* make sentry DSN configurable Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * make proxy smarter Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix typo in config struct Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
		
			
				
	
	
		
			133 lines
		
	
	
		
			3.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			133 lines
		
	
	
		
			3.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package main
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"net/http"
 | 
						|
	"net/url"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/getsentry/sentry-go"
 | 
						|
	log "github.com/sirupsen/logrus"
 | 
						|
	"goauthentik.io/internal/common"
 | 
						|
	"goauthentik.io/internal/config"
 | 
						|
	"goauthentik.io/internal/constants"
 | 
						|
	"goauthentik.io/internal/debug"
 | 
						|
	"goauthentik.io/internal/gounicorn"
 | 
						|
	"goauthentik.io/internal/outpost/ak"
 | 
						|
	"goauthentik.io/internal/outpost/proxyv2"
 | 
						|
	sentryutils "goauthentik.io/internal/utils/sentry"
 | 
						|
	webutils "goauthentik.io/internal/utils/web"
 | 
						|
	"goauthentik.io/internal/web"
 | 
						|
	"goauthentik.io/internal/web/tenant_tls"
 | 
						|
)
 | 
						|
 | 
						|
var running = true
 | 
						|
 | 
						|
func main() {
 | 
						|
	log.SetLevel(log.DebugLevel)
 | 
						|
	log.SetFormatter(&log.JSONFormatter{
 | 
						|
		FieldMap: log.FieldMap{
 | 
						|
			log.FieldKeyMsg:  "event",
 | 
						|
			log.FieldKeyTime: "timestamp",
 | 
						|
		},
 | 
						|
		DisableHTMLEscape: true,
 | 
						|
	})
 | 
						|
	go debug.EnableDebugServer()
 | 
						|
	l := log.WithField("logger", "authentik.root")
 | 
						|
	config.Get().Setup("./authentik/lib/default.yml", "./local.env.yml")
 | 
						|
 | 
						|
	if config.Get().ErrorReporting.Enabled {
 | 
						|
		err := sentry.Init(sentry.ClientOptions{
 | 
						|
			Dsn:              config.Get().ErrorReporting.SentryDSN,
 | 
						|
			AttachStacktrace: true,
 | 
						|
			TracesSampler:    sentryutils.SamplerFunc(config.Get().ErrorReporting.SampleRate),
 | 
						|
			Release:          fmt.Sprintf("authentik@%s", constants.VERSION),
 | 
						|
			Environment:      config.Get().ErrorReporting.Environment,
 | 
						|
			HTTPTransport:    webutils.NewUserAgentTransport(constants.UserAgent(), http.DefaultTransport),
 | 
						|
			IgnoreErrors: []string{
 | 
						|
				http.ErrAbortHandler.Error(),
 | 
						|
			},
 | 
						|
		})
 | 
						|
		if err != nil {
 | 
						|
			l.WithError(err).Warning("failed to init sentry")
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	ex := common.Init()
 | 
						|
	defer common.Defer()
 | 
						|
 | 
						|
	u, _ := url.Parse("http://localhost:8000")
 | 
						|
 | 
						|
	g := gounicorn.New()
 | 
						|
	defer func() {
 | 
						|
		l.Info("shutting down gunicorn")
 | 
						|
		g.Kill()
 | 
						|
	}()
 | 
						|
	ws := web.NewWebServer(g)
 | 
						|
	g.HealthyCallback = func() {
 | 
						|
		if !config.Get().Outposts.DisableEmbeddedOutpost {
 | 
						|
			go attemptProxyStart(ws, u)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	go web.RunMetricsServer()
 | 
						|
	go attemptStartBackend(g)
 | 
						|
	ws.Start()
 | 
						|
	<-ex
 | 
						|
	running = false
 | 
						|
	l.Info("shutting down webserver")
 | 
						|
	go ws.Shutdown()
 | 
						|
}
 | 
						|
 | 
						|
func attemptStartBackend(g *gounicorn.GoUnicorn) {
 | 
						|
	for {
 | 
						|
		if !running {
 | 
						|
			return
 | 
						|
		}
 | 
						|
		err := g.Start()
 | 
						|
		log.WithField("logger", "authentik.router").WithError(err).Warning("gunicorn process died, restarting")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func attemptProxyStart(ws *web.WebServer, u *url.URL) {
 | 
						|
	maxTries := 100
 | 
						|
	attempt := 0
 | 
						|
	l := log.WithField("logger", "authentik.server")
 | 
						|
	for {
 | 
						|
		l.Debug("attempting to init outpost")
 | 
						|
		ac := ak.NewAPIController(*u, config.Get().SecretKey)
 | 
						|
		if ac == nil {
 | 
						|
			attempt += 1
 | 
						|
			time.Sleep(1 * time.Second)
 | 
						|
			if attempt > maxTries {
 | 
						|
				break
 | 
						|
			}
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		// Init tenant_tls here too since it requires an API Client,
 | 
						|
		// so we just re-use the same one as the outpost uses
 | 
						|
		tw := tenant_tls.NewWatcher(ac.Client)
 | 
						|
		go tw.Start()
 | 
						|
		ws.TenantTLS = tw
 | 
						|
		ac.AddRefreshHandler(func() {
 | 
						|
			tw.Check()
 | 
						|
		})
 | 
						|
 | 
						|
		srv := proxyv2.NewProxyServer(ac)
 | 
						|
		ws.ProxyServer = srv
 | 
						|
		ac.Server = srv
 | 
						|
		l.Debug("attempting to start outpost")
 | 
						|
		err := ac.StartBackgroundTasks()
 | 
						|
		if err != nil {
 | 
						|
			l.WithError(err).Warning("outpost failed to start")
 | 
						|
			attempt += 1
 | 
						|
			time.Sleep(15 * time.Second)
 | 
						|
			if attempt > maxTries {
 | 
						|
				break
 | 
						|
			}
 | 
						|
			continue
 | 
						|
		} else {
 | 
						|
			select {}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 |