mirror of
https://github.com/steveiliop56/tinyauth.git
synced 2026-03-14 18:52:05 +00:00
Compare commits
4 Commits
feat/proxy
...
refactor/p
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
b98fa34110 | ||
|
|
1c7ef9693d | ||
|
|
134befe72f | ||
|
|
fdcb253072 |
@@ -17,18 +17,16 @@ import (
|
|||||||
"github.com/google/go-querystring/query"
|
"github.com/google/go-querystring/query"
|
||||||
)
|
)
|
||||||
|
|
||||||
type RequestType int
|
type AuthModuleType int
|
||||||
|
|
||||||
const (
|
const (
|
||||||
AuthRequest RequestType = iota
|
AuthRequest AuthModuleType = iota
|
||||||
ExtAuthz
|
ExtAuthz
|
||||||
ForwardAuth
|
ForwardAuth
|
||||||
)
|
)
|
||||||
|
|
||||||
var BrowserUserAgentRegex = regexp.MustCompile("Chrome|Gecko|AppleWebKit|Opera|Edge")
|
var BrowserUserAgentRegex = regexp.MustCompile("Chrome|Gecko|AppleWebKit|Opera|Edge")
|
||||||
|
|
||||||
var SupportedProxies = []string{"nginx", "traefik", "caddy", "envoy"}
|
|
||||||
|
|
||||||
type Proxy struct {
|
type Proxy struct {
|
||||||
Proxy string `uri:"proxy" binding:"required"`
|
Proxy string `uri:"proxy" binding:"required"`
|
||||||
}
|
}
|
||||||
@@ -38,7 +36,7 @@ type ProxyContext struct {
|
|||||||
Proto string
|
Proto string
|
||||||
Path string
|
Path string
|
||||||
Method string
|
Method string
|
||||||
Type RequestType
|
Type AuthModuleType
|
||||||
IsBrowser bool
|
IsBrowser bool
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -339,12 +337,10 @@ func (controller *ProxyController) getForwardAuthContext(c *gin.Context) (ProxyC
|
|||||||
return ProxyContext{}, errors.New("x-forwarded-proto not found")
|
return ProxyContext{}, errors.New("x-forwarded-proto not found")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Normally we should only allow GET for forward auth but since it's a fallback
|
||||||
|
// for envoy we should allow everything, not a big deal
|
||||||
method := c.Request.Method
|
method := c.Request.Method
|
||||||
|
|
||||||
if method != http.MethodGet {
|
|
||||||
return ProxyContext{}, errors.New("method not allowed")
|
|
||||||
}
|
|
||||||
|
|
||||||
return ProxyContext{
|
return ProxyContext{
|
||||||
Host: host,
|
Host: host,
|
||||||
Proto: proto,
|
Proto: proto,
|
||||||
@@ -368,14 +364,20 @@ func (controller *ProxyController) getAuthRequestContext(c *gin.Context) (ProxyC
|
|||||||
}
|
}
|
||||||
|
|
||||||
host := url.Host
|
host := url.Host
|
||||||
|
|
||||||
|
if strings.TrimSpace(host) == "" {
|
||||||
|
return ProxyContext{}, errors.New("host not found")
|
||||||
|
}
|
||||||
|
|
||||||
proto := url.Scheme
|
proto := url.Scheme
|
||||||
|
|
||||||
|
if strings.TrimSpace(proto) == "" {
|
||||||
|
return ProxyContext{}, errors.New("proto not found")
|
||||||
|
}
|
||||||
|
|
||||||
path := url.Path
|
path := url.Path
|
||||||
method := c.Request.Method
|
method := c.Request.Method
|
||||||
|
|
||||||
if method != http.MethodGet {
|
|
||||||
return ProxyContext{}, errors.New("method not allowed")
|
|
||||||
}
|
|
||||||
|
|
||||||
return ProxyContext{
|
return ProxyContext{
|
||||||
Host: host,
|
Host: host,
|
||||||
Proto: proto,
|
Proto: proto,
|
||||||
@@ -386,19 +388,22 @@ func (controller *ProxyController) getAuthRequestContext(c *gin.Context) (ProxyC
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (controller *ProxyController) getExtAuthzContext(c *gin.Context) (ProxyContext, error) {
|
func (controller *ProxyController) getExtAuthzContext(c *gin.Context) (ProxyContext, error) {
|
||||||
|
// We hope for the someone to set the x-forwarded-proto header
|
||||||
proto, ok := controller.getHeader(c, "x-forwarded-proto")
|
proto, ok := controller.getHeader(c, "x-forwarded-proto")
|
||||||
|
|
||||||
if !ok {
|
if !ok {
|
||||||
return ProxyContext{}, errors.New("x-forwarded-proto not found")
|
return ProxyContext{}, errors.New("x-forwarded-proto not found")
|
||||||
}
|
}
|
||||||
|
|
||||||
host, ok := controller.getHeader(c, "host")
|
// It sets the host to the original host, not the forwarded host
|
||||||
|
host := c.Request.Host
|
||||||
|
|
||||||
if !ok {
|
if strings.TrimSpace(host) == "" {
|
||||||
return ProxyContext{}, errors.New("host not found")
|
return ProxyContext{}, errors.New("host not found")
|
||||||
}
|
}
|
||||||
|
|
||||||
// Seems like we can't get the path?
