
* root: move database calls from ready() to dedicated startup signal Signed-off-by: Jens Langhammer <jens@goauthentik.io> * optimise gunicorn startup to only do DB code in one worker Signed-off-by: Jens Langhammer <jens@goauthentik.io> * always use 2 workers in compose Signed-off-by: Jens Langhammer <jens@goauthentik.io> * send startup signals for test runner Signed-off-by: Jens Langhammer <jens@goauthentik.io> * remove k8s import that isn't really needed Signed-off-by: Jens Langhammer <jens@goauthentik.io> * ci: bump nested actions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix @reconcile_app not triggering reconcile due to changed functions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * connect startup with uid Signed-off-by: Jens Langhammer <jens@goauthentik.io> * adjust some log levels Signed-off-by: Jens Langhammer <jens@goauthentik.io> * remove internal healthcheck we didn't really use it to do anything, and we shouldn't have to since the live/ready probes are handled by django anyways and so the container runtime will restart the server if needed Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add setproctitle for gunicorn and celery process titles Signed-off-by: Jens Langhammer <jens@goauthentik.io> * configure structlog early to use it Signed-off-by: Jens Langhammer <jens@goauthentik.io> * Revert "configure structlog early to use it" This reverts commit 16778fdbbca0f5c474d376c2f85c6f8032c06044. * Revert "adjust some log levels" This reverts commit a129f7ab6aecf27f1206aea1ad8384ce897b74ad. Signed-off-by: Jens Langhammer <jens@goauthentik.io> # Conflicts: # authentik/root/settings.py * optimize startup to not spawn a bunch of one-off processes Signed-off-by: Jens Langhammer <jens@goauthentik.io> * idk why this shows up Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
79 lines
2.3 KiB
Go
79 lines
2.3 KiB
Go
package web
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"net/http"
|
|
"net/http/httputil"
|
|
"time"
|
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
"goauthentik.io/internal/utils/sentry"
|
|
)
|
|
|
|
func (ws *WebServer) configureProxy() {
|
|
// Reverse proxy to the application server
|
|
director := func(req *http.Request) {
|
|
req.URL.Scheme = ws.ul.Scheme
|
|
req.URL.Host = ws.ul.Host
|
|
if _, ok := req.Header["User-Agent"]; !ok {
|
|
// explicitly disable User-Agent so it's not set to default value
|
|
req.Header.Set("User-Agent", "")
|
|
}
|
|
if req.TLS != nil {
|
|
req.Header.Set("X-Forwarded-Proto", "https")
|
|
}
|
|
ws.log.WithField("url", req.URL.String()).WithField("headers", req.Header).Trace("tracing request to backend")
|
|
}
|
|
rp := &httputil.ReverseProxy{
|
|
Director: director,
|
|
Transport: ws.upstreamHttpClient().Transport,
|
|
}
|
|
rp.ErrorHandler = ws.proxyErrorHandler
|
|
rp.ModifyResponse = ws.proxyModifyResponse
|
|
ws.m.PathPrefix("/").HandlerFunc(sentry.SentryNoSample(func(rw http.ResponseWriter, r *http.Request) {
|
|
if !ws.g.IsRunning() {
|
|
ws.proxyErrorHandler(rw, r, errors.New("authentik starting"))
|
|
return
|
|
}
|
|
before := time.Now()
|
|
if ws.ProxyServer != nil && ws.ProxyServer.HandleHost(rw, r) {
|
|
elapsed := time.Since(before)
|
|
Requests.With(prometheus.Labels{
|
|
"dest": "embedded_outpost",
|
|
}).Observe(float64(elapsed) / float64(time.Second))
|
|
return
|
|
}
|
|
elapsed := time.Since(before)
|
|
Requests.With(prometheus.Labels{
|
|
"dest": "core",
|
|
}).Observe(float64(elapsed) / float64(time.Second))
|
|
r.Body = http.MaxBytesReader(rw, r.Body, 32*1024*1024)
|
|
rp.ServeHTTP(rw, r)
|
|
}))
|
|
}
|
|
|
|
func (ws *WebServer) proxyErrorHandler(rw http.ResponseWriter, req *http.Request, err error) {
|
|
ws.log.WithError(err).Warning("failed to proxy to backend")
|
|
rw.WriteHeader(http.StatusBadGateway)
|
|
em := fmt.Sprintf("failed to connect to authentik backend: %v", err)
|
|
// return json if the client asks for json
|
|
if req.Header.Get("Accept") == "application/json" {
|
|
err = json.NewEncoder(rw).Encode(map[string]string{
|
|
"error": em,
|
|
})
|
|
} else {
|
|
_, err = rw.Write([]byte(em))
|
|
}
|
|
if err != nil {
|
|
ws.log.WithError(err).Warning("failed to write error message")
|
|
}
|
|
}
|
|
|
|
func (ws *WebServer) proxyModifyResponse(r *http.Response) error {
|
|
r.Header.Set("X-Powered-By", "authentik")
|
|
r.Header.Del("Server")
|
|
return nil
|
|
}
|