 c45bb8e985
			
		
	
	c45bb8e985
	
	
	
		
			
			* providers/proxy: rework redirect mechanism Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add session id, don't tie to state in session Signed-off-by: Jens Langhammer <jens@goauthentik.io> * handle state failing to parse Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * save session after creating state Signed-off-by: Jens Langhammer <jens@goauthentik.io> * remove debug Signed-off-by: Jens Langhammer <jens@goauthentik.io> * include task expiry in status Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix redirect URL detection Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
		
			
				
	
	
		
			144 lines
		
	
	
		
			4.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			144 lines
		
	
	
		
			4.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package application
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 	"net/http/httptest"
 | |
| 	"net/url"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/google/uuid"
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| 	"goauthentik.io/api/v3"
 | |
| 	"goauthentik.io/internal/outpost/proxyv2/constants"
 | |
| )
 | |
| 
 | |
| func TestForwardHandleTraefik_Single_Blank(t *testing.T) {
 | |
| 	a := newTestApplication()
 | |
| 	req, _ := http.NewRequest("GET", "/outpost.goauthentik.io/auth/traefik", nil)
 | |
| 
 | |
| 	rr := httptest.NewRecorder()
 | |
| 	a.forwardHandleTraefik(rr, req)
 | |
| 
 | |
| 	assert.Equal(t, http.StatusInternalServerError, rr.Code)
 | |
| }
 | |
| 
 | |
| func TestForwardHandleTraefik_Single_Skip(t *testing.T) {
 | |
| 	a := newTestApplication()
 | |
| 	req, _ := http.NewRequest("GET", "/outpost.goauthentik.io/auth/traefik", nil)
 | |
| 	req.Header.Set("X-Forwarded-Proto", "http")
 | |
| 	req.Header.Set("X-Forwarded-Host", "test.goauthentik.io")
 | |
| 	req.Header.Set("X-Forwarded-Uri", "/skip")
 | |
| 
 | |
| 	rr := httptest.NewRecorder()
 | |
| 	a.forwardHandleTraefik(rr, req)
 | |
| 
 | |
| 	assert.Equal(t, http.StatusOK, rr.Code)
 | |
| }
 | |
| 
 | |
| func TestForwardHandleTraefik_Single_Headers(t *testing.T) {
 | |
| 	a := newTestApplication()
 | |
| 	req, _ := http.NewRequest("GET", "/outpost.goauthentik.io/auth/traefik", nil)
 | |
| 	req.Header.Set("X-Forwarded-Proto", "http")
 | |
| 	req.Header.Set("X-Forwarded-Host", "test.goauthentik.io")
 | |
| 	req.Header.Set("X-Forwarded-Uri", "/app")
 | |
| 
 | |
| 	rr := httptest.NewRecorder()
 | |
| 	a.forwardHandleTraefik(rr, req)
 | |
| 
 | |
| 	assert.Equal(t, http.StatusFound, rr.Code)
 | |
| 	loc, st := a.assertState(t, req, rr)
 | |
| 	shouldUrl := url.Values{
 | |
| 		"client_id":     []string{*a.proxyConfig.ClientId},
 | |
| 		"redirect_uri":  []string{"https://ext.t.goauthentik.io/outpost.goauthentik.io/callback?X-authentik-auth-callback=true"},
 | |
| 		"response_type": []string{"code"},
 | |
| 	}
 | |
| 	assert.Equal(t, fmt.Sprintf("http://fake-auth.t.goauthentik.io/auth?%s", shouldUrl.Encode()), loc.String())
 | |
| 	assert.Equal(t, "http://test.goauthentik.io/app", st.Redirect)
 | |
| }
 | |
| 
 | |
| func TestForwardHandleTraefik_Single_Claims(t *testing.T) {
 | |
| 	a := newTestApplication()
 | |
| 	req, _ := http.NewRequest("GET", "/outpost.goauthentik.io/auth/traefik", nil)
 | |
| 	req.Header.Set("X-Forwarded-Proto", "http")
 | |
| 	req.Header.Set("X-Forwarded-Host", "test.goauthentik.io")
 | |
| 	req.Header.Set("X-Forwarded-Uri", "/app")
 | |
| 
 | |
| 	rr := httptest.NewRecorder()
 | |
| 	a.forwardHandleTraefik(rr, req)
 | |
| 
 | |
| 	s, _ := a.sessions.Get(req, a.SessionName())
 | |
| 	s.ID = uuid.New().String()
 | |
| 	s.Options.MaxAge = 86400
 | |
| 	s.Values[constants.SessionClaims] = Claims{
 | |
| 		Sub: "foo",
 | |
| 		Proxy: &ProxyClaims{
 | |
| 			UserAttributes: map[string]interface{}{
 | |
| 				"username": "foo",
 | |
| 				"password": "bar",
 | |
| 				"additionalHeaders": map[string]interface{}{
 | |
| 					"foo": "bar",
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 	err := a.sessions.Save(req, rr, s)
 | |
| 	if err != nil {
 | |
| 		panic(err)
 | |
| 	}
 | |
| 
 | |
| 	rr = httptest.NewRecorder()
 | |
| 	a.forwardHandleTraefik(rr, req)
 | |
| 
 | |
| 	h := rr.Result().Header
 | |
| 
 | |
| 	assert.Equal(t, []string{"Basic Zm9vOmJhcg=="}, h["Authorization"])
 | |
| 	assert.Equal(t, []string{"bar"}, h["Foo"])
 | |
| 	assert.Equal(t, []string{""}, h["User-Agent"])
 | |
| 	assert.Equal(t, []string{""}, h["X-Authentik-Email"])
 | |
| 	assert.Equal(t, []string{""}, h["X-Authentik-Groups"])
 | |
| 	assert.Equal(t, []string{""}, h["X-Authentik-Jwt"])
 | |
| 	assert.Equal(t, []string{""}, h["X-Authentik-Meta-App"])
 | |
| 	assert.Equal(t, []string{""}, h["X-Authentik-Meta-Jwks"])
 | |
| 	assert.Equal(t, []string{""}, h["X-Authentik-Meta-Outpost"])
 | |
| 	assert.Equal(t, []string{""}, h["X-Authentik-Name"])
 | |
| 	assert.Equal(t, []string{"foo"}, h["X-Authentik-Uid"])
 | |
| 	assert.Equal(t, []string{""}, h["X-Authentik-Username"])
 | |
| }
 | |
| 
 | |
| func TestForwardHandleTraefik_Domain_Blank(t *testing.T) {
 | |
| 	a := newTestApplication()
 | |
| 	a.proxyConfig.Mode = api.PROXYMODE_FORWARD_DOMAIN.Ptr()
 | |
| 	a.proxyConfig.CookieDomain = api.PtrString("foo")
 | |
| 	req, _ := http.NewRequest("GET", "/outpost.goauthentik.io/auth/traefik", nil)
 | |
| 
 | |
| 	rr := httptest.NewRecorder()
 | |
| 	a.forwardHandleTraefik(rr, req)
 | |
| 
 | |
| 	assert.Equal(t, http.StatusInternalServerError, rr.Code)
 | |
| }
 | |
| 
 | |
| func TestForwardHandleTraefik_Domain_Header(t *testing.T) {
 | |
| 	a := newTestApplication()
 | |
| 	a.proxyConfig.Mode = api.PROXYMODE_FORWARD_DOMAIN.Ptr()
 | |
| 	a.proxyConfig.CookieDomain = api.PtrString("foo")
 | |
| 	a.proxyConfig.ExternalHost = "http://auth.test.goauthentik.io"
 | |
| 	req, _ := http.NewRequest("GET", "/outpost.goauthentik.io/auth/traefik", nil)
 | |
| 	req.Header.Set("X-Forwarded-Proto", "http")
 | |
| 	req.Header.Set("X-Forwarded-Host", "test.goauthentik.io")
 | |
| 	req.Header.Set("X-Forwarded-Uri", "/app")
 | |
| 
 | |
| 	rr := httptest.NewRecorder()
 | |
| 	a.forwardHandleTraefik(rr, req)
 | |
| 
 | |
| 	assert.Equal(t, http.StatusFound, rr.Code)
 | |
| 	loc, st := a.assertState(t, req, rr)
 | |
| 	shouldUrl := url.Values{
 | |
| 		"client_id":     []string{*a.proxyConfig.ClientId},
 | |
| 		"redirect_uri":  []string{"https://ext.t.goauthentik.io/outpost.goauthentik.io/callback?X-authentik-auth-callback=true"},
 | |
| 		"response_type": []string{"code"},
 | |
| 	}
 | |
| 	assert.Equal(t, fmt.Sprintf("http://fake-auth.t.goauthentik.io/auth?%s", shouldUrl.Encode()), loc.String())
 | |
| 	assert.Equal(t, "http://test.goauthentik.io/app", st.Redirect)
 | |
| }
 |