4915e980c5
closes #2284 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
97 lines
2.8 KiB
Go
97 lines
2.8 KiB
Go
package application
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"net/http"
|
|
"net/http/httputil"
|
|
"net/url"
|
|
"time"
|
|
|
|
"github.com/getsentry/sentry-go"
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
log "github.com/sirupsen/logrus"
|
|
"goauthentik.io/internal/outpost/ak"
|
|
"goauthentik.io/internal/outpost/proxyv2/metrics"
|
|
"goauthentik.io/internal/utils/web"
|
|
)
|
|
|
|
func (a *Application) getUpstreamTransport() http.RoundTripper {
|
|
return &http.Transport{
|
|
TLSClientConfig: &tls.Config{InsecureSkipVerify: !*a.proxyConfig.InternalHostSslValidation},
|
|
}
|
|
}
|
|
|
|
func (a *Application) configureProxy() error {
|
|
// Reverse proxy to the application server
|
|
u, err := url.Parse(*a.proxyConfig.InternalHost)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
rp := &httputil.ReverseProxy{Director: a.proxyModifyRequest(u)}
|
|
rsp := sentry.StartSpan(context.TODO(), "authentik.outposts.proxy.application_transport")
|
|
rp.Transport = ak.NewTracingTransport(rsp.Context(), a.getUpstreamTransport())
|
|
rp.ErrorHandler = a.newProxyErrorHandler()
|
|
rp.ModifyResponse = a.proxyModifyResponse
|
|
a.mux.PathPrefix("/").HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
|
claims, err := a.getClaims(r)
|
|
if claims == nil && a.IsAllowlisted(r.URL) {
|
|
a.log.Trace("path can be accessed without authentication")
|
|
} else if claims == nil && err != nil {
|
|
a.redirectToStart(rw, r)
|
|
return
|
|
} else {
|
|
a.addHeaders(r.Header, claims)
|
|
}
|
|
before := time.Now()
|
|
rp.ServeHTTP(rw, r)
|
|
defer func() {
|
|
err := recover()
|
|
if err == nil || err == http.ErrAbortHandler {
|
|
return
|
|
}
|
|
log.WithError(err.(error)).Error("recover in reverse proxy")
|
|
}()
|
|
after := time.Since(before)
|
|
|
|
user := ""
|
|
if claims != nil {
|
|
user = claims.Email
|
|
}
|
|
metrics.UpstreamTiming.With(prometheus.Labels{
|
|
"outpost_name": a.outpostName,
|
|
"upstream_host": r.URL.Host,
|
|
"scheme": r.URL.Scheme,
|
|
"method": r.Method,
|
|
"path": r.URL.Path,
|
|
"host": web.GetHost(r),
|
|
"user": user,
|
|
}).Observe(float64(after))
|
|
})
|
|
return nil
|
|
}
|
|
|
|
func (a *Application) proxyModifyRequest(ou *url.URL) func(req *http.Request) {
|
|
return func(r *http.Request) {
|
|
r.Header.Set("X-Forwarded-Host", r.Host)
|
|
claims, _ := a.getClaims(r)
|
|
r.URL.Scheme = ou.Scheme
|
|
r.URL.Host = ou.Host
|
|
if claims != nil && claims.Proxy != nil && claims.Proxy.BackendOverride != "" {
|
|
u, err := url.Parse(claims.Proxy.BackendOverride)
|
|
if err != nil {
|
|
a.log.WithField("backend_override", claims.Proxy.BackendOverride).WithError(err).Warning("failed parse user backend override")
|
|
} else {
|
|
r.URL.Scheme = u.Scheme
|
|
r.URL.Host = u.Host
|
|
}
|
|
}
|
|
a.log.WithField("upstream_url", r.URL.String()).Trace("final upstream url")
|
|
}
|
|
}
|
|
|
|
func (a *Application) proxyModifyResponse(res *http.Response) error {
|
|
res.Header.Set("X-Powered-By", "authentik_proxy2")
|
|
return nil
|
|
}
|