Admin features viewable logged out

Created on 5 January 2024, about 1 year ago

Great job on seamlessly setting up Varnish!

We're utilizing the default.vcl file with the settings shown in the attached screenshots, and everything is working smoothly.

However, we've encountered a minor issue related to admin actions. When an admin finishes editing and logs out, navigating to any page they modified still displays the admin features (admin menu, edit links, etc). A simple refresh resolves this, presenting the correct view without the admin elements. Additionally, attempting to click on any edit links leads to the expected "access denied" page.

We're curious if there's a way to address this behavior proactively. Is it possible to force the invalidation of all pages accessed by an admin while logged in, ensuring they display correctly when logged out?

Any assistance or guidance on this matter would be greatly appreciated!

πŸ“Œ Task
Status

Active

Version

4.0

Component

Documentation

Created by

πŸ‡ΊπŸ‡ΈUnited States glynster

Live updates comments and jobs are added and updated live.
Sign in to follow issues

Comments & Activities

  • Issue created by @glynster
  • πŸ‡ΊπŸ‡ΈUnited States glynster

    Here is some additional information:

    This issue occurs on macOSX with Chrome, Safari, and Arc. Interestingly, it does not manifest in Firefox. Firefox behaves as expected. I'm uncertain if this detail helps in identifying the underlying issue.

  • πŸ‡ΊπŸ‡ΈUnited States glynster

    Adding the following to the default.vcl resolves the issue:

    sub vcl_hash {
    
        # ... (existing code)
    
        /** If Bin is set - add it to hash data for this page */
        hash_data(req.http.X-Bin);
    
        return (lookup);
    }
    
    # Respond to incoming requests.
    sub vcl_recv {
    
        # ... (existing code)
    
     # Do not cache if the user is logged in as an admin.
        if (req.http.Cookie ~ "^(|.*; ?)S?SESS([a-z0-9]{32}=[^;]+)(;.*|)$" &&
            req.http.Cookie ~ "^(|.*; ?)ADVBIN=administrator(|;.*|)$") {
            set req.http.X-Bin = "role:administrator";
            set req.hash_always_miss = true; # Ensure a cache miss for admin requests
        }
    
      return (hash);
    }
    

    We have tested this on Arc, Chrome, FireFox, and Safari and it works as expected.

    Perhaps we are doing something wrong initially. Would love some feedback!

  • πŸ‡ΊπŸ‡ΈUnited States glynster

    After much testing this is what we ended up with:

    sub vcl_backend_response {
      if (beresp.http.X-Authenticated-User == "true") {
        set beresp.ttl = 0s;
        set beresp.uncacheable = true;
        set beresp.http.Cache-Control = "no-cache, no-store, must-revalidate";
        set beresp.http.Pragma = "no-cache";
        set beresp.http.Expires = "0";
      } else {
        set beresp.http.Cache-Control = "public, max-age=120s";
        set beresp.ttl = 2m;
      }
      Default code as usual ...
    }
    

    This keeps admin/logged in completely uncached. Our main reason for this is to make sure the admin menu never shows logged out and also to make sure no data is lost with forms. Most of our clients prefer to roam their sites and edit as they go.

  • πŸ‡³πŸ‡±Netherlands Summit

    Hi, was #4 the complete solution, or #3 and #4 together?
    greetings,

  • πŸ‡ΊπŸ‡ΈUnited States glynster

    @summer here is the complete varnish vcl we are using successfully.

    vcl 4.0;
    
    import std;
    
    backend default {
      .host                   = "127.0.0.1";
      .port                   = "8080";
      .connect_timeout        = 600s;
      .first_byte_timeout     = 600s;
      .between_bytes_timeout  = 600s;
    }
    
    # Access control list for specific requests like PURGE.
    # Here you need to put the IP address of your web server.
    acl internal {
      "127.0.0.1";
      "191.101.233.147";
    }
    
    # Respond to incoming requests.
    sub vcl_recv {
    
      # Cache invalidation support:
      #
      #  1. ENTIRE SITE (200):
      #     - method: BAN
      #     - path: /site
      #     - header X-Varnish-Purge: site secret (MUST match X-Varnish-Secret value).
      #  2. CACHE TAGS (200):
      #     - method: BAN
      #     - path: /tags
      #     - header X-Varnish-Purge: site secret (MUST match X-Varnish-Secret value).
      #     - header X-Tag: 32f5 de19 143b - hashed version of the tag to invalidate
      #  3. DEFLATE CALL (200):
      #     - method: BAN
      #     - path: /deflate
      #     - header X-Varnish-Purge: site secret (MUST match X-Varnish-Secret value).
      #  4. SINGLE URL + VARIANTS (200):
      #     - method: BAN
      #     - path: (the path to invalidate, e.g.: "path/a?p=1" or "path/*")
      #     - header Host: the hostname to clear the path for.
      #     - header X-Varnish-Purge: site secret (no verification)
      if (req.method == "BAN") {
        if (!req.http.X-Varnish-Purge) {
          return (synth(405, "Permission denied."));
        }
        if (!client.ip ~ internal) {
          return (synth(405, "Permission denied."));
        }
        set req.http.X-Varnish-Purge = std.tolower(req.http.X-Varnish-Purge);
        if (req.url == "/site") {
          ban("obj.http.X-Varnish-Secret == " + req.http.X-Varnish-Purge);
          return (synth(200, "Site banned."));
        }
        else if ((req.url == "/tags") && req.http.X-Tag) {
          set req.http.X-Tag = "(^|\s)" + regsuball(std.tolower(req.http.X-Tag), "\ ", "(\\s|$)|(^|\\s)") + "(\s|$)";
          ban("obj.http.X-Varnish-Secret == " + req.http.X-Varnish-Purge + " && obj.http.X-Tag ~ " + req.http.X-Tag);
          return (synth(200, "Tags banned."));
        }
        else if (req.url == "/deflate") {
          ban("obj.http.ETag ~ .{8}" + req.http.X-Deflate-Tag + " && obj.http.X-Deflate-Key != " + req.http.X-Deflate-Key);
          return (synth(200, "Deflate operation performed."));
        }
        else {
          set req.url = std.tolower(req.url);
          if (req.url ~ "\*") {
            set req.url = regsuball(req.url, "\*", "\.*");
            ban("obj.http.X-Varnish-Secret == " + req.http.X-Varnish-Purge + " && obj.http.X-Url ~ ^" + req.url + "$");
            return (synth(200, "WILDCARD URL banned."));
          }
          else {
            ban("obj.http.X-Varnish-Secret == " + req.http.X-Varnish-Purge + " && obj.http.X-Url ~ " + req.url);
            return (synth(200, "URL banned."));
          }
        }
      }
    
      unset req.http.X-Real-Forwarded-For;
      set   req.http.X-Real-Forwarded-For = client.ip;
      unset req.http.X-Varnish-Client-IP;
      set   req.http.X-Varnish-Client-IP = client.ip;
    
      set req.url = std.querysort(req.url);
    
      if (!req.method ~ "BAN|PURGE|GET|HEAD|PUT|POST|TRACE|OPTIONS|DELETE") {
        return(synth(400, "Bad request"));
      }
    
      if (req.url ~ "^/(cron|install|update)\.php") {
        return(synth(403, "Forbidden"));
      }
    
      if (req.method != "GET" && req.method != "HEAD") {
        return (pass);
      }
    
      if (req.http.Upgrade ~ "(?i)websocket") {
        return (pipe);
      }
    
      if (req.url ~ "^/(cron|install|update)\.php") {
        if (!client.ip ~ internal) {
          return(synth(403, "Forbidden"));
        }
        return(pass);
      }
    
      if (req.url ~ "(?i)\.(twig|yml|module|info|inc|profile|engine|test|po|txt|theme|svn|git|tpl(\.php)?)(\?.*|)$" && !req.url ~ "(?i)robots\.txt") {
        if (!client.ip ~ internal) {
          return(synth(403, "Forbidden"));
        }
      }
    
      # Pass Caching if it was requested from backend.
      if (req.http.Cookie ~ "(^|;\s*)(S?SESS[a-zA-Z0-9]+|DRUPAL_UID)=\w+") {
        set req.http.X-Pass-Varnish = "YES";
        return (pass);
      }
    
      if (req.url ~ "\.(jpeg|jpg|png|gif|webp|svg|ico|swf|js|css|txt|eot|woff|woff2|ttf|htc)(\?.*|)$") {
        unset req.http.Cookie;
        return (hash);
      }
    
      if (req.url ~ "\.(webm|mp3|m4a|mp4|m4v|mov|mpeg|mpg|avi|divx|ogg|ogv|wma|pdf|tar|gz|gzip|bz2)(\?.*|)$") {
        unset req.http.Cookie;
        return(pipe);
      }
    
      if ((req.url ~ "/system/ajax/") && (! req.url ~ "/cached")) {
        return(pass);
      }
    
      if (req.url ~ "/user" || req.url ~ "/admin") {
        return(pass);
      }
    
      if (
        req.url ~ "^/sites/.*/files/" || req.url ~ "^/sites/all/themes/" || req.url ~ "^/modules/.*\.(js|css)\?") {
        unset req.http.Cookie;
      }
    
      set req.http.Surrogate-Capability = "abc=ESI/1.0";
    
      return (hash);
    }
    
    sub vcl_hash {
    
      /** Default hash */
      hash_data(req.url);
      hash_data(req.http.host);
    
      /** Place ajax into separate bin. */
      hash_data(req.http.X-Requested-With);
    
      /** Add protocol if available. */
      hash_data(req.http.X-Forwarded-Proto);
    
      /** Process authenticated users */
      if (req.http.Cookie ~ "^(|.*; ?)S?SESS([a-z0-9]{32}=[^;]+)(;.*|)$") {
    
        /** Extract full session value */
        set req.http.X-SESS = regsub(req.http.Cookie, "^(|.*; ?)S?SESS([a-z0-9]{32}=[^;]+)(;.*|)$", "\2");
    
        # Get Cookie Bin. And Set new header for Vary caching.
        if (req.http.Cookie ~ "^(|.*; ?)ADVBIN=([^;]+)(;.*|)$") {
          set req.http.X-Bin  = "role:" + regsub(req.http.Cookie, "^(|.*; ?)ADVBIN=([^;]+)(;.*|)$", "\2");
        }
    
        /** ESI_CACHEMODE_1 - SHARED */
        if (req.url ~ "/adv_varnish/esi/" && req.url ~ "[\?&]cachemode=1(&|$)") {
          set req.http.X-Bin = "role:anonymous";
        }
    
        /** ESI_CACHEMODE_2 - ROLE */
        /** X-Bin role:...         */
        /** This is default behavior User role will be set as cookie bin at the beginning of this condition. */
    
        /** ESI_CACHEMODE_3 - USER */
        if (req.url ~ "/adv_varnish/esi/" && req.url ~ "[\?&]cachemode=3(&|$)") {
          /** Set user session as bin */
          set req.http.X-Bin  = "user:" + req.http.X-SESS;
        }
        set req.http.X-URL = req.url;
      }
      else {
        set req.http.X-Bin = "role:anonymous";
      }
    
      /** If Bin is set - add it to hash data for this page */
      hash_data(req.http.X-Bin);
    
      return (lookup);
    }
    
    # Instruct Varnish what to do in the case of certain backend responses (beresp).
    sub vcl_backend_response {
    
      # Set appropriate caching headers
      if (beresp.http.X-Authenticated-User == "true") {
        set beresp.ttl = 0s;
        set beresp.uncacheable = true;
        set beresp.http.Cache-Control = "no-cache, no-store, must-revalidate";
        set beresp.http.Pragma = "no-cache";
        set beresp.http.Expires = "0";
      } else {
        set beresp.http.Cache-Control = "public, max-age=120s";
        set beresp.ttl = 2m;
      }
    
      /** Enable ESI if requested on this page */
      if (beresp.http.X-DOESI) {
        set beresp.do_esi = true;
        /** Avoid cache onn Browser side */
        unset beresp.http.ETag;
        unset beresp.http.Last-Modified;
      }
    
      /** compression, vcl_miss/vcl_pass unset compression from the backend */
      if (!beresp.http.Content-Encoding && (
        beresp.http.content-type ~ "text" ||
        beresp.http.content-type ~ "application/xml" ||
        beresp.http.content-type ~ "application/xml\+rss" ||
        beresp.http.content-type ~ "application/rss\+xml" ||
        beresp.http.content-type ~ "application/xhtml+xml" ||
        beresp.http.content-type ~ "application/x-javascript" ||
        beresp.http.content-type ~ "application/javascript" ||
        beresp.http.content-type ~ "application/json" ||
        beresp.http.content-type ~ "font/truetype" ||
        beresp.http.content-type ~ "application/x-font-ttf" ||
        beresp.http.content-type ~ "application/x-font-opentype" ||
        beresp.http.content-type ~ "font/opentype" ||
        beresp.http.content-type ~ "application/vnd\.ms-fontobject" ||
        beresp.http.content-type ~ "image/svg\+xml" ||
        beresp.http.content-type ~ "image/x-icon"
      ))  {
       set beresp.do_gzip = true;
      }
    
