mirror of
https://github.com/goauthentik/authentik
synced 2026-04-27 09:57:31 +02:00
* packages/client-go: init Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * format Signed-off-by: Jens Langhammer <jens@goauthentik.io> * remove mod/sum Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix translate Signed-off-by: Jens Langhammer <jens@goauthentik.io> * no go replace Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update rust makefile with pwd Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix build Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix docs Signed-off-by: Jens Langhammer <jens@goauthentik.io> * don't need a version ig? Signed-off-by: Jens Langhammer <jens@goauthentik.io> * exclude go client from cspell Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix main docker build Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> Signed-off-by: Jens Langhammer <jens@goauthentik.io> Co-authored-by: Jens Langhammer <jens@goauthentik.io>
145 lines
4.8 KiB
Go
145 lines
4.8 KiB
Go
package application
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"net/url"
|
|
"testing"
|
|
|
|
"github.com/google/uuid"
|
|
"github.com/stretchr/testify/assert"
|
|
"goauthentik.io/internal/outpost/proxyv2/constants"
|
|
"goauthentik.io/internal/outpost/proxyv2/types"
|
|
api "goauthentik.io/packages/client-go"
|
|
)
|
|
|
|
func TestForwardHandleTraefik_Single_Blank(t *testing.T) {
|
|
a := newTestApplication()
|
|
req, _ := http.NewRequest("GET", "/outpost.goauthentik.io/auth/traefik", nil)
|
|
|
|
rr := httptest.NewRecorder()
|
|
a.forwardHandleTraefik(rr, req)
|
|
|
|
assert.Equal(t, http.StatusInternalServerError, rr.Code)
|
|
}
|
|
|
|
func TestForwardHandleTraefik_Single_Skip(t *testing.T) {
|
|
a := newTestApplication()
|
|
req, _ := http.NewRequest("GET", "/outpost.goauthentik.io/auth/traefik", nil)
|
|
req.Header.Set("X-Forwarded-Proto", "http")
|
|
req.Header.Set("X-Forwarded-Host", "test.goauthentik.io")
|
|
req.Header.Set("X-Forwarded-Uri", "/skip")
|
|
|
|
rr := httptest.NewRecorder()
|
|
a.forwardHandleTraefik(rr, req)
|
|
|
|
assert.Equal(t, http.StatusOK, rr.Code)
|
|
}
|
|
|
|
func TestForwardHandleTraefik_Single_Headers(t *testing.T) {
|
|
a := newTestApplication()
|
|
req, _ := http.NewRequest("GET", "/outpost.goauthentik.io/auth/traefik", nil)
|
|
req.Header.Set("X-Forwarded-Proto", "http")
|
|
req.Header.Set("X-Forwarded-Host", "test.goauthentik.io")
|
|
req.Header.Set("X-Forwarded-Uri", "/app")
|
|
|
|
rr := httptest.NewRecorder()
|
|
a.forwardHandleTraefik(rr, req)
|
|
|
|
assert.Equal(t, http.StatusFound, rr.Code)
|
|
loc, st := a.assertState(t, req, rr)
|
|
shouldUrl := url.Values{
|
|
"client_id": []string{*a.proxyConfig.ClientId},
|
|
"redirect_uri": []string{"https://ext.t.goauthentik.io/outpost.goauthentik.io/callback?X-authentik-auth-callback=true"},
|
|
"response_type": []string{"code"},
|
|
}
|
|
assert.Equal(t, fmt.Sprintf("http://fake-auth.t.goauthentik.io/auth?%s", shouldUrl.Encode()), loc.String())
|
|
assert.Equal(t, "http://test.goauthentik.io/app", st.Redirect)
|
|
}
|
|
|
|
func TestForwardHandleTraefik_Single_Claims(t *testing.T) {
|
|
a := newTestApplication()
|
|
req, _ := http.NewRequest("GET", "/outpost.goauthentik.io/auth/traefik", nil)
|
|
req.Header.Set("X-Forwarded-Proto", "http")
|
|
req.Header.Set("X-Forwarded-Host", "test.goauthentik.io")
|
|
req.Header.Set("X-Forwarded-Uri", "/app")
|
|
|
|
rr := httptest.NewRecorder()
|
|
a.forwardHandleTraefik(rr, req)
|
|
|
|
s, _ := a.sessions.Get(req, a.SessionName())
|
|
s.ID = uuid.New().String()
|
|
s.Options.MaxAge = 86400
|
|
s.Values[constants.SessionClaims] = types.Claims{
|
|
Sub: "foo",
|
|
Proxy: &types.ProxyClaims{
|
|
UserAttributes: map[string]any{
|
|
"username": "foo",
|
|
"password": "bar",
|
|
"additionalHeaders": map[string]any{
|
|
"foo": "bar",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
err := a.sessions.Save(req, rr, s)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
rr = httptest.NewRecorder()
|
|
a.forwardHandleTraefik(rr, req)
|
|
|
|
h := rr.Result().Header
|
|
|
|
assert.Equal(t, []string{"Basic Zm9vOmJhcg=="}, h["Authorization"])
|
|
assert.Equal(t, []string{"bar"}, h["Foo"])
|
|
assert.Equal(t, []string{""}, h["User-Agent"])
|
|
assert.Equal(t, []string{""}, h["X-Authentik-Email"])
|
|
assert.Equal(t, []string{""}, h["X-Authentik-Groups"])
|
|
assert.Equal(t, []string{""}, h["X-Authentik-Jwt"])
|
|
assert.Equal(t, []string{""}, h["X-Authentik-Meta-App"])
|
|
assert.Equal(t, []string{""}, h["X-Authentik-Meta-Jwks"])
|
|
assert.Equal(t, []string{""}, h["X-Authentik-Meta-Outpost"])
|
|
assert.Equal(t, []string{""}, h["X-Authentik-Name"])
|
|
assert.Equal(t, []string{"foo"}, h["X-Authentik-Uid"])
|
|
assert.Equal(t, []string{""}, h["X-Authentik-Username"])
|
|
}
|
|
|
|
func TestForwardHandleTraefik_Domain_Blank(t *testing.T) {
|
|
a := newTestApplication()
|
|
a.proxyConfig.Mode = api.PROXYMODE_FORWARD_DOMAIN.Ptr()
|
|
a.proxyConfig.CookieDomain = new("foo")
|
|
req, _ := http.NewRequest("GET", "/outpost.goauthentik.io/auth/traefik", nil)
|
|
|
|
rr := httptest.NewRecorder()
|
|
a.forwardHandleTraefik(rr, req)
|
|
|
|
assert.Equal(t, http.StatusInternalServerError, rr.Code)
|
|
}
|
|
|
|
func TestForwardHandleTraefik_Domain_Header(t *testing.T) {
|
|
a := newTestApplication()
|
|
a.proxyConfig.Mode = api.PROXYMODE_FORWARD_DOMAIN.Ptr()
|
|
a.proxyConfig.CookieDomain = new("foo")
|
|
a.proxyConfig.ExternalHost = "http://auth.test.goauthentik.io"
|
|
req, _ := http.NewRequest("GET", "/outpost.goauthentik.io/auth/traefik", nil)
|
|
req.Header.Set("X-Forwarded-Proto", "http")
|
|
req.Header.Set("X-Forwarded-Host", "test.goauthentik.io")
|
|
req.Header.Set("X-Forwarded-Uri", "/app")
|
|
|
|
rr := httptest.NewRecorder()
|
|
a.forwardHandleTraefik(rr, req)
|
|
|
|
assert.Equal(t, http.StatusFound, rr.Code)
|
|
loc, st := a.assertState(t, req, rr)
|
|
shouldUrl := url.Values{
|
|
"client_id": []string{*a.proxyConfig.ClientId},
|
|
"redirect_uri": []string{"https://ext.t.goauthentik.io/outpost.goauthentik.io/callback?X-authentik-auth-callback=true"},
|
|
"response_type": []string{"code"},
|
|
}
|
|
assert.Equal(t, fmt.Sprintf("http://fake-auth.t.goauthentik.io/auth?%s", shouldUrl.Encode()), loc.String())
|
|
assert.Equal(t, "http://test.goauthentik.io/app", st.Redirect)
|
|
}
|