mirror of https://github.com/vouch/vouch-proxy
103 lines
3.9 KiB
Plaintext
103 lines
3.9 KiB
Plaintext
user nginx;
|
|
worker_processes 1;
|
|
|
|
error_log /var/log/nginx/error.log warn;
|
|
pid /var/run/nginx.pid;
|
|
|
|
events {
|
|
worker_connections 1024;
|
|
}
|
|
|
|
|
|
http {
|
|
include /etc/nginx/mime.types;
|
|
default_type application/octet-stream;
|
|
|
|
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
|
|
'$status $body_bytes_sent "$http_referer" '
|
|
'"$http_user_agent" "$http_x_forwarded_for"';
|
|
|
|
access_log /var/log/nginx/access.log main;
|
|
|
|
sendfile on;
|
|
#tcp_nopush on;
|
|
|
|
keepalive_timeout 65;
|
|
|
|
|
|
server {
|
|
listen 443 ssl http2;
|
|
server_name protectedapp.yourdomain.com;
|
|
root /var/www/html/;
|
|
|
|
ssl_certificate /etc/letsencrypt/live/protectedapp.yourdomain.com/fullchain.pem;
|
|
ssl_certificate_key /etc/letsencrypt/live/protectedapp.yourdomain.com/privkey.pem;
|
|
|
|
# send all requests to the `/validate` endpoint for authorization
|
|
auth_request /validate;
|
|
|
|
location = /validate {
|
|
# forward the /validate request to Vouch Proxy
|
|
proxy_pass http://127.0.0.1:9090/validate;
|
|
|
|
# be sure to pass the original host header
|
|
proxy_set_header Host $http_host;
|
|
|
|
# Vouch Proxy only acts on the request headers
|
|
proxy_pass_request_body off;
|
|
proxy_set_header Content-Length "";
|
|
|
|
# optionally add X-Vouch-User as returned by Vouch Proxy along with the request
|
|
auth_request_set $auth_resp_x_vouch_user $upstream_http_x_vouch_user;
|
|
|
|
# these return values are used by the @error401 call
|
|
auth_request_set $auth_resp_jwt $upstream_http_x_vouch_jwt;
|
|
auth_request_set $auth_resp_err $upstream_http_x_vouch_err;
|
|
auth_request_set $auth_resp_failcount $upstream_http_x_vouch_failcount;
|
|
}
|
|
|
|
# if validate returns `401 not authorized` then forward the request to the error401block
|
|
error_page 401 = @error401;
|
|
|
|
location @error401 {
|
|
# redirect to Vouch Proxy for login
|
|
return 302 https://vouch.yourdomain.com/login?url=$scheme://$http_host$request_uri&vouch-failcount=$auth_resp_failcount&X-Vouch-Token=$auth_resp_jwt&error=$auth_resp_err;
|
|
}
|
|
|
|
# proxy pass authorized requests to your service
|
|
location / {
|
|
# forward authorized requests to your service protectedapp.yourdomain.com
|
|
proxy_pass http://127.0.0.1:8080;
|
|
# you may need to set these variables in this block as per https://github.com/vouch/vouch-proxy/issues/26#issuecomment-425215810
|
|
# auth_request_set $auth_resp_x_vouch_user $upstream_http_x_vouch_user;
|
|
# auth_request_set $auth_resp_x_vouch_idp_claims_groups $upstream_http_x_vouch_idp_claims_groups;
|
|
# auth_request_set $auth_resp_x_vouch_idp_claims_given_name $upstream_http_x_vouch_idp_claims_given_name;
|
|
|
|
# set user header (usually an email)
|
|
proxy_set_header X-Vouch-User $auth_resp_x_vouch_user;
|
|
# optionally pass any custom claims you are tracking
|
|
# proxy_set_header X-Vouch-IdP-Claims-Groups $auth_resp_x_vouch_idp_claims_groups;
|
|
# proxy_set_header X-Vouch-IdP-Claims-Given_Name $auth_resp_x_vouch_idp_claims_given_name;
|
|
# optionally pass the accesstoken or idtoken
|
|
# proxy_set_header X-Vouch-IdP-AccessToken $auth_resp_x_vouch_idp_accesstoken;
|
|
# proxy_set_header X-Vouch-IdP-IdToken $auth_resp_x_vouch_idp_idtoken;
|
|
}
|
|
}
|
|
|
|
server {
|
|
# Setting vouch behind SSL allows you to use the Secure flag for cookies.
|
|
listen 443 ssl http2;
|
|
server_name vouch.yourdomain.com;
|
|
|
|
ssl_certificate /etc/letsencrypt/live/vouch.yourdomain.com/fullchain.pem;
|
|
ssl_certificate_key /etc/letsencrypt/live/vouch.yourdomain.com/privkey.pem;
|
|
|
|
location / {
|
|
proxy_pass http://127.0.0.1:9090;
|
|
# be sure to pass the original host header
|
|
proxy_set_header Host vouch.yourdomain.com;
|
|
}
|
|
}
|
|
|
|
}
|