|
// We get the path from the query string
|
||||||
|
path := c.Query("path")
|
||||||
|
|
||||||
// For envoy we need to support every method
|
// For envoy we need to support every method
|
||||||
method := c.Request.Method
|
method := c.Request.Method
|
||||||
@@ -406,11 +411,49 @@ func (controller *ProxyController) getExtAuthzContext(c *gin.Context) (ProxyCont
|
|||||||
return ProxyContext{
|
return ProxyContext{
|
||||||
Host: host,
|
Host: host,
|
||||||
Proto: proto,
|
Proto: proto,
|
||||||
|
Path: path,
|
||||||
Method: method,
|
Method: method,
|
||||||
Type: ExtAuthz,
|
Type: ExtAuthz,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (controller *ProxyController) determineAuthModules(proxy string) []AuthModuleType {
|
||||||
|
switch proxy {
|
||||||
|
case "traefik", "caddy":
|
||||||
|
return []AuthModuleType{ForwardAuth}
|
||||||
|
case "envoy":
|
||||||
|
return []AuthModuleType{ExtAuthz, ForwardAuth}
|
||||||
|
case "nginx":
|
||||||
|
return []AuthModuleType{AuthRequest, ForwardAuth}
|
||||||
|
default:
|
||||||
|
return []AuthModuleType{}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (controller *ProxyController) getContextFromAuthModule(c *gin.Context, module AuthModuleType) (ProxyContext, error) {
|
||||||
|
switch module {
|
||||||
|
case ForwardAuth:
|
||||||
|
ctx, err := controller.getForwardAuthContext(c)
|
||||||
|
if err != nil {
|
||||||
|
return ProxyContext{}, err
|
||||||
|
}
|
||||||
|
return ctx, nil
|
||||||
|
case ExtAuthz:
|
||||||
|
ctx, err := controller.getExtAuthzContext(c)
|
||||||
|
if err != nil {
|
||||||
|
return ProxyContext{}, err
|
||||||
|
}
|
||||||
|
return ctx, nil
|
||||||
|
case AuthRequest:
|
||||||
|
ctx, err := controller.getAuthRequestContext(c)
|
||||||
|
if err != nil {
|
||||||
|
return ProxyContext{}, err
|
||||||
|
}
|
||||||
|
return ctx, nil
|
||||||
|
}
|
||||||
|
return ProxyContext{}, fmt.Errorf("unsupported auth module: %v", module)
|
||||||
|
}
|
||||||
|
|
||||||
func (controller *ProxyController) getProxyContext(c *gin.Context) (ProxyContext, error) {
|
func (controller *ProxyController) getProxyContext(c *gin.Context) (ProxyContext, error) {
|
||||||
var req Proxy
|
var req Proxy
|
||||||
|
|
||||||
@@ -419,44 +462,28 @@ func (controller *ProxyController) getProxyContext(c *gin.Context) (ProxyContext
|
|||||||
return ProxyContext{}, err
|
return ProxyContext{}, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
tlog.App.Debug().Msgf("Proxy: %v", req.Proxy)
|
||||||
|
|
||||||
|
authModules := controller.determineAuthModules(req.Proxy)
|
||||||
|
|
||||||
|
if len(authModules) == 0 {
|
||||||
|
return ProxyContext{}, fmt.Errorf("no auth modules supported for proxy: %v", req.Proxy)
|
||||||
|
}
|
||||||
|
|
||||||
var ctx ProxyContext
|
var ctx ProxyContext
|
||||||
|
|
||||||
switch req.Proxy {
|
for _, module := range authModules {
|
||||||
// For nginx we need to handle both forward_auth and auth_request extraction since it can be
|
tlog.App.Debug().Msgf("Trying auth module: %v", module)
|
||||||
// used either with something line nginx proxy manager with advanced config or with
|
ctx, err = controller.getContextFromAuthModule(c, module)
|
||||||
// the kubernetes ingress controller
|
|
||||||
case "nginx":
|
|
||||||
tlog.App.Debug().Str("proxy", req.Proxy).Msg("Attempting forward_auth compatible extraction")
|
|
||||||
forwardAuthCtx, err := controller.getForwardAuthContext(c)
|
|
||||||
if err == nil {
|
if err == nil {
|
||||||
tlog.App.Debug().Str("proxy", req.Proxy).Msg("Extractions success using forward_auth")
|
tlog.App.Debug().Msgf("Auth module %v succeeded", module)
|
||||||
ctx = forwardAuthCtx
|
break
|
||||||
} else {
|
|
||||||
tlog.App.Debug().Str("proxy", req.Proxy).Msg("Extractions failed using forward_auth trying with auth_request")
