wip: integrate hydra-sql in example environment
This commit is contained in:
parent
546f31b2dd
commit
62ef2763de
|
@ -38,7 +38,7 @@ spec:
|
||||||
key: WERTHER_LDAP_BINDPW
|
key: WERTHER_LDAP_BINDPW
|
||||||
ports:
|
ports:
|
||||||
- containerPort: 8080
|
- containerPort: 8080
|
||||||
name: hydra-ldap-http
|
name: http
|
||||||
securityContext:
|
securityContext:
|
||||||
allowPrivilegeEscalation: false
|
allowPrivilegeEscalation: false
|
||||||
capabilities:
|
capabilities:
|
||||||
|
|
|
@ -7,9 +7,9 @@ metadata:
|
||||||
spec:
|
spec:
|
||||||
type: ClusterIP
|
type: ClusterIP
|
||||||
ports:
|
ports:
|
||||||
- name: hydra-ldap
|
- name: http
|
||||||
port: 8080
|
port: 8080
|
||||||
targetPort: hydra-ldap-http
|
targetPort: http
|
||||||
protocol: TCP
|
protocol: TCP
|
||||||
selector:
|
selector:
|
||||||
app.kubernetes.io/name: hydra-ldap
|
app.kubernetes.io/name: hydra-ldap
|
||||||
|
|
|
@ -0,0 +1,30 @@
|
||||||
|
hydra:
|
||||||
|
apps:
|
||||||
|
- id: sql
|
||||||
|
title:
|
||||||
|
fr: Connexion SQL
|
||||||
|
en: Login SQL
|
||||||
|
description:
|
||||||
|
fr: Authentification avec SQL
|
||||||
|
en: Authentication with SQL
|
||||||
|
login_url: "%env(string:HYDRA_DISPATCHER_SQL_LOGIN_URL)%"
|
||||||
|
consent_url: "%env(string:HYDRA_DISPATCHER_SQL_CONSENT_URL)%"
|
||||||
|
logout_url: "%env(string:HYDRA_DISPATCHER_SQL_LOGOUT_URL)%"
|
||||||
|
attributes_rewrite_configuration:
|
||||||
|
uid:
|
||||||
|
rules:
|
||||||
|
- "property_exists(consent.session.id_token, 'uid') ? consent.session.id_token.uid : null"
|
||||||
|
email:
|
||||||
|
rules:
|
||||||
|
- "property_exists(consent.session.id_token, 'email') ? consent.session.id_token.email : null"
|
||||||
|
eduPersonAffiliation:
|
||||||
|
rules:
|
||||||
|
- "property_exists(consent.session.id_token, 'eduPersonAffiliation') ? consent.session.id_token.eduPersonAffiliation : null"
|
||||||
|
firewall:
|
||||||
|
rules:
|
||||||
|
email:
|
||||||
|
required: false
|
||||||
|
uid:
|
||||||
|
required: false
|
||||||
|
eduPersonAffiliation:
|
||||||
|
required: false
|
|
@ -26,3 +26,14 @@ configMapGenerator:
|
||||||
- name: sql-login-config
|
- name: sql-login-config
|
||||||
files:
|
files:
|
||||||
- ./files/sql_login.yaml
|
- ./files/sql_login.yaml
|
||||||
|
- name: hydra-dispatcher-apps
|
||||||
|
behavior: merge
|
||||||
|
files:
|
||||||
|
- ./files/hydra/sql.yaml
|
||||||
|
|
||||||
|
patchesJson6902:
|
||||||
|
- target:
|
||||||
|
version: v1
|
||||||
|
kind: ConfigMap
|
||||||
|
name: hydra-dispatcher-env
|
||||||
|
path: patches/hydra-dispatcher-env.yaml
|
||||||
|
|
|
@ -0,0 +1,9 @@
|
||||||
|
- op: replace
|
||||||
|
path: "/data/HYDRA_DISPATCHER_SQL_LOGIN_URL"
|
||||||
|
value: http://hydra-sql/login
|
||||||
|
- op: replace
|
||||||
|
path: "/data/HYDRA_DISPATCHER_SQL_CONSENT_URL"
|
||||||
|
value: http://hydra-sql/consent
|
||||||
|
- op: replace
|
||||||
|
path: "/data/HYDRA_DISPATCHER_SQL_LOGOUT_URL"
|
||||||
|
value: http://hydra-sql/logout
|
|
@ -30,10 +30,10 @@ spec:
|
||||||
valueFrom:
|
valueFrom:
|
||||||
secretKeyRef:
|
secretKeyRef:
|
||||||
name: oidc-test-oauth2-client
|
name: oidc-test-oauth2-client
|
||||||
key: client_id
|
key: CLIENT_ID
|
||||||
- name: OIDC_CLIENT_SECRET
|
- name: OIDC_CLIENT_SECRET
|
||||||
valueFrom:
|
valueFrom:
|
||||||
secretKeyRef:
|
secretKeyRef:
|
||||||
name: oidc-test-oauth2-client
|
name: oidc-test-oauth2-client
|
||||||
key: client_secret
|
key: CLIENT_SECRET
|
||||||
restartPolicy: Always
|
restartPolicy: Always
|
||||||
|
|
|
@ -24,14 +24,6 @@ L'exemple est actuellement déployé avec le composant `hydra-saml` uniquement.
|
||||||
kubectl apply -k ./examples/authenticated-app
|
kubectl apply -k ./examples/authenticated-app
|
||||||
```
|
```
|
||||||
|
|
||||||
**Note** Il est possible d'avoir l'erreur suivante:
|
|
||||||
|
|
||||||
```
|
|
||||||
error: resource mapping not found for name: "app-oauth2-client" namespace: "" from "./examples/authenticated-app": no matches for kind "OAuth2Client" in version "hydra.ory.sh/v1alpha1"
|
|
||||||
```
|
|
||||||
|
|
||||||
Cette erreur est "normale" (voir https://github.com/kubernetes/kubectl/issues/1117). Dans ce cas, attendre la création de la CRD (voir ticket) puis relancer la commande.
|
|
||||||
|
|
||||||
4. Ajouter l'entrée suivante dans votre fichier `/etc/hosts`
|
4. Ajouter l'entrée suivante dans votre fichier `/etc/hosts`
|
||||||
|
|
||||||
```
|
```
|
||||||
|
@ -56,6 +48,6 @@ kind delete cluster -n sso-kustom-example
|
||||||
#### URL utiles
|
#### URL utiles
|
||||||
|
|
||||||
| URL | Description |
|
| URL | Description |
|
||||||
|---|-----------|
|
| --------------------------------------------------- | ------------------------------------- |
|
||||||
| https://ssokustom/auth/saml/Shibboleth.sso/Session | Attributs de la session SP Shibboleth |
|
| https://ssokustom/auth/saml/Shibboleth.sso/Session | Attributs de la session SP Shibboleth |
|
||||||
| https://ssokustom/auth/saml/Shibboleth.sso/Metadata | Métadonnées du SP Shibboleth |
|
| https://ssokustom/auth/saml/Shibboleth.sso/Metadata | Métadonnées du SP Shibboleth |
|
||||||
|
|
|
@ -8,7 +8,7 @@ resources:
|
||||||
- ./resources/self-signed-issuer.yaml
|
- ./resources/self-signed-issuer.yaml
|
||||||
- ./resources/port-forwarder.yaml
|
- ./resources/port-forwarder.yaml
|
||||||
|
|
||||||
patchesJson6902:
|
patches:
|
||||||
- target:
|
- target:
|
||||||
version: v1
|
version: v1
|
||||||
kind: ConfigMap
|
kind: ConfigMap
|
||||||
|
@ -39,3 +39,8 @@ patchesJson6902:
|
||||||
kind: OAuth2Client
|
kind: OAuth2Client
|
||||||
name: oidc-test-oauth2-client
|
name: oidc-test-oauth2-client
|
||||||
path: patches/oidc-test-oauth2-client.yaml
|
path: patches/oidc-test-oauth2-client.yaml
|
||||||
|
- target:
|
||||||
|
version: v1
|
||||||
|
kind: ConfigMap
|
||||||
|
name: hydra-sql-env
|
||||||
|
path: patches/hydra-sql-env.yaml
|
||||||
|
|
|
@ -28,3 +28,13 @@
|
||||||
path: "/data/HYDRA_DISPATCHER_SAML_LOGOUT_URL"
|
path: "/data/HYDRA_DISPATCHER_SAML_LOGOUT_URL"
|
||||||
value: https://ssokustom/auth/saml/logout
|
value: https://ssokustom/auth/saml/logout
|
||||||
|
|
||||||
|
# Hydra SQL configuration
|
||||||
|
- op: replace
|
||||||
|
path: "/data/HYDRA_DISPATCHER_SQL_LOGIN_URL"
|
||||||
|
value: https://ssokustom/auth/sql/login
|
||||||
|
- op: replace
|
||||||
|
path: "/data/HYDRA_DISPATCHER_SQL_CONSENT_URL"
|
||||||
|
value: https://ssokustom/auth/sql/consent
|
||||||
|
- op: replace
|
||||||
|
path: "/data/HYDRA_DISPATCHER_SQL_LOGOUT_URL"
