Created
January 15, 2021 11:44
-
-
Save shkpk/f18c1be421c6e69b04343846769a9031 to your computer and use it in GitHub Desktop.
nginx with vouch and vouch proxy
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
user www-data; | |
worker_processes 1; | |
error_log /var/log/nginx/error.log debug; | |
pid /var/run/nginx.pid; | |
events { | |
worker_connections 1024; | |
} | |
http { | |
include /etc/nginx/conf.d/*.conf; | |
include /etc/nginx/mime.types; | |
default_type application/octet-stream; | |
server_names_hash_bucket_size 64; | |
log_format main '$remote_addr - $remote_user [$time_local] "$request" ' | |
'$status $body_bytes_sent "$http_referer" ' | |
'"$http_user_agent" "$http_x_forwarded_for"'; | |
access_log /var/log/nginx/access.log main; | |
sendfile on; | |
#tcp_nopush on; | |
keepalive_timeout 65; | |
server { | |
listen 443 ssl http2; | |
server_name protectedapp.mydomain.com; | |
root /var/www/html/; | |
# send all requests to the `/validate` endpoint for authorization | |
auth_request /validate; | |
location = /validate { | |
# forward the /validate request to Vouch Proxy | |
proxy_pass http://vouch-proxy.mydomain.com:9090/validate; | |
# be sure to pass the original host header | |
proxy_set_header Host $http_host; | |
# Vouch Proxy only acts on the request headers | |
proxy_pass_request_body off; | |
proxy_set_header Content-Length ""; | |
# optionally add X-Vouch-User as returned by Vouch Proxy along with the request | |
auth_request_set $auth_resp_x_vouch_user $upstream_http_x_vouch_user; | |
# these return values are used by the @error401 call | |
auth_request_set $auth_resp_jwt $upstream_http_x_vouch_jwt; | |
auth_request_set $auth_resp_err $upstream_http_x_vouch_err; | |
auth_request_set $auth_resp_failcount $upstream_http_x_vouch_failcount; | |
} | |
# if validate returns `401 not authorized` then forward the request to the error401block | |
error_page 401 = @error401; | |
location @error401 { | |
# redirect to Vouch Proxy for login | |
return 302 https://vouch.mydomain.com/login?url=$scheme://$http_host$request_uri&vouch-failcount=$auth_resp_failcount&X-Vouch-Token=$auth_resp_jwt&error=$auth_resp_err; | |
} | |
# proxy pass authorized requests to your service | |
location / { | |
# forward authorized requests to your service protectedapp.mydomain.com | |
proxy_pass http://protectedapp.mydomain.com; | |
# you may need to set these variables in this block as per https://github.com/vouch/vouch-proxy/issues/26#issuecomment-425215810 | |
# auth_request_set $auth_resp_x_vouch_user $upstream_http_x_vouch_user | |
# auth_request_set $auth_resp_x_vouch_idp_claims_groups $upstream_http_x_vouch_idp_claims_groups; | |
# auth_request_set $auth_resp_x_vouch_idp_claims_given_name $upstream_http_x_vouch_idp_claims_given_name; | |
# set user header (usually an email) | |
proxy_set_header X-Vouch-User $auth_resp_x_vouch_user; | |
# optionally pass any custom claims you are tracking | |
# proxy_set_header X-Vouch-IdP-Claims-Groups $auth_resp_x_vouch_idp_claims_groups; | |
# proxy_set_header X-Vouch-IdP-Claims-Given_Name $auth_resp_x_vouch_idp_claims_given_name; | |
# optionally pass the accesstoken or idtoken | |
# proxy_set_header X-Vouch-IdP-AccessToken $auth_resp_x_vouch_idp_accesstoken; | |
# proxy_set_header X-Vouch-IdP-IdToken $auth_resp_x_vouch_idp_idtoken; | |
} | |
ssl_certificate /etc/letsencrypt/live/dev.mydomain.com/fullchain.pem; # managed by Certbot | |
ssl_certificate_key /etc/letsencrypt/live/dev.mydomain.com/privkey.pem; # managed by Certbot | |
} | |
server { | |
# Setting vouch behind SSL allows you to use the Secure flag for cookies. | |
listen 443 ssl http2; | |
server_name vouch.mydomain.com; | |
location / { | |
proxy_buffers 8 8k; | |
proxy_buffer_size 8k; | |
proxy_pass http://vouch-proxy.mydomain.com:9090; | |
# be sure to pass the original host header | |
proxy_set_header Host vouch.mydomain.com; | |
} | |
ssl_certificate /etc/letsencrypt/live/dev.mydomain.com/fullchain.pem; # managed by Certbot | |
ssl_certificate_key /etc/letsencrypt/live/dev.mydomain.com/privkey.pem; # managed by Certbot | |
} | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
vouch: | |
testing: true | |
loglevel: debug | |
domains: | |
- mydomain.com | |
allowAllUsers: true | |
jwt: | |
secret: YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY | |
issuer: Vouch | |
maxAge: 240 | |
compress: true | |
cookie: | |
name: VouchCookie | |
secure: true | |
httpOnly: false | |
maxAge: 12000 | |
oauth: | |
provider: oidc | |
client_id: xxxxxxxxxxxxxxxx | |
client_secret: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx | |
auth_url: https://zzzzzzzzzzzz.okta.com/oauth2/default/v1/authorize | |
token_url: https://zzzzzzzzzzzzzz.okta.com/oauth2/default/v1/token | |
user_info_url: https://zzzzzzzzzzzzzzz.okta.com/oauth2/default/v1/userinfo | |
scopes: | |
- openid | |
- profile | |
callback_url: https://vouch.mydomain.com/auth |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment