* prepare client auth with inbuilt server Signed-off-by: Jens Langhammer <jens@goauthentik.io> * introduce better IPC auth Signed-off-by: Jens Langhammer <jens@goauthentik.io> * init Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start stage Signed-off-by: Jens Langhammer <jens@goauthentik.io> * only allow trusted proxies to set MTLS headers Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more stage progress Signed-off-by: Jens Langhammer <jens@goauthentik.io> * dont fail if ipc_key doesn't exist Signed-off-by: Jens Langhammer <jens@goauthentik.io> * actually install app Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add some tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update API Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix unquote Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix int serial number not jsonable Signed-off-by: Jens Langhammer <jens@goauthentik.io> * init ui Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add UI Signed-off-by: Jens Langhammer <jens@goauthentik.io> * unrelated: fix git pull in makefile Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix parse helper Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add test for outpost Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more tests and improvements Signed-off-by: Jens Langhammer <jens@goauthentik.io> * improve labels Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add support for multiple CAs on brand Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add support for multiple CAs to MTLS stage Signed-off-by: Jens Langhammer <jens@goauthentik.io> * dont log ipcuser secret views Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix go mod Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
		
			
				
	
	
		
			268 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			268 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package web
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"encoding/base64"
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"net"
 | 
						|
	"net/http"
 | 
						|
	"net/url"
 | 
						|
	"os"
 | 
						|
	"path"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/gorilla/handlers"
 | 
						|
	"github.com/gorilla/mux"
 | 
						|
	"github.com/gorilla/securecookie"
 | 
						|
	"github.com/pires/go-proxyproto"
 | 
						|
	log "github.com/sirupsen/logrus"
 | 
						|
 | 
						|
	"goauthentik.io/api/v3"
 | 
						|
	"goauthentik.io/internal/config"
 | 
						|
	"goauthentik.io/internal/constants"
 | 
						|
	"goauthentik.io/internal/gounicorn"
 | 
						|
	"goauthentik.io/internal/outpost/ak"
 | 
						|
	"goauthentik.io/internal/outpost/proxyv2"
 | 
						|
	"goauthentik.io/internal/utils"
 | 
						|
	"goauthentik.io/internal/utils/web"
 | 
						|
	"goauthentik.io/internal/web/brand_tls"
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	IPCKeyFile     = "authentik-core-ipc.key"
 | 
						|
	MetricsKeyFile = "authentik-core-metrics.key"
 | 
						|
	UnixSocketName = "authentik-core.sock"
 | 
						|
)
 | 
						|
 | 
						|
type WebServer struct {
 | 
						|
	Bind    string
 | 
						|
	BindTLS bool
 | 
						|
 | 
						|
	stop chan struct{} // channel for waiting shutdown
 | 
						|
 | 
						|
	ProxyServer *proxyv2.ProxyServer
 | 
						|
	BrandTLS    *brand_tls.Watcher
 | 
						|
 | 
						|
	g              *gounicorn.GoUnicorn
 | 
						|
	gunicornReady  bool
 | 
						|
	mainRouter     *mux.Router
 | 
						|
	loggingRouter  *mux.Router
 | 
						|
	log            *log.Entry
 | 
						|
	upstreamClient *http.Client
 | 
						|
	upstreamURL    *url.URL
 | 
						|
 | 
						|
	metricsKey string
 | 
						|
	ipcKey     string
 | 
						|
}
 | 
						|
 | 
						|
func NewWebServer() *WebServer {
 | 
						|
	l := log.WithField("logger", "authentik.router")
 | 
						|
	mainHandler := mux.NewRouter()
 | 
						|
	mainHandler.Use(web.ProxyHeaders())
 | 
						|
	mainHandler.Use(handlers.CompressHandler)
 | 
						|
	loggingHandler := mainHandler.NewRoute().Subrouter()
 | 
						|
	loggingHandler.Use(web.NewLoggingHandler(l, nil))
 | 
						|
 | 
						|
	tmp := os.TempDir()
 | 
						|
	socketPath := path.Join(tmp, UnixSocketName)
 | 
						|
 | 
						|
	// create http client to talk to backend, normal client if we're in debug more
 | 
						|
	// and a client that connects to our socket when in non debug mode
 | 
						|
	var upstreamClient *http.Client
 | 
						|
	if config.Get().Debug {
 | 
						|
		upstreamClient = http.DefaultClient
 | 
						|
	} else {
 | 
						|
		upstreamClient = &http.Client{
 | 
						|
			Transport: &http.Transport{
 | 
						|
				DialContext: func(_ context.Context, _, _ string) (net.Conn, error) {
 | 
						|
					return net.Dial("unix", socketPath)
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	u, _ := url.Parse("http://localhost:8000")
 | 
						|
 | 
						|
	ws := &WebServer{
 | 
						|
		mainRouter:     mainHandler,
 | 
						|
		loggingRouter:  loggingHandler,
 | 
						|
		log:            l,
 | 
						|
		gunicornReady:  false,
 | 
						|
		upstreamClient: upstreamClient,
 | 
						|
		upstreamURL:    u,
 | 
						|
	}
 | 
						|
	ws.configureStatic()
 | 
						|
	ws.configureProxy()
 | 
						|
	// Redirect for sub-folder
 | 
						|
	if sp := config.Get().Web.Path; sp != "/" {
 | 
						|
		ws.mainRouter.Path("/").Handler(http.RedirectHandler(sp, http.StatusFound))
 | 
						|
	}
 | 
						|
	hcUrl := fmt.Sprintf("%s%s-/health/live/", ws.upstreamURL.String(), config.Get().Web.Path)
 | 
						|
	ws.g = gounicorn.New(func() bool {
 | 
						|
		req, err := http.NewRequest(http.MethodGet, hcUrl, nil)
 | 
						|
		if err != nil {
 | 
						|
			ws.log.WithError(err).Warning("failed to create request for healthcheck")
 | 
						|
			return false
 | 
						|
		}
 | 
						|
		req.Header.Set("User-Agent", "goauthentik.io/router/healthcheck")
 | 
						|
		res, err := ws.upstreamHttpClient().Do(req)
 | 
						|
		if err == nil && res.StatusCode >= 200 && res.StatusCode < 300 {
 | 
						|
			return true
 | 
						|
		}
 | 
						|
		return false
 | 
						|
	})
 | 
						|
	return ws
 | 
						|
}
 | 
						|
 | 
						|
func (ws *WebServer) prepareKeys() {
 | 
						|
	tmp := os.TempDir()
 | 
						|
	key := base64.StdEncoding.EncodeToString(securecookie.GenerateRandomKey(64))
 | 
						|
	err := os.WriteFile(path.Join(tmp, MetricsKeyFile), []byte(key), 0o600)
 | 
						|
	if err != nil {
 | 
						|
		ws.log.WithError(err).Warning("failed to save metrics key")
 | 
						|
		return
 | 
						|
	}
 | 
						|
	ws.metricsKey = key
 | 
						|
 | 
						|
	key = base64.StdEncoding.EncodeToString(securecookie.GenerateRandomKey(64))
 | 
						|
	err = os.WriteFile(path.Join(tmp, IPCKeyFile), []byte(key), 0o600)
 | 
						|
	if err != nil {
 | 
						|
		ws.log.WithError(err).Warning("failed to save ipc key")
 | 
						|
		return
 | 
						|
	}
 | 
						|
	ws.ipcKey = key
 | 
						|
}
 | 
						|
 | 
						|
func (ws *WebServer) Start() {
 | 
						|
	ws.prepareKeys()
 | 
						|
 | 
						|
	u, err := url.Parse(fmt.Sprintf("http://%s%s", config.Get().Listen.HTTP, config.Get().Web.Path))
 | 
						|
	if err != nil {
 | 
						|
		panic(err)
 | 
						|
	}
 | 
						|
	apiConfig := api.NewConfiguration()
 | 
						|
	apiConfig.Host = u.Host
 | 
						|
	apiConfig.Scheme = u.Scheme
 | 
						|
	apiConfig.HTTPClient = &http.Client{
 | 
						|
		Transport: web.NewUserAgentTransport(
 | 
						|
			constants.UserAgentIPC(),
 | 
						|
			ak.GetTLSTransport(),
 | 
						|
		),
 | 
						|
	}
 | 
						|
	apiConfig.Servers = api.ServerConfigurations{
 | 
						|
		{
 | 
						|
			URL: fmt.Sprintf("%sapi/v3", u.Path),
 | 
						|
		},
 | 
						|
	}
 | 
						|
	apiConfig.AddDefaultHeader("Authorization", fmt.Sprintf("Bearer %s", ws.ipcKey))
 | 
						|
 | 
						|
	// create the API client, with the transport
 | 
						|
	apiClient := api.NewAPIClient(apiConfig)
 | 
						|
 | 
						|