|
||||||
|
value: https://ssokustom/auth/sql/logout
|
||||||
|
|
|
@ -0,0 +1,24 @@
|
||||||
|
- op: replace
|
||||||
|
path: "/data/BASE_URL"
|
||||||
|
value: https://ssokustom/auth/sql
|
||||||
|
- op: replace
|
||||||
|
path: "/data/ISSUER_URL"
|
||||||
|
value: https://ssokustom
|
||||||
|
- op: replace
|
||||||
|
path: "/data/ISSUER_URL"
|
||||||
|
value: https://ssokustom
|
||||||
|
- op: replace
|
||||||
|
path: "/data/HYDRA_ADMIN_BASE_URL"
|
||||||
|
value: http://hydra-dispatcher
|
||||||
|
- op: replace
|
||||||
|
path: "/data/DSN_REMOTE_DATABASE"
|
||||||
|
value: pgsql:host='postgres';port=5432;dbname=lasql
|
||||||
|
- op: replace
|
||||||
|
path: "/data/REDIS_DSN"
|
||||||
|
value: redis://redis:6379
|
||||||
|
- op: replace
|
||||||
|
path: "/data/DB_USER"
|
||||||
|
value: makeMeASecret
|
||||||
|
- op: replace
|
||||||
|
path: "/data/DB_PASSWORD"
|
||||||
|
value: rmakeMeASecret
|
|
@ -50,6 +50,30 @@ spec:
|
||||||
---
|
---
|
||||||
apiVersion: networking.k8s.io/v1
|
apiVersion: networking.k8s.io/v1
|
||||||
kind: Ingress
|
kind: Ingress
|
||||||
|
metadata:
|
||||||
|
name: auth-sql
|
||||||
|
annotations:
|
||||||
|
cert-manager.io/issuer: "self-signed"
|
||||||
|
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
||||||
|
spec:
|
||||||
|
ingressClassName: nginx
|
||||||
|
tls:
|
||||||
|
- hosts:
|
||||||
|
- ssokustom
|
||||||
|
secretName: ssokustom-example-tls
|
||||||
|
rules:
|
||||||
|
- http:
|
||||||
|
paths:
|
||||||
|
- path: /auth/sql(/|$)(.*)
|
||||||
|
pathType: Prefix
|
||||||
|
backend:
|
||||||
|
service:
|
||||||
|
name: hydra-sql
|
||||||
|
port:
|
||||||
|
name: http
|
||||||
|
---
|
||||||
|
apiVersion: networking.k8s.io/v1
|
||||||
|
kind: Ingress
|
||||||
metadata:
|
metadata:
|
||||||
name: auth-dispatcher
|
name: auth-dispatcher
|
||||||
annotations:
|
annotations:
|
||||||
|
@ -124,8 +148,3 @@ spec:
|
||||||
name: saml-idp
|
name: saml-idp
|
||||||
port:
|
port:
|
||||||
name: https
|
name: https
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -5,6 +5,7 @@ resources:
|
||||||
- https://forge.cadoles.com/CadolesKube/c-kustom//base/cloudnative-pg-operator?ref=develop
|
- https://forge.cadoles.com/CadolesKube/c-kustom//base/cloudnative-pg-operator?ref=develop
|
||||||
- https://forge.cadoles.com/CadolesKube/c-kustom//base/redis?ref=develop
|
- https://forge.cadoles.com/CadolesKube/c-kustom//base/redis?ref=develop
|
||||||
- https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/deploy/static/provider/kind/deploy.yaml
|
- https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/deploy/static/provider/kind/deploy.yaml
|
||||||
|
- https://raw.githubusercontent.com/ory/k8s/v0.28.2/helm/charts/hydra-maester/crds/crd-oauth2clients.yaml
|
||||||
|
|
||||||
patchesJson6902:
|
patchesJson6902:
|
||||||
- target:
|
- target:
|
||||||
|
|
Loading…
Reference in New Issue