 367f86ecfb
			
		
	
	367f86ecfb
	
	
	
		
			
			* tests: remove redundant healthchecks Signed-off-by: Jens Langhammer <jens@goauthentik.io> * internal: do healthcheck within proxy instead of wget to use correct port Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix docs Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix tags Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
		
			
				
	
	
		
			98 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			98 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package main
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"net/url"
 | |
| 	"os"
 | |
| 
 | |
| 	log "github.com/sirupsen/logrus"
 | |
| 	"github.com/spf13/cobra"
 | |
| 
 | |
| 	"goauthentik.io/internal/common"
 | |
| 	"goauthentik.io/internal/config"
 | |
| 	"goauthentik.io/internal/debug"
 | |
| 	"goauthentik.io/internal/outpost/ak"
 | |
| 	"goauthentik.io/internal/outpost/ak/healthcheck"
 | |
| 	"goauthentik.io/internal/outpost/proxyv2"
 | |
| )
 | |
| 
 | |
| const helpMessage = `authentik proxy
 | |
| 
 | |
| Required environment variables:
 | |
| - AUTHENTIK_HOST: URL to connect to (format "http://authentik.company")
 | |
| - AUTHENTIK_TOKEN: Token to authenticate with
 | |
| - AUTHENTIK_INSECURE: Skip SSL Certificate verification
 | |
| 
 | |
| Optionally, you can set these:
 | |
| - AUTHENTIK_HOST_BROWSER: URL to use in the browser, when it differs from AUTHENTIK_HOST`
 | |
| 
 | |
| var rootCmd = &cobra.Command{
 | |
| 	Long: helpMessage,
 | |
| 	PersistentPreRun: func(cmd *cobra.Command, args []string) {
 | |
| 		log.SetLevel(log.DebugLevel)
 | |
| 		log.SetFormatter(&log.JSONFormatter{
 | |
| 			FieldMap: log.FieldMap{
 | |
| 				log.FieldKeyMsg:  "event",
 | |
| 				log.FieldKeyTime: "timestamp",
 | |
| 			},
 | |
| 			DisableHTMLEscape: true,
 | |
| 		})
 | |
| 	},
 | |
| 	Run: func(cmd *cobra.Command, args []string) {
 | |
| 		debug.EnableDebugServer()
 | |
| 		akURL := config.Get().AuthentikHost
 | |
| 		if akURL == "" {
 | |
| 			fmt.Println("env AUTHENTIK_HOST not set!")
 | |
| 			fmt.Println(helpMessage)
 | |
| 			os.Exit(1)
 | |
| 		}
 | |
| 		akToken := config.Get().AuthentikToken
 | |
| 		if akToken == "" {
 | |
| 			fmt.Println("env AUTHENTIK_TOKEN not set!")
 | |
| 			fmt.Println(helpMessage)
 | |
| 			os.Exit(1)
 | |
| 		}
 | |
| 
 | |
| 		akURLActual, err := url.Parse(akURL)
 | |
| 		if err != nil {
 | |
| 			fmt.Println(err)
 | |
| 			fmt.Println(helpMessage)
 | |
| 			os.Exit(1)
 | |
| 		}
 | |
| 
 | |
| 		ex := common.Init()
 | |
| 		defer common.Defer()
 | |
| 		go func() {
 | |
| 			for {
 | |
| 				<-ex
 | |
| 				os.Exit(0)
 | |
| 			}
 | |
| 		}()
 | |
| 
 | |
| 		ac := ak.NewAPIController(*akURLActual, akToken)
 | |
| 		if ac == nil {
 | |
| 			os.Exit(1)
 | |
| 		}
 | |
| 		defer ac.Shutdown()
 | |
| 
 | |
| 		ac.Server = proxyv2.NewProxyServer(ac)
 | |
| 
 | |
| 		err = ac.Start()
 | |
| 		if err != nil {
 | |
| 			log.WithError(err).Panic("Failed to run server")
 | |
| 		}
 | |
| 
 | |
| 		for {
 | |
| 			<-ex
 | |
| 		}
 | |
| 	},
 | |
| }
 | |
| 
 | |
| func main() {
 | |
| 	rootCmd.AddCommand(healthcheck.Command)
 | |
| 	err := rootCmd.Execute()
 | |
| 	if err != nil {
 | |
| 		os.Exit(1)
 | |
| 	}
 | |
| }
 |