package ak import ( "context" "fmt" "math/rand" "net/http" "net/url" "os" "os/signal" "syscall" "time" "github.com/google/uuid" "github.com/gorilla/websocket" "github.com/prometheus/client_golang/prometheus" "goauthentik.io/api" "goauthentik.io/internal/constants" log "github.com/sirupsen/logrus" ) const ConfigLogLevel = "log_level" // APIController main controller which connects to the authentik api via http and ws type APIController struct { Client *api.APIClient Outpost api.Outpost GlobalConfig api.Config Server Outpost token string logger *log.Entry reloadOffset time.Duration wsConn *websocket.Conn lastWsReconnect time.Time wsIsReconnecting bool wsBackoffMultiplier int instanceUUID uuid.UUID } // NewAPIController initialise new API Controller instance from URL and API token func NewAPIController(akURL url.URL, token string) *APIController { config := api.NewConfiguration() config.Host = akURL.Host config.Scheme = akURL.Scheme config.HTTPClient = &http.Client{ Transport: NewUserAgentTransport(constants.OutpostUserAgent(), NewTracingTransport(context.TODO(), GetTLSTransport())), } config.AddDefaultHeader("Authorization", fmt.Sprintf("Bearer %s", token)) // create the API client, with the transport apiClient := api.NewAPIClient(config) log := log.WithField("logger", "authentik.outpost.ak-api-controller") // Because we don't know the outpost UUID, we simply do a list and pick the first // The service account this token belongs to should only have access to a single outpost outposts, _, err := apiClient.OutpostsApi.OutpostsInstancesList(context.Background()).Execute() if err != nil { log.WithError(err).Error("Failed to fetch outpost configuration") return nil } outpost := outposts.Results[0] log.WithField("name", outpost.Name).Debug("Fetched outpost configuration") akConfig, _, err := apiClient.RootApi.RootConfigRetrieve(context.Background()).Execute() if err != nil { log.WithError(err).Error("Failed to fetch global configuration") return nil } log.Debug("Fetched global configuration") doGlobalSetup(outpost, akConfig) ac := &APIController{ Client: apiClient, GlobalConfig: akConfig, token: token, logger: log, reloadOffset: time.Duration(rand.Intn(10)) * time.Second, instanceUUID: uuid.New(), Outpost: outpost, wsBackoffMultiplier: 1, } ac.logger.WithField("offset", ac.reloadOffset.String()).Debug("HA Reload offset") err = ac.initWS(akURL, outpost.Pk) if err != nil { go ac.reconnectWS() } ac.configureRefreshSignal() return ac } // Start Starts all handlers, non-blocking func (a *APIController) Start() error { err := a.StartBackgorundTasks() if err != nil { return err } go func() { err := a.Server.Start() if err != nil { panic(err) } }() return nil } func (a *APIController) configureRefreshSignal() { s := make(chan os.Signal, 1) go func() { for { <-s err := a.OnRefresh() if err != nil { a.logger.WithError(err).Warning("failed to refresh") } } }() signal.Notify(s, syscall.SIGUSR1) a.logger.Debug("Enabled USR1 hook to reload") } func (a *APIController) OnRefresh() error { // Because we don't know the outpost UUID, we simply do a list and pick the first // The service account this token belongs to should only have access to a single outpost outposts, _, err := a.Client.OutpostsApi.OutpostsInstancesList(context.Background()).Execute() if err != nil { log.WithError(err).Error("Failed to fetch outpost configuration") return err } a.Outpost = outposts.Results[0] a.logger.WithField("name", a.Outpost.Name).Debug("Fetched outpost configuration") return a.Server.Refresh() } func (a *APIController) StartBackgorundTasks() error { OutpostInfo.With(prometheus.Labels{ "outpost_name": a.Outpost.Name, "outpost_type": a.Server.Type(), "uuid": a.instanceUUID.String(), "version": constants.VERSION, "build": constants.BUILD(), }).Set(1) go func() { a.logger.Debug("Starting WS Handler...") a.startWSHandler() }() go func() { a.logger.Debug("Starting WS Health notifier...") a.startWSHealth() }() go func() { a.logger.Debug("Starting Interval updater...") a.startIntervalUpdater() }() go func() { a.logger.Debug("Starting periodical timer...") a.startPeriodicalTasks() }() return nil }