* outpost: promote session end signal to non-provider specific Signed-off-by: Jens Langhammer <jens@goauthentik.io> * implement server-side logout in ldap Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix previous import Signed-off-by: Jens Langhammer <jens@goauthentik.io> * use better retry logic Signed-off-by: Jens Langhammer <jens@goauthentik.io> * log Signed-off-by: Jens Langhammer <jens@goauthentik.io> * make more generic if we switch from ws to something else Signed-off-by: Jens Langhammer <jens@goauthentik.io> * make it possible to e2e test WS Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix ldap session id Signed-off-by: Jens Langhammer <jens@goauthentik.io> * ok I actually need to go to bed this took me an hour to fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * format; add ldap test Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix leftover state Signed-off-by: Jens Langhammer <jens@goauthentik.io> * remove thread Signed-off-by: Jens Langhammer <jens@goauthentik.io> * use ws base for radius Signed-off-by: Jens Langhammer <jens@goauthentik.io> * separate test utils Signed-off-by: Jens Langhammer <jens@goauthentik.io> * rename Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix missing super calls Signed-off-by: Jens Langhammer <jens@goauthentik.io> * websocket tests with browser 🎉 Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add proxy test for sign out Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix install_id issue with channels tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix proxy basic auth test Signed-off-by: Jens Langhammer <jens@goauthentik.io> * big code dedupe Signed-off-by: Jens Langhammer <jens@goauthentik.io> * allow passing go build args Signed-off-by: Jens Langhammer <jens@goauthentik.io> * improve waiting for outpost Signed-off-by: Jens Langhammer <jens@goauthentik.io> * rewrite ldap tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * ok actually fix the tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * undo a couple things that need more time to cook Signed-off-by: Jens Langhammer <jens@goauthentik.io> * remove unused lockfile-lint dependency since we use a shell script and SFE does not have a lockfile Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix session id for ldap Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix missing createTimestamp and modifyTimestamp ldap attributes closes #10474 Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
		
			
				
	
	
		
			242 lines
		
	
	
		
			6.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			242 lines
		
	
	
