mirror of
https://github.com/pomerium/pomerium.git
synced 2025-04-29 18:36:30 +02:00
268 lines
9.6 KiB
Go
268 lines
9.6 KiB
Go
package proxy // import "github.com/pomerium/pomerium/proxy"
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/pomerium/csrf"
|
|
|
|
"github.com/pomerium/pomerium/internal/config"
|
|
"github.com/pomerium/pomerium/internal/httputil"
|
|
"github.com/pomerium/pomerium/internal/log"
|
|
"github.com/pomerium/pomerium/internal/middleware"
|
|
"github.com/pomerium/pomerium/internal/sessions"
|
|
"github.com/pomerium/pomerium/internal/templates"
|
|
"github.com/pomerium/pomerium/internal/urlutil"
|
|
)
|
|
|
|
// Handler returns the proxy service's ServeMux
|
|
func (p *Proxy) Handler() http.Handler {
|
|
r := httputil.NewRouter().StrictSlash(true)
|
|
r.Use(middleware.ValidateHost(func(host string) bool {
|
|
_, ok := p.routeConfigs[host]
|
|
return ok
|
|
}))
|
|
r.Use(csrf.Protect(
|
|
p.cookieSecret,
|
|
csrf.Path("/"),
|
|
csrf.Domain(p.cookieDomain),
|
|
csrf.CookieName(fmt.Sprintf("%s_csrf", p.cookieName)),
|
|
csrf.ErrorHandler(http.HandlerFunc(httputil.CSRFFailureHandler)),
|
|
))
|
|
r.HandleFunc("/robots.txt", p.RobotsTxt)
|
|
// requires authN not authZ
|
|
r.Use(sessions.RetrieveSession(p.sessionStore))
|
|
r.Use(p.VerifySession)
|
|
r.HandleFunc("/.pomerium/", p.UserDashboard).Methods(http.MethodGet)
|
|
r.HandleFunc("/.pomerium/impersonate", p.Impersonate).Methods(http.MethodPost)
|
|
r.HandleFunc("/.pomerium/sign_out", p.SignOut).Methods(http.MethodGet, http.MethodPost)
|
|
r.HandleFunc("/.pomerium/refresh", p.ForceRefresh).Methods(http.MethodPost)
|
|
r.PathPrefix("/").HandlerFunc(p.Proxy)
|
|
return r
|
|
}
|
|
|
|
// VerifySession is the middleware used to enforce a valid authentication
|
|
// session state is attached to the users's request context.
|
|
func (p *Proxy) VerifySession(next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
state, err := sessions.FromContext(r.Context())
|
|
if err != nil {
|
|
log.Debug().Str("cause", err.Error()).Msg("proxy: re-authenticating due to session state error")
|
|
p.authenticate(w, r)
|
|
return
|
|
}
|
|
if err := state.Valid(); err != nil {
|
|
log.Debug().Str("cause", err.Error()).Msg("proxy: re-authenticating due to invalid session")
|
|
p.authenticate(w, r)
|
|
return
|
|
}
|
|
next.ServeHTTP(w, r)
|
|
})
|
|
}
|
|
|
|
// RobotsTxt sets the User-Agent header in the response to be "Disallow"
|
|
func (p *Proxy) RobotsTxt(w http.ResponseWriter, _ *http.Request) {
|
|
w.Header().Set("Content-Type", "text/plain; charset=utf-8")
|
|
w.Header().Set("X-Content-Type-Options", "nosniff")
|
|
w.WriteHeader(http.StatusOK)
|
|
fmt.Fprintf(w, "User-agent: *\nDisallow: /")
|
|
}
|
|
|
|
// SignOut redirects the request to the sign out url. It's the responsibility
|
|
// of the authenticate service to revoke the remote session and clear
|
|
// the local session state.
|
|
func (p *Proxy) SignOut(w http.ResponseWriter, r *http.Request) {
|
|
redirectURL := &url.URL{Scheme: "https", Host: r.Host, Path: "/"}
|
|
if uri, err := urlutil.ParseAndValidateURL(r.FormValue("redirect_uri")); err == nil && uri.String() != "" {
|
|
redirectURL = uri
|
|
}
|
|
uri := urlutil.SignedRedirectURL(p.SharedKey, p.authenticateSignoutURL, redirectURL)
|
|
http.Redirect(w, r, uri.String(), http.StatusFound)
|
|
}
|
|
|
|
// Authenticate begins the authenticate flow, encrypting the redirect url
|
|
// in a request to the provider's sign in endpoint.
