Compare commits
1 Commits
69f12e20fc
...
1eb4f51d8e
Author | SHA1 | Date | |
---|---|---|---|
1eb4f51d8e |
@ -10,4 +10,21 @@ hydra:
|
|||||||
login_url: "%env(string:HYDRA_DISPATCHER_SAML_LOGIN_URL)%"
|
login_url: "%env(string:HYDRA_DISPATCHER_SAML_LOGIN_URL)%"
|
||||||
consent_url: "%env(string:HYDRA_DISPATCHER_SAML_CONSENT_URL)%"
|
consent_url: "%env(string:HYDRA_DISPATCHER_SAML_CONSENT_URL)%"
|
||||||
logout_url: "%env(string:HYDRA_DISPATCHER_SAML_LOGOUT_URL)%"
|
logout_url: "%env(string:HYDRA_DISPATCHER_SAML_LOGOUT_URL)%"
|
||||||
attributes_rewrite_configuration: {}
|
attributes_rewrite_configuration:
|
||||||
|
uid:
|
||||||
|
rules:
|
||||||
|
- "property_exists(consent.session.id_token, 'uid') ? consent.session.id_token.uid : null"
|
||||||
|
email:
|
||||||
|
rules:
|
||||||
|
- "property_exists(consent.session.id_token, 'email') ? consent.session.id_token.email : null"
|
||||||
|
eduPersonAffiliation:
|
||||||
|
rules:
|
||||||
|
- "property_exists(consent.session.id_token, 'eduPersonAffiliation') ? consent.session.id_token.eduPersonAffiliation : null"
|
||||||
|
firewall:
|
||||||
|
rules:
|
||||||
|
email:
|
||||||
|
required: true
|
||||||
|
uid:
|
||||||
|
required: true
|
||||||
|
eduPersonAffiliation:
|
||||||
|
required: true
|
@ -0,0 +1,3 @@
|
|||||||
|
<Attribute name="uid" nameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic" id="uid" />
|
||||||
|
<Attribute name="eduPersonAffiliation" nameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic" id="eduPersonAffiliation" />
|
||||||
|
<Attribute name="email" nameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic" id="email" />
|
@ -18,6 +18,7 @@ configMapGenerator:
|
|||||||
- HYDRA_ADMIN_BASE_URL=http://hydra:4445/admin
|
- HYDRA_ADMIN_BASE_URL=http://hydra:4445/admin
|
||||||
- TRUSTED_PROXIES=127.0.0.1,REMOTE_ADDR
|
- TRUSTED_PROXIES=127.0.0.1,REMOTE_ADDR
|
||||||
- LOGOUT_REDIRECT_URL_PATTERN=http://hydra-saml/Shibboleth.sso/Logout?return=%s'
|
- LOGOUT_REDIRECT_URL_PATTERN=http://hydra-saml/Shibboleth.sso/Logout?return=%s'
|
||||||
|
- PATH_PREFIX=
|
||||||
# Shibboleth SP environment variables
|
# Shibboleth SP environment variables
|
||||||
- SP_ENTITY_ID=http://hydra-saml-shibboleth-sp
|
- SP_ENTITY_ID=http://hydra-saml-shibboleth-sp
|
||||||
- IDP_ENTITY_ID=http://saml-idp
|
- IDP_ENTITY_ID=http://saml-idp
|
||||||
@ -25,10 +26,14 @@ configMapGenerator:
|
|||||||
- APACHE_BACKEND_URL=http://hydra-saml-remote-user
|
- APACHE_BACKEND_URL=http://hydra-saml-remote-user
|
||||||
- APACHE_FORCE_HTTPS=false
|
- APACHE_FORCE_HTTPS=false
|
||||||
- SP_HANDLER_BASE_PATH=/
|
- SP_HANDLER_BASE_PATH=/
|
||||||
|
- SP_SESSIONS_RELAY_STATE=cookie:5
|
||||||
- name: hydra-dispatcher-apps
|
- name: hydra-dispatcher-apps
|
||||||
behavior: merge
|
behavior: merge
|
||||||
files:
|
files:
|
||||||
- ./files/hydra/saml.yaml
|
- ./files/hydra/saml.yaml
|
||||||
|
- name: hydra-saml-shibboleth-sp
|
||||||
|
files:
|
||||||
|
- ./files/shibboleth-sp/attribute-map.inc.xml
|
||||||
|
|
||||||
patchesJson6902:
|
patchesJson6902:
|
||||||
- target:
|
- target:
|
||||||
|
@ -18,7 +18,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: hydra-saml-remote-user
|
- name: hydra-saml-remote-user
|
||||||
image: reg.cadoles.com/cadoles/hydra-remote-user-v1:v0.0.0-218-g4b5e1d9
|
image: reg.cadoles.com/wpetit/hydra-remote-user-v1:v0.0.0-232-g99ae0e5
