authelia/internal/handlers/handler_authz_impl_forwarda...

62 lines
1.7 KiB
Go

package handlers
import (
"fmt"
"net/url"
"github.com/valyala/fasthttp"
"github.com/authelia/authelia/v4/internal/authorization"
"github.com/authelia/authelia/v4/internal/middlewares"
)
func handleAuthzGetObjectForwardAuth(ctx *middlewares.AutheliaCtx) (object authorization.Object, err error) {
protocol, host, uri := ctx.XForwardedProto(), ctx.XForwardedHost(), ctx.XForwardedURI()
var (
targetURL *url.URL
method []byte
)
if targetURL, err = getRequestURIFromForwardedHeaders(protocol, host, uri); err != nil {
return object, fmt.Errorf("failed to get target URL: %w", err)
}
if method = ctx.XForwardedMethod(); len(method) == 0 {
return object, fmt.Errorf("header 'X-Forwarded-Method' is empty")
}
if hasInvalidMethodCharacters(method) {
return object, fmt.Errorf("header 'X-Forwarded-Method' with value '%s' has invalid characters", method)
}
return authorization.NewObjectRaw(targetURL, method), nil
}
func handleAuthzUnauthorizedForwardAuth(ctx *middlewares.AutheliaCtx, authn *Authn, redirectionURL *url.URL) {
var (
statusCode int
)
switch {
case ctx.IsXHR() || !ctx.AcceptsMIME("text/html"):
statusCode = fasthttp.StatusUnauthorized
default:
switch authn.Object.Method {
case fasthttp.MethodGet, fasthttp.MethodOptions, fasthttp.MethodHead:
statusCode = fasthttp.StatusFound
default:
statusCode = fasthttp.StatusSeeOther
}
}
ctx.Logger.Infof(logFmtAuthzRedirect, authn.Object.String(), authn.Method, authn.Username, statusCode, redirectionURL)
switch authn.Object.Method {
case fasthttp.MethodHead:
ctx.SpecialRedirectNoBody(redirectionURL.String(), statusCode)
default:
ctx.SpecialRedirect(redirectionURL.String(), statusCode)
}
}