Merge pull request #285 from jmickey/Issue#259-RedirectToHTTPS
Redirect to HTTPS
This commit is contained in:
		
						commit
						6b8d2bdcc3
					
				|  | @ -3,6 +3,7 @@ | |||
| ## Changes since v4.0.0 | ||||
| 
 | ||||
| - [#227](https://github.com/pusher/oauth2_proxy/pull/227) Add Keycloak provider (@Ofinka) | ||||
| - [#259](https://github.com/pusher/oauth2_proxy/pull/259) Redirect to HTTPS (@jmickey) | ||||
| - [#273](https://github.com/pusher/oauth2_proxy/pull/273) Support Go 1.13 (@dio) | ||||
| - [#275](https://github.com/pusher/oauth2_proxy/pull/275) docker: build from debian buster (@syscll) | ||||
| - [#258](https://github.com/pusher/oauth2_proxy/pull/258) Add IDToken for Azure provider | ||||
|  |  | |||
|  | @ -44,6 +44,7 @@ An example [oauth2_proxy.cfg]({{ site.gitweb }}/contrib/oauth2_proxy.cfg.example | |||
| | `-extra-jwt-issuers` | string | if `-skip-jwt-bearer-tokens` is set, a list of extra JWT `issuer=audience` pairs (where the issuer URL has a `.well-known/openid-configuration` or a `.well-known/jwks.json`) | | | ||||
| | `-exclude-logging-paths` | string | comma separated list of paths to exclude from logging, eg: `"/ping,/path2"` |`""` (no paths excluded) | | ||||
| | `-flush-interval` | duration | period between flushing response buffers when streaming responses | `"1s"` | | ||||
| | `-force-https` | bool | enforce https redirect | `false` | | ||||
| | `-banner` | string | custom banner string. Use `"-"` to disable default banner. | | | ||||
| | `-footer` | string | custom footer string. Use `"-"` to disable default footer. | | | ||||
| | `-gcp-healthchecks` | bool | will enable `/liveness_check`, `/readiness_check`, and `/` (with the proper user-agent) endpoints that will make it work well with GCP App Engine and GKE Ingresses | false | | ||||
|  |  | |||
							
								
								
									
										11
									
								
								http.go
								
								
								
								
							
							
						
						
									
										11
									
								
								http.go
								
								
								
								
							|  | @ -152,3 +152,14 @@ func (ln tcpKeepAliveListener) Accept() (c net.Conn, err error) { | |||
| 	tc.SetKeepAlivePeriod(3 * time.Minute) | ||||
| 	return tc, nil | ||||
| } | ||||
| 
 | ||||
| func redirectToHTTPS(opts *Options, h http.Handler) http.Handler { | ||||
| 	return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { | ||||
| 		proto := r.Header.Get("X-Forwarded-Proto") | ||||
| 		if opts.ForceHTTPS && (r.TLS == nil || (proto != "" && strings.ToLower(proto) != "https")) { | ||||
| 			http.Redirect(w, r, opts.HTTPSAddress, http.StatusPermanentRedirect) | ||||
| 		} | ||||
| 
 | ||||
| 		h.ServeHTTP(w, r) | ||||
| 	}) | ||||
| } | ||||
|  |  | |||
							
								
								
									
										50
									
								
								http_test.go
								
								
								
								
							
							
						
						
									
										50
									
								
								http_test.go
								
								
								
								
							|  | @ -106,3 +106,53 @@ func TestGCPHealthcheckNotIngressPut(t *testing.T) { | |||
| 
 | ||||
| 	assert.Equal(t, "test", rw.Body.String()) | ||||
| } | ||||
| 
 | ||||
| func TestRedirectToHTTPSTrue(t *testing.T) { | ||||
| 	opts := NewOptions() | ||||
| 	opts.ForceHTTPS = true | ||||
| 	handler := func(w http.ResponseWriter, req *http.Request) { | ||||
| 		w.Write([]byte("test")) | ||||
| 	} | ||||
| 
 | ||||
| 	h := redirectToHTTPS(opts, http.HandlerFunc(handler)) | ||||
| 	rw := httptest.NewRecorder() | ||||
| 	r, _ := http.NewRequest("GET", "/", nil) | ||||
| 	h.ServeHTTP(rw, r) | ||||
| 
 | ||||
| 	assert.Equal(t, http.StatusPermanentRedirect, rw.Code, "status code should be %d, got: %d", http.StatusPermanentRedirect, rw.Code) | ||||
| } | ||||
| 
 | ||||
| func TestRedirectToHTTPSFalse(t *testing.T) { | ||||
| 	opts := NewOptions() | ||||
| 	handler := func(w http.ResponseWriter, req *http.Request) { | ||||
| 		w.Write([]byte("test")) | ||||
| 	} | ||||
| 
 | ||||
| 	h := redirectToHTTPS(opts, http.HandlerFunc(handler)) | ||||
| 	rw := httptest.NewRecorder() | ||||
| 	r, _ := http.NewRequest("GET", "/", nil) | ||||
| 	h.ServeHTTP(rw, r) | ||||
| 
 | ||||
| 	assert.Equal(t, http.StatusOK, rw.Code, "status code should be %d, got: %d", http.StatusOK, rw.Code) | ||||
| } | ||||
| 
 | ||||
| func TestRedirectNotWhenHTTPS(t *testing.T) { | ||||
| 	opts := NewOptions() | ||||
| 	opts.ForceHTTPS = true | ||||
| 	handler := func(w http.ResponseWriter, req *http.Request) { | ||||
| 		w.Write([]byte("test")) | ||||
| 	} | ||||
| 
 | ||||
| 	h := redirectToHTTPS(opts, http.HandlerFunc(handler)) | ||||
| 	s := httptest.NewTLSServer(h) | ||||
| 	defer s.Close() | ||||
| 
 | ||||
| 	opts.HTTPSAddress = s.URL | ||||
| 	client := s.Client() | ||||
| 	res, err := client.Get(s.URL) | ||||
| 	if err != nil { | ||||
| 		t.Fatalf("request to test server failed with error: %v", err) | ||||
| 	} | ||||
| 
 | ||||
| 	assert.Equal(t, http.StatusOK, res.StatusCode, "status code should be %d, got: %d", http.StatusOK, res.StatusCode) | ||||
| } | ||||
|  |  | |||
							
								
								
									
										5
									
								
								main.go
								
								
								
								
							
							
						
						
									
										5
									
								
								main.go
								
								
								
								
							|  | @ -32,6 +32,7 @@ func main() { | |||
| 
 | ||||
| 	flagSet.String("http-address", "127.0.0.1:4180", "[http://]<addr>:<port> or unix://<path> to listen on for HTTP clients") | ||||
| 	flagSet.String("https-address", ":443", "<addr>:<port> to listen on for HTTPS clients") | ||||
| 	flagSet.Bool("force-https", false, "force HTTPS redirect for HTTP requests") | ||||
| 	flagSet.String("tls-cert-file", "", "path to certificate file") | ||||
| 	flagSet.String("tls-key-file", "", "path to private key file") | ||||
| 	flagSet.String("redirect-url", "", "the OAuth Redirect URL. ie: \"https://internalapp.yourcompany.com/oauth2/callback\"") | ||||
|  | @ -185,9 +186,9 @@ func main() { | |||
| 
 | ||||
| 	var handler http.Handler | ||||
| 	if opts.GCPHealthChecks { | ||||
| 		handler = gcpHealthcheck(LoggingHandler(oauthproxy)) | ||||
| 		handler = redirectToHTTPS(opts, gcpHealthcheck(LoggingHandler(oauthproxy))) | ||||
| 	} else { | ||||
| 		handler = LoggingHandler(oauthproxy) | ||||
| 		handler = redirectToHTTPS(opts, LoggingHandler(oauthproxy)) | ||||
| 	} | ||||
| 	s := &Server{ | ||||
| 		Handler: handler, | ||||
|  |  | |||
|  | @ -34,6 +34,7 @@ type Options struct { | |||
| 	ProxyWebSockets bool   `flag:"proxy-websockets" cfg:"proxy_websockets" env:"OAUTH2_PROXY_PROXY_WEBSOCKETS"` | ||||
| 	HTTPAddress     string `flag:"http-address" cfg:"http_address" env:"OAUTH2_PROXY_HTTP_ADDRESS"` | ||||
| 	HTTPSAddress    string `flag:"https-address" cfg:"https_address" env:"OAUTH2_PROXY_HTTPS_ADDRESS"` | ||||
| 	ForceHTTPS      bool   `flag:"force-https" cfg:"force_https" env:"OAUTH2_PROXY_FORCE_HTTPS"` | ||||
| 	RedirectURL     string `flag:"redirect-url" cfg:"redirect_url" env:"OAUTH2_PROXY_REDIRECT_URL"` | ||||
| 	ClientID        string `flag:"client-id" cfg:"client_id" env:"OAUTH2_PROXY_CLIENT_ID"` | ||||
| 	ClientSecret    string `flag:"client-secret" cfg:"client_secret" env:"OAUTH2_PROXY_CLIENT_SECRET"` | ||||
|  | @ -145,6 +146,7 @@ func NewOptions() *Options { | |||
| 		ProxyWebSockets:     true, | ||||
| 		HTTPAddress:         "127.0.0.1:4180", | ||||
| 		HTTPSAddress:        ":443", | ||||
| 		ForceHTTPS:          false, | ||||
| 		DisplayHtpasswdForm: true, | ||||
| 		CookieOptions: options.CookieOptions{ | ||||
| 			CookieName:     "_oauth2_proxy", | ||||
|  |  | |||
		Loading…
	
		Reference in New Issue