      # Set ban-lurker friendly custom headers.
      set beresp.http.X-Url = bereq.url;
      set beresp.http.X-Host = bereq.http.host;
    
      # Cache 404s, 301s, at 500s with a short lifetime to protect the backend.
      if (beresp.status == 404 || beresp.status == 301 || beresp.status == 500) {
        set beresp.ttl = 10m;
      }
    
      # Don't allow static files to set cookies.
      # (?i) denotes case insensitive in PCRE (perl compatible regular expressions).
      # This list of extensions appears twice, once here and again in vcl_recv so
      # make sure you edit both and keep them equal.
      if (bereq.url ~ "(?i)\.(jpeg|jpg|png|gif|webp|svg|ico|swf|js|css|txt|eot|woff|woff2|ttf|htc|mp3|m4a|mp4|m4v|mov|mpeg|mpg|avi|divx|ogg|ogv|wma|pdf|tar|gz|gzip|bz2|asc|dat|doc|xls|ppt|tgz|csv)(\?.*|)$") {
        unset beresp.http.set-cookie;
        return(deliver);
      }
    
      # Allow items to remain in cache up to X hours past their cache expiration.
      set beresp.grace = std.duration(beresp.http.X-Grace + "s", 0s);
    
      # Use ttl from X-TTL header. If X-Adv-Varnish header exists (page created by Drupal) and
      # missing X-Drupal-[Dynamic-]Cache headers, then the page should not be cached for some
      # reason (Page-Cache-Kill-Switch, Vary per User or Session etc)
      set beresp.ttl = std.duration(beresp.http.X-TTL + "s", 0s);
      if (bereq.url !~ "/adv_varnish/esi/" &&
        beresp.http.X-Adv-Varnish == "Cache-Enabled" &&
        beresp.http.X-Drupal-Dynamic-Cache != "MISS" &&
        beresp.http.X-Drupal-Dynamic-Cache != "HIT" &&
        beresp.http.X-Drupal-Cache != "HIT" &&
        beresp.http.X-Drupal-Cache != "MISS") {
        set beresp.ttl = 0s;
      }
    
      if (beresp.http.Set-Cookie) {
        set beresp.http.X-Cacheable = "NO:Cookie in the response";
        set beresp.ttl = 0s;
      }
      elsif (beresp.ttl <= 0s) {
        set beresp.http.X-Cacheable = "NO:Not Cacheable";
      }
      elsif (beresp.http.Cache-Control ~ "private" && !beresp.http.X-DOESI) {
        set beresp.http.X-Cacheable = "NO:Cache-Control=private";
        set beresp.uncacheable = true;
      }
      else {
        set beresp.http.X-Cacheable = "YES";
      }
    
      if (beresp.ttl > 0s) {
        unset beresp.http.Set-Cookie;
      }
      set beresp.http.X-Varnish-Secret = std.tolower(beresp.http.X-Varnish-Secret);
    
      set beresp.http.X-TTL2 = beresp.ttl;
    
      # Disable buffering only for BigPipe responses
      if (beresp.http.Surrogate-Control ~ "BigPipe/1.0") {
        set beresp.do_stream = true;
        set beresp.ttl = 0s;
      }
    }
    
    # Set a header to track a cache HITs and MISSes.
    sub vcl_deliver {
    
      # If the header doesn't already exist, set it.
      #if (!req.http.X-Bin) {
      #set resp.http.X-Bin = "role:anonymous";
      #}
      set resp.http.X-Bin = req.http.X-Bin;
    
      if (obj.hits > 0) {
        set resp.http.X-Varnish-Cache = "HIT";
        set resp.http.X-Cache-TTL-Remaining = req.http.X-Cache-TTL-Remaining;
    
        if (resp.http.Age) {
          set resp.http.X-Cache-Age = resp.http.Age;
        }
      }
      else {
        set resp.http.X-Varnish-Cache = "MISS";
      }
    
      set resp.http.X-Cache-Hits = obj.hits;
    
      # If it's a Drupal-Page with X-Bin vary, tell browsers to vary by Cookie.
      if (resp.http.Vary ~ "X-Bin") {
        set resp.http.Vary = resp.http.Vary + ", Cookie";
      }
    
      # Remove ban-lurker friendly custom headers when delivering to client.
      if (!resp.http.X-Cache-Debug) {
        unset resp.http.X-Url;
        unset resp.http.X-Host;
        unset resp.http.Purge-Cache-Tags;
        unset resp.http.X-Drupal-Cache-Contexts;
        unset resp.http.X-Drupal-Cache-Tags;
        unset resp.http.X-Drupal-Dynamic-Cache;
        unset resp.http.X-Bin;
        unset resp.http.X-Tag;
        unset resp.http.X-TTL2;
        unset resp.http.X-Cache-TTL;
        unset resp.http.X-Powered-By;
        unset resp.http.Via;
        unset resp.http.X-Generator;
        unset resp.http.Connection;
        unset resp.http.Server;
        unset resp.http.X-DOESI;
        unset resp.http.X-Varnish-Secret;
        unset resp.http.X-Deflate-Key;
      }
    
      return (deliver);
    }
    
    # Right after an object has been found (hit) in the cache.
    sub vcl_hit {
      set req.http.X-Cache-TTL-Remaining = obj.ttl;
    
      if (obj.ttl >= 0s) {
        return (deliver);
      }
    
      if (std.healthy(req.backend_hint)) {
        if (obj.ttl + 10s > 0s) {
          return (deliver);
        } else {
          return(deliver);
        }
      } else {
        if (obj.ttl + obj.grace > 0s) {
          return (deliver);
        } else {
          return (deliver);
        }
      }
    
      return (deliver);
    }
    
    # Right after an object was looked up and not found in cache.
    sub vcl_miss {
      return (fetch);
    }
    
    # Run after a pass in vcl_recv OR after a lookup that returned a hitpass.
    sub vcl_pass {
      # stub
    }
    
    sub vcl_pipe {
      if (req.http.upgrade) {
        set bereq.http.upgrade = req.http.upgrade;
      }
      set bereq.http.connection = "close";
    }
    
    sub vcl_synth {
    
      if (resp.status == 400) {
        set resp.status = 400;
        set resp.http.Content-Type = "text/html; charset=utf-8";
    
        synthetic ({"
        <?xml version="1.0" encoding="utf-8"?>
        <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
        "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
        <html>
        <head>
        <title>400 Bad request</title>
        </head>
        <body>
        <h1>Error 400 Bad request</h1>
        <p>Bad request</p>
        </body>
        </html>
        "});
    
        return(deliver);
      }
    
      if (resp.status == 401) {
        set resp.status = 401;
        set resp.http.Content-Type = "text/html; charset=utf-8";
        set resp.http.WWW-Authenticate = "Basic realm=Authentication required. Please login";
    
        synthetic ({"
        <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
        "http://www.w3.org/TR/1999/REC-html401-19991224/loose.dtd">
        <HTML>
        <HEAD>
        <TITLE>Error</TITLE>
        <META HTTP-EQUIV='Content-Type' CONTENT='text/html;'>
        </HEAD>
        <BODY><H1>401 Unauthorized.</H1></BODY>
        </HTML>
        "});
    
        return(deliver);
      }
    
      if (resp.status == 403) {
        set resp.status = 403;
        set resp.http.Content-Type = "text/html; charset=utf-8";
    
        synthetic ({"
        <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
        "http://www.w3.org/TR/1999/REC-html401-19991224/loose.dtd">
        <HTML>
        <HEAD>
        <TITLE>403 Forbidden</TITLE>
        <META HTTP-EQUIV='Content-Type' CONTENT='text/html;'>
        </HEAD>
        <BODY><H1>Forbidden</H1></BODY>
        <p>You don't have permissions to access "} + req.url + {" on this server</p>
        </HTML>
        "});
        return(deliver);
      }
    
    }
    
    sub vcl_fini {
      return (ok);
    }
  • πŸ‡³πŸ‡±Netherlands Summit

    Hi, Thanks! I have asked my hosting provider to upload your .vlc without changes, I let you know if it succeeds for us as well. Thanks! Greetings,

  • πŸ‡ΊπŸ‡ΈUnited States glynster

    To see if varnish is working you need to review the network tab, select the page and view the headers. Search for caching like attached.

  • πŸ‡³πŸ‡±Netherlands Summit

    Hi, the attached image https://www.drupal.org/files/issues/2025-03-31/SCR-2025-03-31.jpg β†’ , looks like there is no varnish caching, right?
    greetings, and thanks for the quick reply!

  • πŸ‡ΊπŸ‡ΈUnited States glynster

    Correct on the screenshot I grabbed that was an admin page. Here is a varnish hit.

Production build 0.71.5 2024