha's cache across multiple nodes.

When enabled, Chacha performs a cache operation by picking a single node from nodes using a rendezvous hashing algorithm with the calculated cache key, and then:

  • in case Chacha's own addr is identical to the selected node — it'll use a local disk cache, which will additionally be exposed to other nodes via Chacha's KV protocol
  • otherwise — Chacha will use a remote disk cache (through Chacha's KV protocol) on the selected node

Structure:

  • cluster (dict, optional)
    • secret (string, required) — secret token used for authentication and authorization between nodes
    • nodes (sequence of dicts, required) — a list of nodes responsible for storing the cache entries
      • addr (string, required) — address of the Chacha node

Example:

addr: 192.168.0.1:8080

cluster:
  secret: "AV8B._W.@cr7-n3ZcnBkUtXy7natj.KN"

  nodes:
    - addr: 192.168.0.2:8080
    - addr: 192.168.0.8:8080
    - addr: 192.168.0.16:8080

Running

chacha run -f config.yaml