mirror of
https://github.com/pomerium/pomerium.git
synced 2025-05-20 12:37:16 +02:00
remove forward auth (#3628)
This commit is contained in:
parent
ba07afc245
commit
fa26587f19
68 changed files with 302 additions and 5072 deletions
|
@ -222,14 +222,6 @@ type Options struct {
|
|||
GRPCClientTimeout time.Duration `mapstructure:"grpc_client_timeout" yaml:"grpc_client_timeout,omitempty"`
|
||||
GRPCClientDNSRoundRobin bool `mapstructure:"grpc_client_dns_roundrobin" yaml:"grpc_client_dns_roundrobin,omitempty"`
|
||||
|
||||
// ForwardAuthEndpoint allows for a given route to be used as a forward-auth
|
||||
// endpoint instead of a reverse proxy. Some third-party proxies that do not
|
||||
// have rich access control capabilities (nginx, envoy, ambassador, traefik)
|
||||
// allow you to delegate and authenticate each request to your website
|
||||
// with an external server or service. Pomerium can be configured to accept
|
||||
// these requests with this switch
|
||||
ForwardAuthURLString string `mapstructure:"forward_auth_url" yaml:"forward_auth_url,omitempty"`
|
||||
|
||||
// DataBrokerURLString is the routable destination of the databroker service's gRPC endpoint.
|
||||
DataBrokerURLString string `mapstructure:"databroker_service_url" yaml:"databroker_service_url,omitempty"`
|
||||
DataBrokerURLStrings []string `mapstructure:"databroker_service_urls" yaml:"databroker_service_urls,omitempty"`
|
||||
|
@ -602,13 +594,6 @@ func (o *Options) Validate() error {
|
|||
}
|
||||
}
|
||||
|
||||
if o.ForwardAuthURLString != "" {
|
||||
_, err := urlutil.ParseAndValidateURL(o.ForwardAuthURLString)
|
||||
if err != nil {
|
||||
return fmt.Errorf("config: bad forward-auth-url %s : %w", o.ForwardAuthURLString, err)
|
||||
}
|
||||
}
|
||||
|
||||
if o.PolicyFile != "" {
|
||||
return errors.New("config: policy file setting is deprecated")
|
||||
}
|
||||
|
@ -823,15 +808,6 @@ func (o *Options) getURLs(strs ...string) ([]*url.URL, error) {
|
|||
return urls, nil
|
||||
}
|
||||
|
||||
// GetForwardAuthURL returns the ForwardAuthURL.
|
||||
func (o *Options) GetForwardAuthURL() (*url.URL, error) {
|
||||
rawurl := o.ForwardAuthURLString
|
||||
if rawurl == "" {
|
||||
return nil, nil
|
||||
}
|
||||
return urlutil.ParseAndValidateURL(rawurl)
|
||||
}
|
||||
|
||||
// GetGRPCAddr gets the gRPC address.
|
||||
func (o *Options) GetGRPCAddr() string {
|
||||
// to avoid port collision when running on localhost
|
||||
|
@ -1114,11 +1090,6 @@ func (o *Options) GetAllRouteableHTTPDomains() ([]string, error) {
|
|||
// GetAllRouteableHTTPDomainsForTLSServerName returns all the possible HTTP domains handled by the Pomerium options
|
||||
// for the given TLS server name.
|
||||
func (o *Options) GetAllRouteableHTTPDomainsForTLSServerName(tlsServerName string) ([]string, error) {
|
||||
forwardAuthURL, err := o.GetForwardAuthURL()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
domains := sets.NewSorted[string]()
|
||||
if IsAuthenticate(o.Services) {
|
||||
authenticateURL, err := o.GetInternalAuthenticateURL()
|
||||
|
@ -1162,13 +1133,6 @@ func (o *Options) GetAllRouteableHTTPDomainsForTLSServerName(tlsServerName strin
|
|||
}
|
||||
}
|
||||
}
|
||||
if forwardAuthURL != nil {
|
||||
for _, h := range urlutil.GetDomainsForURL(*forwardAuthURL) {
|
||||
if tlsServerName == "" || urlutil.StripPort(h) == tlsServerName {
|
||||
domains.Add(h)
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return domains.ToSlice(), nil
|
||||
|
@ -1457,9 +1421,6 @@ func (o *Options) ApplySettings(ctx context.Context, settings *config.Settings)
|
|||
if settings.GrpcInsecure != nil {
|
||||
o.GRPCInsecure = settings.GetGrpcInsecure()
|
||||
}
|
||||
if settings.ForwardAuthUrl != nil {
|
||||
o.ForwardAuthURLString = settings.GetForwardAuthUrl()
|
||||
}
|
||||
if len(settings.DatabrokerServiceUrls) > 0 {
|
||||
o.DataBrokerURLStrings = settings.GetDatabrokerServiceUrls()
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue