Files
wonderwall/pkg/handler/handler.go
2023-02-10 14:57:57 +01:00

62 lines
1.5 KiB
Go

package handler
import (
"net/http"
"time"
"github.com/nais/wonderwall/pkg/config"
"github.com/nais/wonderwall/pkg/cookie"
"github.com/nais/wonderwall/pkg/crypto"
"github.com/nais/wonderwall/pkg/handler/autologin"
"github.com/nais/wonderwall/pkg/ingress"
"github.com/nais/wonderwall/pkg/loginstatus"
"github.com/nais/wonderwall/pkg/openid/client"
openidconfig "github.com/nais/wonderwall/pkg/openid/config"
"github.com/nais/wonderwall/pkg/session"
)
func NewHandler(
cfg *config.Config,
cookieOpts cookie.Options,
jwksProvider client.JwksProvider,
openidConfig openidconfig.Config,
crypter crypto.Crypter,
) (*StandardHandler, error) {
autoLogin, err := autologin.New(cfg)
if err != nil {
return nil, err
}
httpClient := &http.Client{
Timeout: time.Second * 10,
}
loginstatusClient := loginstatus.NewClient(cfg.Loginstatus, httpClient)
openidClient := client.NewClient(openidConfig, loginstatusClient, jwksProvider)
openidClient.SetHttpClient(httpClient)
sessionHandler, err := session.NewHandler(cfg, openidConfig, crypter, openidClient)
if err != nil {
return nil, err
}
ingresses, err := ingress.ParseIngresses(cfg)
if err != nil {
return nil, err
}
return &StandardHandler{
AutoLogin: autoLogin,
Client: openidClient,
Config: cfg,
CookieOptions: cookieOpts,
Crypter: crypter,
Ingresses: ingresses,
Loginstatus: loginstatusClient,
OpenidConfig: openidConfig,
Sessions: sessionHandler,
UpstreamProxy: NewReverseProxy(cfg.UpstreamHost),
}, nil
}