 3c1b70c355
			
		
	
	3c1b70c355
	
	
	
		
			
			* outposts/proxyv2: initial commit Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add rs256 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> more stuff Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add forward auth an sign_out Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> match cookie name Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> re-add support for rs256 for backwards compat Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add error handler Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> ensure unique user-agent is used Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> set cookie duration based on id_token expiry Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> build proxy v2 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add ssl Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add basic auth and custom header support Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add application cert loading Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> implement whitelist Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add redis Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> migrate embedded outpost to v2 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> remove old proxy Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> providers/proxy: make token expiration configurable Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add metrics Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> fix tests Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * providers/proxy: only allow one redirect URI Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix docker build for proxy Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * remove default port offset Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * add AUTHENTIK_HOST_BROWSER Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * tests: fix e2e/integration tests not using proper tags Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * remove references of old port Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix user_attributes not being loaded correctly Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * cleanup dependencies Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * cleanup Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
		
			
				
	
	
		
			54 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			54 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package application
 | |
| 
 | |
| import (
 | |
| 	"encoding/base64"
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 	"strings"
 | |
| )
 | |
| 
 | |
| func (a *Application) addHeaders(r *http.Request, c *Claims) {
 | |
| 	// https://goauthentik.io/docs/providers/proxy/proxy
 | |
| 	r.Header.Set("X-Auth-Username", c.PreferredUsername)
 | |
| 	r.Header.Set("X-Auth-Groups", strings.Join(c.Groups, "|"))
 | |
| 	r.Header.Set("X-Forwarded-Email", c.Email)
 | |
| 	r.Header.Set("X-Forwarded-Preferred-Username", c.PreferredUsername)
 | |
| 	r.Header.Set("X-Forwarded-User", c.Sub)
 | |
| 
 | |
| 	userAttributes := c.Proxy.UserAttributes
 | |
| 	// Attempt to set basic auth based on user's attributes
 | |
| 	if *a.proxyConfig.BasicAuthEnabled {
 | |
| 		var ok bool
 | |
| 		var password string
 | |
| 		if password, ok = userAttributes[*a.proxyConfig.BasicAuthPasswordAttribute].(string); !ok {
 | |
| 			password = ""
 | |
| 		}
 | |
| 		// Check if we should use email or a custom attribute as username
 | |
| 		var username string
 | |
| 		if username, ok = userAttributes[*a.proxyConfig.BasicAuthUserAttribute].(string); !ok {
 | |
| 			username = c.Email
 | |
| 		}
 | |
| 		authVal := base64.StdEncoding.EncodeToString([]byte(username + ":" + password))
 | |
| 		a.log.WithField("username", username).Trace("setting http basic auth")
 | |
| 		r.Header["Authorization"] = []string{fmt.Sprintf("Basic %s", authVal)}
 | |
| 	}
 | |
| 	// Check if user has additional headers set that we should sent
 | |
| 	if additionalHeaders, ok := userAttributes["additionalHeaders"].(map[string]interface{}); ok {
 | |
| 		a.log.WithField("headers", additionalHeaders).Trace("setting additional headers")
 | |
| 		if additionalHeaders == nil {
 | |
| 			return
 | |
| 		}
 | |
| 		for key, value := range additionalHeaders {
 | |
| 			r.Header.Set(key, toString(value))
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func copyHeadersToResponse(rw http.ResponseWriter, r *http.Request) {
 | |
| 	for headerKey, headers := range r.Header {
 | |
| 		for _, value := range headers {
 | |
| 			rw.Header().Set(headerKey, value)
 | |
| 		}
 | |
| 	}
 | |
| }
 |