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
name: hydra-saml-env
|
name: hydra-saml-env
|
||||||
|
@ -16,14 +16,24 @@ spec:
|
|||||||
labels:
|
labels:
|
||||||
io.kompose.service: hydra-saml-shibboleth-sp
|
io.kompose.service: hydra-saml-shibboleth-sp
|
||||||
spec:
|
spec:
|
||||||
|
securityContext:
|
||||||
|
fsGroup: 102
|
||||||
containers:
|
containers:
|
||||||
- name: hydra-saml-shibboleth-sp
|
- name: hydra-saml-shibboleth-sp
|
||||||
image: reg.cadoles.com/wpetit/shibboleth-sp-v3:v0.0.0-231-ge7979bb
|
image: reg.cadoles.com/wpetit/shibboleth-sp-v3:v0.0.0-232-g377af91
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
name: hydra-saml-env
|
name: hydra-saml-env
|
||||||
|
volumeMounts:
|
||||||
|
- name: attributes-map-inc
|
||||||
|
mountPath: /etc/shibboleth/attribute-map.inc.xml
|
||||||
|
subPath: attribute-map.inc.xml
|
||||||
ports:
|
ports:
|
||||||
- containerPort: 80
|
- containerPort: 80
|
||||||
resources: {}
|
resources: {}
|
||||||
restartPolicy: Always
|
restartPolicy: Always
|
||||||
|
volumes:
|
||||||
|
- name: attributes-map-inc
|
||||||
|
configMap:
|
||||||
|
name: hydra-saml-shibboleth-sp
|
||||||
|
|
||||||
|
@ -40,16 +40,16 @@ L'exemple est actuellement déployé avec le composant `hydra-saml` uniquement.
|
|||||||
|
|
||||||
5. Après stabilisation du déploiement, l'application devrait être accessible à l'adresse https://ssokustom
|
5. Après stabilisation du déploiement, l'application devrait être accessible à l'adresse https://ssokustom
|
||||||
|
|
||||||
#### Authentification
|
|
||||||
|
|
||||||
### SAML
|
|
||||||
|
|
||||||
- Utilisateur: `user1`
|
|
||||||
- Mot de passe `user1pass`
|
|
||||||
|
|
||||||
#### Supprimer le cluster
|
#### Supprimer le cluster
|
||||||
|
|
||||||
```
|
```
|
||||||
kind delete cluster -n sso-kustom-example
|
kind delete cluster -n sso-kustom-example
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Authentification
|
||||||
|
|
||||||
|
### SAML
|
||||||
|
|
||||||
|
- Utilisateur: `user1`
|
||||||
|
- Mot de passe `user1pass`
|
||||||
|
|
||||||
|
@ -4,14 +4,12 @@ kind: Kustomization
|
|||||||
resources:
|
resources:
|
||||||
- ../../resources/hydra
|
- ../../resources/hydra
|
||||||
- ../../resources/hydra-dispatcher
|
- ../../resources/hydra-dispatcher
|
||||||
- ./resources/app-deployment.yaml
|
- ./resources/app.yaml
|
||||||
- ./resources/app-service.yaml
|
|
||||||
- ./resources/ingress.yaml
|
- ./resources/ingress.yaml
|
||||||
- ./resources/oauth2-client.yaml
|
- ./resources/oauth2-client.yaml
|
||||||
- ./resources/saml-idp.yaml
|
- ./resources/saml-idp.yaml
|
||||||
- ./resources/self-signed-issuer.yaml
|
- ./resources/self-signed-issuer.yaml
|
||||||
- ./resources/port-forwarder-deployment.yaml
|
- ./resources/port-forwarder.yaml
|
||||||
- ./resources/port-forwarder-service.yaml
|
|
||||||
|
|
||||||
components:
|
components:
|
||||||
- ../../components/hydra-cnpg-database
|
- ../../components/hydra-cnpg-database
|
||||||
|
@ -10,22 +10,25 @@
|
|||||||
- op: replace
|
- op: replace
|
||||||
path: "/data/LOGOUT_REDIRECT_URL_PATTERN"
|
path: "/data/LOGOUT_REDIRECT_URL_PATTERN"
|
||||||
value: https://ssokustom/auth/saml/Shibboleth.sso/Logout?return=%s
|
value: https://ssokustom/auth/saml/Shibboleth.sso/Logout?return=%s
|
||||||
|
- op: replace
|
||||||
|
path: "/data/PATH_PREFIX"
|
||||||
|
value: "/auth/saml"
|
||||||
|
|
||||||
- op: replace
|
- op: replace
|
||||||
path: "/data/SP_ENTITY_ID"
|
path: "/data/SP_ENTITY_ID"
|
||||||
value: https://ssokustom/auth/saml
|
value: https://ssokustom/auth/saml
|
||||||
- op: replace
|
- op: replace
|
||||||
path: "/data/IDP_ENTITY_ID"
|
path: "/data/IDP_ENTITY_ID"
|
||||||
value: http://ssokustom/simplesaml/saml2/idp/metadata.php
|
value: https://ssokustom/simplesaml/saml2/idp/metadata.php
|
||||||
- op: replace
|
- op: replace
|
||||||
path: "/data/IDP_METADATA_URL"
|
path: "/data/IDP_METADATA_URL"
|
||||||
value: http://ssokustom/simplesaml/saml2/idp/metadata.php
|
value: https://ssokustom/simplesaml/saml2/idp/metadata.php
|
||||||
- op: replace
|
- op: replace
|
||||||
path: "/data/APACHE_FORCE_HTTPS"
|
path: "/data/APACHE_FORCE_HTTPS"
|
||||||
value: "false"
|
value: "true"
|
||||||
- op: replace
|
- op: replace
|
||||||
path: "/data/SP_HANDLER_BASE_PATH"
|
path: "/data/SP_HANDLER_BASE_PATH"
|
||||||
value: /
|
value: "/auth/saml"
|
||||||
- op: replace
|
- op: replace
|
||||||
path: "/data/SP_LOG_LEVEL"
|
path: "/data/SP_LOG_LEVEL"
|
||||||
value: DEBUG
|
value: DEBUG
|
||||||
|
@ -1,15 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: Service
|
|
||||||
metadata:
|
|
||||||
labels:
|
|
||||||
io.kompose.service: app
|
|
||||||
name: app
|
|
||||||
spec:
|
|
||||||
ports:
|
|
||||||
- name: http
|
|
||||||
port: 8080
|
|
||||||
targetPort: 8080
|
|
||||||
selector:
|
|
||||||
io.kompose.service: app
|
|
||||||
status:
|
|
||||||
loadBalancer: {}
|
|
@ -17,7 +17,7 @@ spec:
|
|||||||
io.kompose.service: app
|
io.kompose.service: app
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- image: reg.cadoles.com/cadoles/oidc-test:2023.11.2-stable.1831.8496a4e
|
- image: reg.cadoles.com/cadoles/oidc-test:2023.11.6-stable.1557.e16b905
|
||||||
name: app
|
name: app
|
||||||
ports:
|
ports:
|
||||||
- containerPort: 8080
|
- containerPort: 8080
|
||||||
@ -40,9 +40,27 @@ spec:
|
|||||||
- name: OIDC_ISSUER_URL
|
- name: OIDC_ISSUER_URL
|
||||||
value: http://hydra:4444
|
value: http://hydra:4444
|
||||||
- name: OIDC_REDIRECT_URL
|
- name: OIDC_REDIRECT_URL
|
||||||
value: https://ssokustom
|
value: https://ssokustom/oauth2/callback
|
||||||
- name: OIDC_POST_LOGOUT_REDIRECT_URL
|
- name: OIDC_POST_LOGOUT_REDIRECT_URL
|
||||||
value: https://ssokustom
|
value: https://ssokustom
|
||||||
- name: OIDC_SKIP_ISSUER_VERIFICATION
|
- name: OIDC_SKIP_ISSUER_VERIFICATION
|
||||||
value: "true"
|
value: "true"
|
||||||
|
- name: OIDC_INSECURE_SKIP_VERIFY
|
||||||
|
value: "true"
|
||||||
restartPolicy: Always
|
restartPolicy: Always
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
io.kompose.service: app
|
||||||
|
name: app
|
||||||
|
spec:
|
||||||
|
ports:
|
||||||
|
- name: http
|
||||||
|
port: 8080
|
||||||
|
targetPort: 8080
|
||||||
|
selector:
|
||||||
|
io.kompose.service: app
|
||||||
|
status:
|
||||||
|
loadBalancer: {}
|
@ -5,11 +5,12 @@ metadata:
|
|||||||
annotations:
|
annotations:
|
||||||
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
||||||
cert-manager.io/issuer: "self-signed"
|
cert-manager.io/issuer: "self-signed"
|
||||||
|
# nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||||
|
# more_set_headers "X-Forwarded-Proto: https";
|
||||||
spec:
|
spec:
|
||||||
ingressClassName: nginx
|
ingressClassName: nginx
|
||||||
tls:
|
tls:
|
||||||
- hosts:
|
- hosts:
|
||||||
- ssokustom
|
|
||||||
- ssokustom
|
- ssokustom
|
||||||
secretName: ssokustom-example-tls
|
secretName: ssokustom-example-tls
|
||||||
rules:
|
rules:
|
||||||
@ -26,16 +27,40 @@ spec:
|
|||||||
apiVersion: networking.k8s.io/v1
|
apiVersion: networking.k8s.io/v1
|
||||||
kind: Ingress
|
kind: Ingress
|
||||||
metadata:
|
metadata:
|
||||||
name: auth
|
name: auth-saml
|
||||||
annotations:
|
annotations:
|
||||||
cert-manager.io/issuer: "self-signed"
|
cert-manager.io/issuer: "self-signed"
|
||||||
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
||||||
nginx.ingress.kubernetes.io/rewrite-target: /$2
|
|
||||||
spec:
|
spec:
|
||||||
ingressClassName: nginx
|
ingressClassName: nginx
|
||||||
tls:
|
tls:
|
||||||
- hosts:
|
- hosts:
|
||||||
- ssokustom
|
- ssokustom
|
||||||
|
secretName: ssokustom-example-tls
|
||||||
|
rules:
|
||||||
|
- http:
|
||||||
|
paths:
|
||||||
|
- path: /auth/saml(/|$)(.*)
|
||||||
|
pathType: Prefix
|
||||||
|
backend:
|
||||||
|
service:
|
||||||
|
name: hydra-saml
|
||||||
|
port:
|
||||||
|
name: http
|
||||||
|
---
|
||||||
|
apiVersion: networking.k8s.io/v1
|
||||||
|
kind: Ingress
|
||||||
|
metadata:
|
||||||
|
name: auth-dispatcher
|
||||||
|
annotations:
|
||||||
|
cert-manager.io/issuer: "self-signed"
|
||||||
|
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
||||||
|
nginx.ingress.kubernetes.io/rewrite-target: /$2
|
||||||
|
nginx.ingress.kubernetes.io/x-forwarded-prefix: /auth/dispatcher
|
||||||
|
spec:
|
||||||
|
ingressClassName: nginx
|
||||||
|
tls:
|
||||||
|
- hosts:
|
||||||
- ssokustom
|
- ssokustom
|
||||||
secretName: ssokustom-example-tls
|
secretName: ssokustom-example-tls
|
||||||
rules:
|
rules:
|
||||||
@ -48,7 +73,24 @@ spec:
|
|||||||
name: hydra-dispatcher
|
name: hydra-dispatcher
|
||||||
port:
|
port:
|
||||||
name: http
|
name: http
|
||||||
|
---
|
||||||
|
apiVersion: networking.k8s.io/v1
|
||||||
|
kind: Ingress
|
||||||
|
metadata:
|
||||||
|
name: auth
|
||||||
|
annotations:
|
||||||
|
cert-manager.io/issuer: "self-signed"
|
||||||
|
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
||||||
|
nginx.ingress.kubernetes.io/rewrite-target: /$2
|
||||||
|
spec:
|
||||||
|
ingressClassName: nginx
|
||||||
|
tls:
|
||||||
|
- hosts:
|
||||||
|
- ssokustom
|
||||||
|
secretName: ssokustom-example-tls
|
||||||
|
rules:
|
||||||
|
- http:
|
||||||
|
paths:
|
||||||
- path: /auth(/|$)(.*)
|
- path: /auth(/|$)(.*)
|
||||||
pathType: Prefix
|
pathType: Prefix
|
||||||
backend:
|
backend:
|
||||||
@ -56,14 +98,6 @@ spec:
|
|||||||
name: hydra
|
name: hydra
|
||||||
port:
|
port:
|
||||||
name: hydra-public
|
name: hydra-public
|
||||||
|
|
||||||
- path: /auth/saml(/|$)(.*)
|
|
||||||
pathType: Prefix
|
|
||||||
backend:
|
|
||||||
service:
|
|
||||||
name: hydra-saml
|
|
||||||
port:
|
|
||||||
name: http
|
|
||||||
---
|
---
|
||||||
apiVersion: networking.k8s.io/v1
|
apiVersion: networking.k8s.io/v1
|
||||||
kind: Ingress
|
kind: Ingress
|
||||||
@ -73,11 +107,11 @@ metadata:
|
|||||||
cert-manager.io/issuer: "self-signed"
|
cert-manager.io/issuer: "self-signed"
|
||||||
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
||||||
nginx.ingress.kubernetes.io/rewrite-target: /simplesaml/$2
|
nginx.ingress.kubernetes.io/rewrite-target: /simplesaml/$2
|
||||||
|
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
|
||||||
spec:
|
spec:
|
||||||
ingressClassName: nginx
