 f482937474
			
		
	
	f482937474
	
	
	
		
			
			* providers/proxy: fix handling of AUTHENTIK_HOST_BROWSER (#9622/#4688/#6476) * chore: fix tests
		
			
				
	
	
		
			91 lines
		
	
	
		
			2.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			91 lines
		
	
	
		
			2.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package application
 | |
| 
 | |
| import (
 | |
| 	"net/url"
 | |
| 
 | |
| 	log "github.com/sirupsen/logrus"
 | |
| 	"goauthentik.io/api/v3"
 | |
| 	"goauthentik.io/internal/config"
 | |
| 	"golang.org/x/oauth2"
 | |
| )
 | |
| 
 | |
| type OIDCEndpoint struct {
 | |
| 	oauth2.Endpoint
 | |
| 	TokenIntrospection string
 | |
| 	EndSessionEndpoint string
 | |
| 	JwksUri            string
 | |
| 	Issuer             string
 | |
| }
 | |
| 
 | |
| func updateURL(rawUrl string, scheme string, host string) string {
 | |
| 	u, err := url.Parse(rawUrl)
 | |
| 	if err != nil {
 | |
| 		return rawUrl
 | |
| 	}
 | |
| 	u.Host = host
 | |
| 	u.Scheme = scheme
 | |
| 	return u.String()
 | |
| }
 | |
| 
 | |
| func GetOIDCEndpoint(p api.ProxyOutpostConfig, authentikHost string, embedded bool) OIDCEndpoint {
 | |
| 	authUrl := p.OidcConfiguration.AuthorizationEndpoint
 | |
| 	endUrl := p.OidcConfiguration.EndSessionEndpoint
 | |
| 	jwksUri := p.OidcConfiguration.JwksUri
 | |
| 	issuer := p.OidcConfiguration.Issuer
 | |
| 	ep := OIDCEndpoint{
 | |
| 		Endpoint: oauth2.Endpoint{
 | |
| 			AuthURL:   authUrl,
 | |
| 			TokenURL:  p.OidcConfiguration.TokenEndpoint,
 | |
| 			AuthStyle: oauth2.AuthStyleInParams,
 | |
| 		},
 | |
| 		EndSessionEndpoint: endUrl,
 | |
| 		JwksUri:            jwksUri,
 | |
| 		TokenIntrospection: p.OidcConfiguration.IntrospectionEndpoint,
 | |
| 		Issuer:             issuer,
 | |
| 	}
 | |
| 	aku, err := url.Parse(authentikHost)
 | |
| 	if err != nil {
 | |
| 		return ep
 | |
| 	}
 | |
| 	// For the embedded outpost, we use the configure `authentik_host` for the browser URLs
 | |
| 	// and localhost (which is what we've got from the API) for backchannel URLs
 | |
| 	//
 | |
| 	// For other outposts, when `AUTHENTIK_HOST_BROWSER` is set, we use that for the browser URLs
 | |
| 	// and use what we got from the API for backchannel
 | |
| 	hostBrowser := config.Get().AuthentikHostBrowser
 | |
| 	if !embedded && hostBrowser == "" {
 | |
| 		return ep
 | |
| 	}
 | |
| 	var newHost *url.URL = aku
 | |
| 	var newBrowserHost *url.URL
 | |
| 	if embedded {
 | |
| 		if authentikHost == "" {
 | |
| 			log.Warning("Outpost has localhost/blank API Connection but no authentik_host is configured.")
 | |
| 			return ep
 | |
| 		}
 | |
| 		newBrowserHost = aku
 | |
| 	} else if hostBrowser != "" {
 | |
| 		browser, err := url.Parse(hostBrowser)
 | |
| 		if err != nil {
 | |
| 			return ep
 | |
| 		}
 | |
| 		newBrowserHost = browser
 | |
| 	}
 | |
| 	// Update all browser-accessed URLs to use the new host and scheme
 | |
| 	ep.AuthURL = updateURL(authUrl, newBrowserHost.Scheme, newBrowserHost.Host)
 | |
| 	ep.EndSessionEndpoint = updateURL(endUrl, newBrowserHost.Scheme, newBrowserHost.Host)
 | |
| 	// Update issuer to use the same host and scheme, which would normally break as we don't
 | |
| 	// change the token URL here, but the token HTTP transport overwrites the Host header
 | |
| 	//
 | |
| 	// This is only used in embedded outposts as there we can guarantee that the request
 | |
| 	// is routed correctly
 | |
| 	if embedded {
 | |
| 		ep.Issuer = updateURL(ep.Issuer, newHost.Scheme, newHost.Host)
 | |
| 		ep.JwksUri = updateURL(jwksUri, newHost.Scheme, newHost.Host)
 | |
| 	} else {
 | |
| 		// Fixes: https://github.com/goauthentik/authentik/issues/9622 / ep.Issuer must be the HostBrowser URL
 | |
| 		ep.Issuer = updateURL(ep.Issuer, newBrowserHost.Scheme, newBrowserHost.Host)
 | |
| 	}
 | |
| 	return ep
 | |
| }
 |