2012-12-11 04:59:23 +03:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2012-12-17 21:38:33 +03:00
|
|
|
"fmt"
|
2019-03-20 15:44:51 +02:00
|
|
|
"math/rand"
|
2020-06-12 19:18:41 +02:00
|
|
|
"net"
|
2014-08-07 23:16:39 +03:00
|
|
|
"os"
|
2020-04-04 17:12:38 +02:00
|
|
|
"os/signal"
|
2015-03-20 05:03:00 +02:00
|
|
|
"runtime"
|
2020-04-04 17:12:38 +02:00
|
|
|
"syscall"
|
2014-11-08 20:26:55 +02:00
|
|
|
"time"
|
2012-12-11 04:59:23 +03:00
|
|
|
|
2020-06-14 21:58:44 +02:00
|
|
|
"github.com/justinas/alice"
|
2020-04-13 12:34:25 +02:00
|
|
|
"github.com/oauth2-proxy/oauth2-proxy/pkg/apis/options"
|
2020-03-29 15:54:36 +02:00
|
|
|
"github.com/oauth2-proxy/oauth2-proxy/pkg/logger"
|
2020-06-14 21:58:44 +02:00
|
|
|
"github.com/oauth2-proxy/oauth2-proxy/pkg/middleware"
|
2020-04-13 14:50:34 +02:00
|
|
|
"github.com/oauth2-proxy/oauth2-proxy/pkg/validation"
|
2012-12-11 04:59:23 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
func main() {
|
2019-02-10 18:37:45 +02:00
|
|
|
logger.SetFlags(logger.Lshortfile)
|
2020-04-13 15:20:04 +02:00
|
|
|
flagSet := options.NewFlagSet()
|
2014-11-09 21:51:10 +02:00
|
|
|
|
|
|
|
config := flagSet.String("config", "", "path to config file")
|
|
|
|
showVersion := flagSet.Bool("version", false, "print version string")
|
|
|
|
|
2020-07-20 07:24:18 +02:00
|
|
|
err := flagSet.Parse(os.Args[1:])
|
|
|
|
if err != nil {
|
|
|
|
logger.Printf("ERROR: Failed to parse flags: %v", err)
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2014-11-09 21:51:10 +02:00
|
|
|
|
2014-11-10 04:07:02 +02:00
|
|
|
if *showVersion {
|
2020-03-29 15:54:36 +02:00
|
|
|
fmt.Printf("oauth2-proxy %s (built with %s)\n", VERSION, runtime.Version())
|
2014-11-10 04:07:02 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-05-26 21:06:27 +02:00
|
|
|
legacyOpts := options.NewLegacyOptions()
|
2020-07-20 07:24:18 +02:00
|
|
|
err = options.Load(*config, flagSet, legacyOpts)
|
2020-04-13 12:34:25 +02:00
|
|
|
if err != nil {
|
2020-08-10 12:44:08 +02:00
|
|
|
logger.Errorf("ERROR: Failed to load config: %v", err)
|
2020-04-13 12:34:25 +02:00
|
|
|
os.Exit(1)
|
2014-11-09 21:51:10 +02:00
|
|
|
}
|
2012-12-11 04:59:23 +03:00
|
|
|
|
2020-05-26 21:06:27 +02:00
|
|
|
opts, err := legacyOpts.ToOptions()
|
|
|
|
if err != nil {
|
2020-08-10 12:44:08 +02:00
|
|
|
logger.Errorf("ERROR: Failed to convert config: %v", err)
|
2020-05-26 21:06:27 +02:00
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
|
2020-04-13 14:50:34 +02:00
|
|
|
err = validation.Validate(opts)
|
2012-12-11 04:59:23 +03:00
|
|
|
if err != nil {
|
2019-02-10 18:37:45 +02:00
|
|
|
