 3c1b70c355
			
		
	
	3c1b70c355
	
	
	
		
			
			* outposts/proxyv2: initial commit Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add rs256 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> more stuff Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add forward auth an sign_out Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> match cookie name Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> re-add support for rs256 for backwards compat Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add error handler Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> ensure unique user-agent is used Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> set cookie duration based on id_token expiry Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> build proxy v2 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add ssl Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add basic auth and custom header support Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add application cert loading Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> implement whitelist Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add redis Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> migrate embedded outpost to v2 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> remove old proxy Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> providers/proxy: make token expiration configurable Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add metrics Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> fix tests Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * providers/proxy: only allow one redirect URI Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix docker build for proxy Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * remove default port offset Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * add AUTHENTIK_HOST_BROWSER Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * tests: fix e2e/integration tests not using proper tags Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * remove references of old port Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix user_attributes not being loaded correctly Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * cleanup dependencies Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * cleanup Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
		
			
				
	
	
		
			64 lines
		
	
	
		
			1.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			64 lines
		
	
	
		
			1.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package application
 | |
| 
 | |
| import (
 | |
| 	"net/http"
 | |
| 	"net/http/httputil"
 | |
| 	"net/url"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/prometheus/client_golang/prometheus"
 | |
| 	"goauthentik.io/internal/outpost/proxyv2/metrics"
 | |
| 	"goauthentik.io/internal/outpost/proxyv2/templates"
 | |
| 	"goauthentik.io/internal/utils/web"
 | |
| )
 | |
| 
 | |
| func (a *Application) configureProxy() error {
 | |
| 	// Reverse proxy to the application server
 | |
| 	u, err := url.Parse(*a.proxyConfig.InternalHost)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	rp := &httputil.ReverseProxy{Director: a.proxyModifyRequest(u)}
 | |
| 	rp.ErrorHandler = NewProxyErrorHandler(templates.GetTemplates())
 | |
| 	rp.ModifyResponse = a.proxyModifyResponse
 | |
| 	a.mux.PathPrefix("/").HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
 | |
| 		claims, err := a.getClaims(r)
 | |
| 		if claims == nil && a.IsAllowlisted(r) {
 | |
| 			a.log.Trace("path can be accessed without authentication")
 | |
| 		} else if claims == nil && err != nil {
 | |
| 			a.redirectToStart(rw, r)
 | |
| 			return
 | |
| 		} else {
 | |
| 			a.addHeaders(r, claims)
 | |
| 		}
 | |
| 		before := time.Now()
 | |
| 		rp.ServeHTTP(rw, r)
 | |
| 		after := time.Since(before)
 | |
| 
 | |
| 		user := ""
 | |
| 		if claims != nil {
 | |
| 			user = claims.Email
 | |
| 		}
 | |
| 		metrics.UpstreamTiming.With(prometheus.Labels{
 | |
| 			"upstream_host": u.String(),
 | |
| 			"scheme":        r.URL.Scheme,
 | |
| 			"method":        r.Method,
 | |
| 			"path":          r.URL.Path,
 | |
| 			"host":          web.GetHost(r),
 | |
| 			"user":          user,
 | |
| 		}).Observe(float64(after))
 | |
| 	})
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (a *Application) proxyModifyRequest(u *url.URL) func(req *http.Request) {
 | |
| 	return func(req *http.Request) {
 | |
| 		req.URL.Scheme = u.Scheme
 | |
| 		req.URL.Host = u.Host
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (a *Application) proxyModifyResponse(res *http.Response) error {
 | |
| 	return nil
 | |
| }
 |