 65517f3b7f
			
		
	
	65517f3b7f
	
	
	
		
			
			* prepare client auth with inbuilt server Signed-off-by: Jens Langhammer <jens@goauthentik.io> * introduce better IPC auth Signed-off-by: Jens Langhammer <jens@goauthentik.io> * init Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start stage Signed-off-by: Jens Langhammer <jens@goauthentik.io> * only allow trusted proxies to set MTLS headers Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more stage progress Signed-off-by: Jens Langhammer <jens@goauthentik.io> * dont fail if ipc_key doesn't exist Signed-off-by: Jens Langhammer <jens@goauthentik.io> * actually install app Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add some tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update API Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix unquote Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix int serial number not jsonable Signed-off-by: Jens Langhammer <jens@goauthentik.io> * init ui Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add UI Signed-off-by: Jens Langhammer <jens@goauthentik.io> * unrelated: fix git pull in makefile Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix parse helper Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add test for outpost Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more tests and improvements Signed-off-by: Jens Langhammer <jens@goauthentik.io> * improve labels Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add support for multiple CAs on brand Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add support for multiple CAs to MTLS stage Signed-off-by: Jens Langhammer <jens@goauthentik.io> * dont log ipcuser secret views Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix go mod Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
		
			
				
	
	
		
			268 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			268 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package web
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"encoding/base64"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"net"
 | |
| 	"net/http"
 | |
| 	"net/url"
 | |
| 	"os"
 | |
| 	"path"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/gorilla/handlers"
 | |
| 	"github.com/gorilla/mux"
 | |
| 	"github.com/gorilla/securecookie"
 | |
| 	"github.com/pires/go-proxyproto"
 | |
| 	log "github.com/sirupsen/logrus"
 | |
| 
 | |
| 	"goauthentik.io/api/v3"
 | |
| 	"goauthentik.io/internal/config"
 | |
| 	"goauthentik.io/internal/constants"
 | |
| 	"goauthentik.io/internal/gounicorn"
 | |
| 	"goauthentik.io/internal/outpost/ak"
 | |
| 	"goauthentik.io/internal/outpost/proxyv2"
 | |
| 	"goauthentik.io/internal/utils"
 | |
| 	"goauthentik.io/internal/utils/web"
 | |
| 	"goauthentik.io/internal/web/brand_tls"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	IPCKeyFile     = "authentik-core-ipc.key"
 | |
| 	MetricsKeyFile = "authentik-core-metrics.key"
 | |
| 	UnixSocketName = "authentik-core.sock"
 | |
| )
 | |
| 
 | |
| type WebServer struct {
 | |
| 	Bind    string
 | |
| 	BindTLS bool
 | |
| 
 | |
| 	stop chan struct{} // channel for waiting shutdown
 | |
| 
 | |
| 	ProxyServer *proxyv2.ProxyServer
 | |
| 	BrandTLS    *brand_tls.Watcher
 | |
| 
 | |
| 	g              *gounicorn.GoUnicorn
 | |
| 	gunicornReady  bool
 | |
| 	mainRouter     *mux.Router
 | |
| 	loggingRouter  *mux.Router
 | |
| 	log            *log.Entry
 | |
| 	upstreamClient *http.Client
 | |
| 	upstreamURL    *url.URL
 | |
| 
 | |
| 	metricsKey string
 | |
| 	ipcKey     string
 | |
| }
 | |
| 
 | |
| func NewWebServer() *WebServer {
 | |
| 	l := log.WithField("logger", "authentik.router")