|
|
||||||
authRequestCtx, err := controller.getAuthRequestContext(c)
|
|
||||||
if err != nil {
|
|
||||||
tlog.App.Warn().Str("proxy", req.Proxy).Msg("Failed to determine required module for header extraction")
|
|
||||||
return ProxyContext{}, err
|
|
||||||
}
|
|
||||||
ctx = authRequestCtx
|
|
||||||
}
|
}
|
||||||
case "envoy":
|
tlog.App.Debug().Err(err).Msgf("Auth module %v failed", module)
|
||||||
tlog.App.Debug().Str("proxy", req.Proxy).Msg("Attempting ext_authz compatible extraction")
|
}
|
||||||
extAuthzCtx, err := controller.getExtAuthzContext(c)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
tlog.App.Warn().Str("proxy", req.Proxy).Msg("Failed to determine required module for header extraction")
|
return ProxyContext{}, err
|
||||||
return ProxyContext{}, err
|
|
||||||
}
|
|
||||||
ctx = extAuthzCtx
|
|
||||||
// By default we fallback to the forward_auth module which supports most proxies like traefik or caddy
|
|
||||||
default:
|
|
||||||
tlog.App.Debug().Str("proxy", req.Proxy).Msg("Attempting forward_auth compatible extraction")
|
|
||||||
forwardAuthCtx, err := controller.getForwardAuthContext(c)
|
|
||||||
if err != nil {
|
|
||||||
tlog.App.Warn().Str("proxy", req.Proxy).Msg("Failed to determine required module for header extraction")
|
|
||||||
return ProxyContext{}, err
|
|
||||||
}
|
|
||||||
ctx = forwardAuthCtx
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// We don't care if the header is empty, we will just assume it's not a browser
|
// We don't care if the header is empty, we will just assume it's not a browser
|
||||||
@@ -464,9 +491,9 @@ func (controller *ProxyController) getProxyContext(c *gin.Context) (ProxyContext
|
|||||||
isBrowser := BrowserUserAgentRegex.MatchString(userAgent)
|
isBrowser := BrowserUserAgentRegex.MatchString(userAgent)
|
||||||
|
|
||||||
if isBrowser {
|
if isBrowser {
|
||||||
tlog.App.Debug().Msg("Request identified as (most likely) coming from a browser")
|
tlog.App.Debug().Msg("Request identified as coming from a browser")
|
||||||
} else {
|
} else {
|
||||||
tlog.App.Debug().Msg("Request identified as (most likely) coming from a non-browser client")
|
tlog.App.Debug().Msg("Request identified as coming from a non-browser client")
|
||||||
}
|
}
|
||||||
|
|
||||||
ctx.IsBrowser = isBrowser
|
ctx.IsBrowser = isBrowser
|
||||||
|
|||||||
@@ -1,6 +1,7 @@
|
|||||||
package controller_test
|
package controller_test
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"net/http"
|
||||||
"net/http/httptest"
|
"net/http/httptest"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
@@ -9,21 +10,26 @@ import (
|
|||||||
"github.com/steveiliop56/tinyauth/internal/controller"
|
"github.com/steveiliop56/tinyauth/internal/controller"
|
||||||
"github.com/steveiliop56/tinyauth/internal/repository"
|
"github.com/steveiliop56/tinyauth/internal/repository"
|
||||||
"github.com/steveiliop56/tinyauth/internal/service"
|
"github.com/steveiliop56/tinyauth/internal/service"
|
||||||
"github.com/steveiliop56/tinyauth/internal/utils/tlog"
|
|
||||||
|
|
||||||
"github.com/gin-gonic/gin"
|
"github.com/gin-gonic/gin"
|
||||||
"gotest.tools/v3/assert"
|
"gotest.tools/v3/assert"
|
||||||
)
|
)
|
||||||
|
|
||||||
func setupProxyController(t *testing.T, middlewares *[]gin.HandlerFunc) (*gin.Engine, *httptest.ResponseRecorder, *service.AuthService) {
|
var loggedInCtx = config.UserContext{
|
||||||
tlog.NewSimpleLogger().Init()
|
Username: "test",
|
||||||
|
Name: "Test",
|
||||||
|
Email: "test@example.com",
|
||||||
|
IsLoggedIn: true,
|
||||||
|
Provider: "local",
|
||||||
|
}
|
||||||
|
|
||||||
|
func setupProxyController(t *testing.T, middlewares []gin.HandlerFunc) (*gin.Engine, *httptest.ResponseRecorder) {
|
||||||
// Setup
|
// Setup
|
||||||
gin.SetMode(gin.TestMode)
|
gin.SetMode(gin.TestMode)
|
||||||
router := gin.Default()
|
router := gin.Default()
|
||||||
|
|
||||||
if middlewares != nil {
|
if len(middlewares) > 0 {
|
||||||
for _, m := range *middlewares {
|
for _, m := range middlewares {
|
||||||
router.Use(m)
|
router.Use(m)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -48,7 +54,13 @@ func setupProxyController(t *testing.T, middlewares *[]gin.HandlerFunc) (*gin.En
|
|||||||
assert.NilError(t, dockerService.Init())
|
assert.NilError(t, dockerService.Init())
|
||||||
|
|
||||||
// Access controls
|
// Access controls
|
||||||
accessControlsService := service.NewAccessControlsService(dockerService, map[string]config.App{})
|
accessControlsService := service.NewAccessControlsService(dockerService, map[string]config.App{
|
||||||
|
"whoami": {
|
||||||
|
Path: config.AppPath{
|
||||||
|
Allow: "/allow",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
assert.NilError(t, accessControlsService.Init())
|
assert.NilError(t, accessControlsService.Init())
|
||||||
|
|
||||||
@@ -77,107 +89,214 @@ func setupProxyController(t *testing.T, middlewares *[]gin.HandlerFunc) (*gin.En
|
|||||||
|
|
||||||
// Controller
|
// Controller
|
||||||
ctrl := controller.NewProxyController(controller.ProxyControllerConfig{
|
ctrl := controller.NewProxyController(controller.ProxyControllerConfig{
|
||||||
AppURL: "http://localhost:8080",
|
AppURL: "http://tinyauth.example.com",
|
||||||
}, group, accessControlsService, authService)
|
}, group, accessControlsService, authService)
|
||||||
ctrl.SetupRoutes()
|
ctrl.SetupRoutes()
|
||||||
|
|
||||||
return router, recorder, authService
|
return router, recorder
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO: Needs tests for context middleware
|
// TODO: Needs tests for context middleware
|
||||||
|
|
||||||
func TestProxyHandler(t *testing.T) {
|
func TestProxyHandler(t *testing.T) {
|
||||||
// Setup
|
// Test logged out user traefik/caddy (forward_auth)
|
||||||
router, recorder, _ := setupProxyController(t, nil)
|
router, recorder := setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "/api/auth/traefik", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-forwarded-host", "whoami.example.com")
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
req.Header.Set("x-forwarded-uri", "/")
|
||||||
|
|
||||||
// Test invalid proxy
|
|
||||||
req := httptest.NewRequest("GET", "/api/auth/invalidproxy", nil)
|
|
||||||
router.ServeHTTP(recorder, req)
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusUnauthorized)
|
||||||
|
|
||||||
assert.Equal(t, 400, recorder.Code)
|
// Test logged out user nginx (auth_request)
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/nginx", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-original-url", "http://whoami.example.com/")
|
||||||
|
|
||||||
// Test invalid method for non-envoy proxy
|
|
||||||
recorder = httptest.NewRecorder()
|
|
||||||
req = httptest.NewRequest("POST", "/api/auth/traefik", nil)
|
|
||||||
router.ServeHTTP(recorder, req)
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusUnauthorized)
|
||||||
|
|
||||||
assert.Equal(t, 405, recorder.Code)
|
// Test logged out user envoy (ext_authz)
|
||||||
assert.Equal(t, "GET", recorder.Header().Get("Allow"))
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/envoy?path=/", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Host = "whoami.example.com"
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
|
||||||
// Test logged out user (traefik/caddy)
|
|
||||||
recorder = httptest.NewRecorder()
|
|
||||||
req = httptest.NewRequest("GET", "/api/auth/traefik", nil)
|
|
||||||
req.Header.Set("X-Forwarded-Proto", "https")
|
|
||||||
req.Header.Set("X-Forwarded-Host", "example.com")
|
|
||||||
req.Header.Set("X-Forwarded-Uri", "/somepath")
|
|
||||||
req.Header.Set("Accept", "text/html")
|
|
||||||
router.ServeHTTP(recorder, req)
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusUnauthorized)
|
||||||
|
|
||||||
assert.Equal(t, 307, recorder.Code)
|
// Test logged in user traefik/caddy (forward_auth)
|
||||||
assert.Equal(t, "http://localhost:8080/login?redirect_uri=https%3A%2F%2Fexample.com%2Fsomepath", recorder.Header().Get("Location"))
|
router, recorder = setupProxyController(t, []gin.HandlerFunc{
|
||||||
|
|
||||||
// Test logged out user (envoy - POST method)
|
|
||||||
recorder = httptest.NewRecorder()
|
|
||||||
req = httptest.NewRequest("POST", "/api/auth/envoy", nil)
|
|
||||||
req.Header.Set("X-Forwarded-Proto", "https")
|
|
||||||
req.Header.Set("X-Forwarded-Host", "example.com")
|
|
||||||
req.Header.Set("X-Forwarded-Uri", "/somepath")
|
|
||||||
req.Header.Set("Accept", "text/html")
|
|
||||||
router.ServeHTTP(recorder, req)
|
|
||||||
|
|
||||||
assert.Equal(t, 307, recorder.Code)
|
|
||||||
assert.Equal(t, "http://localhost:8080/login?redirect_uri=https%3A%2F%2Fexample.com%2Fsomepath", recorder.Header().Get("Location"))
|
|
||||||
|
|
||||||
// Test logged out user (envoy - DELETE method)
|
|
||||||
recorder = httptest.NewRecorder()
|
|
||||||
req = httptest.NewRequest("DELETE", "/api/auth/envoy", nil)
|
|
||||||
req.Header.Set("X-Forwarded-Proto", "https")
|
|
||||||
req.Header.Set("X-Forwarded-Host", "example.com")
|
|
||||||
req.Header.Set("X-Forwarded-Uri", "/somepath")
|
|
||||||
req.Header.Set("Accept", "text/html")
|
|
||||||
router.ServeHTTP(recorder, req)
|
|
||||||
|
|
||||||
assert.Equal(t, 307, recorder.Code)
|
|
||||||
assert.Equal(t, "http://localhost:8080/login?redirect_uri=https%3A%2F%2Fexample.com%2Fsomepath", recorder.Header().Get("Location"))
|
|
||||||
|
|
||||||
// Test logged out user (nginx)
|
|
||||||
recorder = httptest.NewRecorder()
|
|
||||||
req = httptest.NewRequest("GET", "/api/auth/nginx", nil)
|
|
||||||
req.Header.Set("X-Forwarded-Proto", "https")
|
|
||||||
req.Header.Set("X-Forwarded-Host", "example.com")
|
|
||||||
// we won't set X-Forwarded-Uri to test that the controller can work without it
|
|
||||||
router.ServeHTTP(recorder, req)
|
|
||||||
|
|
||||||
assert.Equal(t, 401, recorder.Code)
|
|
||||||
|
|
||||||
// Test logged in user
|
|
||||||
router, recorder, _ = setupProxyController(t, &[]gin.HandlerFunc{
|
|
||||||
func(c *gin.Context) {
|
func(c *gin.Context) {
|
||||||
c.Set("context", &config.UserContext{
|
c.Set("context", &loggedInCtx)
|
||||||
Username: "testuser",
|
|
||||||
Name: "testuser",
|
|
||||||
Email: "testuser@example.com",
|
|
||||||
IsLoggedIn: true,
|
|
||||||
OAuth: false,
|
|
||||||
Provider: "local",
|
|
||||||
TotpPending: false,
|
|
||||||
OAuthGroups: "",
|
|
||||||
TotpEnabled: false,
|
|
||||||
})
|
|
||||||
c.Next()
|
c.Next()
|
||||||
},
|
},
|
||||||
})
|
})
|
||||||
|
|
||||||
req = httptest.NewRequest("GET", "/api/auth/traefik", nil)
|
req, err = http.NewRequest("GET", "/api/auth/traefik", nil)
|
||||||
req.Header.Set("X-Forwarded-Proto", "https")
|
assert.NilError(t, err)
|
||||||
req.Header.Set("X-Forwarded-Host", "example.com")
|
|
||||||
req.Header.Set("X-Original-Uri", "/somepath") // Test with original URI for kubernetes ingress
|
req.Header.Set("x-forwarded-host", "whoami.example.com")
|
||||||
req.Header.Set("Accept", "text/html")
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
req.Header.Set("x-forwarded-uri", "/")
|
||||||
|
|
||||||
router.ServeHTTP(recorder, req)
|
router.ServeHTTP(recorder, req)
|
||||||
assert.Equal(t, 200, recorder.Code)
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
assert.Equal(t, "testuser", recorder.Header().Get("Remote-User"))
|
// Test logged in user nginx (auth_request)
|
||||||
assert.Equal(t, "testuser", recorder.Header().Get("Remote-Name"))
|
router, recorder = setupProxyController(t, []gin.HandlerFunc{
|
||||||
assert.Equal(t, "testuser@example.com", recorder.Header().Get("Remote-Email"))
|
func(c *gin.Context) {
|
||||||
|
c.Set("context", &loggedInCtx)
|
||||||
|
c.Next()
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/nginx", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-original-url", "http://whoami.example.com/")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
|
// Test logged in user envoy (ext_authz)
|
||||||
|
router, recorder = setupProxyController(t, []gin.HandlerFunc{
|
||||||
|
func(c *gin.Context) {
|
||||||
|
c.Set("context", &loggedInCtx)
|
||||||
|
c.Next()
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/envoy?path=/", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Host = "whoami.example.com"
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
|
// Test ACL allow caddy/traefik (forward_auth)
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/traefik", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-forwarded-host", "whoami.example.com")
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
req.Header.Set("x-forwarded-uri", "/allow")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
|
// Test ACL allow nginx
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/nginx", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-original-url", "http://whoami.example.com/allow")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
|
// Test ACL allow envoy
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/envoy?path=/allow", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Host = "whoami.example.com"
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
|
// Test traefik/caddy (forward_auth) without required headers
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/traefik", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusBadRequest)
|
||||||
|
|
||||||
|
// Test nginx (forward_auth) without required headers
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/nginx", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusBadRequest)
|
||||||
|
|
||||||
|
// Test envoy (forward_auth) without required headers
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/envoy", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusBadRequest)
|
||||||
|
|
||||||
|
// Test nginx (auth_request) with forward_auth fallback with ACLs
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/nginx", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-forwarded-host", "whoami.example.com")
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
req.Header.Set("x-forwarded-uri", "/allow")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
|
// Test envoy (ext_authz) with forward_auth fallback with ACLs
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/envoy", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-forwarded-host", "whoami.example.com")
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
req.Header.Set("x-forwarded-uri", "/allow")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
|
// Test envoy (ext_authz) with empty path
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/envoy", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Host = "whoami.example.com"
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusUnauthorized)
|
||||||
|
|
||||||
|
// Ensure forward_auth fallback works with path (should ignore)
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/traefik?path=/allow", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
req.Header.Set("x-forwarded-host", "whoami.example.com")
|
||||||
|
req.Header.Set("x-forwarded-uri", "/allow")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user