 3c1b70c355
			
		
	
	3c1b70c355
	
	
	
		
			
			* outposts/proxyv2: initial commit Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add rs256 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> more stuff Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add forward auth an sign_out Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> match cookie name Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> re-add support for rs256 for backwards compat Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add error handler Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> ensure unique user-agent is used Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> set cookie duration based on id_token expiry Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> build proxy v2 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add ssl Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add basic auth and custom header support Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add application cert loading Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> implement whitelist Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add redis Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> migrate embedded outpost to v2 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> remove old proxy Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> providers/proxy: make token expiration configurable Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add metrics Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> fix tests Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * providers/proxy: only allow one redirect URI Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix docker build for proxy Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * remove default port offset Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * add AUTHENTIK_HOST_BROWSER Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * tests: fix e2e/integration tests not using proper tags Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * remove references of old port Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix user_attributes not being loaded correctly Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * cleanup dependencies Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * cleanup Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
		
			
				
	
	
		
			155 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			155 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package ak
 | |
| 
 | |
| import (
 | |
| 	"crypto/tls"
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 	"net/url"
 | |
| 	"os"
 | |
| 	"strings"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/go-openapi/strfmt"
 | |
| 	"github.com/gorilla/websocket"
 | |
| 	"github.com/prometheus/client_golang/prometheus"
 | |
| 	"github.com/recws-org/recws"
 | |
| 	"goauthentik.io/internal/constants"
 | |
| )
 | |
| 
 | |
| func (ac *APIController) initWS(akURL url.URL, outpostUUID strfmt.UUID) {
 | |
| 	pathTemplate := "%s://%s/ws/outpost/%s/"
 | |
| 	scheme := strings.ReplaceAll(akURL.Scheme, "http", "ws")
 | |
| 
 | |
| 	authHeader := fmt.Sprintf("Bearer %s", ac.token)
 | |
| 
 | |
| 	header := http.Header{
 | |
| 		"Authorization": []string{authHeader},
 | |
| 		"User-Agent":    []string{constants.OutpostUserAgent()},
 | |
| 	}
 | |
| 
 | |
| 	value, set := os.LookupEnv("AUTHENTIK_INSECURE")
 | |
| 	if !set {
 | |
| 		value = "false"
 | |
| 	}
 | |
| 
 | |
| 	ws := &recws.RecConn{
 | |
| 		NonVerbose: true,
 | |
| 		TLSClientConfig: &tls.Config{
 | |
| 			InsecureSkipVerify: strings.ToLower(value) == "true",
 | |
| 		},
 | |
| 	}
 | |
| 	ws.Dial(fmt.Sprintf(pathTemplate, scheme, akURL.Host, outpostUUID.String()), header)
 | |
| 
 | |
| 	ac.logger.WithField("logger", "authentik.outpost.ak-ws").WithField("outpost", outpostUUID.String()).Debug("Connecting to authentik")
 | |
| 
 | |
| 	ac.wsConn = ws
 | |
| 	// Send hello message with our version
