213 lines
		
	
	
		
			5.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			213 lines
		
	
	
		
			5.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package ak
 | |
| 
 | |
| import (
 | |
| 	"crypto/tls"
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 	"net/url"
 | |
| 	"os"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/gorilla/websocket"
 | |
| 	"github.com/prometheus/client_golang/prometheus"
 | |
| 	"goauthentik.io/internal/constants"
 | |
| )
 | |
| 
 | |
| func (ac *APIController) initWS(akURL url.URL, outpostUUID string) error {
 | |
| 	pathTemplate := "%s://%s/ws/outpost/%s/?%s"
 | |
| 	scheme := strings.ReplaceAll(akURL.Scheme, "http", "ws")
 | |
| 
 | |
| 	authHeader := fmt.Sprintf("Bearer %s", ac.token)
 | |
| 
 | |
| 	header := http.Header{
 | |
| 		"Authorization": []string{authHeader},
 | |
| 		"User-Agent":    []string{constants.OutpostUserAgent()},
 | |
| 	}
 | |
| 
 | |
| 	value, set := os.LookupEnv("AUTHENTIK_INSECURE")
 | |
| 	if !set {
 | |
| 		value = "false"
 | |
| 	}
 | |
| 
 | |
| 	dialer := websocket.Dialer{
 | |
| 		Proxy:            http.ProxyFromEnvironment,
 | |
| 		HandshakeTimeout: 10 * time.Second,
 | |
| 		TLSClientConfig: &tls.Config{
 | |
| 			InsecureSkipVerify: strings.ToLower(value) == "true",
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	ws, _, err := dialer.Dial(fmt.Sprintf(pathTemplate, scheme, akURL.Host, outpostUUID, akURL.Query().Encode()), header)
 | |
| 	if err != nil {
 | |
| 		ac.logger.WithError(err).Warning("failed to connect websocket")
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	ac.wsConn = ws
 | |
| 	// Send hello message with our version
 | |
| 	msg := websocketMessage{
 | |
| 		Instruction: WebsocketInstructionHello,
 | |
| 		Args: map[string]interface{}{
 | |
| 			"version":   constants.VERSION,
 | |
| 			"buildHash": constants.BUILD("tagged"),
 | |
| 			"uuid":      ac.instanceUUID.String(),
 | |
| 		},
 | |
| 	}
 | |
| 	err = ws.WriteJSON(msg)
 | |
| 	if err != nil {
 | |
| 		ac.logger.WithField("logger", "authentik.outpost.ak-ws").WithError(err).Warning("Failed to hello to authentik")
 | |
| 		return err
 | |
| 	}
 | |
| 	ac.lastWsReconnect = time.Now()
 | |
| 	ac.logger.WithField("logger", "authentik.outpost.ak-ws").WithField("outpost", outpostUUID).Debug("Successfully connected websocket")
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Shutdown Gracefully stops all workers, disconnects from websocket
 | |
| func (ac *APIController) Shutdown() {
 | |
| 	// Cleanly close the connection by sending a close message and then
 | |
| 	// waiting (with timeout) for the server to close the connection.
 | |
| 	err := ac.wsConn.WriteMessage(websocket.CloseMessage, websocket.FormatCloseMessage(websocket.CloseNormalClosure, ""))
 | |
| 	if err != nil {
 | |
| 		ac.logger.WithError(err).Warning("failed to write close message")
 | |
| 		return
 | |
| 	}
 | |
| 	err = ac.wsConn.Close()
 | |
| 	if err != nil {
 | |
| 		ac.logger.WithError(err).Warning("failed to close websocket")
 | |
| 	}
 | |
| 	ac.logger.Info("finished shutdown")
 | |
| }
 | |
| 
 | |
| func (ac *APIController) reconnectWS() {
 | |
| 	if ac.wsIsReconnecting {
 | |
| 		return
 | |
| 	}
 | |
| 	ac.wsIsReconnecting = true
 | |
| 	u := url.URL{
 | |
| 		Host:   ac.Client.GetConfig().Host,
 | |
| 		Scheme: ac.Client.GetConfig().Scheme,
 | |
| 	}
 | |
| 	attempt := 1
 | |
| 	for {
 | |
| 		q := u.Query()
 | |
| 		q.Set("attempt", strconv.Itoa(attempt))
 | |
| 		u.RawQuery = q.Encode()
 | |
| 		err := ac.initWS(u, ac.Outpost.Pk)
 | |
| 		attempt += 1
 | |
| 		if err != nil {
 | |
| 			ac.logger.Infof("waiting %d seconds to reconnect", ac.wsBackoffMultiplier)
 | |
| 			time.Sleep(time.Duration(ac.wsBackoffMultiplier) * time.Second)
 | |
