chore: format using Make (#111)

This commit is contained in:
Kevin Goslar 2022-09-22 07:52:52 -05:00 committed by GitHub
parent c5a66aa6eb
commit 5795340e0e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
38 changed files with 593 additions and 424 deletions

View File

@ -86,7 +86,9 @@ jobs:
./.circleci/release_name.bash ./.circleci/release_name.bash
source $BASH_ENV source $BASH_ENV
- setup_remote_docker - setup_remote_docker
- run: docker login --username "$DOCKER_USERNAME" --password "$DOCKER_PASSWORD" - run:
docker login --username "$DOCKER_USERNAME" --password
"$DOCKER_PASSWORD"
- run: curl -sL https://git.io/goreleaser | bash - run: curl -sL https://git.io/goreleaser | bash
release-changelog: release-changelog:
@ -96,7 +98,9 @@ jobs:
- checkout - checkout
- run: gem install github_changelog_generator -v 1.14.3 - run: gem install github_changelog_generator -v 1.14.3
- run: sudo npm i -g doctoc - run: sudo npm i -g doctoc
- run: github_changelog_generator -u ory -p hydra-maester -o CHANGELOG.md --token $GITHUB_TOKEN - run:
github_changelog_generator -u ory -p hydra-maester -o CHANGELOG.md
--token $GITHUB_TOKEN
- run: doctoc CHANGELOG.md - run: doctoc CHANGELOG.md
- run: doctoc README.md - run: doctoc README.md
- run: git config --global user.email "circleci@ory.am" - run: git config --global user.email "circleci@ory.am"
@ -106,7 +110,9 @@ jobs:
- run: | - run: |
git commit -a -m "docs: Incorporates changes from version $(git describe --tags)" || true git commit -a -m "docs: Incorporates changes from version $(git describe --tags)" || true
- run: git remote rm origin - run: git remote rm origin
- run: git remote add origin https://arekkas:$GITHUB_TOKEN@github.com/ory/hydra-maester.git - run:
git remote add origin
https://arekkas:$GITHUB_TOKEN@github.com/ory/hydra-maester.git
- run: git push origin HEAD:master || true - run: git push origin HEAD:master || true
workflows: workflows:

View File

@ -2,12 +2,12 @@ name: Docker Image Scan
on: on:
push: push:
branches: branches:
- 'master' - "master"
tags: tags:
- 'v*.*.*' - "v*.*.*"
pull_request: pull_request:
branches: branches:
- 'master' - "master"
jobs: jobs:
docker: docker:
@ -18,7 +18,7 @@ jobs:
- uses: actions/setup-go@v2 - uses: actions/setup-go@v2
name: Setup Golang name: Setup Golang
with: with:
go-version: '^1.16' go-version: "^1.16"
- name: Set up QEMU - name: Set up QEMU
uses: docker/setup-qemu-action@v1 uses: docker/setup-qemu-action@v1
- name: Set up Docker Buildx - name: Set up Docker Buildx
@ -45,8 +45,8 @@ jobs:
uses: aquasecurity/trivy-action@master uses: aquasecurity/trivy-action@master
with: with:
image-ref: controller:latest image-ref: controller:latest
format: 'table' format: "table"
exit-code: '42' exit-code: "42"
ignore-unfixed: true ignore-unfixed: true
vuln-type: 'os,library' vuln-type: "os,library"
severity: 'CRITICAL,HIGH' severity: "CRITICAL,HIGH"

17
.github/workflows/format.yml vendored Normal file
View File

@ -0,0 +1,17 @@
name: Format
on:
pull_request:
push:
jobs:
format:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- uses: actions/setup-go@v3
with:
go-version: 1.19
- run: make format
- name: Indicate formatting issues
run: git diff HEAD --exit-code --color

3
.gitignore vendored
View File

@ -1,4 +1,3 @@
# Binaries for programs and plugins # Binaries for programs and plugins
*.exe *.exe
*.exe~ *.exe~
@ -25,3 +24,5 @@ bin
config/default/manager_image_patch.yaml-e config/default/manager_image_patch.yaml-e
/manager /manager
node_modules/

View File

@ -27,7 +27,6 @@ snapshot:
changelog: changelog:
sort: asc sort: asc
dockers: dockers:
- image_templates: - image_templates:
- "oryd/hydra-maester:v{{ .Major }}" - "oryd/hydra-maester:v{{ .Major }}"

4
.prettierignore Normal file
View File

@ -0,0 +1,4 @@
api/v1alpha1/zz_generated.deepcopy.go
CHANGELOG.md
.github/pull_request_template.md
CONTRIBUTING.md

View File

@ -28,7 +28,7 @@ all: manager
# Run tests # Run tests
.PHONY: test .PHONY: test
test: generate fmt vet manifests test: generate vet manifests
go test ./api/... ./controllers/... ./hydra/... ./helpers/... -coverprofile cover.out go test ./api/... ./controllers/... ./hydra/... ./helpers/... -coverprofile cover.out
# Start KIND pseudo-cluster # Start KIND pseudo-cluster
@ -64,12 +64,12 @@ test-integration:
# Build manager binary # Build manager binary
.PHONY: manager .PHONY: manager
manager: generate fmt vet manager: generate vet
CGO_ENABLED=0 GO111MODULE=on GOOS=linux GOARCH=amd64 go build -a -o manager main.go CGO_ENABLED=0 GO111MODULE=on GOOS=linux GOARCH=amd64 go build -a -o manager main.go
# Run against the configured Kubernetes cluster in ~/.kube/config # Run against the configured Kubernetes cluster in ~/.kube/config
.PHONY: run .PHONY: run
run: generate fmt vet run: generate vet
go run ./main.go --hydra-url ${HYDRA_URL} go run ./main.go --hydra-url ${HYDRA_URL}
# Install CRDs into a cluster # Install CRDs into a cluster
@ -88,10 +88,10 @@ deploy: manifests
manifests: controller-gen manifests: controller-gen
$(CONTROLLER_GEN) $(CRD_OPTIONS) rbac:roleName=manager-role webhook paths="./..." output:crd:artifacts:config=config/crd/bases $(CONTROLLER_GEN) $(CRD_OPTIONS) rbac:roleName=manager-role webhook paths="./..." output:crd:artifacts:config=config/crd/bases
# Run go fmt against code # Format the source code
.PHONY: fmt format: node_modules
fmt:
go fmt ./... go fmt ./...
npm exec -- prettier --write .
# Run go vet against code # Run go vet against code
.PHONY: vet .PHONY: vet
@ -135,3 +135,7 @@ kubebuilder:
curl -sL https://github.com/kubernetes-sigs/kubebuilder/releases/download/v2.3.2/kubebuilder_2.3.2_${OS}_${ARCH}.tar.gz | tar -xz -C /tmp/ curl -sL https://github.com/kubernetes-sigs/kubebuilder/releases/download/v2.3.2/kubebuilder_2.3.2_${OS}_${ARCH}.tar.gz | tar -xz -C /tmp/
mv /tmp/kubebuilder_2.3.2_${OS}_${ARCH} ${PWD}/.bin/kubebuilder mv /tmp/kubebuilder_2.3.2_${OS}_${ARCH} ${PWD}/.bin/kubebuilder
export PATH=${PATH}:${PWD}/.bin/kubebuilder/bin export PATH=${PATH}:${PWD}/.bin/kubebuilder/bin
node_modules: package-lock.json
npm ci
touch node_modules

View File

@ -15,15 +15,26 @@
⚠️ ⚠️ ⚠️ ⚠️ ⚠️ ⚠️
> Ory Hydra Maester is developed by the Ory community and is not actively maintained by Ory core maintainers due to lack of resources, time, and knolwedge. As such please be aware that there might be issues with the system. If you have ideas for better testing and development principles please open an issue or PR! > Ory Hydra Maester is developed by the Ory community and is not actively
> maintained by Ory core maintainers due to lack of resources, time, and
> knolwedge. As such please be aware that there might be issues with the system.
> If you have ideas for better testing and development principles please open an
> issue or PR!
⚠️ ⚠️ ⚠️ ⚠️ ⚠️ ⚠️
This project contains a Kubernetes controller that uses Custom Resources (CR) to manage Hydra Oauth2 clients. ORY Hydra Maester watches for instances of `oauth2clients.hydra.ory.sh/v1alpha1` CR and creates, updates, or deletes corresponding OAuth2 clients by communicating with ORY Hydra's API. This project contains a Kubernetes controller that uses Custom Resources (CR) to
manage Hydra Oauth2 clients. ORY Hydra Maester watches for instances of
`oauth2clients.hydra.ory.sh/v1alpha1` CR and creates, updates, or deletes
corresponding OAuth2 clients by communicating with ORY Hydra's API.
Visit Hydra-maester's [chart documentation](https://github.com/ory/k8s/blob/master/docs/helm/hydra-maester.md) and view [sample OAuth2 client resources](config/samples) to learn more about the `oauth2clients.hydra.ory.sh/v1alpha1` CR. Visit Hydra-maester's
[chart documentation](https://github.com/ory/k8s/blob/master/docs/helm/hydra-maester.md)
and view [sample OAuth2 client resources](config/samples) to learn more about
the `oauth2clients.hydra.ory.sh/v1alpha1` CR.
The project is based on [Kubebuilder](https://github.com/kubernetes-sigs/kubebuilder). The project is based on
[Kubebuilder](https://github.com/kubernetes-sigs/kubebuilder).
## Prerequisites ## Prerequisites
@ -31,10 +42,12 @@ The project is based on [Kubebuilder](https://github.com/kubernetes-sigs/kubebui
- make - make
- kubectl - kubectl
- kustomize - kustomize
- [kubebuilder](https://github.com/kubernetes-sigs/kubebuilder) for running tests - [kubebuilder](https://github.com/kubernetes-sigs/kubebuilder) for running
tests
- [ginkgo](https://onsi.github.io/ginkgo/) for local integration testing - [ginkgo](https://onsi.github.io/ginkgo/) for local integration testing
- access to K8s environment: minikube or a remote K8s cluster - access to K8s environment: minikube or a remote K8s cluster
- [mockery](https://github.com/vektra/mockery) to generate mocks for testing purposes - [mockery](https://github.com/vektra/mockery) to generate mocks for testing
purposes
## Design ## Design
@ -44,15 +57,17 @@ Take a look at [Design Readme](./docs/README.md).
- `make test` to run tests - `make test` to run tests
- `make test-integration` to run integration tests - `make test-integration` to run integration tests
- `make install` to generate CRD file from go sources and install it on the cluster - `make install` to generate CRD file from go sources and install it on the
cluster
- `export HYDRA_URL={HYDRA_SERVICE_URL} && make run` to run the controller - `export HYDRA_URL={HYDRA_SERVICE_URL} && make run` to run the controller
To deploy the controller, edit the value of the ```--hydra-url``` argument in the [manager.yaml](config/manager/manager.yaml) file and run ```make deploy```. To deploy the controller, edit the value of the `--hydra-url` argument in the
[manager.yaml](config/manager/manager.yaml) file and run `make deploy`.
### Command-line flags ### Command-line flags
| Name | Required | Description | Default value | Example values | | Name | Required | Description | Default value | Example values |
|----------------------------|----------|----------------------------------------|---------------|------------------------------------------------------| | ---------------------------- | -------- | ---------------------------------------------------------------------------------------------------------------- | ------------- | ---------------------------------------- |
| **hydra-url** | yes | ORY Hydra's service address | - | ` ory-hydra-admin.ory.svc.cluster.local` | | **hydra-url** | yes | ORY Hydra's service address | - | ` ory-hydra-admin.ory.svc.cluster.local` |
| **hydra-port** | no | ORY Hydra's service port | `4445` | `4445` | | **hydra-port** | no | ORY Hydra's service port | `4445` | `4445` |
| **tls-trust-store** | no | TLS cert path for hydra client | `""` | `/etc/ssl/certs/ca-certificates.crt` | | **tls-trust-store** | no | TLS cert path for hydra client | `""` | `/etc/ssl/certs/ca-certificates.crt` |
@ -64,7 +79,10 @@ To deploy the controller, edit the value of the ```--hydra-url``` argument in th
### Testing ### Testing
Use mockery to generate mock types that implement existing interfaces. To generate a mock type for an interface, navigate to the directory containing that interface and run this command: Use mockery to generate mock types that implement existing interfaces. To
generate a mock type for an interface, navigate to the directory containing that
interface and run this command:
``` ```
mockery -name={INTERFACE_NAME} mockery -name={INTERFACE_NAME}
``` ```

View File

@ -1,3 +1,4 @@
//go:build !ignore_autogenerated
// +build !ignore_autogenerated // +build !ignore_autogenerated
/* /*

