2021-09-08 18:04:56 +00:00
|
|
|
package application
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"net/http"
|
2021-09-10 14:19:29 +00:00
|
|
|
"net/url"
|
|
|
|
"path"
|
2021-09-08 18:04:56 +00:00
|
|
|
"strconv"
|
2022-01-19 18:15:57 +00:00
|
|
|
"strings"
|
2021-09-08 18:04:56 +00:00
|
|
|
|
2022-01-19 18:15:57 +00:00
|
|
|
"goauthentik.io/api"
|
2021-09-08 18:04:56 +00:00
|
|
|
"goauthentik.io/internal/outpost/proxyv2/constants"
|
|
|
|
)
|
|
|
|
|
2021-09-10 14:19:29 +00:00
|
|
|
func urlJoin(originalUrl string, newPath string) string {
|
|
|
|
u, err := url.Parse(originalUrl)
|
|
|
|
if err != nil {
|
|
|
|
return originalUrl
|
|
|
|
}
|
|
|
|
u.Path = path.Join(u.Path, newPath)
|
|
|
|
return u.String()
|
|
|
|
}
|
|
|
|
|
2021-09-08 18:04:56 +00:00
|
|
|
func (a *Application) redirectToStart(rw http.ResponseWriter, r *http.Request) {
|
2022-01-19 18:15:57 +00:00
|
|
|
s, err := a.sessions.Get(r, constants.SeesionName)
|
2022-02-17 19:50:47 +00:00
|
|
|
if err != nil {
|
2022-01-19 18:15:57 +00:00
|
|
|
a.log.WithError(err).Warning("failed to decode session")
|
|
|
|
}
|
2022-01-25 09:57:53 +00:00
|
|
|
redirectUrl := urlJoin(a.proxyConfig.ExternalHost, r.URL.Path)
|
2022-01-19 18:15:57 +00:00
|
|
|
if a.Mode() == api.PROXYMODE_FORWARD_DOMAIN {
|
|
|
|
dom := strings.TrimPrefix(*a.proxyConfig.CookieDomain, ".")
|
|
|
|
// In forward_domain we only check that the current URL's host
|
|
|
|
// ends with the cookie domain (remove the leading period if set)
|
|
|
|
if !strings.HasSuffix(r.URL.Hostname(), dom) {
|
|
|
|
a.log.WithField("url", r.URL.String()).WithField("cd", dom).Warning("Invalid redirect found")
|
2022-01-25 09:57:53 +00:00
|
|
|
redirectUrl = a.proxyConfig.ExternalHost
|
2022-01-19 18:15:57 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
s.Values[constants.SessionRedirect] = redirectUrl
|
|
|
|
err = s.Save(r, rw)
|
|
|
|
if err != nil {
|
|
|
|
a.log.WithError(err).Warning("failed to save session before redirect")
|
|
|
|
}
|
|
|
|
|
2022-02-18 09:32:22 +00:00
|
|
|
urlArgs := url.Values{
|
|
|
|
"rd": []string{redirectUrl},
|
|
|
|
}
|
2022-02-08 19:25:38 +00:00
|
|
|
authUrl := urlJoin(a.proxyConfig.ExternalHost, "/outpost.goauthentik.io/start")
|
2022-02-18 09:32:22 +00:00
|
|
|
http.Redirect(rw, r, authUrl+"?"+urlArgs.Encode(), http.StatusFound)
|
2021-09-08 18:04:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// getClaims Get claims which are currently in session
|
|
|
|
// Returns an error if the session can't be loaded or the claims can't be parsed/type-cast
|
|
|
|
func (a *Application) getClaims(r *http.Request) (*Claims, error) {
|
|
|
|
s, err := a.sessions.Get(r, constants.SeesionName)
|
|
|
|
if err != nil {
|
|
|
|
// err == user has no session/session is not valid, reject
|
|
|
|
return nil, fmt.Errorf("invalid session")
|
|
|
|
}
|
|
|
|
claims, ok := s.Values[constants.SessionClaims]
|
|
|
|
if claims == nil || !ok {
|
|
|
|
// no claims saved, reject
|
|
|
|
return nil, fmt.Errorf("invalid session")
|
|
|
|
}
|
|
|
|
c, ok := claims.(Claims)
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("invalid session")
|
|
|
|
}
|
|
|
|
return &c, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// toString Generic to string function, currently supports actual strings and integers
|
|
|
|
func toString(in interface{}) string {
|
|
|
|
switch v := in.(type) {
|
|
|
|
case string:
|
|
|
|
return v
|
|
|
|
case *string:
|
|
|
|
return *v
|
|
|
|
case int:
|
|
|
|
return strconv.Itoa(v)
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
2021-12-02 14:17:32 +00:00
|
|
|
|
|
|
|
func contains(s []string, e string) bool {
|
|
|
|
for _, a := range s {
|
|
|
|
if a == e {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
2022-01-27 17:14:02 +00:00
|
|
|
|
|
|
|
func cleanseHeaders(headers http.Header) map[string]string {
|
|
|
|
h := make(map[string]string)
|
|
|
|
for hk, hv := range headers {
|
|
|
|
if len(hv) > 0 {
|
|
|
|
h[hk] = hv[0]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return h
|
|
|
|
}
|