| 			ac.wsBackoffMultiplier = ac.wsBackoffMultiplier * 2
 | |
| 			// Limit to 300 seconds (5m)
 | |
| 			if ac.wsBackoffMultiplier >= 300 {
 | |
| 				ac.wsBackoffMultiplier = 300
 | |
| 			}
 | |
| 		} else {
 | |
| 			ac.wsIsReconnecting = false
 | |
| 			ac.wsBackoffMultiplier = 1
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (ac *APIController) startWSHandler() {
 | |
| 	logger := ac.logger.WithField("loop", "ws-handler")
 | |
| 	for {
 | |
| 		var wsMsg websocketMessage
 | |
| 		if ac.wsConn == nil {
 | |
| 			go ac.reconnectWS()
 | |
| 			time.Sleep(time.Second * 5)
 | |
| 			continue
 | |
| 		}
 | |
| 		err := ac.wsConn.ReadJSON(&wsMsg)
 | |
| 		if err != nil {
 | |
| 			ConnectionStatus.With(prometheus.Labels{
 | |
| 				"outpost_name": ac.Outpost.Name,
 | |
| 				"outpost_type": ac.Server.Type(),
 | |
| 				"uuid":         ac.instanceUUID.String(),
 | |
| 			}).Set(0)
 | |
| 			logger.WithError(err).Warning("ws read error")
 | |
| 			go ac.reconnectWS()
 | |
| 			time.Sleep(time.Second * 5)
 | |
| 			continue
 | |
| 		}
 | |
| 		ConnectionStatus.With(prometheus.Labels{
 | |
| 			"outpost_name": ac.Outpost.Name,
 | |
| 			"outpost_type": ac.Server.Type(),
 | |
| 			"uuid":         ac.instanceUUID.String(),
 | |
| 		}).Set(1)
 | |
| 		if wsMsg.Instruction == WebsocketInstructionTriggerUpdate {
 | |
| 			time.Sleep(ac.reloadOffset)
 | |
| 			logger.Debug("Got update trigger...")
 | |
| 			err := ac.OnRefresh()
 | |
| 			if err != nil {
 | |
| 				logger.WithError(err).Debug("Failed to update")
 | |
| 			} else {
 | |
| 				LastUpdate.With(prometheus.Labels{
 | |
| 					"outpost_name": ac.Outpost.Name,
 | |
| 					"outpost_type": ac.Server.Type(),
 | |
| 					"uuid":         ac.instanceUUID.String(),
 | |
| 					"version":      constants.VERSION,
 | |
| 					"build":        constants.BUILD("tagged"),
 | |
| 				}).SetToCurrentTime()
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (ac *APIController) startWSHealth() {
 | |
| 	ticker := time.NewTicker(time.Second * 10)
 | |
| 	for ; true; <-ticker.C {
 | |
| 		aliveMsg := websocketMessage{
 | |
| 			Instruction: WebsocketInstructionHello,
 | |
| 			Args: map[string]interface{}{
 | |
| 				"version":   constants.VERSION,
 | |
| 				"buildHash": constants.BUILD("tagged"),
 | |
| 				"uuid":      ac.instanceUUID.String(),
 | |
| 			},
 | |
| 		}
 | |
| 		if ac.wsConn == nil {
 | |
| 			go ac.reconnectWS()
 | |
| 			time.Sleep(time.Second * 5)
 | |
| 			continue
 | |
| 		}
 | |
| 		err := ac.wsConn.WriteJSON(aliveMsg)
 | |
| 		ac.logger.WithField("loop", "ws-health").Trace("hello'd")
 | |
| 		if err != nil {
 | |
| 			ac.logger.WithField("loop", "ws-health").WithError(err).Warning("ws write error")
 | |
| 			go ac.reconnectWS()
 | |
| 			time.Sleep(time.Second * 5)
 | |
| 			continue
 | |
| 		} else {
 | |
| 			ConnectionStatus.With(prometheus.Labels{
 | |
| 				"outpost_name": ac.Outpost.Name,
 | |
| 				"outpost_type": ac.Server.Type(),
 | |
| 				"uuid":         ac.instanceUUID.String(),
 | |
| 			}).Set(1)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (ac *APIController) startIntervalUpdater() {
 | |
| 	logger := ac.logger.WithField("loop", "interval-updater")
 | |
| 	ticker := time.NewTicker(5 * time.Minute)
 | |
| 	for ; true; <-ticker.C {
 | |
| 		logger.Debug("Running interval update")
 | |
| 		err := ac.OnRefresh()
 | |
| 		if err != nil {
 | |
| 			logger.WithError(err).Debug("Failed to update")
 | |
| 		} else {
 | |
| 			LastUpdate.With(prometheus.Labels{
 | |
| 				"outpost_name": ac.Outpost.Name,
 | |
| 				"outpost_type": ac.Server.Type(),
 | |
| 				"uuid":         ac.instanceUUID.String(),
 | |
| 				"version":      constants.VERSION,
 | |
| 				"build":        constants.BUILD("tagged"),
 | |
| 			}).SetToCurrentTime()
 | |
| 		}
 | |
| 	}
 | |
| }
 | 
