* prepare client auth with inbuilt server Signed-off-by: Jens Langhammer <jens@goauthentik.io> * introduce better IPC auth Signed-off-by: Jens Langhammer <jens@goauthentik.io> * init Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start stage Signed-off-by: Jens Langhammer <jens@goauthentik.io> * only allow trusted proxies to set MTLS headers Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more stage progress Signed-off-by: Jens Langhammer <jens@goauthentik.io> * dont fail if ipc_key doesn't exist Signed-off-by: Jens Langhammer <jens@goauthentik.io> * actually install app Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add some tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update API Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix unquote Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix int serial number not jsonable Signed-off-by: Jens Langhammer <jens@goauthentik.io> * init ui Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add UI Signed-off-by: Jens Langhammer <jens@goauthentik.io> * unrelated: fix git pull in makefile Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix parse helper Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add test for outpost Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more tests and improvements Signed-off-by: Jens Langhammer <jens@goauthentik.io> * improve labels Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add support for multiple CAs on brand Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add support for multiple CAs to MTLS stage Signed-off-by: Jens Langhammer <jens@goauthentik.io> * dont log ipcuser secret views Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix go mod Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
		
			
				
	
	
		
			114 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			114 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package web
 | 
						|
 | 
						|
import (
 | 
						|
	"encoding/json"
 | 
						|
	"encoding/pem"
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"net/http"
 | 
						|
	"net/http/httputil"
 | 
						|
	"net/url"
 | 
						|
	"strings"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/prometheus/client_golang/prometheus"
 | 
						|
	"goauthentik.io/internal/config"
 | 
						|
	"goauthentik.io/internal/utils/sentry"
 | 
						|
	"goauthentik.io/internal/utils/web"
 | 
						|
)
 | 
						|
 | 
						|
var (
 | 
						|
	ErrAuthentikStarting = errors.New("authentik starting")
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	maxBodyBytes = 32 * 1024 * 1024
 | 
						|
)
 | 
						|
 | 
						|
func (ws *WebServer) configureProxy() {
 | 
						|
	// Reverse proxy to the application server
 | 
						|
	director := func(req *http.Request) {
 | 
						|
		req.URL.Scheme = ws.upstreamURL.Scheme
 | 
						|
		req.URL.Host = ws.upstreamURL.Host
 | 
						|
		if _, ok := req.Header["User-Agent"]; !ok {
 | 
						|
			// explicitly disable User-Agent so it's not set to default value
 | 
						|
			req.Header.Set("User-Agent", "")
 | 
						|
		}
 | 
						|
		if !web.IsRequestFromTrustedProxy(req) {
 | 
						|
			// If the request isn't coming from a trusted proxy, delete MTLS headers
 | 
						|
			req.Header.Del("SSL-Client-Cert")             // nginx-ingress
 | 
						|
			req.Header.Del("X-Forwarded-TLS-Client-Cert") // traefik
 | 
						|
			req.Header.Del("X-Forwarded-Client-Cert")     // envoy
 | 
						|
		}
 | 
						|
		if req.TLS != nil {
 | 
						|
			req.Header.Set("X-Forwarded-Proto", "https")
 | 
						|
			if len(req.TLS.PeerCertificates) > 0 {
 | 
						|
				pems := make([]string, len(req.TLS.PeerCertificates))
 | 
						|
				for i, crt := range req.TLS.PeerCertificates {
 | 
						|
					pem := pem.EncodeToMemory(&pem.Block{
 | 
						|
						Type:  "CERTIFICATE",
 | 
						|
						Bytes: crt.Raw,
 | 
						|
					})
 | 
						|
					pems[i] = "Cert=" + url.QueryEscape(string(pem))
 | 
						|
				}
 | 
						|
				req.Header.Set("X-Forwarded-Client-Cert", strings.Join(pems, ","))
 | 
						|
			}
 | 
						|
		}
 | 
						|
		ws.log.WithField("url", req.URL.String()).WithField("headers", req.Header).Trace("tracing request to backend")
 | 
						|
	}
 | 
						|
	rp := &httputil.ReverseProxy{
 | 
						|
		Director:  director,
 | 
						|
		Transport: ws.upstreamHttpClient().Transport,
 | 
						|
	}
 | 
						|
	rp.ErrorHandler = ws.proxyErrorHandler
 | 
						|
	rp.ModifyResponse = ws.proxyModifyResponse
 | 
						|
	ws.mainRouter.PathPrefix(config.Get().Web.Path).Path("/-/health/live/").HandlerFunc(sentry.SentryNoSample(func(rw http.ResponseWriter, r *http.Request) {
 | 
						|
		rw.WriteHeader(200)
 | 
						|
	}))
 | 
						|
	ws.mainRouter.PathPrefix(config.Get().Web.Path).HandlerFunc(sentry.SentryNoSample(func(rw http.ResponseWriter, r *http.Request) {
 | 
						|
		if !ws.g.IsRunning() {
 | 
						|
			ws.proxyErrorHandler(rw, r, ErrAuthentikStarting)
 | 
						|
			return
 | 
						|
		}
 | 
						|
		before := time.Now()
 | 
						|
		if ws.ProxyServer != nil && ws.ProxyServer.HandleHost(rw, r) {
 | 
						|
			elapsed := time.Since(before)
 | 
						|
			Requests.With(prometheus.Labels{
 | 
						|
				"dest": "embedded_outpost",
 | 
						|
			}).Observe(float64(elapsed) / float64(time.Second))
 | 
						|
			return
 | 
						|
		}
 | 
						|
		elapsed := time.Since(before)
 | 
						|
		Requests.With(prometheus.Labels{
 | 
						|
			"dest": "core",
 | 
						|
		}).Observe(float64(elapsed) / float64(time.Second))
 | 
						|
		r.Body = http.MaxBytesReader(rw, r.Body, maxBodyBytes)
 | 
						|
		rp.ServeHTTP(rw, r)
 | 
						|
	}))
 | 
						|
}
 | 
						|
 | 
						|
func (ws *WebServer) proxyErrorHandler(rw http.ResponseWriter, req *http.Request, err error) {
 | 
						|
	if !errors.Is(err, ErrAuthentikStarting) {
 | 
						|
		ws.log.WithError(err).Warning("failed to proxy to backend")
 | 
						|
	}
 | 
						|
	rw.WriteHeader(http.StatusBadGateway)
 | 
						|
	em := fmt.Sprintf("failed to connect to authentik backend: %v", err)
 | 
						|
	// return json if the client asks for json
 | 
						|
	if req.Header.Get("Accept") == "application/json" {
 | 
						|
		err = json.NewEncoder(rw).Encode(map[string]string{
 | 
						|
			"error": em,
 | 
						|
		})
 | 
						|
	} else {
 | 
						|
		_, err = rw.Write([]byte(em))
 | 
						|
	}
 | 
						|
	if err != nil {
 | 
						|
		ws.log.WithError(err).Warning("failed to write error message")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (ws *WebServer) proxyModifyResponse(r *http.Response) error {
 | 
						|
	r.Header.Set("X-Powered-By", "authentik")
 | 
						|
	r.Header.Del("Server")
 | 
						|
	return nil
 | 
						|
}
 |