Add forward auth portal — CPM as built-in IdP replacing Authentik
CPM can now act as its own forward auth provider for proxied sites. Users authenticate at a login portal (credentials or OAuth) and Caddy gates access via a verify subrequest, eliminating the need for external IdPs like Authentik. Key components: - Forward auth flow: verify endpoint, exchange code callback, login portal - User groups with membership management - Per-proxy-host access control (users and/or groups) - Caddy config generation for forward_auth handler + callback route - OAuth and credential login on the portal page - Admin UI: groups page, inline user/group assignment in proxy host form - REST API: /api/v1/groups, /api/v1/forward-auth-sessions, per-host access - Integration tests for groups and forward auth schema Also fixes mTLS E2E test selectors broken by the RBAC refactor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
4
proxy.ts
4
proxy.ts
@@ -41,10 +41,12 @@ export default auth((req) => {
|
||||
// Allow public routes
|
||||
if (
|
||||
pathname === "/login" ||
|
||||
pathname === "/portal" ||
|
||||
pathname.startsWith("/api/auth") ||
|
||||
pathname === "/api/health" ||
|
||||
pathname === "/api/instances/sync" ||
|
||||
pathname.startsWith("/api/v1/")
|
||||
pathname.startsWith("/api/v1/") ||
|
||||
pathname.startsWith("/api/forward-auth/")
|
||||
) {
|
||||
return NextResponse.next();
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user