3c1b70c355
* outposts/proxyv2: initial commit Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add rs256 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> more stuff Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add forward auth an sign_out Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> match cookie name Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> re-add support for rs256 for backwards compat Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add error handler Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> ensure unique user-agent is used Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> set cookie duration based on id_token expiry Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> build proxy v2 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add ssl Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add basic auth and custom header support Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add application cert loading Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> implement whitelist Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add redis Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> migrate embedded outpost to v2 Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> remove old proxy Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> providers/proxy: make token expiration configurable Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> add metrics Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> fix tests Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * providers/proxy: only allow one redirect URI Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix docker build for proxy Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * remove default port offset Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * add AUTHENTIK_HOST_BROWSER Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * tests: fix e2e/integration tests not using proper tags Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * remove references of old port Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix user_attributes not being loaded correctly Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * cleanup dependencies Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * cleanup Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
65 lines
1.3 KiB
Go
65 lines
1.3 KiB
Go
package main
|
|
|
|
import (
|
|
"fmt"
|
|
"net/url"
|
|
"os"
|
|
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
"goauthentik.io/internal/common"
|
|
"goauthentik.io/internal/outpost/ak"
|
|
"goauthentik.io/internal/outpost/proxyv2"
|
|
)
|
|
|
|
const helpMessage = `authentik proxy
|
|
|
|
Required environment variables:
|
|
- AUTHENTIK_HOST: URL to connect to (format "http://authentik.company")
|
|
- AUTHENTIK_TOKEN: Token to authenticate with
|
|
- AUTHENTIK_INSECURE: Skip SSL Certificate verification
|
|
|
|
Optionally, you can set these:
|
|
- AUTHENTIK_HOST_BROWSER: URL to use in the browser, when it differs from AUTHENTIK_HOST`
|
|
|
|
func main() {
|
|
log.SetLevel(log.DebugLevel)
|
|
akURL, found := os.LookupEnv("AUTHENTIK_HOST")
|
|
if !found {
|
|
fmt.Println("env AUTHENTIK_HOST not set!")
|
|
fmt.Println(helpMessage)
|
|
os.Exit(1)
|
|
}
|
|
akToken, found := os.LookupEnv("AUTHENTIK_TOKEN")
|
|
if !found {
|
|
fmt.Println("env AUTHENTIK_TOKEN not set!")
|
|
fmt.Println(helpMessage)
|
|
os.Exit(1)
|
|
}
|
|
|
|
akURLActual, err := url.Parse(akURL)
|
|
if err != nil {
|
|
fmt.Println(err)
|
|
fmt.Println(helpMessage)
|
|
os.Exit(1)
|
|
}
|
|
|
|
ex := common.Init()
|
|
defer common.Defer()
|
|
|
|
ac := ak.NewAPIController(*akURLActual, akToken)
|
|
|
|
ac.Server = proxyv2.NewProxyServer(ac)
|
|
|
|
err = ac.Start()
|
|
if err != nil {
|
|
log.WithError(err).Panic("Failed to run server")
|
|
}
|
|
|
|
for {
|
|
<-ex
|
|
ac.Shutdown()
|
|
os.Exit(0)
|
|
}
|
|
}
|