90 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			90 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package application
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"crypto/tls"
 | |
| 	"net/http"
 | |
| 	"net/http/httputil"
 | |
| 	"net/url"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/getsentry/sentry-go"
 | |
| 	"github.com/prometheus/client_golang/prometheus"
 | |
| 	log "github.com/sirupsen/logrus"
 | |
| 	"goauthentik.io/internal/outpost/proxyv2/metrics"
 | |
| 	"goauthentik.io/internal/utils/web"
 | |
| )
 | |
| 
 | |
| func (a *Application) getUpstreamTransport() http.RoundTripper {
 | |
| 	return &http.Transport{
 | |
| 		TLSClientConfig: &tls.Config{InsecureSkipVerify: !*a.proxyConfig.InternalHostSslValidation},
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (a *Application) configureProxy() error {
 | |
| 	// Reverse proxy to the application server
 | |
| 	u, err := url.Parse(*a.proxyConfig.InternalHost)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	rp := &httputil.ReverseProxy{Director: a.proxyModifyRequest(u)}
 | |
| 	rsp := sentry.StartSpan(context.TODO(), "authentik.outposts.proxy.application_transport")
 | |
| 	rp.Transport = web.NewTracingTransport(rsp.Context(), a.getUpstreamTransport())
 | |
| 	rp.ErrorHandler = a.newProxyErrorHandler()
 | |
| 	rp.ModifyResponse = a.proxyModifyResponse
 | |
| 	a.mux.PathPrefix("/").HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
 | |
| 		claims, err := a.getClaims(r)
 | |
| 		if claims == nil && a.IsAllowlisted(r.URL) {
 | |
| 			a.log.Trace("path can be accessed without authentication")
 | |
| 		} else if claims == nil && err != nil {
 | |
| 			a.redirectToStart(rw, r)
 | |
| 			return
 | |
| 		} else {
 | |
| 			a.addHeaders(r.Header, claims)
 | |
| 		}
 | |
| 		before := time.Now()
 | |
| 		rp.ServeHTTP(rw, r)
 | |
| 		defer func() {
 | |
| 			err := recover()
 | |
| 			if err == nil || err == http.ErrAbortHandler {
 | |
| 				return
 | |
| 			}
 | |
| 			log.WithError(err.(error)).Error("recover in reverse proxy")
 | |
| 		}()
 | |
| 		after := time.Since(before)
 | |
| 
 | |
| 		metrics.UpstreamTiming.With(prometheus.Labels{
 | |
| 			"outpost_name":  a.outpostName,
 | |
| 			"upstream_host": r.URL.Host,
 | |
| 			"method":        r.Method,
 | |
| 			"scheme":        r.URL.Scheme,
 | |
| 			"host":          web.GetHost(r),
 | |
| 		}).Observe(float64(after))
 | |
| 	})
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (a *Application) proxyModifyRequest(ou *url.URL) func(req *http.Request) {
 | |
| 	return func(r *http.Request) {
 | |
| 		r.Header.Set("X-Forwarded-Host", r.Host)
 | |
| 		claims, _ := a.getClaims(r)
 | |
| 		r.URL.Scheme = ou.Scheme
 | |
| 		r.URL.Host = ou.Host
 | |
| 		if claims != nil && claims.Proxy != nil && claims.Proxy.BackendOverride != "" {
 | |
| 			u, err := url.Parse(claims.Proxy.BackendOverride)
 | |
| 			if err != nil {
 | |
| 				a.log.WithField("backend_override", claims.Proxy.BackendOverride).WithError(err).Warning("failed parse user backend override")
 | |
| 			} else {
 | |
| 				r.URL.Scheme = u.Scheme
 | |
| 				r.URL.Host = u.Host
 | |
| 			}
 | |
| 		}
 | |
| 		a.log.WithField("upstream_url", r.URL.String()).Trace("final upstream url")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (a *Application) proxyModifyResponse(res *http.Response) error {
 | |
| 	res.Header.Set("X-Powered-By", "authentik_proxy2")
 | |
| 	return nil
 | |
| }
 | 
