
* prepare client auth with inbuilt server Signed-off-by: Jens Langhammer <jens@goauthentik.io> * introduce better IPC auth Signed-off-by: Jens Langhammer <jens@goauthentik.io> * init Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start stage Signed-off-by: Jens Langhammer <jens@goauthentik.io> * only allow trusted proxies to set MTLS headers Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more stage progress Signed-off-by: Jens Langhammer <jens@goauthentik.io> * dont fail if ipc_key doesn't exist Signed-off-by: Jens Langhammer <jens@goauthentik.io> * actually install app Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add some tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update API Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix unquote Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix int serial number not jsonable Signed-off-by: Jens Langhammer <jens@goauthentik.io> * init ui Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add UI Signed-off-by: Jens Langhammer <jens@goauthentik.io> * unrelated: fix git pull in makefile Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix parse helper Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add test for outpost Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more tests and improvements Signed-off-by: Jens Langhammer <jens@goauthentik.io> * improve labels Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add support for multiple CAs on brand Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add support for multiple CAs to MTLS stage Signed-off-by: Jens Langhammer <jens@goauthentik.io> * dont log ipcuser secret views Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix go mod Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
268 lines
6.9 KiB
Go
268 lines
6.9 KiB
Go
package web
|
|
|
|
import (
|
|
"context"
|
|
"encoding/base64"
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"net/url"
|
|
"os"
|
|
"path"
|
|
"time"
|
|
|
|
"github.com/gorilla/handlers"
|
|
"github.com/gorilla/mux"
|
|
"github.com/gorilla/securecookie"
|
|
"github.com/pires/go-proxyproto"
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
"goauthentik.io/api/v3"
|
|
"goauthentik.io/internal/config"
|
|
"goauthentik.io/internal/constants"
|
|
"goauthentik.io/internal/gounicorn"
|
|
"goauthentik.io/internal/outpost/ak"
|
|
"goauthentik.io/internal/outpost/proxyv2"
|
|
"goauthentik.io/internal/utils"
|
|
"goauthentik.io/internal/utils/web"
|
|
"goauthentik.io/internal/web/brand_tls"
|
|
)
|
|
|
|
const (
|
|
IPCKeyFile = "authentik-core-ipc.key"
|
|
MetricsKeyFile = "authentik-core-metrics.key"
|
|
UnixSocketName = "authentik-core.sock"
|
|
)
|
|
|
|
type WebServer struct {
|
|
Bind string
|
|
BindTLS bool
|
|
|
|
stop chan struct{} // channel for waiting shutdown
|
|
|
|
ProxyServer *proxyv2.ProxyServer
|
|
BrandTLS *brand_tls.Watcher
|
|
|
|
g *gounicorn.GoUnicorn
|
|
gunicornReady bool
|
|
mainRouter *mux.Router
|
|
loggingRouter *mux.Router
|
|
log *log.Entry
|
|
upstreamClient *http.Client
|
|
upstreamURL *url.URL
|
|
|
|
metricsKey string
|
|
ipcKey string
|
|
}
|
|
|
|
func NewWebServer() *WebServer {
|
|
l := log.WithField("logger", "authentik.router")
