Skip to content

providers/proxy: set outpost session cookie to httponly and secure wh…#6482

Merged
BeryJu merged 2 commits intomainfrom
providers/proxy/http-only
Aug 5, 2023
Merged

providers/proxy: set outpost session cookie to httponly and secure wh…#6482
BeryJu merged 2 commits intomainfrom
providers/proxy/http-only

Conversation

@BeryJu
Copy link
Member

@BeryJu BeryJu commented Aug 5, 2023

…en possible

Details

security improvement, possible issues when a provider has an external URL configured with HTTPS but is being accessed via HTTP, but that's not supported anyways


Checklist

  • Local tests pass (ak test authentik/)
  • The code has been formatted (make lint-fix)

If an API change has been made

  • The API schema has been updated (make gen-build)

If changes to the frontend have been made

  • The code has been formatted (make web)
  • The translation files have been updated (make i18n-extract)

If applicable

  • The documentation has been updated
  • The documentation has been formatted (make website)

…en possible

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
@BeryJu BeryJu requested a review from a team as a code owner August 5, 2023 19:32
@BeryJu BeryJu requested review from rissson and removed request for a team August 5, 2023 19:32
@netlify
Copy link

netlify bot commented Aug 5, 2023

Deploy Preview for authentik-storybook canceled.

Name Link
🔨 Latest commit 6e5e7cf
🔍 Latest deploy log https://app.netlify.com/sites/authentik-storybook/deploys/64cea52682d10d00080260de

@rissson
Copy link
Member

rissson commented Aug 5, 2023

Maybe set samesite as well?

@BeryJu
Copy link
Member Author

BeryJu commented Aug 5, 2023

Maybe set samesite as well?

I just talked about that on discord too, SameSite could on theory break some SSO stuff, which is why the main server also sets it to Lax (allthough I think those issues only occurred with SAML)

@codecov
Copy link

codecov bot commented Aug 5, 2023

Codecov Report

Patch coverage has no change and project coverage change: -0.02% ⚠️

Comparison is base (50b2124) 92.48% compared to head (6e5e7cf) 92.45%.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #6482      +/-   ##
==========================================
- Coverage   92.48%   92.45%   -0.02%     
==========================================
  Files         561      561              
  Lines       27080    27080              
==========================================
- Hits        25041    25035       -6     
- Misses       2039     2045       +6     
Flag Coverage Δ
e2e 51.60% <ø> (-0.02%) ⬇️
integration 26.56% <ø> (ø)
unit 89.27% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

see 2 files with indirect coverage changes

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
@github-actions
Copy link
Contributor

github-actions bot commented Aug 5, 2023

authentik PR Installation instructions

Instructions for docker-compose

Add the following block to your .env file:

AUTHENTIK_IMAGE=ghcr.io/goauthentik/dev-server
AUTHENTIK_TAG=gh-providers-proxy-http-only-1691264971-6e5e7cf
AUTHENTIK_OUTPOSTS__CONTAINER_IMAGE_BASE=ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s

For arm64, use these values:

AUTHENTIK_IMAGE=ghcr.io/goauthentik/dev-server
AUTHENTIK_TAG=gh-providers-proxy-http-only-1691264971-6e5e7cf-arm64
AUTHENTIK_OUTPOSTS__CONTAINER_IMAGE_BASE=ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s

Afterwards, run the upgrade commands from the latest release notes.

Instructions for Kubernetes

Add the following block to your values.yml file:

authentik:
    outposts:
        container_image_base: ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s
image:
    repository: ghcr.io/goauthentik/dev-server
    tag: gh-providers-proxy-http-only-1691264971-6e5e7cf

For arm64, use these values:

authentik:
    outposts:
        container_image_base: ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s
image:
    repository: ghcr.io/goauthentik/dev-server
    tag: gh-providers-proxy-http-only-1691264971-6e5e7cf-arm64

Afterwards, run the upgrade commands from the latest release notes.

@BeryJu BeryJu merged commit 0782b3b into main Aug 5, 2023
@BeryJu BeryJu deleted the providers/proxy/http-only branch August 5, 2023 20:09
BeryJu added a commit that referenced this pull request Aug 7, 2023
#6482)

* providers/proxy: set outpost session cookie to httponly and secure when possible

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* set samesite too

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

---------

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
kensternberg-authentik added a commit that referenced this pull request Aug 7, 2023
* main:
  web/flows: fix identification stage band color (#6489)
  providers/proxy: only intercept auth header when a value is set (#6488)
  web: bump @goauthentik/api from 2023.6.1-1691242648 to 2023.6.1-1691266058 in /web (#6486)
  providers/proxy: set outpost session cookie to httponly and secure wh… (#6482)
  web: bump @esbuild/linux-arm64 from 0.18.17 to 0.18.18 in /web (#6483)
  web/admin: fix user sorting by active field (#6485)
  web: bump @esbuild/darwin-arm64 from 0.18.17 to 0.18.18 in /web (#6484)
  web: bump storybook (#6481)
  web: bump the sentry group in /web with 2 updates (#6480)
  web: bump API Client version (#6479)
  api: optimise pagination in API schema (#6478)
  website/dev-docs: tweaks to template (#6474)
  website: bump react-tooltip from 5.19.0 to 5.20.0 in /website (#6471)
  website: bump prettier from 3.0.0 to 3.0.1 in /website (#6472)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants