providers/proxy: only intercept auth header when a value is set (#6488)
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
This commit is contained in:
parent
7124a620af
commit
f6b144a0fa
|
@ -13,6 +13,30 @@ import (
|
||||||
"goauthentik.io/internal/constants"
|
"goauthentik.io/internal/constants"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// Attempt to set basic auth based on user's attributes
|
||||||
|
func (a *Application) setAuthorizationHeader(headers http.Header, c *Claims) {
|
||||||
|
if !*a.proxyConfig.BasicAuthEnabled {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
userAttributes := c.Proxy.UserAttributes
|
||||||
|
var ok bool
|
||||||
|
var password string
|
||||||
|
if password, ok = userAttributes[*a.proxyConfig.BasicAuthPasswordAttribute].(string); !ok {
|
||||||
|
password = ""
|
||||||
|
}
|
||||||
|
// Check if we should use email or a custom attribute as username
|
||||||
|
var username string
|
||||||
|
if username, ok = userAttributes[*a.proxyConfig.BasicAuthUserAttribute].(string); !ok {
|
||||||
|
username = c.Email
|
||||||
|
}
|
||||||
|
if username == "" && password == "" {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
authVal := base64.StdEncoding.EncodeToString([]byte(username + ":" + password))
|
||||||
|
a.log.WithField("username", username).Trace("setting http basic auth")
|
||||||
|
headers.Set("Authorization", fmt.Sprintf("Basic %s", authVal))
|
||||||
|
}
|
||||||
|
|
||||||
func (a *Application) addHeaders(headers http.Header, c *Claims) {
|
func (a *Application) addHeaders(headers http.Header, c *Claims) {
|
||||||
// https://goauthentik.io/docs/providers/proxy/proxy
|
// https://goauthentik.io/docs/providers/proxy/proxy
|
||||||
headers.Set("X-authentik-username", c.PreferredUsername)
|
headers.Set("X-authentik-username", c.PreferredUsername)
|
||||||
|
@ -33,22 +57,7 @@ func (a *Application) addHeaders(headers http.Header, c *Claims) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
userAttributes := c.Proxy.UserAttributes
|
userAttributes := c.Proxy.UserAttributes
|
||||||
// Attempt to set basic auth based on user's attributes
|
a.setAuthorizationHeader(headers, c)
|
||||||
if *a.proxyConfig.BasicAuthEnabled {
|
|
||||||
var ok bool
|
|
||||||
var password string
|
|
||||||
if password, ok = userAttributes[*a.proxyConfig.BasicAuthPasswordAttribute].(string); !ok {
|
|
||||||
password = ""
|
|
||||||
}
|
|
||||||
// Check if we should use email or a custom attribute as username
|
|
||||||
var username string
|
|
||||||
if username, ok = userAttributes[*a.proxyConfig.BasicAuthUserAttribute].(string); !ok {
|
|
||||||
username = c.Email
|
|
||||||
}
|
|
||||||
authVal := base64.StdEncoding.EncodeToString([]byte(username + ":" + password))
|
|
||||||
a.log.WithField("username", username).Trace("setting http basic auth")
|
|
||||||
headers.Set("Authorization", fmt.Sprintf("Basic %s", authVal))
|
|
||||||
}
|
|
||||||
// Check if user has additional headers set that we should sent
|
// Check if user has additional headers set that we should sent
|
||||||
if additionalHeaders, ok := userAttributes["additionalHeaders"].(map[string]interface{}); ok {
|
if additionalHeaders, ok := userAttributes["additionalHeaders"].(map[string]interface{}); ok {
|
||||||
a.log.WithField("headers", additionalHeaders).Trace("setting additional headers")
|
a.log.WithField("headers", additionalHeaders).Trace("setting additional headers")
|
||||||
|
|
Reference in New Issue