added an option to enable GCP healthcheck endpoints
This commit is contained in:
		
							parent
							
								
									ca89bb833d
								
							
						
					
					
						commit
						3476daf322
					
				
							
								
								
									
										17
									
								
								http.go
								
								
								
								
							
							
						
						
									
										17
									
								
								http.go
								
								
								
								
							|  | @ -24,6 +24,23 @@ func (s *Server) ListenAndServe() { | ||||||
| 	} | 	} | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
|  | // gcpHealthcheck handles healthcheck queries from GCP
 | ||||||
|  | func gcpHealthcheck(h http.Handler) http.Handler { | ||||||
|  | 	return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { | ||||||
|  | 		if r.URL.EscapedPath() == "/liveness_check" { | ||||||
|  | 			w.WriteHeader(http.StatusOK) | ||||||
|  | 			w.Write([]byte("OK")) | ||||||
|  | 			return | ||||||
|  | 		} | ||||||
|  | 		if r.URL.EscapedPath() == "/readiness_check" { | ||||||
|  | 			w.WriteHeader(http.StatusOK) | ||||||
|  | 			w.Write([]byte("OK")) | ||||||
|  | 			return | ||||||
|  | 		} | ||||||
|  | 		h.ServeHTTP(w, r) | ||||||
|  | 	}) | ||||||
|  | } | ||||||
|  | 
 | ||||||
| // ServeHTTP constructs a net.Listener and starts handling HTTP requests
 | // ServeHTTP constructs a net.Listener and starts handling HTTP requests
 | ||||||
| func (s *Server) ServeHTTP() { | func (s *Server) ServeHTTP() { | ||||||
| 	HTTPAddress := s.Opts.HTTPAddress | 	HTTPAddress := s.Opts.HTTPAddress | ||||||
|  |  | ||||||
							
								
								
									
										10
									
								
								main.go
								
								
								
								
							
							
						
						
									
										10
									
								
								main.go
								
								
								
								
							|  | @ -5,6 +5,7 @@ import ( | ||||||
| 	"fmt" | 	"fmt" | ||||||
| 	"log" | 	"log" | ||||||
| 	"math/rand" | 	"math/rand" | ||||||
|  | 	"net/http" | ||||||
| 	"os" | 	"os" | ||||||
| 	"runtime" | 	"runtime" | ||||||
| 	"strings" | 	"strings" | ||||||
|  | @ -92,6 +93,7 @@ func main() { | ||||||
| 	flagSet.String("acr-values", "http://idmanagement.gov/ns/assurance/loa/1", "acr values string:  optional, used by login.gov") | 	flagSet.String("acr-values", "http://idmanagement.gov/ns/assurance/loa/1", "acr values string:  optional, used by login.gov") | ||||||
| 	flagSet.String("jwt-key", "", "private key used to sign JWT: required by login.gov") | 	flagSet.String("jwt-key", "", "private key used to sign JWT: required by login.gov") | ||||||
| 	flagSet.String("pubjwk-url", "", "JWK pubkey access endpoint: required by login.gov") | 	flagSet.String("pubjwk-url", "", "JWK pubkey access endpoint: required by login.gov") | ||||||
|  | 	flagSet.Bool("gcp-healthchecks", false, "Enable GCP healthcheck endpoints") | ||||||
| 
 | 
 | ||||||
| 	flagSet.Parse(os.Args[1:]) | 	flagSet.Parse(os.Args[1:]) | ||||||
| 
 | 
 | ||||||
|  | @ -139,8 +141,14 @@ func main() { | ||||||
| 
 | 
 | ||||||
| 	rand.Seed(time.Now().UnixNano()) | 	rand.Seed(time.Now().UnixNano()) | ||||||
| 
 | 
 | ||||||
|  | 	var myhandler http.Handler | ||||||
|  | 	if opts.GCPHealthChecks { | ||||||
|  | 		myhandler = gcpHealthcheck(LoggingHandler(os.Stdout, oauthproxy, opts.RequestLogging, opts.RequestLoggingFormat)) | ||||||
|  | 	} else { | ||||||
|  | 		myhandler = LoggingHandler(os.Stdout, oauthproxy, opts.RequestLogging, opts.RequestLoggingFormat) | ||||||
|  | 	} | ||||||
| 	s := &Server{ | 	s := &Server{ | ||||||
| 		Handler: LoggingHandler(os.Stdout, oauthproxy, opts.RequestLogging, opts.RequestLoggingFormat), | 		Handler: myhandler, | ||||||
| 		Opts:    opts, | 		Opts:    opts, | ||||||
| 	} | 	} | ||||||
| 	s.ListenAndServe() | 	s.ListenAndServe() | ||||||
|  |  | ||||||
|  | @ -86,10 +86,11 @@ type Options struct { | ||||||
| 	RequestLogging       bool   `flag:"request-logging" cfg:"request_logging" env:"OAUTH2_PROXY_REQUEST_LOGGING"` | 	RequestLogging       bool   `flag:"request-logging" cfg:"request_logging" env:"OAUTH2_PROXY_REQUEST_LOGGING"` | ||||||
| 	RequestLoggingFormat string `flag:"request-logging-format" cfg:"request_logging_format" env:"OAUTH2_PROXY_REQUEST_LOGGING_FORMAT"` | 	RequestLoggingFormat string `flag:"request-logging-format" cfg:"request_logging_format" env:"OAUTH2_PROXY_REQUEST_LOGGING_FORMAT"` | ||||||
| 
 | 
 | ||||||
| 	SignatureKey string `flag:"signature-key" cfg:"signature_key" env:"OAUTH2_PROXY_SIGNATURE_KEY"` | 	SignatureKey    string `flag:"signature-key" cfg:"signature_key" env:"OAUTH2_PROXY_SIGNATURE_KEY"` | ||||||
| 	AcrValues    string `flag:"acr-values" cfg:"acr_values" env:"OAUTH2_PROXY_ACR_VALUES"` | 	AcrValues       string `flag:"acr-values" cfg:"acr_values" env:"OAUTH2_PROXY_ACR_VALUES"` | ||||||
| 	JWTKey       string `flag:"jwt-key" cfg:"jwt_key" env:"OAUTH2_PROXY_JWT_KEY"` | 	JWTKey          string `flag:"jwt-key" cfg:"jwt_key" env:"OAUTH2_PROXY_JWT_KEY"` | ||||||
| 	PubJWKURL    string `flag:"pubjwk-url" cfg:"pubjwk_url" env:"OAUTH2_PROXY_PUBJWK_URL"` | 	PubJWKURL       string `flag:"pubjwk-url" cfg:"pubjwk_url" env:"OAUTH2_PROXY_PUBJWK_URL"` | ||||||
|  | 	GCPHealthChecks bool   `flag:"gcp-healthchecks" cfg:"gcp_healthchecks" env:"OAUTH2_PROXY_GCP_HEALTHCHECKS"` | ||||||
| 
 | 
 | ||||||
| 	// internal values that are set after config validation
 | 	// internal values that are set after config validation
 | ||||||
| 	redirectURL   *url.URL | 	redirectURL   *url.URL | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue