* outposts/proxyv2: initial commit Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add rs256 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> more stuff Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add forward auth an sign_out Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> match cookie name Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> re-add support for rs256 for backwards compat Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add error handler Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> ensure unique user-agent is used Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> set cookie duration based on id_token expiry Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> build proxy v2 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add ssl Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add basic auth and custom header support Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add application cert loading Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> implement whitelist Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add redis Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> migrate embedded outpost to v2 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> remove old proxy Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> providers/proxy: make token expiration configurable Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add metrics Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> fix tests Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * providers/proxy: only allow one redirect URI Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix docker build for proxy Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * remove default port offset Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * add AUTHENTIK_HOST_BROWSER Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * tests: fix e2e/integration tests not using proper tags Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * remove references of old port Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix user_attributes not being loaded correctly Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * cleanup dependencies Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * cleanup Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
144 lines
4.7 KiB
Python
144 lines
4.7 KiB
Python
"""ProxyProvider API Views"""
|
|
from typing import Any
|
|
|
|
from drf_spectacular.utils import extend_schema_field
|
|
from rest_framework.exceptions import ValidationError
|
|
from rest_framework.fields import CharField, ListField, SerializerMethodField
|
|
from rest_framework.serializers import ModelSerializer
|
|
from rest_framework.viewsets import ModelViewSet, ReadOnlyModelViewSet
|
|
|
|
from authentik.core.api.providers import ProviderSerializer
|
|
from authentik.core.api.used_by import UsedByMixin
|
|
from authentik.core.api.utils import PassiveSerializer
|
|
from authentik.providers.oauth2.views.provider import ProviderInfoView
|
|
from authentik.providers.proxy.models import ProxyMode, ProxyProvider
|
|
|
|
|
|
class OpenIDConnectConfigurationSerializer(PassiveSerializer):
|
|
"""rest_framework Serializer for OIDC Configuration"""
|
|
|
|
issuer = CharField()
|
|
authorization_endpoint = CharField()
|
|
token_endpoint = CharField()
|
|
userinfo_endpoint = CharField()
|
|
end_session_endpoint = CharField()
|
|
introspection_endpoint = CharField()
|
|
jwks_uri = CharField()
|
|
|
|
response_types_supported = ListField(child=CharField())
|
|
id_token_signing_alg_values_supported = ListField(child=CharField())
|
|
subject_types_supported = ListField(child=CharField())
|
|
token_endpoint_auth_methods_supported = ListField(child=CharField())
|
|
|
|
|
|
class ProxyProviderSerializer(ProviderSerializer):
|
|
"""ProxyProvider Serializer"""
|
|
|
|
redirect_uris = CharField(read_only=True)
|
|
|
|
def validate(self, attrs) -> dict[Any, str]:
|
|
"""Check that internal_host is set when mode is Proxy"""
|
|
if (
|
|
attrs.get("mode", ProxyMode.PROXY) == ProxyMode.PROXY
|
|
and attrs.get("internal_host", "") == ""
|
|
):
|
|
raise ValidationError("Internal host cannot be empty when forward auth is disabled.")
|
|
return attrs
|
|
|
|
def create(self, validated_data):
|
|
instance: ProxyProvider = super().create(validated_data)
|
|
instance.set_oauth_defaults()
|
|
instance.save()
|
|
return instance
|
|
|
|
def update(self, instance: ProxyProvider, validated_data):
|
|
instance = super().update(instance, validated_data)
|
|
instance.set_oauth_defaults()
|
|
instance.save()
|
|
return instance
|
|
|
|
class Meta:
|
|
|
|
model = ProxyProvider
|
|
fields = ProviderSerializer.Meta.fields + [
|
|
"internal_host",
|
|
"external_host",
|
|
"internal_host_ssl_validation",
|
|
"certificate",
|
|
"skip_path_regex",
|
|
"basic_auth_enabled",
|
|
"basic_auth_password_attribute",
|
|
"basic_auth_user_attribute",
|
|
"mode",
|
|
"redirect_uris",
|
|
"cookie_domain",
|
|
"token_validity",
|
|
]
|
|
|
|
|
|
class ProxyProviderViewSet(UsedByMixin, ModelViewSet):
|
|
"""ProxyProvider Viewset"""
|
|
|
|
queryset = ProxyProvider.objects.all()
|
|
serializer_class = ProxyProviderSerializer
|
|
filterset_fields = {
|
|
"application": ["isnull"],
|
|
"name": ["iexact"],
|
|
"authorization_flow__slug": ["iexact"],
|
|
"property_mappings": ["iexact"],
|
|
"internal_host": ["iexact"],
|
|
"external_host": ["iexact"],
|
|
"internal_host_ssl_validation": ["iexact"],
|
|
"certificate__kp_uuid": ["iexact"],
|
|
"certificate__name": ["iexact"],
|
|
"skip_path_regex": ["iexact"],
|
|
"basic_auth_enabled": ["iexact"],
|
|
"basic_auth_password_attribute": ["iexact"],
|
|
"basic_auth_user_attribute": ["iexact"],
|
|
"mode": ["iexact"],
|
|
"redirect_uris": ["iexact"],
|
|
"cookie_domain": ["iexact"],
|
|
}
|
|
ordering = ["name"]
|
|
|
|
|
|
class ProxyOutpostConfigSerializer(ModelSerializer):
|
|
"""Proxy provider serializer for outposts"""
|
|
|
|
oidc_configuration = SerializerMethodField()
|
|
|
|
class Meta:
|
|
|
|
model = ProxyProvider
|
|
fields = [
|
|
"pk",
|
|
"name",
|
|
"internal_host",
|
|
"external_host",
|
|
"internal_host_ssl_validation",
|
|
"client_id",
|
|
"client_secret",
|
|
"oidc_configuration",
|
|
"cookie_secret",
|
|
"certificate",
|
|
"skip_path_regex",
|
|
"basic_auth_enabled",
|
|
"basic_auth_password_attribute",
|
|
"basic_auth_user_attribute",
|
|
"mode",
|
|
"cookie_domain",
|
|
]
|
|
|
|
@extend_schema_field(OpenIDConnectConfigurationSerializer)
|
|
def get_oidc_configuration(self, obj: ProxyProvider):
|
|
"""Embed OpenID Connect provider information"""
|
|
return ProviderInfoView(request=self.context["request"]._request).get_info(obj)
|
|
|
|
|
|
class ProxyOutpostConfigViewSet(ReadOnlyModelViewSet):
|
|
"""ProxyProvider Viewset"""
|
|
|
|
queryset = ProxyProvider.objects.filter(application__isnull=False)
|
|
serializer_class = ProxyOutpostConfigSerializer
|
|
ordering = ["name"]
|