|
|
func (p *Proxy) authenticate(w http.ResponseWriter, r *http.Request) {
|
|
uri := urlutil.SignedRedirectURL(p.SharedKey, p.authenticateSigninURL, urlutil.GetAbsoluteURL(r))
|
|
http.Redirect(w, r, uri.String(), http.StatusFound)
|
|
}
|
|
|
|
// shouldSkipAuthentication contains conditions for skipping authentication.
|
|
// Conditions should be few in number and have strong justifications.
|
|
func (p *Proxy) shouldSkipAuthentication(r *http.Request) bool {
|
|
policy, policyExists := p.policy(r)
|
|
|
|
if isCORSPreflight(r) && policyExists && policy.CORSAllowPreflight {
|
|
log.FromRequest(r).Debug().Msg("proxy: skipping authentication for valid CORS preflight request")
|
|
return true
|
|
}
|
|
|
|
if policyExists && policy.AllowPublicUnauthenticatedAccess {
|
|
log.FromRequest(r).Debug().Msg("proxy: skipping authentication for public route")
|
|
return true
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// isCORSPreflight inspects the request to see if this is a valid CORS preflight request.
|
|
// These checks are not exhaustive, because the proxied server should be verifying it as well.
|
|
//
|
|
// See https://www.html5rocks.com/static/images/cors_server_flowchart.png for more info.
|
|
func isCORSPreflight(r *http.Request) bool {
|
|
return r.Method == http.MethodOptions &&
|
|
r.Header.Get("Access-Control-Request-Method") != "" &&
|
|
r.Header.Get("Origin") != ""
|
|
}
|
|
|
|
// Proxy authenticates a request, either proxying the request if it is authenticated,
|
|
// or starting the authenticate service for validation if not.
|
|
func (p *Proxy) Proxy(w http.ResponseWriter, r *http.Request) {
|
|
route, ok := p.router(r)
|
|
if !ok {
|
|
httputil.ErrorResponse(w, r, httputil.Error("", http.StatusNotFound, nil))
|
|
return
|
|
}
|
|
|
|
if p.shouldSkipAuthentication(r) {
|
|
log.FromRequest(r).Debug().Msg("proxy: access control skipped")
|
|
route.ServeHTTP(w, r)
|
|
return
|
|
}
|
|
s, err := sessions.FromContext(r.Context())
|
|
if err != nil || s == nil {
|
|
log.Debug().Err(err).Msg("proxy: couldn't get session from context")
|
|
p.authenticate(w, r)
|
|
return
|
|
}
|
|
authorized, err := p.AuthorizeClient.Authorize(r.Context(), r.Host, s)
|
|
if err != nil {
|
|
httputil.ErrorResponse(w, r, err)
|
|
return
|
|
} else if !authorized {
|
|
httputil.ErrorResponse(w, r, httputil.Error(fmt.Sprintf("%s is not authorized for this route", s.RequestEmail()), http.StatusForbidden, nil))
|
|
return
|
|
}
|
|
r.Header.Set(HeaderUserID, s.User)
|
|
r.Header.Set(HeaderEmail, s.RequestEmail())
|
|
r.Header.Set(HeaderGroups, s.RequestGroups())
|
|
|
|
route.ServeHTTP(w, r)
|
|
}
|
|
|
|
// UserDashboard lets users investigate, and refresh their current session.
|
|
// It also contains certain administrative actions like user impersonation.
|
|
// Nota bene: This endpoint does authentication, not authorization.
|
|
func (p *Proxy) UserDashboard(w http.ResponseWriter, r *http.Request) {
|
|
session, err := sessions.FromContext(r.Context())
|
|
if err != nil {
|
|
httputil.ErrorResponse(w, r, err)
|
|
return
|
|
}
|
|
|
|
isAdmin, err := p.AuthorizeClient.IsAdmin(r.Context(), session)
|
|
if err != nil {
|
|
httputil.ErrorResponse(w, r, err)
|
|
return
|
|
}
|
|
//todo(bdd): make sign out redirect a configuration option so that
|
|
// admins can set to whatever their corporate homepage is
|
|
redirectURL := &url.URL{Scheme: "https", Host: r.Host, Path: "/"}
|
|
signoutURL := urlutil.SignedRedirectURL(p.SharedKey, p.authenticateSignoutURL, redirectURL)
|
|
templates.New().ExecuteTemplate(w, "dashboard.html", map[string]interface{}{
|
|
"Email": session.Email,
|
|
"User": session.User,
|
|
"Groups": session.Groups,
|
|
"RefreshDeadline": time.Until(session.RefreshDeadline).Round(time.Second).String(),
|
|
"SignoutURL": signoutURL.String(),
|
|
"IsAdmin": isAdmin,
|
|
"ImpersonateEmail": session.ImpersonateEmail,
|
|
"ImpersonateGroup": strings.Join(session.ImpersonateGroups, ","),
|
|
"csrfField": csrf.TemplateField(r),
|
|
})
|
|
}
|
|
|
|
// ForceRefresh redeems and extends an existing authenticated oidc session with
|
|
// the underlying identity provider. All session details including groups,
|
|
// timeouts, will be renewed.
|
|
func (p *Proxy) ForceRefresh(w http.ResponseWriter, r *http.Request) {
|
|
session, err := sessions.FromContext(r.Context())
|
|
if err != nil {
|
|
httputil.ErrorResponse(w, r, err)
|
|
return
|
|
}
|
|
iss, err := session.IssuedAt()
|
|
if err != nil {
|
|
httputil.ErrorResponse(w, r, err)
|
|
return
|
|
}
|
|
|
|
// reject a refresh if it's been less than the refresh cooldown to prevent abuse
|
|
if time.Since(iss) < p.refreshCooldown {
|
|
httputil.ErrorResponse(w, r,
|
|
httputil.Error(
|
|
fmt.Sprintf("Session must be %s old before refreshing", p.refreshCooldown),
|
|
http.StatusBadRequest, nil))
|
|
return
|
|
}
|
|
session.ForceRefresh()
|
|
if err = p.sessionStore.SaveSession(w, r, session); err != nil {
|
|
httputil.ErrorResponse(w, r, err)
|
|
return
|
|
}
|
|
http.Redirect(w, r, "/.pomerium", http.StatusFound)
|
|
}
|
|
|
|
// Impersonate takes the result of a form and adds user impersonation details
|
|
// to the user's current user sessions state if the user is currently an
|
|
// administrative user. Requests are redirected back to the user dashboard.
|
|
func (p *Proxy) Impersonate(w http.ResponseWriter, r *http.Request) {
|
|
session, err := sessions.FromContext(r.Context())
|
|
if err != nil {
|
|
httputil.ErrorResponse(w, r, err)
|
|
return
|
|
}
|
|
isAdmin, err := p.AuthorizeClient.IsAdmin(r.Context(), session)
|
|
if err != nil || !isAdmin {
|
|
httputil.ErrorResponse(w, r, httputil.Error(fmt.Sprintf("%s is not an administrator", session.RequestEmail()), http.StatusForbidden, err))
|
|
return
|
|
}
|
|
// OK to impersonation
|
|
session.ImpersonateEmail = r.FormValue("email")
|
|
session.ImpersonateGroups = strings.Split(r.FormValue("group"), ",")
|
|
groups := r.FormValue("group")
|
|
if groups != "" {
|
|
session.ImpersonateGroups = strings.Split(groups, ",")
|
|
}
|
|
if err := p.sessionStore.SaveSession(w, r, session); err != nil {
|
|
httputil.ErrorResponse(w, r, err)
|
|
return
|
|
}
|
|
|
|
http.Redirect(w, r, "/.pomerium", http.StatusFound)
|
|
}
|
|
|
|
// router attempts to find a route for a request. If a route is successfully matched,
|
|
// it returns the route information and a bool value of `true`. If a route can
|
|
// not be matched, a nil value for the route and false bool value is returned.
|
|
func (p *Proxy) router(r *http.Request) (http.Handler, bool) {
|
|
config, ok := p.routeConfigs[r.Host]
|
|
if ok {
|
|
return config.mux, true
|
|
}
|
|
return nil, false
|
|
}
|
|
|
|
// policy attempts to find a policy for a request. If a policy is successfully matched,
|
|
// it returns the policy information and a bool value of `true`. If a policy can not be matched,
|
|
// a nil value for the policy and false bool value is returned.
|
|
func (p *Proxy) policy(r *http.Request) (*config.Policy, bool) {
|
|
config, ok := p.routeConfigs[r.Host]
|
|
if ok {
|
|
return &config.policy, true
|
|
}
|
|
return nil, false
|
|
}
|