	// Init brand_tls here too since it requires an API Client,
 | 
						|
	// so we just reuse the same one as the outpost uses
 | 
						|
	tw := brand_tls.NewWatcher(apiClient)
 | 
						|
	ws.BrandTLS = tw
 | 
						|
	ws.g.AddHealthyCallback(func() {
 | 
						|
		go tw.Start()
 | 
						|
	})
 | 
						|
 | 
						|
	go ws.runMetricsServer()
 | 
						|
	go ws.attemptStartBackend()
 | 
						|
	go ws.listenPlain()
 | 
						|
	go ws.listenTLS()
 | 
						|
}
 | 
						|
 | 
						|
func (ws *WebServer) attemptStartBackend() {
 | 
						|
	for {
 | 
						|
		if ws.gunicornReady {
 | 
						|
			return
 | 
						|
		}
 | 
						|
		err := ws.g.Start()
 | 
						|
		ws.log.WithError(err).Warning("gunicorn process died, restarting")
 | 
						|
		if err != nil {
 | 
						|
			ws.log.WithError(err).Error("gunicorn failed to start, restarting")
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		failedChecks := 0
 | 
						|
		for range time.NewTicker(30 * time.Second).C {
 | 
						|
			if !ws.g.IsRunning() {
 | 
						|
				ws.log.Warningf("gunicorn process failed healthcheck %d times", failedChecks)
 | 
						|
				failedChecks += 1
 | 
						|
			}
 | 
						|
			if failedChecks >= 3 {
 | 
						|
				ws.log.WithError(err).Error("gunicorn process failed healthcheck three times, restarting")
 | 
						|
				break
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (ws *WebServer) Core() *gounicorn.GoUnicorn {
 | 
						|
	return ws.g
 | 
						|
}
 | 
						|
 | 
						|
func (ws *WebServer) upstreamHttpClient() *http.Client {
 | 
						|
	return ws.upstreamClient
 | 
						|
}
 | 
						|
 | 
						|
func (ws *WebServer) Shutdown() {
 | 
						|
	ws.log.Info("shutting down gunicorn")
 | 
						|
	ws.g.Kill()
 | 
						|
	tmp := os.TempDir()
 | 
						|
	err := os.Remove(path.Join(tmp, MetricsKeyFile))
 | 
						|
	if err != nil {
 | 
						|
		ws.log.WithError(err).Warning("failed to remove metrics key file")
 | 
						|
	}
 | 
						|
	err = os.Remove(path.Join(tmp, IPCKeyFile))
 | 
						|
	if err != nil {
 | 
						|
		ws.log.WithError(err).Warning("failed to remove ipc key file")
 | 
						|
	}
 | 
						|
	ws.stop <- struct{}{}
 | 
						|
}
 | 
						|
 | 
						|
func (ws *WebServer) listenPlain() {
 | 
						|
	ln, err := net.Listen("tcp", config.Get().Listen.HTTP)
 | 
						|
	if err != nil {
 | 
						|
		ws.log.WithError(err).Warning("failed to listen")
 | 
						|
		return
 | 
						|
	}
 | 
						|
	proxyListener := &proxyproto.Listener{Listener: ln, ConnPolicy: utils.GetProxyConnectionPolicy()}
 | 
						|
	defer func() {
 | 
						|
		err := proxyListener.Close()
 | 
						|
		if err != nil {
 | 
						|
			ws.log.WithError(err).Warning("failed to close proxy listener")
 | 
						|
		}
 | 
						|
	}()
 | 
						|
 | 
						|
	ws.log.WithField("listen", config.Get().Listen.HTTP).Info("Starting HTTP server")
 | 
						|
	ws.serve(proxyListener)
 | 
						|
	ws.log.WithField("listen", config.Get().Listen.HTTP).Info("Stopping HTTP server")
 | 
						|
}
 | 
						|
 | 
						|
func (ws *WebServer) serve(listener net.Listener) {
 | 
						|
	srv := &http.Server{
 | 
						|
		Handler: ws.mainRouter,
 | 
						|
	}
 | 
						|
 | 
						|
	// See https://golang.org/pkg/net/http/#Server.Shutdown
 | 
						|
	idleConnsClosed := make(chan struct{})
 | 
						|
	go func() {
 | 
						|
		<-ws.stop // wait notification for stopping server
 | 
						|
 | 
						|
		// We received an interrupt signal, shut down.
 | 
						|
		if err := srv.Shutdown(context.Background()); err != nil {
 | 
						|
			// Error from closing listeners, or context timeout:
 | 
						|
			ws.log.WithError(err).Warning("HTTP server Shutdown")
 | 
						|
		}
 | 
						|
		close(idleConnsClosed)
 | 
						|
	}()
 | 
						|
 | 
						|
	err := srv.Serve(listener)
 | 
						|
	if err != nil && !errors.Is(err, http.ErrServerClosed) {
 | 
						|
		ws.log.WithError(err).Error("ERROR: http.Serve()")
 | 
						|
	}
 | 
						|
	<-idleConnsClosed
 | 
						|
}
 |