 | |
| 	mainHandler := mux.NewRouter()
 | |
| 	mainHandler.Use(web.ProxyHeaders())
 | |
| 	mainHandler.Use(handlers.CompressHandler)
 | |
| 	loggingHandler := mainHandler.NewRoute().Subrouter()
 | |
| 	loggingHandler.Use(web.NewLoggingHandler(l, nil))
 | |
| 
 | |
| 	tmp := os.TempDir()
 | |
| 	socketPath := path.Join(tmp, UnixSocketName)
 | |
| 
 | |
| 	// create http client to talk to backend, normal client if we're in debug more
 | |
| 	// and a client that connects to our socket when in non debug mode
 | |
| 	var upstreamClient *http.Client
 | |
| 	if config.Get().Debug {
 | |
| 		upstreamClient = http.DefaultClient
 | |
| 	} else {
 | |
| 		upstreamClient = &http.Client{
 | |
| 			Transport: &http.Transport{
 | |
| 				DialContext: func(_ context.Context, _, _ string) (net.Conn, error) {
 | |
| 					return net.Dial("unix", socketPath)
 | |
| 				},
 | |
| 			},
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	u, _ := url.Parse("http://localhost:8000")
 | |
| 
 | |
| 	ws := &WebServer{
 | |
| 		mainRouter:     mainHandler,
 | |
| 		loggingRouter:  loggingHandler,
 | |
| 		log:            l,
 | |
| 		gunicornReady:  false,
 | |
| 		upstreamClient: upstreamClient,
 | |
| 		upstreamURL:    u,
 | |
| 	}
 | |
| 	ws.configureStatic()
 | |
| 	ws.configureProxy()
 | |
| 	// Redirect for sub-folder
 | |
| 	if sp := config.Get().Web.Path; sp != "/" {
 | |
| 		ws.mainRouter.Path("/").Handler(http.RedirectHandler(sp, http.StatusFound))
 | |
| 	}
 | |
| 	hcUrl := fmt.Sprintf("%s%s-/health/live/", ws.upstreamURL.String(), config.Get().Web.Path)
 | |
| 	ws.g = gounicorn.New(func() bool {
 | |
| 		req, err := http.NewRequest(http.MethodGet, hcUrl, nil)
 | |
| 		if err != nil {
 | |
| 			ws.log.WithError(err).Warning("failed to create request for healthcheck")
 | |
| 			return false
 | |
| 		}
 | |
| 		req.Header.Set("User-Agent", "goauthentik.io/router/healthcheck")
 | |
| 		res, err := ws.upstreamHttpClient().Do(req)
 | |
| 		if err == nil && res.StatusCode >= 200 && res.StatusCode < 300 {
 | |
| 			return true
 | |
| 		}
 | |
| 		return false
 | |
| 	})
 | |
| 	return ws
 | |
| }
 | |
| 
 | |
| func (ws *WebServer) prepareKeys() {
 | |
| 	tmp := os.TempDir()
 | |
| 	key := base64.StdEncoding.EncodeToString(securecookie.GenerateRandomKey(64))
 | |
| 	err := os.WriteFile(path.Join(tmp, MetricsKeyFile), []byte(key), 0o600)
 | |
| 	if err != nil {
 | |
| 		ws.log.WithError(err).Warning("failed to save metrics key")
 | |
| 		return
 | |
| 	}
 | |
| 	ws.metricsKey = key
 | |
| 
 | |
| 	key = base64.StdEncoding.EncodeToString(securecookie.GenerateRandomKey(64))
 | |
| 	err = os.WriteFile(path.Join(tmp, IPCKeyFile), []byte(key), 0o600)
 | |
| 	if err != nil {
 | |
| 		ws.log.WithError(err).Warning("failed to save ipc key")
 | |
| 		return
 | |
| 	}
 | |
| 	ws.ipcKey = key
 | |
| }
 | |
| 
 | |
| func (ws *WebServer) Start() {
 | |
| 	ws.prepareKeys()
 | |
| 
 | |
| 	u, err := url.Parse(fmt.Sprintf("http://%s%s", config.Get().Listen.HTTP, config.Get().Web.Path))
 | |
| 	if err != nil {
 | |
| 		panic(err)
 | |
| 	}
 | |
| 	apiConfig := api.NewConfiguration()
 | |
| 	apiConfig.Host = u.Host
 | |
| 	apiConfig.Scheme = u.Scheme
 | |
| 	apiConfig.HTTPClient = &http.Client{
 | |
| 		Transport: web.NewUserAgentTransport(
 | |
| 			constants.UserAgentIPC(),
 | |
| 			ak.GetTLSTransport(),
 | |
| 		),
 | |
| 	}
 | |
| 	apiConfig.Servers = api.ServerConfigurations{
 | |
| 		{
 | |
| 			URL: fmt.Sprintf("%sapi/v3", u.Path),
 | |
| 		},
 | |
| 	}
 | |
| 	apiConfig.AddDefaultHeader("Authorization", fmt.Sprintf("Bearer %s", ws.ipcKey))
 | |
| 
 | |
| 	// create the API client, with the transport
 | |
| 	apiClient := api.NewAPIClient(apiConfig)
 | |
| 
 | |
| 	// Init brand_tls here too since it requires an API Client,
 | |
| 	// so we just reuse the same one as the outpost uses
 | |
| 	tw := brand_tls.NewWatcher(apiClient)
 | |
| 	ws.BrandTLS = tw
 | |
| 	ws.g.AddHealthyCallback(func() {
 | |
| 		go tw.Start()
 | |
| 	})
 | |
| 
 | |
| 	go ws.runMetricsServer()
 | |
| 	go ws.attemptStartBackend()
 | |
| 	go ws.listenPlain()
 | |
| 	go ws.listenTLS()
 | |
| }
 | |
| 
 | |
| func (ws *WebServer) attemptStartBackend() {
 | |
| 	for {
 | |
| 		if ws.gunicornReady {
 | |
| 			return
 | |
| 		}
 | |
| 		err := ws.g.Start()
 | |
| 		ws.log.WithError(err).Warning("gunicorn process died, restarting")
 | |
| 		if err != nil {
 | |
| 			ws.log.WithError(err).Error("gunicorn failed to start, restarting")
 | |
| 			continue
 | |
| 		}
 | |
| 		failedChecks := 0
 | |
| 		for range time.NewTicker(30 * time.Second).C {
 | |
| 			if !ws.g.IsRunning() {
 | |
| 				ws.log.Warningf("gunicorn process failed healthcheck %d times", failedChecks)
 | |
| 				failedChecks += 1
 | |
| 			}
 | |
| 			if failedChecks >= 3 {
 | |
| 				ws.log.WithError(err).Error("gunicorn process failed healthcheck three times, restarting")
 | |
| 				break
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (ws *WebServer) Core() *gounicorn.GoUnicorn {
 | |
| 	return ws.g
 | |
| }
 | |
| 
 | |
| func (ws *WebServer) upstreamHttpClient() *http.Client {
 | |
| 	return ws.upstreamClient
 | |
| }
 | |
| 
 | |
| func (ws *WebServer) Shutdown() {
 | |
| 	ws.log.Info("shutting down gunicorn")
 | |
| 	ws.g.Kill()
 | |
| 	tmp := os.TempDir()
 | |
| 	err := os.Remove(path.Join(tmp, MetricsKeyFile))
 | |
| 	if err != nil {
 | |
| 		ws.log.WithError(err).Warning("failed to remove metrics key file")
 | |
| 	}
 | |
| 	err = os.Remove(path.Join(tmp, IPCKeyFile))
 | |
| 	if err != nil {
 | |
| 		ws.log.WithError(err).Warning("failed to remove ipc key file")
 | |
| 	}
 | |
| 	ws.stop <- struct{}{}
 | |
| }
 | |
| 
 | |
| func (ws *WebServer) listenPlain() {
 | |
| 	ln, err := net.Listen("tcp", config.Get().Listen.HTTP)
 | |
| 	if err != nil {
 | |
| 		ws.log.WithError(err).Warning("failed to listen")
 | |
| 		return
 | |
| 	}
 | |
| 	proxyListener := &proxyproto.Listener{Listener: ln, ConnPolicy: utils.GetProxyConnectionPolicy()}
 | |
| 	defer func() {
 | |
| 		err := proxyListener.Close()
 | |
| 		if err != nil {
 | |
| 			ws.log.WithError(err).Warning("failed to close proxy listener")
 | |
| 		}
 | |
| 	}()
 | |
| 
 | |
| 	ws.log.WithField("listen", config.Get().Listen.HTTP).Info("Starting HTTP server")
 | |
| 	ws.serve(proxyListener)
 | |
| 	ws.log.WithField("listen", config.Get().Listen.HTTP).Info("Stopping HTTP server")
 | |
| }
 | |
| 
 | |
| func (ws *WebServer) serve(listener net.Listener) {
 | |
| 	srv := &http.Server{
 | |
| 		Handler: ws.mainRouter,
 | |
| 	}
 | |
| 
 | |
| 	// See https://golang.org/pkg/net/http/#Server.Shutdown
 | |
| 	idleConnsClosed := make(chan struct{})
 | |
| 	go func() {
 | |
| 		<-ws.stop // wait notification for stopping server
 | |
| 
 | |
| 		// We received an interrupt signal, shut down.
 | |
| 		if err := srv.Shutdown(context.Background()); err != nil {
 | |
| 			// Error from closing listeners, or context timeout:
 | |
| 			ws.log.WithError(err).Warning("HTTP server Shutdown")
 | |
| 		}
 | |
| 		close(idleConnsClosed)
 | |
| 	}()
 | |
| 
 | |
| 	err := srv.Serve(listener)
 | |
| 	if err != nil && !errors.Is(err, http.ErrServerClosed) {
 | |
| 		ws.log.WithError(err).Error("ERROR: http.Serve()")
 | |
| 	}
 | |
| 	<-idleConnsClosed
 | |
| }
 |