* outposts/proxyv2: initial commit Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add rs256 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> more stuff Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add forward auth an sign_out Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> match cookie name Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> re-add support for rs256 for backwards compat Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add error handler Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> ensure unique user-agent is used Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> set cookie duration based on id_token expiry Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> build proxy v2 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add ssl Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add basic auth and custom header support Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add application cert loading Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> implement whitelist Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add redis Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> migrate embedded outpost to v2 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> remove old proxy Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> providers/proxy: make token expiration configurable Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add metrics Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> fix tests Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * providers/proxy: only allow one redirect URI Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix docker build for proxy Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * remove default port offset Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * add AUTHENTIK_HOST_BROWSER Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * tests: fix e2e/integration tests not using proper tags Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * remove references of old port Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix user_attributes not being loaded correctly Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * cleanup dependencies Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * cleanup Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
		
			
				
	
	
		
			54 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			54 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package application
 | 
						|
 | 
						|
import (
 | 
						|
	"encoding/base64"
 | 
						|
	"fmt"
 | 
						|
	"net/http"
 | 
						|
	"strings"
 | 
						|
)
 | 
						|
 | 
						|
func (a *Application) addHeaders(r *http.Request, c *Claims) {
 | 
						|
	// https://goauthentik.io/docs/providers/proxy/proxy
 | 
						|
	r.Header.Set("X-Auth-Username", c.PreferredUsername)
 | 
						|
	r.Header.Set("X-Auth-Groups", strings.Join(c.Groups, "|"))
 | 
						|
	r.Header.Set("X-Forwarded-Email", c.Email)
 | 
						|
	r.Header.Set("X-Forwarded-Preferred-Username", c.PreferredUsername)
 | 
						|
	r.Header.Set("X-Forwarded-User", c.Sub)
 | 
						|
 | 
						|
	userAttributes := c.Proxy.UserAttributes
 | 
						|
	// Attempt to set basic auth based on user's attributes
 | 
						|
	if *a.proxyConfig.BasicAuthEnabled {
 | 
						|
		var ok bool
 | 
						|
		var password string
 | 
						|
		if password, ok = userAttributes[*a.proxyConfig.BasicAuthPasswordAttribute].(string); !ok {
 | 
						|
			password = ""
 | 
						|
		}
 | 
						|
		// Check if we should use email or a custom attribute as username
 | 
						|
		var username string
 | 
						|
		if username, ok = userAttributes[*a.proxyConfig.BasicAuthUserAttribute].(string); !ok {
 | 
						|
			username = c.Email
 | 
						|
		}
 | 
						|
		authVal := base64.StdEncoding.EncodeToString([]byte(username + ":" + password))
 | 
						|
		a.log.WithField("username", username).Trace("setting http basic auth")
 | 
						|
		r.Header["Authorization"] = []string{fmt.Sprintf("Basic %s", authVal)}
 | 
						|
	}
 | 
						|
	// Check if user has additional headers set that we should sent
 | 
						|
	if additionalHeaders, ok := userAttributes["additionalHeaders"].(map[string]interface{}); ok {
 | 
						|
		a.log.WithField("headers", additionalHeaders).Trace("setting additional headers")
 | 
						|
		if additionalHeaders == nil {
 | 
						|
			return
 | 
						|
		}
 | 
						|
		for key, value := range additionalHeaders {
 | 
						|
			r.Header.Set(key, toString(value))
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func copyHeadersToResponse(rw http.ResponseWriter, r *http.Request) {
 | 
						|
	for headerKey, headers := range r.Header {
 | 
						|
		for _, value := range headers {
 | 
						|
			rw.Header().Set(headerKey, value)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 |