		
			6.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package ak
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"crypto/fips140"
 | 
						|
	"fmt"
 | 
						|
	"math/rand"
 | 
						|
	"net/http"
 | 
						|
	"net/url"
 | 
						|
	"os"
 | 
						|
	"os/signal"
 | 
						|
	"runtime"
 | 
						|
	"syscall"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/avast/retry-go/v4"
 | 
						|
	"github.com/getsentry/sentry-go"
 | 
						|
	"github.com/google/uuid"
 | 
						|
	"github.com/gorilla/websocket"
 | 
						|
	"github.com/prometheus/client_golang/prometheus"
 | 
						|
	log "github.com/sirupsen/logrus"
 | 
						|
 | 
						|
	"goauthentik.io/api/v3"
 | 
						|
	"goauthentik.io/internal/constants"
 | 
						|
	cryptobackend "goauthentik.io/internal/crypto/backend"
 | 
						|
	"goauthentik.io/internal/utils/web"
 | 
						|
)
 | 
						|
 | 
						|
const ConfigLogLevel = "log_level"
 | 
						|
 | 
						|
// APIController main controller which connects to the authentik api via http and ws
 | 
						|
type APIController struct {
 | 
						|
	Client       *api.APIClient
 | 
						|
	Outpost      api.Outpost
 | 
						|
	GlobalConfig *api.Config
 | 
						|
 | 
						|
	Server Outpost
 | 
						|
 | 
						|
	token string
 | 
						|
 | 
						|
	logger *log.Entry
 | 
						|
 | 
						|
	reloadOffset time.Duration
 | 
						|
 | 
						|
	eventConn        *websocket.Conn
 | 
						|
	lastWsReconnect  time.Time
 | 
						|
	wsIsReconnecting bool
 | 
						|
	eventHandlers    []EventHandler
 | 
						|
	refreshHandlers  []func()
 | 
						|
 | 
						|
	instanceUUID uuid.UUID
 | 
						|
}
 | 
						|
 | 
						|
// NewAPIController initialise new API Controller instance from URL and API token
 | 
						|
func NewAPIController(akURL url.URL, token string) *APIController {
 | 
						|
	rsp := sentry.StartSpan(context.Background(), "authentik.outposts.init")
 | 
						|
 | 
						|
	apiConfig := api.NewConfiguration()
 | 
						|
	apiConfig.Host = akURL.Host
 | 
						|
	apiConfig.Scheme = akURL.Scheme
 | 
						|
	apiConfig.HTTPClient = &http.Client{
 | 
						|
		Transport: web.NewUserAgentTransport(
 | 
						|
			constants.UserAgentOutpost(),
 | 
						|
			web.NewTracingTransport(
 | 
						|
				rsp.Context(),
 | 
						|
				GetTLSTransport(),
 | 
						|
			),
 | 
						|
		),
 | 
						|
	}
 | 
						|
	apiConfig.Servers = api.ServerConfigurations{
 | 
						|
		{
 | 
						|
			URL: fmt.Sprintf("%sapi/v3", akURL.Path),
 | 
						|
		},
 | 
						|
	}
 | 
						|
	apiConfig.AddDefaultHeader("Authorization", fmt.Sprintf("Bearer %s", token))
 | 
						|
 | 
						|
	// create the API client, with the transport
 | 
						|
	apiClient := api.NewAPIClient(apiConfig)
 | 
						|
 | 
						|
	log := log.WithField("logger", "authentik.outpost.ak-api-controller")
 | 
						|
 | 
						|
	// Because we don't know the outpost UUID, we simply do a list and pick the first
 | 
						|
	// The service account this token belongs to should only have access to a single outpost
 | 
						|
	outposts, _ := retry.DoWithData[*api.PaginatedOutpostList](
 | 
						|
		func() (*api.PaginatedOutpostList, error) {
 | 
						|
			outposts, _, err := apiClient.OutpostsApi.OutpostsInstancesList(context.Background()).Execute()
 | 
						|
			return outposts, err
 | 
						|
		},
 | 
						|
		retry.Attempts(0),
 | 
						|
		retry.Delay(time.Second*3),
 | 
						|
		retry.OnRetry(func(attempt uint, err error) {
 | 
						|
			log.WithError(err).Error("Failed to fetch outpost configuration, retrying in 3 seconds")
 | 
						|
		}),
 | 
						|
	)
 | 
						|
	if len(outposts.Results) < 1 {
 | 
						|
		log.Panic("No outposts found with given token, ensure the given token corresponds to an authenitk Outpost")
 | 
						|
	}
 | 
						|
	outpost := outposts.Results[0]
 | 
						|
 | 
						|
	log.WithField("name", outpost.Name).Debug("Fetched outpost configuration")
 | 
						|
 | 
						|
	akConfig, _, err := apiClient.RootApi.RootConfigRetrieve(context.Background()).Execute()
 | 
						|
	if err != nil {
 | 
						|
		log.WithError(err).Error("Failed to fetch global configuration")
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	log.Debug("Fetched global configuration")
 | 
						|
 | 
						|
	// doGlobalSetup is called by the OnRefresh handler, which ticks on start
 | 
						|
	// doGlobalSetup(outpost, akConfig)
 | 
						|
 | 
						|
	ac := &APIController{
 | 
						|
		Client:       apiClient,
 | 
						|
		GlobalConfig: akConfig,
 | 
						|
 | 
						|
		token:  token,
 | 
						|
		logger: log,
 | 
						|
 | 
						|
		reloadOffset:    time.Duration(rand.Intn(10)) * time.Second,
 | 
						|
		instanceUUID:    uuid.New(),
 | 
						|
		Outpost:         outpost,
 | 
						|
		eventHandlers:   []EventHandler{},
 | 
						|
		refreshHandlers: make([]func(), 0),
 | 
						|
	}
 | 
						|
	ac.logger.WithField("offset", ac.reloadOffset.String()).Debug("HA Reload offset")
 | 
						|
	err = ac.initEvent(akURL, outpost.Pk)
 | 
						|
	if err != nil {
 | 
						|
		go ac.recentEvents()
 | 
						|
	}
 | 
						|
	ac.configureRefreshSignal()
 | 
						|
	return ac
 | 
						|
}
 | 
						|
 | 
						|
func (a *APIController) Log() *log.Entry {
 | 
						|
	return a.logger
 | 
						|
}
 | 
						|
 | 
						|
// Start Starts all handlers, non-blocking
 | 
						|
func (a *APIController) Start() error {
 | 
						|
	err := a.Server.Refresh()
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	err = a.StartBackgroundTasks()
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	go func() {
 | 
						|
		err := a.Server.Start()
 | 
						|
		if err != nil {
 | 
						|
			panic(err)
 | 
						|
		}
 | 
						|
	}()
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func (a *APIController) configureRefreshSignal() {
 | 
						|
	s := make(chan os.Signal, 1)
 | 
						|
	go func() {
 | 
						|
		for {
 | 
						|
			<-s
 | 
						|
			err := a.OnRefresh()
 | 
						|
			if err != nil {
 | 
						|
				a.logger.WithError(err).Warning("failed to refresh")
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}()
 | 
						|
	signal.Notify(s, syscall.SIGUSR1)
 | 
						|
	a.logger.Debug("Enabled USR1 hook to reload")
 | 
						|
}
 | 
						|
 | 
						|
func (a *APIController) AddRefreshHandler(handler func()) {
 | 
						|
	a.refreshHandlers = append(a.refreshHandlers, handler)
 | 
						|
}
 | 
						|
 | 
						|
func (a *APIController) Token() string {
 | 
						|
	return a.token
 | 
						|
}
 | 
						|
 | 
						|
func (a *APIController) OnRefresh() error {
 | 
						|
	// Because we don't know the outpost UUID, we simply do a list and pick the first
 | 
						|
	// The service account this token belongs to should only have access to a single outpost
 | 
						|
	outposts, _, err := a.Client.OutpostsApi.OutpostsInstancesList(context.Background()).Execute()
 | 
						|
	if err != nil {
 | 
						|
		log.WithError(err).Error("Failed to fetch outpost configuration")
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	a.Outpost = outposts.Results[0]
 | 
						|
 | 
						|
	a.logger.WithField("name", a.Outpost.Name).Debug("Fetched outpost configuration")
 | 
						|
	doGlobalSetup(a.Outpost, a.GlobalConfig)
 | 
						|
	err = a.Server.Refresh()
 | 
						|
	for _, handler := range a.refreshHandlers {
 | 
						|
		handler()
 | 
						|
	}
 | 
						|
	return err
 | 
						|
}
 | 
						|
 | 
						|
func (a *APIController) getEventPingArgs() map[string]interface{} {
 | 
						|
	args := map[string]interface{}{
 | 
						|
		"version":        constants.VERSION,
 | 
						|
		"buildHash":      constants.BUILD(""),
 | 
						|
		"uuid":           a.instanceUUID.String(),
 | 
						|
		"golangVersion":  runtime.Version(),
 | 
						|
		"opensslEnabled": cryptobackend.OpensslEnabled,
 | 
						|
		"opensslVersion": cryptobackend.OpensslVersion(),
 | 
						|
		"fipsEnabled":    fips140.Enabled(),
 | 
						|
	}
 | 
						|
	hostname, err := os.Hostname()
 | 
						|
	if err == nil {
 | 
						|
		args["hostname"] = hostname
 | 
						|
	}
 | 
						|
	return args
 | 
						|
}
 | 
						|
 | 
						|
func (a *APIController) StartBackgroundTasks() error {
 | 
						|
	OutpostInfo.With(prometheus.Labels{
 | 
						|
		"outpost_name": a.Outpost.Name,
 | 
						|
		"outpost_type": a.Server.Type(),
 | 
						|
		"uuid":         a.instanceUUID.String(),
 | 
						|
		"version":      constants.VERSION,
 | 
						|
		"build":        constants.BUILD(""),
 | 
						|
	}).Set(1)
 | 
						|
	go func() {
 | 
						|
		a.logger.Debug("Starting Event Handler...")
 | 
						|
		a.startEventHandler()
 | 
						|
	}()
 | 
						|
	go func() {
 | 
						|
		a.logger.Debug("Starting Event health notifier...")
 | 
						|
		a.startEventHealth()
 | 
						|
	}()
 | 
						|
	go func() {
 | 
						|
		a.logger.Debug("Starting Interval updater...")
 | 
						|
		a.startIntervalUpdater()
 | 
						|
	}()
 | 
						|
	go func() {
 | 
						|
		a.logger.Debug("Starting periodical timer...")
 | 
						|
		a.startPeriodicalTasks()
 | 
						|
	}()
 | 
						|
	return nil
 | 
						|
}
 |