View File

@ -1,26 +1,26 @@
resources: resources:
- certificate.yaml - certificate.yaml
# the following config is for teaching kustomize how to do var substitution # the following config is for teaching kustomize how to do var substitution
vars: vars:
- name: NAMESPACE # namespace of the service and the certificate CR - name: NAMESPACE # namespace of the service and the certificate CR
objref: objref:
kind: Service kind: Service
version: v1 version: v1
name: webhook-service name: webhook-service
fieldref: fieldref:
fieldpath: metadata.namespace fieldpath: metadata.namespace
- name: CERTIFICATENAME - name: CERTIFICATENAME
objref: objref:
kind: Certificate kind: Certificate
group: certmanager.k8s.io group: certmanager.k8s.io
version: v1alpha1 version: v1alpha1
name: serving-cert # this name should match the one in certificate.yaml name: serving-cert # this name should match the one in certificate.yaml
- name: SERVICENAME - name: SERVICENAME
objref: objref:
kind: Service kind: Service
version: v1 version: v1
name: webhook-service name: webhook-service
configurations: configurations:
- kustomizeconfig.yaml - kustomizeconfig.yaml

View File

@ -1,6 +1,6 @@
# This configuration is for teaching kustomize how to update name ref and var substitution # This configuration is for teaching kustomize how to update name ref and var substitution
nameReference: nameReference:
- kind: Issuer - kind: Issuer
group: certmanager.k8s.io group: certmanager.k8s.io
fieldSpecs: fieldSpecs:
- kind: Certificate - kind: Certificate
@ -8,9 +8,9 @@ nameReference:
path: spec/issuerRef/name path: spec/issuerRef/name
varReference: varReference:
- kind: Certificate - kind: Certificate
group: certmanager.k8s.io group: certmanager.k8s.io
path: spec/commonName path: spec/commonName
- kind: Certificate - kind: Certificate
group: certmanager.k8s.io group: certmanager.k8s.io
path: spec/dnsNames path: spec/dnsNames