logger.Printf("%s", err)
|
2014-11-09 21:51:10 +02:00
|
|
|
os.Exit(1)
|
2012-12-11 04:59:23 +03:00
|
|
|
}
|
2019-02-10 18:37:45 +02:00
|
|
|
|
2015-06-06 20:37:54 +02:00
|
|
|
validator := NewValidator(opts.EmailDomains, opts.AuthenticatedEmailsFile)
|
2020-05-25 15:00:49 +02:00
|
|
|
oauthproxy, err := NewOAuthProxy(opts, validator)
|
|
|
|
if err != nil {
|
2020-08-10 12:44:08 +02:00
|
|
|
logger.Errorf("ERROR: Failed to initialise OAuth2 Proxy: %v", err)
|
2020-05-25 15:00:49 +02:00
|
|
|
os.Exit(1)
|
|
|
|
}
|
2014-11-09 21:51:10 +02:00
|
|
|
|
2019-03-20 15:44:51 +02:00
|
|
|
rand.Seed(time.Now().UnixNano())
|
|
|
|
|
2020-06-14 21:58:44 +02:00
|
|
|
chain := alice.New()
|
|
|
|
|
|
|
|
if opts.ForceHTTPS {
|
2020-06-12 19:18:41 +02:00
|
|
|
_, httpsPort, err := net.SplitHostPort(opts.HTTPSAddress)
|
|
|
|
if err != nil {
|
|
|
|
logger.Fatalf("FATAL: invalid HTTPS address %q: %v", opts.HTTPAddress, err)
|
|
|
|
}
|
|
|
|
chain = chain.Append(middleware.NewRedirectToHTTPS(httpsPort))
|
2020-06-14 21:58:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
healthCheckPaths := []string{opts.PingPath}
|
|
|
|
healthCheckUserAgents := []string{opts.PingUserAgent}
|
2019-03-20 23:29:44 +02:00
|
|
|
if opts.GCPHealthChecks {
|
2020-06-14 21:58:44 +02:00
|
|
|
healthCheckPaths = append(healthCheckPaths, "/liveness_check", "/readiness_check")
|
|
|
|
healthCheckUserAgents = append(healthCheckUserAgents, "GoogleHC/1.0")
|
|
|
|
}
|
|
|
|
|
|
|
|
// To silence logging of health checks, register the health check handler before
|
|
|
|
// the logging handler
|
|
|
|
if opts.Logging.SilencePing {
|
|
|
|
chain = chain.Append(middleware.NewHealthCheck(healthCheckPaths, healthCheckUserAgents), LoggingHandler)
|
2019-03-20 23:29:44 +02:00
|
|
|
} else {
|
2020-06-14 21:58:44 +02:00
|
|
|
chain = chain.Append(LoggingHandler, middleware.NewHealthCheck(healthCheckPaths, healthCheckUserAgents))
|
2019-03-20 23:29:44 +02:00
|
|
|
}
|
2020-06-14 21:58:44 +02:00
|
|
|
|
2015-06-08 03:51:47 +02:00
|
|
|
s := &Server{
|
2020-06-14 21:58:44 +02:00
|
|
|
Handler: chain.Then(oauthproxy),
|
2015-06-08 03:51:47 +02:00
|
|
|
Opts: opts,
|
2020-04-04 17:12:38 +02:00
|
|
|
stop: make(chan struct{}, 1),
|
2015-02-11 03:07:40 +02:00
|
|
|
}
|
2020-04-04 17:12:38 +02:00
|
|
|
// Observe signals in background goroutine.
|
|
|
|
go func() {
|
|
|
|
sigint := make(chan os.Signal, 1)
|
|
|
|
signal.Notify(sigint, os.Interrupt, syscall.SIGTERM)
|
|
|
|
<-sigint
|
|
|
|
s.stop <- struct{}{} // notify having caught signal
|
|
|
|
}()
|
2015-06-08 03:51:47 +02:00
|
|
|
s.ListenAndServe()
|
2012-12-11 04:59:23 +03:00
|
|
|
}
|