 | |
| 	msg := websocketMessage{
 | |
| 		Instruction: WebsocketInstructionHello,
 | |
| 		Args: map[string]interface{}{
 | |
| 			"version":   constants.VERSION,
 | |
| 			"buildHash": constants.BUILD(),
 | |
| 			"uuid":      ac.instanceUUID.String(),
 | |
| 		},
 | |
| 	}
 | |
| 	err := ws.WriteJSON(msg)
 | |
| 	if err != nil {
 | |
| 		ac.logger.WithField("logger", "authentik.outpost.ak-ws").WithError(err).Warning("Failed to hello to authentik")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // Shutdown Gracefully stops all workers, disconnects from websocket
 | |
| func (ac *APIController) Shutdown() {
 | |
| 	// Cleanly close the connection by sending a close message and then
 | |
| 	// waiting (with timeout) for the server to close the connection.
 | |
| 	err := ac.wsConn.WriteMessage(websocket.CloseMessage, websocket.FormatCloseMessage(websocket.CloseNormalClosure, ""))
 | |
| 	if err != nil {
 | |
| 		ac.logger.Println("write close:", err)
 | |
| 		return
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (ac *APIController) startWSHandler() {
 | |
| 	logger := ac.logger.WithField("loop", "ws-handler")
 | |
| 	for {
 | |
| 		var wsMsg websocketMessage
 | |
| 		err := ac.wsConn.ReadJSON(&wsMsg)
 | |
| 		if err != nil {
 | |
| 			ConnectionStatus.With(prometheus.Labels{
 | |
| 				"uuid": ac.instanceUUID.String(),
 | |
| 				"name": ac.Outpost.Name,
 | |
| 			}).Set(0)
 | |
| 			logger.WithError(err).Warning("ws write error, reconnecting")
 | |
| 			ac.wsConn.CloseAndReconnect()
 | |
| 			time.Sleep(time.Second * 5)
 | |
| 			continue
 | |
| 		}
 | |
| 		ConnectionStatus.With(prometheus.Labels{
 | |
| 			"uuid": ac.instanceUUID.String(),
 | |
| 			"name": ac.Outpost.Name,
 | |
| 		}).Set(1)
 | |
| 		if wsMsg.Instruction == WebsocketInstructionTriggerUpdate {
 | |
| 			time.Sleep(ac.reloadOffset)
 | |
| 			logger.Debug("Got update trigger...")
 | |
| 			err := ac.Server.Refresh()
 | |
| 			if err != nil {
 | |
| 				logger.WithError(err).Debug("Failed to update")
 | |
| 			} else {
 | |
| 				LastUpdate.With(prometheus.Labels{
 | |
| 					"uuid":    ac.instanceUUID.String(),
 | |
| 					"name":    ac.Outpost.Name,
 | |
| 					"version": constants.VERSION,
 | |
| 					"build":   constants.BUILD(),
 | |
| 				}).SetToCurrentTime()
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (ac *APIController) startWSHealth() {
 | |
| 	ticker := time.NewTicker(time.Second * 10)
 | |
| 	for ; true; <-ticker.C {
 | |
| 		if !ac.wsConn.IsConnected() {
 | |
| 			continue
 | |
| 		}
 | |
| 		aliveMsg := websocketMessage{
 | |
| 			Instruction: WebsocketInstructionHello,
 | |
| 			Args: map[string]interface{}{
 | |
| 				"version":   constants.VERSION,
 | |
| 				"buildHash": constants.BUILD(),
 | |
| 				"uuid":      ac.instanceUUID.String(),
 | |
| 			},
 | |
| 		}
 | |
| 		err := ac.wsConn.WriteJSON(aliveMsg)
 | |
| 		ac.logger.WithField("loop", "ws-health").Trace("hello'd")
 | |
| 		if err != nil {
 | |
| 			ac.logger.WithField("loop", "ws-health").WithError(err).Warning("ws write error, reconnecting")
 | |
| 			ac.wsConn.CloseAndReconnect()
 | |
| 			continue
 | |
| 		} else {
 | |
| 			ConnectionStatus.With(prometheus.Labels{
 | |
| 				"uuid": ac.instanceUUID.String(),
 | |
| 				"name": ac.Outpost.Name,
 | |
| 			}).Set(1)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (ac *APIController) startIntervalUpdater() {
 | |
| 	logger := ac.logger.WithField("loop", "interval-updater")
 | |
| 	ticker := time.NewTicker(5 * time.Minute)
 | |
| 	for ; true; <-ticker.C {
 | |
| 		err := ac.Server.Refresh()
 | |
| 		if err != nil {
 | |
| 			logger.WithError(err).Debug("Failed to update")
 | |
| 		} else {
 | |
| 			LastUpdate.With(prometheus.Labels{
 | |
| 				"uuid":    ac.instanceUUID.String(),
 | |
| 				"name":    ac.Outpost.Name,
 | |
| 				"version": constants.VERSION,
 | |
| 				"build":   constants.BUILD(),
 | |
| 			}).SetToCurrentTime()
 | |
| 		}
 | |
| 	}
 | |
| }
 |