View File

@ -1,4 +1,3 @@
--- ---
apiVersion: apiextensions.k8s.io/v1 apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition kind: CustomResourceDefinition
@ -22,33 +21,52 @@ spec:
description: OAuth2Client is the Schema for the oauth2clients API description: OAuth2Client is the Schema for the oauth2clients API
properties: properties:
apiVersion: apiVersion:
description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' description:
"APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the
latest internal value, and may reject unrecognized values. More
info:
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources"
type: string type: string
kind: kind:
description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' description:
"Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the
client submits requests to. Cannot be updated. In CamelCase.
More info:
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds"
type: string type: string
metadata: metadata:
type: object type: object
spec: spec:
description: OAuth2ClientSpec defines the desired state of OAuth2Client description:
OAuth2ClientSpec defines the desired state of OAuth2Client
properties: properties:
allowedCorsOrigins: allowedCorsOrigins:
description: AllowedCorsOrigins is an array of allowed CORS origins description:
AllowedCorsOrigins is an array of allowed CORS origins
items: items:
description: RedirectURI represents a redirect URI for the client description:
RedirectURI represents a redirect URI for the client
pattern: \w+:/?/?[^\s]+ pattern: \w+:/?/?[^\s]+
type: string type: string
type: array type: array
audience: audience:
description: Audience is a whitelist defining the audiences this client is allowed to request tokens for description:
Audience is a whitelist defining the audiences this client
is allowed to request tokens for
items: items:
type: string type: string
type: array type: array
clientName: clientName:
description: ClientName is the human-readable string name of the client to be presented to the end-user during authorization. description:
ClientName is the human-readable string name of the client
to be presented to the end-user during authorization.
type: string type: string
grantTypes: grantTypes:
description: GrantTypes is an array of grant types the client is allowed to use. description:
GrantTypes is an array of grant types the client is allowed
to use.
items: items:
description: GrantType represents an OAuth 2.0 grant type description: GrantType represents an OAuth 2.0 grant type
enum: enum:
@ -61,22 +79,37 @@ spec:
minItems: 1 minItems: 1
type: array type: array
hydraAdmin: hydraAdmin:
description: HydraAdmin is the optional configuration to use for managing this client description:
HydraAdmin is the optional configuration to use for managing
this client
properties: properties:
endpoint: endpoint:
description: Endpoint is the endpoint for the hydra instance on which to set up the client. This value will override the value provided to `--endpoint` (defaults to `"/clients"` in the application) description:
Endpoint is the endpoint for the hydra instance on which
to set up the client. This value will override the value
provided to `--endpoint` (defaults to `"/clients"` in
the application)
pattern: (^$|^/.*) pattern: (^$|^/.*)
type: string type: string
forwardedProto: forwardedProto:
description: ForwardedProto overrides the `--forwarded-proto` flag. The value "off" will force this to be off even if `--forwarded-proto` is specified description:
ForwardedProto overrides the `--forwarded-proto` flag.
The value "off" will force this to be off even if
`--forwarded-proto` is specified
pattern: (^$|https?|off) pattern: (^$|https?|off)
type: string type: string
port: port:
description: Port is the port for the hydra instance on which to set up the client. This value will override the value provided to `--hydra-port` description:
Port is the port for the hydra instance on which to set
up the client. This value will override the value
provided to `--hydra-port`
maximum: 65535 maximum: 65535
type: integer type: integer
url: url:
description: URL is the URL for the hydra instance on which to set up the client. This value will override the value provided to `--hydra-url` description:
URL is the URL for the hydra instance on which to set up
the client. This value will override the value provided
to `--hydra-url`
maxLength: 64 maxLength: 64
pattern: (^$|^https?://.*) pattern: (^$|^https?://.*)
type: string type: string
@ -87,23 +120,33 @@ spec:
type: object type: object
x-kubernetes-preserve-unknown-fields: true x-kubernetes-preserve-unknown-fields: true
postLogoutRedirectUris: postLogoutRedirectUris:
description: PostLogoutRedirectURIs is an array of the post logout redirect URIs allowed for the application description:
PostLogoutRedirectURIs is an array of the post logout
redirect URIs allowed for the application
items: items:
description: RedirectURI represents a redirect URI for the client description:
RedirectURI represents a redirect URI for the client
pattern: \w+:/?/?[^\s]+ pattern: \w+:/?/?[^\s]+
type: string type: string
type: array type: array
redirectUris: redirectUris:
description: RedirectURIs is an array of the redirect URIs allowed for the application description:
RedirectURIs is an array of the redirect URIs allowed for
the application
items: items:
description: RedirectURI represents a redirect URI for the client description:
RedirectURI represents a redirect URI for the client
pattern: \w+:/?/?[^\s]+ pattern: \w+:/?/?[^\s]+
type: string type: string
type: array type: array
responseTypes: responseTypes:
description: ResponseTypes is an array of the OAuth 2.0 response type strings that the client can use at the authorization endpoint. description:
ResponseTypes is an array of the OAuth 2.0 response type
strings that the client can use at the authorization
endpoint.
items: items:
description: ResponseType represents an OAuth 2.0 response type strings description:
ResponseType represents an OAuth 2.0 response type strings
enum: enum:
- id_token - id_token
- code - code
@ -117,11 +160,16 @@ spec:
minItems: 1 minItems: 1
type: array type: array
scope: scope:
description: Scope is a string containing a space-separated list of scope values (as described in Section 3.3 of OAuth 2.0 [RFC6749]) that the client can use when requesting access tokens. description:
Scope is a string containing a space-separated list of scope
values (as described in Section 3.3 of OAuth 2.0 [RFC6749])
that the client can use when requesting access tokens.
pattern: ([a-zA-Z0-9\.\*]+\s?)+ pattern: ([a-zA-Z0-9\.\*]+\s?)+
type: string type: string
secretName: secretName:
description: SecretName points to the K8s secret that contains this client's ID and password description:
SecretName points to the K8s secret that contains this
client's ID and password
maxLength: 253 maxLength: 253
minLength: 1 minLength: 1
pattern: '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*' pattern: '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*'
@ -138,7 +186,9 @@ spec:
- client_secret_post - client_secret_post
- private_key_jwt - private_key_jwt
- none - none
description: Indication which authentication method shoud be used for the token endpoint description:
Indication which authentication method shoud be used for the
token endpoint
type: string type: string
required: required:
- grantTypes - grantTypes
@ -146,20 +196,28 @@ spec:
- secretName - secretName
type: object type: object
status: status:
description: OAuth2ClientStatus defines the observed state of OAuth2Client description:
OAuth2ClientStatus defines the observed state of OAuth2Client
properties: properties:
observedGeneration: observedGeneration:
description: ObservedGeneration represents the most recent generation observed by the daemon set controller. description:
ObservedGeneration represents the most recent generation
observed by the daemon set controller.
format: int64 format: int64
type: integer type: integer
reconciliationError: reconciliationError:
description: ReconciliationError represents an error that occurred during the reconciliation process description:
ReconciliationError represents an error that occurred during
the reconciliation process
properties: properties:
description: description:
description: Description is the description of the reconciliation error description:
Description is the description of the reconciliation
error
type: string type: string
statusCode: statusCode:
description: Code is the status code of the reconciliation error description:
Code is the status code of the reconciliation error
type: string type: string
type: object type: object
type: object type: object

