2021-05-02 23:49:16 +01:00
|
|
|
package web
|
|
|
|
|
|
|
|
import (
|
2021-07-29 10:30:30 +01:00
|
|
|
"fmt"
|
2021-05-04 17:14:25 +01:00
|
|
|
"net/http"
|
2021-05-02 23:49:16 +01:00
|
|
|
"net/http/httputil"
|
|
|
|
"net/url"
|
2021-09-09 14:52:24 +01:00
|
|
|
"time"
|
2021-07-29 10:30:30 +01:00
|
|
|
|
2021-09-09 14:52:24 +01:00
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
2021-07-29 10:30:30 +01:00
|
|
|
"goauthentik.io/internal/utils/web"
|
2021-05-02 23:49:16 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
func (ws *WebServer) configureProxy() {
|
|
|
|
// Reverse proxy to the application server
|
|
|
|
u, _ := url.Parse("http://localhost:8000")
|
2021-05-20 23:03:02 +01:00
|
|
|
director := func(req *http.Request) {
|
|
|
|
req.URL.Scheme = u.Scheme
|
|
|
|
req.URL.Host = u.Host
|
|
|
|
if _, ok := req.Header["User-Agent"]; !ok {
|
|
|
|
// explicitly disable User-Agent so it's not set to default value
|
|
|
|
req.Header.Set("User-Agent", "")
|
|
|
|
}
|
|
|
|
if req.TLS != nil {
|
|
|
|
req.Header.Set("X-Forwarded-Proto", "https")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rp := &httputil.ReverseProxy{Director: director}
|
2021-05-04 17:14:25 +01:00
|
|
|
rp.ErrorHandler = ws.proxyErrorHandler
|
2021-05-04 17:45:28 +01:00
|
|
|
rp.ModifyResponse = ws.proxyModifyResponse
|
2021-07-29 10:30:30 +01:00
|
|
|
ws.m.PathPrefix("/akprox").HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
|
|
|
if ws.ProxyServer != nil {
|
2021-09-09 14:52:24 +01:00
|
|
|
before := time.Now()
|
2021-09-08 19:04:56 +01:00
|
|
|
ws.ProxyServer.Handle(rw, r)
|
2021-09-09 14:52:24 +01:00
|
|
|
Requests.With(prometheus.Labels{
|
|
|
|
"dest": "embedded_outpost",
|
|
|
|
}).Observe(float64(time.Since(before)))
|
2021-07-29 10:30:30 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
ws.proxyErrorHandler(rw, r, fmt.Errorf("proxy not running"))
|
|
|
|
})
|
|
|
|
ws.m.PathPrefix("/").HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
2021-10-05 21:19:33 +01:00
|
|
|
if !ws.p.IsRunning() {
|
|
|
|
ws.proxyErrorHandler(rw, r, fmt.Errorf("authentik core not running yet"))
|
|
|
|
return
|
|
|
|
}
|
2021-07-29 10:30:30 +01:00
|
|
|
host := web.GetHost(r)
|
2021-09-09 14:52:24 +01:00
|
|
|
before := time.Now()
|
2021-07-29 10:30:30 +01:00
|
|
|
if ws.ProxyServer != nil {
|
2021-09-08 19:04:56 +01:00
|
|
|
if ws.ProxyServer.HandleHost(host, rw, r) {
|
2021-09-09 14:52:24 +01:00
|
|
|
Requests.With(prometheus.Labels{
|
|
|
|
"dest": "embedded_outpost",
|
|
|
|
}).Observe(float64(time.Since(before)))
|
2021-09-08 19:04:56 +01:00
|
|
|
return
|
2021-07-29 10:30:30 +01:00
|
|
|
}
|
|
|
|
}
|
2021-09-09 14:52:24 +01:00
|
|
|
Requests.With(prometheus.Labels{
|
|
|
|
"dest": "py",
|
|
|
|
}).Observe(float64(time.Since(before)))
|
2021-07-29 10:30:30 +01:00
|
|
|
ws.log.WithField("host", host).Trace("routing to application server")
|
|
|
|
rp.ServeHTTP(rw, r)
|
|
|
|
})
|
2021-05-02 23:49:16 +01:00
|
|
|
}
|
2021-05-04 17:14:25 +01:00
|
|
|
|
|
|
|
func (ws *WebServer) proxyErrorHandler(rw http.ResponseWriter, req *http.Request, err error) {
|
2021-10-05 21:19:33 +01:00
|
|
|
ws.log.Warning(err.Error())
|
2021-05-04 17:14:25 +01:00
|
|
|
rw.WriteHeader(http.StatusBadGateway)
|
2021-10-05 21:19:33 +01:00
|
|
|
_, err = rw.Write([]byte("authentik starting..."))
|
|
|
|
if err != nil {
|
|
|
|
ws.log.WithError(err).Warning("failed to write error message")
|
|
|
|
}
|
2021-05-04 17:14:25 +01:00
|
|
|
}
|
2021-05-04 17:45:28 +01:00
|
|
|
|
|
|
|
func (ws *WebServer) proxyModifyResponse(r *http.Response) error {
|
2021-06-02 17:00:26 +01:00
|
|
|
r.Header.Set("server", "authentik")
|
2021-05-04 17:45:28 +01:00
|
|
|
return nil
|
|
|
|
}
|