|
|
mainHandler := mux.NewRouter()
|
|
mainHandler.Use(web.ProxyHeaders())
|
|
mainHandler.Use(handlers.CompressHandler)
|
|
loggingHandler := mainHandler.NewRoute().Subrouter()
|
|
loggingHandler.Use(web.NewLoggingHandler(l, nil))
|
|
|
|
tmp := os.TempDir()
|
|
socketPath := path.Join(tmp, UnixSocketName)
|
|
|
|
// create http client to talk to backend, normal client if we're in debug more
|
|
// and a client that connects to our socket when in non debug mode
|
|
var upstreamClient *http.Client
|
|
if config.Get().Debug {
|
|
upstreamClient = http.DefaultClient
|
|
} else {
|
|
upstreamClient = &http.Client{
|
|
Transport: &http.Transport{
|
|
DialContext: func(_ context.Context, _, _ string) (net.Conn, error) {
|
|
return net.Dial("unix", socketPath)
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
u, _ := url.Parse("http://localhost:8000")
|
|
|
|
ws := &WebServer{
|
|
mainRouter: mainHandler,
|
|
loggingRouter: loggingHandler,
|
|
log: l,
|
|
gunicornReady: false,
|
|
upstreamClient: upstreamClient,
|
|
upstreamURL: u,
|
|
}
|
|
ws.configureStatic()
|
|
ws.configureProxy()
|
|
// Redirect for sub-folder
|
|
if sp := config.Get().Web.Path; sp != "/" {
|
|
ws.mainRouter.Path("/").Handler(http.RedirectHandler(sp, http.StatusFound))
|
|
}
|
|
hcUrl := fmt.Sprintf("%s%s-/health/live/", ws.upstreamURL.String(), config.Get().Web.Path)
|
|
ws.g = gounicorn.New(func() bool {
|
|
req, err := http.NewRequest(http.MethodGet, hcUrl, nil)
|
|
if err != nil {
|
|
ws.log.WithError(err).Warning("failed to create request for healthcheck")
|
|
return false
|
|
}
|
|
req.Header.Set("User-Agent", "goauthentik.io/router/healthcheck")
|
|
res, err := ws.upstreamHttpClient().Do(req)
|
|
if err == nil && res.StatusCode >= 200 && res.StatusCode < 300 {
|
|
return true
|
|
}
|
|
return false
|
|
})
|
|
return ws
|
|
}
|
|
|
|
func (ws *WebServer) prepareKeys() {
|
|
tmp := os.TempDir()
|
|
key := base64.StdEncoding.EncodeToString(securecookie.GenerateRandomKey(64))
|
|
err := os.WriteFile(path.Join(tmp, MetricsKeyFile), []byte(key), 0o600)
|
|
if err != nil {
|
|
ws.log.WithError(err).Warning("failed to save metrics key")
|
|
return
|
|
}
|
|
ws.metricsKey = key
|
|
|
|
key = base64.StdEncoding.EncodeToString(securecookie.GenerateRandomKey(64))
|
|
err = os.WriteFile(path.Join(tmp, IPCKeyFile), []byte(key), 0o600)
|
|
if err != nil {
|
|
ws.log.WithError(err).Warning("failed to save ipc key")
|
|
return
|
|
}
|
|
ws.ipcKey = key
|
|
}
|
|
|
|
func (ws *WebServer) Start() {
|
|
ws.prepareKeys()
|
|
|
|
u, err := url.Parse(fmt.Sprintf("http://%s%s", config.Get().Listen.HTTP, config.Get().Web.Path))
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
apiConfig := api.NewConfiguration()
|
|
apiConfig.Host = u.Host
|
|
apiConfig.Scheme = u.Scheme
|
|
apiConfig.HTTPClient = &http.Client{
|
|
Transport: web.NewUserAgentTransport(
|
|
constants.UserAgentIPC(),
|
|
ak.GetTLSTransport(),
|
|
),
|
|
}
|
|
apiConfig.Servers = api.ServerConfigurations{
|
|
{
|
|
URL: fmt.Sprintf("%sapi/v3", u.Path),
|
|
},
|
|
}
|
|
apiConfig.AddDefaultHeader("Authorization", fmt.Sprintf("Bearer %s", ws.ipcKey))
|
|
|
|
// create the API client, with the transport