View File

@ -2,7 +2,7 @@
# since it depends on service name and namespace that are out of this kustomize package. # since it depends on service name and namespace that are out of this kustomize package.
# It should be run by config/default # It should be run by config/default
resources: resources:
- bases/hydra.ory.sh_oauth2clients.yaml - bases/hydra.ory.sh_oauth2clients.yaml
# +kubebuilder:scaffold:crdkustomizeresource # +kubebuilder:scaffold:crdkustomizeresource
patches: patches:
@ -16,4 +16,4 @@ patches:
# the following config is for teaching kustomize how to do kustomization for CRDs. # the following config is for teaching kustomize how to do kustomization for CRDs.
configurations: configurations:
- kustomizeconfig.yaml - kustomizeconfig.yaml

View File

@ -1,6 +1,6 @@
# This file is for teaching kustomize how to substitute name and namespace reference in CRD # This file is for teaching kustomize how to substitute name and namespace reference in CRD
nameReference: nameReference:
- kind: Service - kind: Service
version: v1 version: v1
fieldSpecs: fieldSpecs:
- kind: CustomResourceDefinition - kind: CustomResourceDefinition
@ -8,10 +8,10 @@ nameReference:
path: spec/conversion/webhookClientConfig/service/name path: spec/conversion/webhookClientConfig/service/name
namespace: namespace:
- kind: CustomResourceDefinition - kind: CustomResourceDefinition
group: apiextensions.k8s.io group: apiextensions.k8s.io
path: spec/conversion/webhookClientConfig/service/namespace path: spec/conversion/webhookClientConfig/service/namespace
create: false create: false
varReference: varReference:
- path: metadata/annotations - path: metadata/annotations

View File

@ -13,20 +13,20 @@ namePrefix: hydra-maester-
# someName: someValue # someName: someValue
bases: bases:
- ../crd - ../crd
- ../rbac - ../rbac
- ../manager - ../manager
# [WEBHOOK] To enable webhook, uncomment all the sections with [WEBHOOK] prefix including the one in crd/kustomization.yaml # [WEBHOOK] To enable webhook, uncomment all the sections with [WEBHOOK] prefix including the one in crd/kustomization.yaml
#- ../webhook #- ../webhook
# [CERTMANAGER] To enable cert-manager, uncomment next line. 'WEBHOOK' components are required. # [CERTMANAGER] To enable cert-manager, uncomment next line. 'WEBHOOK' components are required.
#- ../certmanager #- ../certmanager
patches: patches:
- manager_image_patch.yaml - manager_image_patch.yaml
# Protect the /metrics endpoint by putting it behind auth. # Protect the /metrics endpoint by putting it behind auth.
# Only one of manager_auth_proxy_patch.yaml and # Only one of manager_auth_proxy_patch.yaml and
# manager_prometheus_metrics_patch.yaml should be enabled. # manager_prometheus_metrics_patch.yaml should be enabled.
- manager_auth_proxy_patch.yaml - manager_auth_proxy_patch.yaml
# If you want your controller-manager to expose the /metrics # If you want your controller-manager to expose the /metrics
# endpoint w/o any authn/z, uncomment the following line and # endpoint w/o any authn/z, uncomment the following line and
# comment manager_auth_proxy_patch.yaml. # comment manager_auth_proxy_patch.yaml.

View File

@ -8,7 +8,7 @@ spec:
template: template:
metadata: metadata:
annotations: annotations:
prometheus.io/scrape: 'true' prometheus.io/scrape: "true"
spec: spec:
containers: containers:
# Expose the prometheus metrics on default port # Expose the prometheus metrics on default port

View File

@ -1,2 +1,2 @@
resources: resources:
- manager.yaml - manager.yaml

View File

@ -3,11 +3,11 @@ kind: ClusterRole
metadata: metadata:
name: proxy-role name: proxy-role
rules: rules:
- apiGroups: ["authentication.k8s.io"] - apiGroups: ["authentication.k8s.io"]
resources: resources:
- tokenreviews - tokenreviews
verbs: ["create"] verbs: ["create"]
- apiGroups: ["authorization.k8s.io"] - apiGroups: ["authorization.k8s.io"]
resources: resources:
- subjectaccessreviews - subjectaccessreviews
verbs: ["create"] verbs: ["create"]

View File

@ -7,6 +7,6 @@ roleRef:
kind: ClusterRole kind: ClusterRole
name: proxy-role name: proxy-role
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: default name: default
namespace: system namespace: system

View File

@ -1,11 +1,11 @@
resources: resources:
- role.yaml - role.yaml
- role_binding.yaml - role_binding.yaml
- leader_election_role.yaml - leader_election_role.yaml
- leader_election_role_binding.yaml - leader_election_role_binding.yaml
# Comment the following 3 lines if you want to disable # Comment the following 3 lines if you want to disable
# the auth proxy (https://github.com/brancz/kube-rbac-proxy) # the auth proxy (https://github.com/brancz/kube-rbac-proxy)
# which protects your /metrics endpoint. # which protects your /metrics endpoint.
- auth_proxy_service.yaml - auth_proxy_service.yaml
- auth_proxy_role.yaml - auth_proxy_role.yaml
- auth_proxy_role_binding.yaml - auth_proxy_role_binding.yaml

View File

@ -4,7 +4,7 @@ kind: Role
metadata: metadata:
name: leader-election-role name: leader-election-role
rules: rules:
- apiGroups: - apiGroups:
- "" - ""
resources: resources:
- configmaps - configmaps
@ -16,7 +16,7 @@ rules:
- update - update
- patch - patch
- delete - delete
- apiGroups: - apiGroups:
- "" - ""
resources: resources:
- configmaps/status - configmaps/status

View File

@ -7,6 +7,6 @@ roleRef:
kind: Role kind: Role
name: leader-election-role name: leader-election-role
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: default name: default
namespace: system namespace: system

View File

@ -1,4 +1,3 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
@ -6,7 +5,7 @@ metadata:
creationTimestamp: null creationTimestamp: null
name: manager-role name: manager-role
rules: rules:
- apiGroups: - apiGroups:
- "" - ""
resources: resources:
- secrets - secrets
@ -18,7 +17,7 @@ rules:
- patch - patch
- update - update
- watch - watch
- apiGroups: - apiGroups:
- hydra.ory.sh - hydra.ory.sh
resources: resources:
- oauth2clients - oauth2clients
@ -30,7 +29,7 @@ rules:
- patch - patch
- update - update
- watch - watch
- apiGroups: - apiGroups:
- hydra.ory.sh - hydra.ory.sh
resources: resources:
- oauth2clients/status - oauth2clients/status

View File

@ -7,6 +7,6 @@ roleRef:
kind: ClusterRole kind: ClusterRole
name: manager-role name: manager-role
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: default name: default
namespace: system namespace: system

View File

@ -36,4 +36,3 @@ spec:
endpoint: /clients endpoint: /clients
forwardedProto: https forwardedProto: https
tokenEndpointAuthMethod: client_secret_basic tokenEndpointAuthMethod: client_secret_basic

View File

@ -1,6 +1,6 @@
resources: resources:
- manifests.yaml - manifests.yaml
- service.yaml - service.yaml
configurations: configurations:
- kustomizeconfig.yaml - kustomizeconfig.yaml

View File

@ -1,7 +1,7 @@
# the following config is for teaching kustomize where to look at when substituting vars. # the following config is for teaching kustomize where to look at when substituting vars.
# It requires kustomize v2.1.0 or newer to work properly. # It requires kustomize v2.1.0 or newer to work properly.
nameReference: nameReference:
- kind: Service - kind: Service
version: v1 version: v1
fieldSpecs: fieldSpecs:
- kind: MutatingWebhookConfiguration - kind: MutatingWebhookConfiguration
@ -12,14 +12,14 @@ nameReference:
path: webhooks/clientConfig/service/name path: webhooks/clientConfig/service/name
namespace: namespace:
- kind: MutatingWebhookConfiguration - kind: MutatingWebhookConfiguration
group: admissionregistration.k8s.io group: admissionregistration.k8s.io
path: webhooks/clientConfig/service/namespace path: webhooks/clientConfig/service/namespace
create: true create: true
- kind: ValidatingWebhookConfiguration - kind: ValidatingWebhookConfiguration
group: admissionregistration.k8s.io group: admissionregistration.k8s.io
path: webhooks/clientConfig/service/namespace path: webhooks/clientConfig/service/namespace
create: true create: true
varReference: varReference:
- path: metadata/annotations - path: metadata/annotations

View File

@ -1,4 +1,3 @@
apiVersion: v1 apiVersion: v1
kind: Service kind: Service
metadata: metadata:

View File

@ -1,24 +1,32 @@
# Design # Design
## Controller design ## Controller design
The controller listens for Custom Resource which defines client registration request. Once Custom resource is created, the controller register oauth2 client in hydra using hydra's REST API. The controller listens for Custom Resource which defines client registration
Client Id, Client Secret and Identifier of the client in hydra are be stored in the kubernetes as a secret and referenced in the applied CR. request. Once Custom resource is created, the controller register oauth2 client
Reference is used to identify in which kubernetes secret are stored mentioned properties. Secret iscreated in the same namespace of applied CR. in hydra using hydra's REST API. Client Id, Client Secret and Identifier of the
By default controller should be deployed in the same pod as hydra. Service discovery will come in place in the future. client in hydra are be stored in the kubernetes as a secret and referenced in
the applied CR. Reference is used to identify in which kubernetes secret are
stored mentioned properties. Secret iscreated in the same namespace of applied
CR. By default controller should be deployed in the same pod as hydra. Service
discovery will come in place in the future.
Custom Resource should be Namespace scoped to enable isolation in k8s. Custom Resource should be Namespace scoped to enable isolation in k8s. It is
It is represented in the diagram represented in the diagram
![diagram](./assets/workflow.svg) ![diagram](./assets/workflow.svg)
## Synchronization mode ## Synchronization mode
Additionally, controller supports synchronization mode, where it tries to register all clients in hydra. Additionally, controller supports synchronization mode, where it tries to
Synchronization is an optional mode, enabled via config, which is meant for use cases where hydra is deployed with in memory storage. register all clients in hydra. Synchronization is an optional mode, enabled via
If hydra pod is restarted for some reason then it does not have client in its storage. With synchronization mode the controller makes sure that hydra has up to date clients. config, which is meant for use cases where hydra is deployed with in memory
Synchronization is done by making POST request to hydra with payload describing all client information including clientID,clientSecret and Identifier of last applied client. storage. If hydra pod is restarted for some reason then it does not have client
If client exists in hydra storage 409 is returned which is considered as ok and synchronization continues with other clients. in its storage. With synchronization mode the controller makes sure that hydra
has up to date clients. Synchronization is done by making POST request to hydra
with payload describing all client information including clientID,clientSecret
and Identifier of last applied client. If client exists in hydra storage 409 is
returned which is considered as ok and synchronization continues with other
clients.
![diagram](./assets/synchronization-mode.svg) ![diagram](./assets/synchronization-mode.svg)

48
package-lock.json generated Normal file
View File

@ -0,0 +1,48 @@
{
"name": "hydra-maester",
"lockfileVersion": 2,
"requires": true,
"packages": {
"": {
"devDependencies": {
"ory-prettier-styles": "1.3.0",
"prettier": "2.7.1"
}
},
"node_modules/ory-prettier-styles": {
"version": "1.3.0",
"resolved": "https://registry.npmjs.org/ory-prettier-styles/-/ory-prettier-styles-1.3.0.tgz",
"integrity": "sha512-Vfn0G6CyLaadwcCamwe1SQCf37ZQfBDgMrhRI70dE/2fbE3Q43/xu7K5c32I5FGt/EliroWty5yBjmdkj0eWug==",
"dev": true
},
"node_modules/prettier": {
"version": "2.7.1",
"resolved": "https://registry.npmjs.org/prettier/-/prettier-2.7.1.tgz",
"integrity": "sha512-ujppO+MkdPqoVINuDFDRLClm7D78qbDt0/NR+wp5FqEZOoTNAjPHWj17QRhu7geIHJfcNhRk1XVQmF8Bp3ye+g==",
"dev": true,
"bin": {
"prettier": "bin-prettier.js"
},
"engines": {
"node": ">=10.13.0"
},
"funding": {
"url": "https://github.com/prettier/prettier?sponsor=1"
}
}
},
"dependencies": {
"ory-prettier-styles": {
"version": "1.3.0",
"resolved": "https://registry.npmjs.org/ory-prettier-styles/-/ory-prettier-styles-1.3.0.tgz",
"integrity": "sha512-Vfn0G6CyLaadwcCamwe1SQCf37ZQfBDgMrhRI70dE/2fbE3Q43/xu7K5c32I5FGt/EliroWty5yBjmdkj0eWug==",
"dev": true
},
"prettier": {
"version": "2.7.1",
"resolved": "https://registry.npmjs.org/prettier/-/prettier-2.7.1.tgz",
"integrity": "sha512-ujppO+MkdPqoVINuDFDRLClm7D78qbDt0/NR+wp5FqEZOoTNAjPHWj17QRhu7geIHJfcNhRk1XVQmF8Bp3ye+g==",
"dev": true
}
}
}

8
package.json Normal file
View File

@ -0,0 +1,8 @@
{
"private": true,
"prettier": "ory-prettier-styles",
"devDependencies": {
"ory-prettier-styles": "1.3.0",
"prettier": "2.7.1"
}
}