|
ingressClassName: nginx
|
||||||
tls:
|
tls:
|
||||||
- hosts:
|
- hosts:
|
||||||
- ssokustom
|
|
||||||
- ssokustom
|
- ssokustom
|
||||||
secretName: ssokustom-example-tls
|
secretName: ssokustom-example-tls
|
||||||
rules:
|
rules:
|
||||||
@ -89,7 +123,7 @@ spec:
|
|||||||
service:
|
service:
|
||||||
name: saml-idp
|
name: saml-idp
|
||||||
port:
|
port:
|
||||||
name: http
|
name: https
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -10,9 +10,9 @@ spec:
|
|||||||
- refresh_token
|
- refresh_token
|
||||||
responseTypes:
|
responseTypes:
|
||||||
- code
|
- code
|
||||||
scope: "openid profile email"
|
scope: "openid email"
|
||||||
secretName: app-oidc-secret
|
secretName: app-oidc-secret
|
||||||
redirectUris:
|
redirectUris:
|
||||||
- https://ssokustom
|
- https://ssokustom/oauth2/callback
|
||||||
postLogoutRedirectUris:
|
postLogoutRedirectUris:
|
||||||
- https://ssokustom
|
- https://ssokustom
|
||||||
|
@ -1,16 +0,0 @@
|
|||||||
kind: Service
|
|
||||||
apiVersion: v1
|
|
||||||
metadata:
|
|
||||||
name: ssokustom
|
|
||||||
labels:
|
|
||||||
io.kompose.service: port-forwarder
|
|
||||||
spec:
|
|
||||||
ports:
|
|
||||||
- name: https
|
|
||||||
port: 443
|
|
||||||
targetPort: 443
|
|
||||||
- name: http
|
|
||||||
port: 80
|
|
||||||
targetPort: 80
|
|
||||||
selector:
|
|
||||||
io.kompose.service: port-forwarder
|
|
@ -36,3 +36,20 @@ spec:
|
|||||||
resources: {}
|
resources: {}
|
||||||
args: ["ingress-nginx-controller.ingress-nginx.svc.cluster.local", "80"]
|
args: ["ingress-nginx-controller.ingress-nginx.svc.cluster.local", "80"]
|
||||||
restartPolicy: Always
|
restartPolicy: Always
|
||||||
|
---
|
||||||
|
kind: Service
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: ssokustom
|
||||||
|
labels:
|
||||||
|
io.kompose.service: port-forwarder
|
||||||
|
spec:
|
||||||
|
ports:
|
||||||
|
- name: https
|
||||||
|
port: 443
|
||||||
|
targetPort: 443
|
||||||
|
- name: http
|
||||||
|
port: 80
|
||||||
|
targetPort: 80
|
||||||
|
selector:
|
||||||
|
io.kompose.service: port-forwarder
|
@ -3,4 +3,12 @@ kind: Kustomization
|
|||||||
resources:
|
resources:
|
||||||
- https://github.com/jetstack/cert-manager/releases/download/v1.13.2/cert-manager.yaml
|
- https://github.com/jetstack/cert-manager/releases/download/v1.13.2/cert-manager.yaml
|
||||||
- https://forge.cadoles.com/CadolesKube/c-kustom//base/cloudnative-pg-operator?ref=develop
|
- https://forge.cadoles.com/CadolesKube/c-kustom//base/cloudnative-pg-operator?ref=develop
|
||||||
- https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/deploy/static/provider/kind/deploy.yaml
|
- https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/deploy/static/provider/kind/deploy.yaml
|
||||||
|
|
||||||
|
patchesJson6902:
|
||||||
|
- target:
|
||||||
|
version: v1
|
||||||
|
kind: ConfigMap
|
||||||
|
name: ingress-nginx-controller
|
||||||
|
namespace: ingress-nginx
|
||||||
|
path: patches/nginx-controller.yaml
|
6
examples/k8s/kind/cluster/patches/nginx-controller.yaml
Normal file
6
examples/k8s/kind/cluster/patches/nginx-controller.yaml
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
- op: replace
|
||||||
|
path: "/data/allow-snippet-annotations"
|
||||||
|
value: "true"
|
||||||
|
- op: replace
|
||||||
|
path: "/data/use-forwarded-headers"
|
||||||
|
value: "true"
|
Loading…
x
Reference in New Issue
Block a user