|
|
apiClient := api.NewAPIClient(apiConfig)
|
|
|
|
// Init brand_tls here too since it requires an API Client,
|
|
// so we just reuse the same one as the outpost uses
|
|
tw := brand_tls.NewWatcher(apiClient)
|
|
ws.BrandTLS = tw
|
|
ws.g.AddHealthyCallback(func() {
|
|
go tw.Start()
|
|
})
|
|
|
|
go ws.runMetricsServer()
|
|
go ws.attemptStartBackend()
|
|
go ws.listenPlain()
|
|
go ws.listenTLS()
|
|
}
|
|
|
|
func (ws *WebServer) attemptStartBackend() {
|
|
for {
|
|
if ws.gunicornReady {
|
|
return
|
|
}
|
|
err := ws.g.Start()
|
|
ws.log.WithError(err).Warning("gunicorn process died, restarting")
|
|
if err != nil {
|
|
ws.log.WithError(err).Error("gunicorn failed to start, restarting")
|
|
continue
|
|
}
|
|
failedChecks := 0
|
|
for range time.NewTicker(30 * time.Second).C {
|
|
if !ws.g.IsRunning() {
|
|
ws.log.Warningf("gunicorn process failed healthcheck %d times", failedChecks)
|
|
failedChecks += 1
|
|
}
|
|
if failedChecks >= 3 {
|
|
ws.log.WithError(err).Error("gunicorn process failed healthcheck three times, restarting")
|
|
break
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func (ws *WebServer) Core() *gounicorn.GoUnicorn {
|
|
return ws.g
|
|
}
|
|
|
|
func (ws *WebServer) upstreamHttpClient() *http.Client {
|
|
return ws.upstreamClient
|
|
}
|
|
|
|
func (ws *WebServer) Shutdown() {
|
|
ws.log.Info("shutting down gunicorn")
|
|
ws.g.Kill()
|
|
tmp := os.TempDir()
|
|
err := os.Remove(path.Join(tmp, MetricsKeyFile))
|
|
if err != nil {
|
|
ws.log.WithError(err).Warning("failed to remove metrics key file")
|
|
}
|
|
err = os.Remove(path.Join(tmp, IPCKeyFile))
|
|
if err != nil {
|
|
ws.log.WithError(err).Warning("failed to remove ipc key file")
|
|
}
|
|
ws.stop <- struct{}{}
|
|
}
|
|
|
|
func (ws *WebServer) listenPlain() {
|
|
ln, err := net.Listen("tcp", config.Get().Listen.HTTP)
|
|
if err != nil {
|
|
ws.log.WithError(err).Warning("failed to listen")
|
|
return
|
|
}
|
|
proxyListener := &proxyproto.Listener{Listener: ln, ConnPolicy: utils.GetProxyConnectionPolicy()}
|
|
defer func() {
|
|
err := proxyListener.Close()
|
|
if err != nil {
|
|
ws.log.WithError(err).Warning("failed to close proxy listener")
|
|
}
|
|
}()
|
|
|
|
ws.log.WithField("listen", config.Get().Listen.HTTP).Info("Starting HTTP server")
|
|
ws.serve(proxyListener)
|
|
ws.log.WithField("listen", config.Get().Listen.HTTP).Info("Stopping HTTP server")
|
|
}
|
|
|
|
func (ws *WebServer) serve(listener net.Listener) {
|
|
srv := &http.Server{
|
|
Handler: ws.mainRouter,
|
|
}
|
|
|
|
// See https://golang.org/pkg/net/http/#Server.Shutdown
|
|
idleConnsClosed := make(chan struct{})
|
|
go func() {
|
|
<-ws.stop // wait notification for stopping server
|
|
|
|
// We received an interrupt signal, shut down.
|
|
if err := srv.Shutdown(context.Background()); err != nil {
|
|
// Error from closing listeners, or context timeout:
|
|
ws.log.WithError(err).Warning("HTTP server Shutdown")
|
|
}
|
|
close(idleConnsClosed)
|
|
}()
|
|
|
|
err := srv.Serve(listener)
|
|
if err != nil && !errors.Is(err, http.ErrServerClosed) {
|
|
ws.log.WithError(err).Error("ERROR: http.Serve()")
|
|
}
|
|
<-idleConnsClosed
|
|
}
|