 65517f3b7f
			
		
	
	65517f3b7f
	
	
	
		
			
			* prepare client auth with inbuilt server Signed-off-by: Jens Langhammer <jens@goauthentik.io> * introduce better IPC auth Signed-off-by: Jens Langhammer <jens@goauthentik.io> * init Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start stage Signed-off-by: Jens Langhammer <jens@goauthentik.io> * only allow trusted proxies to set MTLS headers Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more stage progress Signed-off-by: Jens Langhammer <jens@goauthentik.io> * dont fail if ipc_key doesn't exist Signed-off-by: Jens Langhammer <jens@goauthentik.io> * actually install app Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add some tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update API Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix unquote Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix int serial number not jsonable Signed-off-by: Jens Langhammer <jens@goauthentik.io> * init ui Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add UI Signed-off-by: Jens Langhammer <jens@goauthentik.io> * unrelated: fix git pull in makefile Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix parse helper Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add test for outpost Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more tests and improvements Signed-off-by: Jens Langhammer <jens@goauthentik.io> * improve labels Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add support for multiple CAs on brand Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add support for multiple CAs to MTLS stage Signed-off-by: Jens Langhammer <jens@goauthentik.io> * dont log ipcuser secret views Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix go mod Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
		
			
				
	
	
		
			146 lines
		
	
	
		
			4.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			146 lines
		
	
	
		
			4.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package application
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"encoding/base64"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 	"net/url"
 | |
| 	"strings"
 | |
| 
 | |
| 	"goauthentik.io/api/v3"
 | |
| 	"goauthentik.io/internal/constants"
 | |
| )
 | |
| 
 | |
| // Attempt to set basic auth based on user's attributes
 | |
| func (a *Application) setAuthorizationHeader(headers http.Header, c *Claims) {
 | |
| 	if !*a.proxyConfig.BasicAuthEnabled {
 | |
| 		return
 | |
| 	}
 | |
| 	userAttributes := c.Proxy.UserAttributes
 | |
| 	var ok bool
 | |
| 	var password string
 | |
| 	if password, ok = userAttributes[*a.proxyConfig.BasicAuthPasswordAttribute].(string); !ok {
 | |
| 		password = ""
 | |
| 	}
 | |
| 	// Check if we should use email or a custom attribute as username
 | |
| 	var username string
 | |
| 	if username, ok = userAttributes[*a.proxyConfig.BasicAuthUserAttribute].(string); !ok {
 | |
| 		username = c.Email
 | |
| 	}
 | |
| 	if username == "" && password == "" {
 | |
| 		return
 | |
| 	}
 | |
| 	authVal := base64.StdEncoding.EncodeToString([]byte(username + ":" + password))
 | |
| 	a.log.WithField("username", username).Trace("setting http basic auth")
 | |
| 	headers.Set("Authorization", fmt.Sprintf("Basic %s", authVal))
 | |
| }
 | |
| 
 | |
| func (a *Application) addHeaders(headers http.Header, c *Claims) {
 | |
| 	// https://goauthentik.io/docs/providers/proxy/proxy
 | |
| 	headers.Set("X-authentik-username", c.PreferredUsername)
 | |
| 	headers.Set("X-authentik-groups", strings.Join(c.Groups, "|"))
 | |
| 	headers.Set("X-authentik-entitlements", strings.Join(c.Entitlements, "|"))
 | |
| 	headers.Set("X-authentik-email", c.Email)
 | |
| 	headers.Set("X-authentik-name", c.Name)
 | |
| 	headers.Set("X-authentik-uid", c.Sub)
 | |
| 	headers.Set("X-authentik-jwt", c.RawToken)
 | |
| 
 | |
| 	// System headers
 | |
| 	headers.Set("X-authentik-meta-jwks", a.endpoint.JwksUri)
 | |
| 	headers.Set("X-authentik-meta-outpost", a.outpostName)
 | |
| 	headers.Set("X-authentik-meta-provider", a.proxyConfig.Name)
 | |
| 	headers.Set("X-authentik-meta-app", a.proxyConfig.AssignedApplicationSlug)
 | |
| 	headers.Set("X-authentik-meta-version", constants.UserAgentOutpost())
 | |
| 
 | |
| 	if c.Proxy == nil {
 | |
| 		return
 | |
| 	}
 | |
| 	userAttributes := c.Proxy.UserAttributes
 | |
| 	a.setAuthorizationHeader(headers, c)
 | |
| 	// Check if user has additional headers set that we should sent
 | |
| 	if additionalHeaders, ok := userAttributes["additionalHeaders"]; ok {
 | |
| 		a.log.WithField("headers", additionalHeaders).Trace("setting additional headers")
 | |
| 		if additionalHeaders == nil {
 | |
| 			return
 | |
| 		}
 | |
| 		for key, value := range additionalHeaders.(map[string]interface{}) {
 | |
| 			headers.Set(key, toString(value))
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // getTraefikForwardUrl See https://doc.traefik.io/traefik/middlewares/forwardauth/
 | |
| func (a *Application) getTraefikForwardUrl(r *http.Request) (*url.URL, error) {
 | |
| 	u, err := url.Parse(fmt.Sprintf(
 | |
| 		"%s://%s%s",
 | |
| 		r.Header.Get("X-Forwarded-Proto"),
 | |
| 		r.Header.Get("X-Forwarded-Host"),
 | |
| 		r.Header.Get("X-Forwarded-Uri"),
 | |
| 	))
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	a.log.WithField("url", u.String()).Trace("traefik forwarded url")
 | |
| 	return u, nil
 | |
| }
 | |
| 
 | |
| // getNginxForwardUrl See https://github.com/kubernetes/ingress-nginx/blob/main/rootfs/etc/nginx/template/nginx.tmpl
 | |
| func (a *Application) getNginxForwardUrl(r *http.Request) (*url.URL, error) {
 | |
| 	ou := r.Header.Get("X-Original-URI")
 | |
| 	if ou != "" {
 | |
| 		// Turn this full URL into a relative URL
 | |
| 		u := &url.URL{
 | |
| 			Host:   "",
 | |
| 			Scheme: "",
 | |
| 			Path:   ou,
 | |
| 		}
 | |
| 		a.log.WithField("url", u.String()).Info("building forward URL from X-Original-URI")
 | |
| 		return u, nil
 | |
| 	}
 | |
| 	h := r.Header.Get("X-Original-URL")
 | |
| 	if len(h) < 1 {
 | |
| 		return nil, errors.New("no forward URL found")
 | |
| 	}
 | |
| 	u, err := url.Parse(h)
 | |
| 	if err != nil {
 | |
| 		a.log.WithError(err).Warning("failed to parse URL from nginx")
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	a.log.WithField("url", u.String()).Trace("nginx forwarded url")
 | |
| 	return u, nil
 | |
| }
 | |
| 
 | |
| func (a *Application) ReportMisconfiguration(r *http.Request, msg string, fields map[string]interface{}) {
 | |
| 	fields["message"] = msg
 | |
| 	a.log.WithFields(fields).Error("Reporting configuration error")
 | |
| 	req := api.EventRequest{
 | |
| 		Action:   api.EVENTACTIONS_CONFIGURATION_ERROR,
 | |
| 		App:      "authentik.providers.proxy", // must match python apps.py name
 | |
| 		ClientIp: *api.NewNullableString(api.PtrString(r.RemoteAddr)),
 | |
| 		Context:  fields,
 | |
| 	}
 | |
| 	_, _, err := a.ak.Client.EventsApi.EventsEventsCreate(context.Background()).EventRequest(req).Execute()
 | |
| 	if err != nil {
 | |
| 		a.log.WithError(err).Warning("failed to report configuration error")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (a *Application) IsAllowlisted(u *url.URL) bool {
 | |
| 	for _, ur := range a.UnauthenticatedRegex {
 | |
| 		var testString string
 | |
| 		if a.Mode() == api.PROXYMODE_PROXY || a.Mode() == api.PROXYMODE_FORWARD_SINGLE {
 | |
| 			testString = u.Path
 | |
| 		} else {
 | |
| 			testString = u.String()
 | |
| 		}
 | |
| 		match := ur.MatchString(testString)
 | |
| 		a.log.WithField("match", match).WithField("regex", ur.String()).WithField("url", testString).Trace("Matching URL against allow list")
 | |
| 		if match {
 | |
| 			return true
 | |
| 		}
 | |
| 	}
 | |
| 	return false
 | |
| }
 |