Compare commits

...

50 Commits

Author SHA1 Message Date
83b81b1056 Revert "fix(resources): do not set namespace in maester rolebinding"
This reverts commit 1fccf5f8dc.
2024-01-30 12:34:54 +01:00
1fccf5f8dc fix(resources): do not set namespace in maester rolebinding 2024-01-30 12:27:50 +01:00
907618902e fix(resources): oauth2client CRD must be installed clusterwide 2024-01-30 12:21:13 +01:00
6b1702b7ed fix(component): do not specify namespace for werther component 2024-01-30 10:42:56 +01:00
fce733374c Merge pull request 'feat(hydra): mise en place du stockage des session redis sur la stack hydra, et correction logout sur hydra-oidc' (#31) from hydra-redis into develop
Reviewed-on: #31
2023-12-18 11:18:31 +01:00
824b8613c4 update doc 2023-12-18 11:15:51 +01:00
19910617bd typo 2023-12-18 10:52:54 +01:00
f4146345d5 Patche du DSN redis 2023-12-18 10:38:13 +01:00
bbeb1ec62f mise en place d'un component pour Redis 2023-12-18 09:25:30 +01:00
fcfbb6cc30 correction port mapping de hydra-remote-user 2023-12-15 15:25:02 +01:00
7a802a6d28 ajout redis à l'example 2023-12-15 14:44:04 +01:00
a02622b516 feat(hydra): mise en place du stockage des session redis sur la stack hydra, et correction logout sur hydra-oidc 2023-12-15 10:17:23 +01:00
61d9dade3b Merge pull request 'feat(hydra-dispatcher): maj ref image hydra-dispatcher pour ajout url_link env var' (#29) from hydra-dispatcher-link-url into develop
Reviewed-on: #29
2023-12-13 10:41:44 +01:00
e333d07c14 feat(hydra-dispatcher): maj ref image hydra-dispatcher pour ajout url_link env var 2023-12-13 10:41:44 +01:00
06f58a061d Merge pull request 'Issue-16 : update dev image ref' (#27) from issue-16 into develop
Reviewed-on: #27
2023-12-13 09:38:05 +01:00
dd6804aa11 feat(shibboleth-sp): update dev ref image 2023-12-13 09:38:05 +01:00
c7b937adaf feat(hydra-sql): update env vars 2023-12-13 09:38:05 +01:00
77eb73818f feat(hydra-remote-user): update dev image ref 2023-12-13 09:38:05 +01:00
cc3d07d654 feat(hydra-sql): update hydra-sql dev image ref 2023-12-13 09:38:05 +01:00
86754cf518 cosmetic(oidc-test): rename CM oidc-test to oidc-test-env 2023-12-11 17:33:02 +01:00
8b02e8a875 Merge pull request 'Composant "OIDC Test"' (#7) from oidc-test-component-2 into develop
Reviewed-on: #7
2023-12-11 14:31:37 +01:00
caa180747e feat: add oidc-test app component 2023-12-11 14:29:30 +01:00
4d29851350 Merge pull request 'Ajout de la tâche programmée "janitor" pour Hydra' (#8) from hydra-janitor into develop
Reviewed-on: #8
2023-12-11 13:46:54 +01:00
d88cc2de65 feat(hydra): add janitor cronjob 2023-12-11 11:30:50 +01:00
435597f9f1 feat(hydra-dispatcher): update image tag 2023-12-11 10:47:56 +01:00
ee2bb1ea45 update hydra-dispatcher probes and image ref 2023-12-11 10:47:56 +01:00
63c5d7259c add probes 2023-12-11 10:47:56 +01:00
815917c306 add hydra-sql deployment 2023-12-11 10:47:56 +01:00
bc6fe46e1c fix(saml): fixing port name longer than 15c 2023-12-11 10:47:56 +01:00
1b1cc27916 feat(hydra-sql): adding new hydra login app 2023-12-11 10:47:56 +01:00
d37e85000f set correct tag for hydra-oidc 2023-12-11 10:47:56 +01:00
d9570ec8d0 add imagepullpolicy rule 2023-12-11 10:47:56 +01:00
d56ae059a3 remove loginapp default app configmap 2023-12-11 10:47:56 +01:00
5ec48c8b22 update config default apps filename 2023-12-11 10:47:56 +01:00
aaae6e2f20 set default configuration 2023-12-11 10:47:56 +01:00
081e854454 correciton config 2023-12-11 10:47:56 +01:00
3dba6c0d69 set hydra-oidc side container 2023-12-11 10:47:56 +01:00
8c6dc30bde set hydra-dispatcher side container 2023-12-11 10:47:56 +01:00
4ff0f83880 set hydra-dispatcher side container 2023-12-11 10:47:56 +01:00
e93bc069d3 set correct path for hydra-dispatcher conf 2023-12-11 10:47:56 +01:00
a56089efe5 Utilisation images symfony-containers 2023-12-11 10:47:56 +01:00
c4998279d5 Merge pull request 'feat(component): adding hydra-ldap' (#6) from f/werther into master
Reviewed-on: #6
2023-12-11 10:13:18 +01:00
6de80b1d9c fix(hydra-ldap): update werther secret name references 2023-12-11 10:06:37 +01:00
2f3cf60974 fix(hydra-ldap): update werther container port name 2023-12-11 09:56:27 +01:00
bf865b02e2 feat(hydra-ldap): rename resources from werther to hydra-ldap 2023-12-11 09:50:33 +01:00
063b575117 feat(werther): update image 2023-12-06 15:38:40 +01:00
38d3f1c1df feat(werther): adding a timeout for LDAP connection 2023-12-06 14:40:24 +01:00
6acda0553e feat(component): adding werther 2023-11-29 10:22:33 +01:00
6217c7b3fd Merge pull request 'Correction de l'exemple de déploiement' (#4) from fix-example-app into master
Reviewed-on: #4
2023-11-08 09:29:39 +01:00
8fe8423071 fix: example app deployment with saml login app 2023-11-07 10:29:45 +01:00
60 changed files with 1140 additions and 269 deletions

View File

@ -29,7 +29,7 @@ vars:
fieldref: fieldref:
fieldpath: metadata.name fieldpath: metadata.name
patchesJson6902: patches:
- target: - target:
group: apps group: apps
version: v1 version: v1
@ -42,3 +42,9 @@ patchesJson6902:
kind: Job kind: Job
name: hydra-migrate name: hydra-migrate
path: patches/hydra-migrate-job.yaml path: patches/hydra-migrate-job.yaml
- target:
group: batch
version: v1
kind: CronJob
name: hydra-janitor
path: patches/hydra-janitor-cronjob.yaml

View File

@ -0,0 +1,21 @@
- op: add
path: "/spec/jobTemplate/spec/template/spec/containers/0/env/-"
value:
name: HYDRA_DATABASE_USER
valueFrom:
secretKeyRef:
name: hydra-postgres-user
key: username
- op: add
path: "/spec/jobTemplate/spec/template/spec/containers/0/env/-"
value:
name: HYDRA_DATABASE_PASSWORD
valueFrom:
secretKeyRef:
name: hydra-postgres-user
key: password
- op: add
path: "/spec/jobTemplate/spec/template/spec/containers/0/env/-"
value:
name: DSN
value: "postgres://$(HYDRA_DATABASE_USER):$(HYDRA_DATABASE_PASSWORD)@$(HYDRA_DATABASE_SERVICE_NAME)-rw:5432/hydra?sslmode=disable"

View File

@ -0,0 +1,26 @@
apiVersion: kustomize.config.k8s.io/v1alpha1
kind: Component
resources:
- ./resources/deployment.yaml
- ./resources/service.yaml
configMapGenerator:
- name: hydra-ldap-env
literals:
- WERTHER_DEV_MODE=false
- WERTHER_LDAP_ROLE_CLAIM="https://hydra/claims/roles"
- WERTHER_SKIP_SSL_VERIFICATIONS=false
- WERTHER_IDENTP_CLAIM_SCOPES="name:profile,family_name:profile,given_name:profile,email:email,https%3A%2F%2Fhydra%2Fclaims%2Froles:roles"
- WERTHER_IDENTP_HYDRA_URL="http://hydra:4444"
- WERTHER_LDAP_ENDPOINTS="ldap.test.fr:636"
- WERTHER_LDAP_IS_TLS=true
- WERTHER_LDAP_BASEDN="o=test,c=fr"
- WERTHER_LDAP_ROLE_BASEDN="ou=groups,o=test,c=fr"
- WERTHER_LDAP_CONNECTION_TIMEOUT="10s"
secretGenerator:
- name: hydra-ldap-sc
literals:
- WERTHER_LDAP_BINDDN="cn=reader,o=test,c=fr"
- WERTHER_LDAP_BINDPW=ThisMustBeAbsolutelyChanged

View File

@ -0,0 +1,50 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: hydra-ldap
labels:
app.kubernetes.io/name: hydra-ldap
app.kubernetes.io/version: "v1.2.2"
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/name: hydra-ldap
template:
metadata:
labels:
app.kubernetes.io/name: hydra-ldap
app.kubernetes.io/version: "v1.2.2"
spec:
containers:
- name: werther
image: reg.cadoles.com/cadoles/hydra-werther:2023.12.6-stable.1421.15a4717
imagePullPolicy: IfNotPresent
envFrom:
- configMapRef:
name: hydra-ldap-env
env:
- name: WERTHER_WEB_DIR
value: "/usr/share/werther/login/"
- name: WERTHER_LDAP_BINDDN
valueFrom:
secretKeyRef:
name: hydra-ldap-sc
key: WERTHER_LDAP_BINDDN
- name: WERTHER_LDAP_BINDPW
valueFrom:
secretKeyRef:
name: hydra-ldap-sc
key: WERTHER_LDAP_BINDPW
ports:
- containerPort: 8080
name: hydra-ldap-http
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
privileged: false
readOnlyRootFilesystem: true
runAsNonRoot: true
runAsUser: 100

View File

@ -0,0 +1,17 @@
apiVersion: v1
kind: Service
metadata:
labels:
io.kompose.service: hydra-ldap
name: hydra-ldap
spec:
type: ClusterIP
ports:
- name: hydra-ldap
port: 8080
targetPort: hydra-ldap-http
protocol: TCP
selector:
app.kubernetes.io/name: hydra-ldap
status:
loadBalancer: {}

View File

@ -1,12 +1,13 @@
hydra: hydra:
apps: apps:
- id: oidc - id: oidc
title: title:
fr: Connexion OIDC fr: Connexion OIDC
en: Login OIDC en: Login OIDC
description: description:
fr: Authentification avec OpenID Connect fr: Authentification avec OpenID Connect
en: Authentication with OpenID Connect en: Authentication with OpenID Connect
login_url: "%env(string:HYDRA_DISPATCHER_OIDC_LOGIN_URL)%" login_url: "%env(string:HYDRA_DISPATCHER_OIDC_LOGIN_URL)%"
consent_url: "%env(string:HYDRA_DISPATCHER_OIDC_CONSENT_URL)%" consent_url: "%env(string:HYDRA_DISPATCHER_OIDC_CONSENT_URL)%"
logout_url: "%env(string:HYDRA_DISPATCHER_OIDC_LOGOUT_URL)%" logout_url: "%env(string:HYDRA_DISPATCHER_OIDC_LOGOUT_URL)%"
attributes_rewrite_configuration: []

View File

@ -5,11 +5,17 @@ resources:
- ./resources/hydra-oidc-deployment.yaml - ./resources/hydra-oidc-deployment.yaml
- ./resources/hydra-oidc-service.yaml - ./resources/hydra-oidc-service.yaml
generatorOptions:
labels:
com.cadoles.forge.sso-kustom/session: redis
configMapGenerator: configMapGenerator:
- name: hydra-oidc-env - name: hydra-oidc-env
literals: literals:
- APP_ENV=prod - APP_ENV=prod
- APP_DEBUG=false - APP_DEBUG=false
- PHP_FPM_MEMORY_LIMIT=256m
- NGINX_APP_SERVER_LISTEN=80
- HYDRA_ADMIN_BASE_URL=http://hydra-dispatcher - HYDRA_ADMIN_BASE_URL=http://hydra-dispatcher
- OIC_AUTHORIZE_ENDPOINT=https://oidc-idp/api/v1/authorize - OIC_AUTHORIZE_ENDPOINT=https://oidc-idp/api/v1/authorize
- OIDC_TOKEN_ENDPOINT=https://oidc-idp/api/v1/token - OIDC_TOKEN_ENDPOINT=https://oidc-idp/api/v1/token
@ -24,14 +30,15 @@ configMapGenerator:
- CLIENT_SECRET_FC=MyClientSecret - CLIENT_SECRET_FC=MyClientSecret
- COOKIE_PATH=/ - COOKIE_PATH=/
- TRUSTED_PROXIES=127.0.0.1,REMOTE_ADDR - TRUSTED_PROXIES=127.0.0.1,REMOTE_ADDR
- name: hydra-dispatcher-apps - REDIS_DSN="redis://redis:6379"
behavior: merge # - name: hydra-dispatcher-apps
files: # behavior: merge
- ./files/hydra/oidc.yaml # files:
# - apps.yaml=./files/hydra/oidc.yaml
patchesJson6902: patchesJson6902:
- target: - target:
version: v1 version: v1
kind: ConfigMap kind: ConfigMap
name: hydra-dispatcher-env name: hydra-oidc-env
path: patches/hydra-dispatcher-env.yaml path: patches/hydra-oidc-env.yaml

View File

@ -17,13 +17,70 @@ spec:
io.kompose.service: hydra-oidc io.kompose.service: hydra-oidc
spec: spec:
containers: containers:
- name: hydra-oidc - name: hydra-oidc-php-fpm
image: reg.cadoles.com/cadoles/hydra-oidc-v1:v0.0.0-170-g485b138 image: reg.cadoles.com/cadoles/hydra-oidc-base:2023.12.15-develop.1012.d57f2ad
imagePullPolicy: Always
args: ["/usr/sbin/php-fpm81", "-F", "-e"]
readinessProbe:
exec:
command:
- sh
- -c
- test -f /etc/php81/php-fpm.d/www.conf
livenessProbe:
exec:
command:
- php
- bin/console
- -V
initialDelaySeconds: 10
periodSeconds: 30
env:
- name: PHP_FPM_LISTEN
value: 127.0.0.1:9000
- name: PHP_MEMORY_LIMIT
value: 128m
- name: PHP_FPM_MEMORY_LIMIT
value: 128m
envFrom: envFrom:
- configMapRef: - configMapRef:
name: hydra-oidc-env name: hydra-oidc-env
resources: {}
- image: reg.cadoles.com/cadoles/hydra-oidc-base:2023.12.15-develop.1012.d57f2ad
imagePullPolicy: Always
name: hydra-oidc-nginx
args: ["/usr/sbin/nginx"]
readinessProbe:
httpGet:
path: /healthy
port: 80
initialDelaySeconds: 5
timeoutSeconds: 5
periodSeconds: 10
livenessProbe:
httpGet:
path: /healthy
port: 80
initialDelaySeconds: 15
timeoutSeconds: 5
periodSeconds: 15
envFrom:
- configMapRef:
name: hydra-oidc-env
env:
- name: NGINX_APP_UPSTREAM_BACKEND_SERVER
value: 127.0.0.1:9000
- name: NGINX_APP_ROOT
value: "/public/"
- name: NGINX_APP_PHP_INDEX
value: "/index.php"
- name: NGINX_ERROR_LOG_LEVEL
value: "warn"
- name: NGINX_APP_PHP_NON_FILE_PATTERN
value: "^/index\\.php(/|$)"
ports: ports:
- containerPort: 80 - containerPort: 8080
resources: {} resources: {}
restartPolicy: Always restartPolicy: Always

View File

@ -1,13 +1,30 @@
hydra: hydra:
apps: apps:
- id: saml - id: saml
title: title:
fr: Connexion SAML fr: Connexion SAML
en: Login SAML en: Login SAML
description: description:
fr: Authentification avec SAML fr: Authentification avec SAML
en: Authentication with SAML en: Authentication with SAML
login_url: "%env(string:HYDRA_DISPATCHER_SAML_LOGIN_URL)%" login_url: "%env(string:HYDRA_DISPATCHER_SAML_LOGIN_URL)%"
consent_url: "%env(string:HYDRA_DISPATCHER_SAML_CONSENT_URL)%" consent_url: "%env(string:HYDRA_DISPATCHER_SAML_CONSENT_URL)%"
logout_url: "%env(string:HYDRA_DISPATCHER_SAML_LOGOUT_URL)%" logout_url: "%env(string:HYDRA_DISPATCHER_SAML_LOGOUT_URL)%"
attributes_rewrite_rules: [] attributes_rewrite_configuration:
uid:
rules:
- "property_exists(consent.session.id_token, 'uid') ? consent.session.id_token.uid : null"
email:
rules:
- "property_exists(consent.session.id_token, 'email') ? consent.session.id_token.email : null"
eduPersonAffiliation:
rules:
- "property_exists(consent.session.id_token, 'eduPersonAffiliation') ? consent.session.id_token.eduPersonAffiliation : null"
firewall:
rules:
email:
required: false
uid:
required: false
eduPersonAffiliation:
required: false

View File

@ -0,0 +1,3 @@
<Attribute name="uid" nameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic" id="uid" />
<Attribute name="eduPersonAffiliation" nameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic" id="eduPersonAffiliation" />
<Attribute name="email" nameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic" id="email" />

View File

@ -2,10 +2,8 @@ apiVersion: kustomize.config.k8s.io/v1alpha1
kind: Component kind: Component
resources: resources:
- ./resources/hydra-saml-service.yaml - ./resources/hydra-saml-shibboleth-sp.yaml
- ./resources/hydra-saml-shibboleth-sp-deployment.yaml - ./resources/hydra-saml-remote-user.yaml
- ./resources/hydra-saml-remote-user-deployment.yaml
- ./resources/hydra-saml-remote-user-service.yaml
configMapGenerator: configMapGenerator:
- name: hydra-saml-env - name: hydra-saml-env
@ -18,6 +16,7 @@ configMapGenerator:
- HYDRA_ADMIN_BASE_URL=http://hydra:4445/admin - HYDRA_ADMIN_BASE_URL=http://hydra:4445/admin
- TRUSTED_PROXIES=127.0.0.1,REMOTE_ADDR - TRUSTED_PROXIES=127.0.0.1,REMOTE_ADDR
- LOGOUT_REDIRECT_URL_PATTERN=http://hydra-saml/Shibboleth.sso/Logout?return=%s' - LOGOUT_REDIRECT_URL_PATTERN=http://hydra-saml/Shibboleth.sso/Logout?return=%s'
- PATH_PREFIX=
# Shibboleth SP environment variables # Shibboleth SP environment variables
- SP_ENTITY_ID=http://hydra-saml-shibboleth-sp - SP_ENTITY_ID=http://hydra-saml-shibboleth-sp
- IDP_ENTITY_ID=http://saml-idp - IDP_ENTITY_ID=http://saml-idp
@ -29,10 +28,13 @@ configMapGenerator:
behavior: merge behavior: merge
files: files:
- ./files/hydra/saml.yaml - ./files/hydra/saml.yaml
- name: hydra-saml-shibboleth-sp
files:
- ./files/shibboleth-sp/attribute-map.inc.xml
patchesJson6902: patchesJson6902:
- target: - target:
version: v1 version: v1
kind: ConfigMap kind: ConfigMap
name: hydra-dispatcher-env name: hydra-dispatcher-env
path: patches/hydra-dispatcher-env.yaml path: patches/hydra-dispatcher-env.yaml

View File

@ -1,14 +0,0 @@
apiVersion: v1
kind: Service
metadata:
labels:
io.kompose.service: hydra-saml-remote-user
name: hydra-saml-remote-user
spec:
ports:
- name: hydra-saml-remote-user
port: 80
selector:
io.kompose.service: hydra-saml-remote-user
status:
loadBalancer: {}

View File

@ -18,12 +18,27 @@ spec:
spec: spec:
containers: containers:
- name: hydra-saml-remote-user - name: hydra-saml-remote-user
image: reg.cadoles.com/cadoles/hydra-remote-user-v1:v0.0.0-170-g485b138 image: reg.cadoles.com/cadoles/hydra-remote-user-base:2023.12.11-develop.1523.5f14595
envFrom: envFrom:
- configMapRef: - configMapRef:
name: hydra-saml-env name: hydra-saml-env
ports: ports:
- containerPort: 80 - containerPort: 8080
resources: {} resources: {}
restartPolicy: Always restartPolicy: Always
---
apiVersion: v1
kind: Service
metadata:
labels:
io.kompose.service: hydra-saml-remote-user
name: hydra-saml-remote-user
spec:
ports:
- name: http
port: 80
targetPort: 8080
selector:
io.kompose.service: hydra-saml-remote-user
status:
loadBalancer: {}

View File

@ -1,14 +0,0 @@
apiVersion: v1
kind: Service
metadata:
labels:
io.kompose.service: hydra-saml
name: hydra-saml
spec:
ports:
- name: hydra-saml-shibboleth-sp
port: 80
selector:
io.kompose.service: hydra-saml-shibboleth-sp
status:
loadBalancer: {}

View File

@ -1,29 +0,0 @@
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
io.kompose.service: hydra-saml-shibboleth-sp
name: hydra-saml-shibboleth-sp
spec:
replicas: 1
selector:
matchLabels:
io.kompose.service: hydra-saml-shibboleth-sp
strategy:
type: Recreate
template:
metadata:
labels:
io.kompose.service: hydra-saml-shibboleth-sp
spec:
containers:
- name: hydra-saml-shibboleth-sp
image: reg.cadoles.com/cadoles/shibboleth-sp-v3:v0.0.0-172-g0f44679
envFrom:
- configMapRef:
name: hydra-saml-env
ports:
- containerPort: 80
resources: {}
restartPolicy: Always

View File

@ -0,0 +1,54 @@
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
io.kompose.service: hydra-saml-shibboleth-sp
name: hydra-saml-shibboleth-sp
spec:
replicas: 1
selector:
matchLabels:
io.kompose.service: hydra-saml-shibboleth-sp
strategy:
type: Recreate
template:
metadata:
labels:
io.kompose.service: hydra-saml-shibboleth-sp
spec:
securityContext:
fsGroup: 102
containers:
- name: hydra-saml-shibboleth-sp
image: reg.cadoles.com/cadoles/shibboleth-sp-v3:2023.12.12-develop.1039.49b85e1
envFrom:
- configMapRef:
name: hydra-saml-env
volumeMounts:
- name: attributes-map-inc
mountPath: /etc/shibboleth/attribute-map.inc.xml
subPath: attribute-map.inc.xml
ports:
- containerPort: 80
resources: {}
restartPolicy: Always
volumes:
- name: attributes-map-inc
configMap:
name: hydra-saml-shibboleth-sp
---
apiVersion: v1
kind: Service
metadata:
labels:
io.kompose.service: hydra-saml
name: hydra-saml
spec:
ports:
- name: http
port: 80
selector:
io.kompose.service: hydra-saml-shibboleth-sp
status:
loadBalancer: {}

View File

@ -0,0 +1,7 @@
sql_login:
login_column_name: mail
password_column_name: password
salt_column_name: salt
table_name: user
data_to_fetch:
- mail

View File

@ -0,0 +1,28 @@
apiVersion: kustomize.config.k8s.io/v1alpha1
kind: Component
resources:
- ./resources/hydra-sql-service.yaml
- ./resources/hydra-sql-deployment.yaml
generatorOptions:
labels:
com.cadoles.forge.sso-kustom/session: redis
configMapGenerator:
- name: hydra-sql-env
literals:
- ISSUER_URL="http://localhost:8000"
- BASE_URL='http://localhost:8080'
- HYDRA_ADMIN_BASE_URL='http://hydra:4445/admin'
- APP_LOCALES="fr,en"
- HASH_ALGO_LEGACY="sha256, bcrypt"
- SECURITY_PATTERN="password,salt,pepper"
- DSN_REMOTE_DATABASE="pgsql:host='postgres';port=5432;dbname=lasql"
- DB_USER="makeMeASecret"
- DB_PASSWORD="makeMeASecret"
- REDIS_DSN="redis://redis:6379"
- PEPPER="MakeMeABigSecret"
- name: sql-login-config
files:
- ./files/sql_login.yaml

View File

@ -0,0 +1,100 @@
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
io.kompose.service: hydra-sql
name: hydra-sql
spec:
replicas: 1
selector:
matchLabels:
io.kompose.service: hydra-sql
strategy:
type: Recreate
template:
metadata:
labels:
io.kompose.service: hydra-sql
spec:
containers:
- name: hydra-sql-fpm
image: reg.cadoles.com/cadoles/hydra-sql-base:2023.12.14-develop.1107.740a756
imagePullPolicy: Always
args: ["/usr/sbin/php-fpm81", "-F", "-e"]
readinessProbe:
exec:
command:
- sh
- -c
- test -f /etc/php81/php-fpm.d/www.conf
livenessProbe:
exec:
command:
- php
- bin/console
- -V
initialDelaySeconds: 10
periodSeconds: 30
resources: {}
envFrom:
- configMapRef:
name: hydra-sql-env
env:
- name: PHP_FPM_LISTEN
value: 127.0.0.1:9000
- name: PHP_MEMORY_LIMIT
value: 128m
- name: PHP_FPM_MEMORY_LIMIT
value: 128m
- name: PHP_FPM_LOG_LEVEL
value: warning
volumeMounts:
- name: sql-login-config
mountPath: "/app/config/sql_login_configuration/sql_login.yaml"
subPath: "sql_login.yaml"
- name: hydra-sql-nginx
image: reg.cadoles.com/cadoles/hydra-sql-base:2023.12.14-develop.1107.740a756
imagePullPolicy: Always
args: ["/usr/sbin/nginx"]
readinessProbe:
httpGet:
path: /health
port: 8080
initialDelaySeconds: 5
timeoutSeconds: 5
periodSeconds: 10
livenessProbe:
httpGet:
path: /health
port: 8080
initialDelaySeconds: 15
timeoutSeconds: 5
periodSeconds: 15
envFrom:
- configMapRef:
name: hydra-sql-env
env:
- name: NGINX_APP_UPSTREAM_BACKEND_SERVER
value: 127.0.0.1:9000
- name: NGINX_APP_ROOT
value: "/public"
- name: NGINX_APP_PHP_INDEX
value: "/index.php"
- name: NGINX_ERROR_LOG_LEVEL
value: "warn"
- name: NGINX_APP_PHP_NON_FILE_PATTERN
value: "^/index\\.php(/|$)"
resources: {}
ports:
- containerPort: 8080
volumeMounts:
- name: sql-login-config
mountPath: "/app/config/sql_login_configuration/sql_login.yaml"
subPath: "sql_login.yaml"
volumes:
- name: sql-login-config
configMap:
name: sql-login-config
restartPolicy: Always

View File

@ -0,0 +1,14 @@
apiVersion: v1
kind: Service
metadata:
labels:
io.kompose.service: hydra-sql
name: hydra-sql
spec:
ports:
- name: hydra-sql
port: 8080
selector:
io.kompose.service: hydra-sql
status:
loadBalancer: {}

View File

@ -0,0 +1,20 @@
apiVersion: kustomize.config.k8s.io/v1alpha1
kind: Component
resources:
- ./resources/deployment.yaml
- ./resources/service.yaml
- ./resources/oauth2-client.yaml
configMapGenerator:
- name: oidc-test-env
literals:
- LOG_LEVEL=0
- HTTP_ADDRESS=0.0.0.0:8080
- OIDC_CLIENT_ID=oidc-test
- OIDC_CLIENT_SECRET=NotSoSecret
- OIDC_ISSUER_URL=http://hydra:4444
- OIDC_REDIRECT_URL=https://example.net/oauth2/callback
- OIDC_POST_LOGOUT_REDIRECT_URL=https://example.net
- OIDC_SKIP_ISSUER_VERIFICATION="true"
- OIDC_INSECURE_SKIP_VERIFY="true"

View File

@ -0,0 +1,39 @@
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app.kubernetes.io/name: oidc-test
name: oidc-test
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/name: oidc-test
strategy:
type: Recreate
template:
metadata:
labels:
app.kubernetes.io/name: oidc-test
spec:
containers:
- image: reg.cadoles.com/cadoles/oidc-test:2023.12.6-stable.1502.ebfd504
name: oidc-test
ports:
- containerPort: 8080
resources: {}
envFrom:
- configMapRef:
name: oidc-test-env
env:
- name: OIDC_CLIENT_ID
valueFrom:
secretKeyRef:
name: oidc-test-oauth2-client
key: client_id
- name: OIDC_CLIENT_SECRET
valueFrom:
secretKeyRef:
name: oidc-test-oauth2-client
key: client_secret
restartPolicy: Always

View File

@ -0,0 +1,18 @@
apiVersion: hydra.ory.sh/v1alpha1
kind: OAuth2Client
metadata:
name: oidc-test-oauth2-client
spec:
clientName: "oidc-test"
tokenEndpointAuthMethod: "client_secret_basic"
grantTypes:
- authorization_code
- refresh_token
responseTypes:
- code
scope: "openid email"
secretName: oidc-test-oauth2-client
redirectUris:
- https://example.net/oauth2/callback
postLogoutRedirectUris:
- https://example.net

View File

@ -2,14 +2,14 @@ apiVersion: v1
kind: Service kind: Service
metadata: metadata:
labels: labels:
io.kompose.service: app app.kubernetes.io/name: oidc-test
name: app name: oidc-test
spec: spec:
ports: ports:
- name: http - name: http
port: 8080 port: 8080
targetPort: 8080 targetPort: 8080
selector: selector:
io.kompose.service: app app.kubernetes.io/name: oidc-test
status: status:
loadBalancer: {} loadBalancer: {}

View File

@ -0,0 +1,22 @@
# Composant `redis`
### Description
Les applications `hydra-dispatcher`, `hydra-sql` et `hydra-oidc` stockent dorénavant le cache et les sessions utilisateur sur un serveur Redis.
Le DSN du serveur est défini dans leur variable d'environnement respective `REDIS_DSN`.
Les applications peuvent utiliser le mode `sentinel` de redis
Il est donc nécessaire donc nécessaire de disposer d'un serveur Redis pour utiliser ces applications.
### Principe général de fonctionnement
Un `RedisFailOver` crée un cluster redis en mode sentinel avec 3 réplicats chacun.
### Personnalisation
Via des `patches` sur la ressource `ConfigMap` via un label selector `com.cadoles.forge.sso-kustom/session=redis` il est possible de modifier la valeur du `REDIS_DSN`.
|Clé|Description|Exemple|
|---|-----------|-------|
|`REDIS_DSN`| DSN du cluster Redis | `redis://rfs-sso-redis:26379?&redis_sentinel=mymaster`

View File

@ -0,0 +1,11 @@
apiVersion: kustomize.config.k8s.io/v1alpha1
kind: Component
resources:
- ./resources/redis-failover.yaml
patches:
- path: ./patches/hydra-apps.yaml
target:
kind: ConfigMap
labelSelector: "com.cadoles.forge.sso-kustom/session=redis"

View File

@ -0,0 +1,3 @@
- op: replace
path: "/data/REDIS_DSN"
value: "redis://rfs-sso-redis:26379?&redis_sentinel=mymaster"

View File

@ -0,0 +1,21 @@
apiVersion: databases.spotahome.com/v1
kind: RedisFailover
metadata:
name: sso-redis
spec:
sentinel:
replicas: 3
resources:
requests:
cpu: 100m
limits:
memory: 100Mi
redis:
replicas: 3
resources:
requests:
cpu: 100m
memory: 100Mi
limits:
cpu: 400m
memory: 500Mi

View File

@ -1 +0,0 @@
# Documentation

View File

@ -1,19 +1,21 @@
# Exemple: Déploiement d'une application authentifiée avec la stack SSO # Exemple: Déploiement d'une application authentifiée avec la stack SSO
L'exemple est actuellement déployé avec le composant `hydra-saml` uniquement.
## Procédure ## Procédure
### Avec `k3d` ### Avec `kind`
1. Créer un cluster avec `k3d` 1. Créer un cluster avec `kind`
``` ```
k3d cluster create -c ./examples/k8s/k3d/k3d/cluster-config.yaml kind create cluster --config ./examples/k8s/kind/cluster-config.yaml
``` ```
2. Déployer les opérateurs nécessaires au déploiement 2. Déployer les opérateurs nécessaires au déploiement
``` ```
kubectl apply -k ./examples/k8s/k3d/cluster kubectl apply -k ./examples/k8s/kind/cluster --server-side
``` ```
3. Déployer l'application 3. Déployer l'application
@ -22,4 +24,38 @@
kubectl apply -k ./examples/authenticated-app kubectl apply -k ./examples/authenticated-app
``` ```
Après stabilisation du déploiement, l'application devrait être accessible à l'adresse http://localhost:8080/ **Note** Il est possible d'avoir l'erreur suivante:
```
error: resource mapping not found for name: "app-oauth2-client" namespace: "" from "./examples/authenticated-app": no matches for kind "OAuth2Client" in version "hydra.ory.sh/v1alpha1"
```
Cette erreur est "normale" (voir https://github.com/kubernetes/kubectl/issues/1117). Dans ce cas, attendre la création de la CRD (voir ticket) puis relancer la commande.
4. Ajouter l'entrée suivante dans votre fichier `/etc/hosts`
```
127.0.0.1 ssokustom
```
5. Après stabilisation du déploiement, l'application devrait être accessible à l'adresse https://ssokustom
#### Supprimer le cluster
```
kind delete cluster -n sso-kustom-example
```
## Authentification
### SAML
- Utilisateur: `user1`
- Mot de passe `user1pass`
#### URL utiles
|URL|Description|
|---|-----------|
|https://ssokustom/auth/saml/Shibboleth.sso/Session|Attributs de la session SP Shibboleth|
|https://ssokustom/auth/saml/Shibboleth.sso/Metadata|Métadonnées du SP Shibboleth|

View File

@ -2,19 +2,11 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization kind: Kustomization
resources: resources:
- ../../resources/hydra - ../../overlays/full
- ../../resources/hydra-dispatcher
- ./resources/app-deployment.yaml
- ./resources/app-service.yaml
- ./resources/ingress.yaml - ./resources/ingress.yaml
- ./resources/ingress-prefix-traefik-middleware.yaml - ./resources/saml-idp.yaml
- ./resources/port-forwarder-deployment.yaml - ./resources/self-signed-issuer.yaml
- ./resources/port-forwarder-service.yaml - ./resources/port-forwarder.yaml
components:
- ../../components/hydra-cnpg-database
#- ../../components/hydra-oidc
- ../../components/hydra-saml
patchesJson6902: patchesJson6902:
- target: - target:
@ -36,4 +28,14 @@ patchesJson6902:
version: v1 version: v1
kind: Secret kind: Secret
name: hydra-secret name: hydra-secret
path: patches/hydra-secret.yaml path: patches/hydra-secret.yaml
- target:
version: v1
kind: ConfigMap
name: oidc-test
path: patches/oidc-test.yaml
- target:
version: v1alpha1
kind: OAuth2Client
name: oidc-test-oauth2-client
path: patches/oidc-test-oauth2-client.yaml

View File

@ -1,18 +1,30 @@
- op: replace - op: replace
path: "/data/HYDRA_BASE_URL" path: "/data/HYDRA_BASE_URL"
value: http://ssokustom:8080/auth value: http://hydra:4444
- op: replace - op: replace
path: "/data/HYDRA_ADMIN_BASE_URL" path: "/data/HYDRA_ADMIN_BASE_URL"
value: http://hydra:4445/admin value: http://hydra:4445/admin
- op: replace - op: replace
path: "/data/HYDRA_ORIGINAL_ISSUER" path: "/data/HYDRA_ORIGINAL_ISSUER"
value: http://ssokustom:8080/auth value: http://hydra:4444
- op: replace - op: replace
path: "/data/HYDRA_NEW_ISSUER" path: "/data/HYDRA_NEW_ISSUER"
value: http://ssokustom:8080/auth/dispatcher/ value: https://ssokustom/auth/dispatcher
- op: replace - op: replace
path: "/data/BASE_URL" path: "/data/BASE_URL"
value: http://ssokustom:8080/auth/dispatcher value: https://ssokustom/auth/dispatcher
- op: replace - op: replace
path: "/data/COOKIE_PATH" path: "/data/COOKIE_PATH"
value: /auth/dispatcher value: /auth/dispatcher
# Hydra SAML configuration
- op: replace
path: "/data/HYDRA_DISPATCHER_SAML_LOGIN_URL"
value: https://ssokustom/auth/saml/login
- op: replace
path: "/data/HYDRA_DISPATCHER_SAML_CONSENT_URL"
value: https://ssokustom/auth/saml/consent
- op: replace
path: "/data/HYDRA_DISPATCHER_SAML_LOGOUT_URL"
value: https://ssokustom/auth/saml/logout

View File

@ -1,15 +1,15 @@
- op: replace - op: replace
path: "/data/URLS_SELF_ISSUER" path: "/data/URLS_SELF_ISSUER"
value: http://ssokustom:8080/auth value: https://ssokustom/auth
- op: replace - op: replace
path: "/data/URLS_LOGIN" path: "/data/URLS_LOGIN"
value: http://ssokustom:8080/auth/dispatcher/login value: https://ssokustom/auth/dispatcher/login
- op: replace - op: replace
path: "/data/URLS_LOGOUT" path: "/data/URLS_LOGOUT"
value: http://ssokustom:8080/auth/dispatcher/logout value: https://ssokustom/auth/dispatcher/logout
- op: replace - op: replace
path: "/data/URLS_CONSENT" path: "/data/URLS_CONSENT"
value: http://ssokustom:8080/auth/dispatcher/consent value: https://ssokustom/auth/dispatcher/consent
- op: replace - op: replace
path: "/data/HYDRA_SERVE_ALL_ARGS" path: "/data/HYDRA_SERVE_ALL_ARGS"
value: "--dev" value: "--dev"

View File

@ -1,6 +1,6 @@
- op: replace - op: replace
path: "/data/HTTP_BASE_URL" path: "/data/HTTP_BASE_URL"
value: http://ssokustom:8080/auth/saml value: https://ssokustom/auth/saml
- op: replace - op: replace
path: "/data/COOKIE_PATH" path: "/data/COOKIE_PATH"
value: /auth/saml value: /auth/saml
@ -9,23 +9,35 @@
value: http://hydra-dispatcher value: http://hydra-dispatcher
- op: replace - op: replace
path: "/data/LOGOUT_REDIRECT_URL_PATTERN" path: "/data/LOGOUT_REDIRECT_URL_PATTERN"
value: http://ssokustom:8080/auth/saml/Shibboleth.sso/Logout?return=%s value: https://ssokustom/auth/saml/Shibboleth.sso/Logout?return=%s
- op: replace
path: "/data/PATH_PREFIX"
value: "/auth/saml"
- op: replace - op: replace
path: "/data/SP_ENTITY_ID" path: "/data/SP_ENTITY_ID"
value: http://ssokustom:8080/auth/saml value: https://ssokustom/auth/saml
- op: replace - op: replace
path: "/data/IDP_ENTITY_ID" path: "/data/IDP_ENTITY_ID"
value: http://ssokustom:8080/idp value: https://ssokustom/simplesaml/saml2/idp/metadata.php
- op: replace - op: replace
path: "/data/IDP_METADATA_URL" path: "/data/IDP_METADATA_URL"
value: http://ssokustom:8080/idp/metadata value: https://ssokustom/simplesaml/saml2/idp/metadata.php
- op: replace
path: "/data/APACHE_BACKEND_URL"
value: http://hydra-remote-user
- op: replace - op: replace
path: "/data/APACHE_FORCE_HTTPS" path: "/data/APACHE_FORCE_HTTPS"
value: "false" value: "true"
- op: replace - op: replace
path: "/data/SP_HANDLER_BASE_PATH" path: "/data/SP_HANDLER_BASE_PATH"
value: /auth/saml value: "/auth/saml"
- op: replace
path: "/data/SP_LOG_LEVEL"
value: DEBUG
- op: replace
path: "/data/SP_SESSIONS_REDIRECT_LIMIT"
value: none
- op: replace
path: "/data/SP_SESSIONS_REDIRECT_ALLOW"
value: https://ssokustom
- op: replace
path: "/data/SP_SESSIONS_COOKIE_PROPS"
value: https

View File

@ -0,0 +1,6 @@
- op: replace
path: "/spec/redirectUris/0"
value: https://ssokustom/oauth2/callback
- op: replace
path: "/spec/postLogoutRedirectUris/0"
value: https://ssokustom

View File

@ -0,0 +1,6 @@
- op: replace
path: "/data/OIDC_REDIRECT_URL"
value: https://ssokustom/oauth2/callback
- op: replace
path: "/data/OIDC_POST_LOGOUT_REDIRECT_URL"
value: https://ssokustom

View File

@ -1,40 +0,0 @@
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
io.kompose.service: app
name: app
spec:
replicas: 1
selector:
matchLabels:
io.kompose.service: app
strategy:
type: Recreate
template:
metadata:
labels:
io.kompose.service: app
spec:
containers:
- image: bornholm/oidc-test:v0.0.0-1-g936a77e
name: app
ports:
- containerPort: 8080
resources: {}
env:
- name: LOG_LEVEL
value: "0"
- name: HTTP_ADDRESS
value: 0.0.0.0:8080
- name: OIDC_CLIENT_ID
value: oidc-test
- name: OIDC_CLIENT_SECRET
value: oidc-test-123456
- name: OIDC_ISSUER_URL
value: http://ssokustom:8080/auth
- name: OIDC_REDIRECT_URL
value: http://ssokustom:8080
- name: OIDC_POST_LOGOUT_REDIRECT_URL
value: http://ssokustom:8080
restartPolicy: Always

View File

@ -1,10 +0,0 @@
apiVersion: traefik.containo.us/v1alpha1
kind: Middleware
metadata:
name: ingress-prefix
spec:
stripPrefixRegex:
regex:
- ^/auth/dispatcher
- ^/auth/saml
- ^/auth

View File

@ -1,11 +1,18 @@
apiVersion: networking.k8s.io/v1 apiVersion: networking.k8s.io/v1
kind: Ingress kind: Ingress
metadata: metadata:
name: portal name: app
annotations: annotations:
ingress.kubernetes.io/ssl-redirect: "false" nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
traefik.ingress.kubernetes.io/router.middlewares: default-ingress-prefix@kubernetescrd cert-manager.io/issuer: "self-signed"
# nginx.ingress.kubernetes.io/configuration-snippet: |
# more_set_headers "X-Forwarded-Proto: https";
spec: spec:
ingressClassName: nginx
tls:
- hosts:
- ssokustom
secretName: ssokustom-example-tls
rules: rules:
- http: - http:
paths: paths:
@ -13,31 +20,112 @@ spec:
pathType: Prefix pathType: Prefix
backend: backend:
service: service:
name: app name: oidc-test
port: port:
name: http name: http
---
- path: /auth/dispatcher apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: auth-saml
annotations:
cert-manager.io/issuer: "self-signed"
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
spec:
ingressClassName: nginx
tls:
- hosts:
- ssokustom
secretName: ssokustom-example-tls
rules:
- http:
paths:
- path: /auth/saml(/|$)(.*)
pathType: Prefix
backend:
service:
name: hydra-saml
port:
name: http
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: auth-dispatcher
annotations:
cert-manager.io/issuer: "self-signed"
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
nginx.ingress.kubernetes.io/rewrite-target: /$2
nginx.ingress.kubernetes.io/x-forwarded-prefix: /auth/dispatcher
spec:
ingressClassName: nginx
tls:
- hosts:
- ssokustom
secretName: ssokustom-example-tls
rules:
- http:
paths:
- path: /auth/dispatcher(/|$)(.*)
pathType: Prefix pathType: Prefix
backend: backend:
service: service:
name: hydra-dispatcher name: hydra-dispatcher
port: port:
name: http name: http
---
- path: /auth apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: auth
annotations:
cert-manager.io/issuer: "self-signed"
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
nginx.ingress.kubernetes.io/rewrite-target: /$2
spec:
ingressClassName: nginx
tls:
- hosts:
- ssokustom
secretName: ssokustom-example-tls
rules:
- http:
paths:
- path: /auth(/|$)(.*)
pathType: Prefix pathType: Prefix
backend: backend:
service: service:
name: hydra name: hydra
port: port:
name: hydra-public name: hydra-public
---
# - path: /auth/passwordless/?(.*) apiVersion: networking.k8s.io/v1
# pathType: Prefix kind: Ingress
# backend: metadata:
# service: name: saml-idp
# name: hydra annotations:
# port: cert-manager.io/issuer: "self-signed"
# name: http-public nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
nginx.ingress.kubernetes.io/rewrite-target: /simplesaml/$2
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
spec:
ingressClassName: nginx
tls:
- hosts:
- ssokustom
secretName: ssokustom-example-tls
rules:
- http:
paths:
- path: /simplesaml(/|$)(.*)
pathType: Prefix
backend:
service:
name: saml-idp
port:
name: https

View File

@ -1,29 +0,0 @@
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
io.kompose.service: port-forwarder
name: port-forwarder
spec:
replicas: 1
selector:
matchLabels:
io.kompose.service: port-forwarder
strategy:
type: Recreate
template:
metadata:
labels:
io.kompose.service: port-forwarder
spec:
containers:
- image: hpello/tcp-proxy:latest
name: port-forwarder
env:
- name: LISTEN_PORT
value: "8080"
ports:
- containerPort: 8080
resources: {}
args: ["traefik.kube-system.svc.cluster.local", "80"]
restartPolicy: Always

View File

@ -1,12 +0,0 @@
kind: Service
apiVersion: v1
metadata:
name: ssokustom
labels:
io.kompose.service: port-forwarder
spec:
ports:
- port: 8080
targetPort: 8080
selector:
io.kompose.service: port-forwarder

View File

@ -0,0 +1,55 @@
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
io.kompose.service: port-forwarder
name: port-forwarder
spec:
replicas: 1
selector:
matchLabels:
io.kompose.service: port-forwarder
strategy:
type: Recreate
template:
metadata:
labels:
io.kompose.service: port-forwarder
spec:
containers:
- image: hpello/tcp-proxy:latest
name: port-forwarder-https
env:
- name: LISTEN_PORT
value: "443"
ports:
- containerPort: 443
resources: {}
args: ["ingress-nginx-controller.ingress-nginx.svc.cluster.local", "443"]
- image: hpello/tcp-proxy:latest
name: port-forwarder-http
env:
- name: LISTEN_PORT
value: "80"
ports:
- containerPort: 80
resources: {}
args: ["ingress-nginx-controller.ingress-nginx.svc.cluster.local", "80"]
restartPolicy: Always
---
kind: Service
apiVersion: v1
metadata:
name: ssokustom
labels:
io.kompose.service: port-forwarder
spec:
ports:
- name: https
port: 443
targetPort: 443
- name: http
port: 80
targetPort: 80
selector:
io.kompose.service: port-forwarder

View File

@ -0,0 +1,51 @@
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
io.kompose.service: saml-idp
name: saml-idp
spec:
replicas: 1
selector:
matchLabels:
io.kompose.service: saml-idp
strategy:
type: Recreate
template:
metadata:
labels:
io.kompose.service: saml-idp
spec:
containers:
- image: kristophjunge/test-saml-idp:1.15
name: saml-idp
ports:
- containerPort: 8443
resources: {}
env:
- name: SIMPLESAMLPHP_SP_ENTITY_ID
value: https://ssokustom/auth/saml
- name: SIMPLESAMLPHP_SP_ASSERTION_CONSUMER_SERVICE
value: https://ssokustom/auth/saml/Shibboleth.sso/SAML2/POST
- name: SIMPLESAMLPHP_SP_SINGLE_LOGOUT_SERVICE
value: https://ssokustom/auth/saml/Shibboleth.sso/Logout?return=https://ssokustom
restartPolicy: Always
---
apiVersion: v1
kind: Service
metadata:
labels:
io.kompose.service: saml-idp
name: saml-idp
spec:
ports:
- name: http
port: 8080
targetPort: 8080
- name: https
port: 8443
targetPort: 8443
selector:
io.kompose.service: saml-idp
status:
loadBalancer: {}

View File

@ -0,0 +1,6 @@
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
name: self-signed
spec:
selfSigned: {}

View File

@ -1,11 +0,0 @@
---
apiVersion: k3d.io/v1alpha4
kind: Simple
metadata:
name: sso-kustom
servers: 1
agents: 2
ports:
- port: 8080:80
nodeFilters:
- loadbalancer

View File

@ -1,4 +0,0 @@
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- https://forge.cadoles.com/CadolesKube/c-kustom//base/cloudnative-pg-operator?ref=develop

View File

@ -0,0 +1,45 @@
kind: Cluster
apiVersion: kind.x-k8s.io/v1alpha4
name: sso-kustom-example
nodes:
- role: control-plane
image: kindest/node:v1.27.2
kubeadmConfigPatches:
- |
kind: InitConfiguration
nodeRegistration:
kubeletExtraArgs:
node-labels: "ingress-ready=true"
extraPortMappings:
- containerPort: 80
hostPort: 80
listenAddress: "0.0.0.0" # Optional, defaults to "0.0.0.0"
- containerPort: 443
hostPort: 443
listenAddress: "0.0.0.0" # Optional, defaults to "0.0.0.0"
labels:
ingress-ready: true
- role: worker
image: kindest/node:v1.27.2
kubeadmConfigPatches:
- |
kind: JoinConfiguration
nodeRegistration:
kubeletExtraArgs:
system-reserved: memory=2Gi
- role: worker
image: kindest/node:v1.27.2
kubeadmConfigPatches:
- |
kind: JoinConfiguration
nodeRegistration:
kubeletExtraArgs:
system-reserved: memory=2Gi
- role: worker
image: kindest/node:v1.27.2
kubeadmConfigPatches:
- |
kind: JoinConfiguration
nodeRegistration:
kubeletExtraArgs:
system-reserved: memory=2Gi

1
examples/k8s/kind/cluster/.gitignore vendored Normal file
View File

@ -0,0 +1 @@
/charts

View File

@ -0,0 +1,15 @@
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- https://github.com/jetstack/cert-manager/releases/download/v1.13.2/cert-manager.yaml
- https://forge.cadoles.com/CadolesKube/c-kustom//base/cloudnative-pg-operator?ref=develop
- https://forge.cadoles.com/CadolesKube/c-kustom//base/redis?ref=develop
- https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/deploy/static/provider/kind/deploy.yaml
patchesJson6902:
- target:
version: v1
kind: ConfigMap
name: ingress-nginx-controller
namespace: ingress-nginx
path: patches/nginx-controller.yaml

View File

@ -0,0 +1,6 @@
- op: replace
path: "/data/allow-snippet-annotations"
value: "true"
- op: replace
path: "/data/use-forwarded-headers"
value: "true"

View File

@ -2,10 +2,4 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization kind: Kustomization
resources: resources:
- ./resources/hydra - ./overlays/base
- ./resources/hydra-dispatcher
components:
- ./components/hydra-cnpg-database
- ./components/hydra-oidc
- ./components/hydra-saml

View File

@ -0,0 +1,11 @@
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- ../../resources/hydra
- ../../resources/hydra-dispatcher
labels:
- pairs:
app.kubernetes.io/part-of: sso-kustom
app.kubernetes.io/component: auth

View File

@ -0,0 +1,18 @@
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- ../base
labels:
- pairs:
app.kubernetes.io/part-of: sso-kustom
app.kubernetes.io/component: auth
components:
- ../../components/hydra-cnpg-database
- ../../components/hydra-oidc
- ../../components/hydra-saml
- ../../components/hydra-sql
- ../../components/oidc-test
- ../../components/redis

View File

@ -1,2 +1,17 @@
parameters:
env(HYDRA_DISPATCHER_WEBHOOK_ENABLED): false
env(HYDRA_DISPATCHER_WEBHOOK_API_URL): ""
env(HYDRA_DISPATCHER_WEBHOOK_API_KEY): ""
env(HYDRA_DISPATCHER_WEBHOOK_API_METHOD): POST
env(HYDRA_DISPATCHER_FIREWALL_ADDITIONAL_PROPERTIES): true
hydra: hydra:
apps: [] apps: []
webhook:
enabled: "%env(bool:HYDRA_DISPATCHER_WEBHOOK_ENABLED)%"
api_url: "%env(string:HYDRA_DISPATCHER_WEBHOOK_API_URL)%"
api_key: "%env(string:HYDRA_DISPATCHER_WEBHOOK_API_KEY)%"
api_method: "%env(string:HYDRA_DISPATCHER_WEBHOOK_API_METHOD)%"
firewall:
additional_properties: "%env(bool:HYDRA_DISPATCHER_FIREWALL_ADDITIONAL_PROPERTIES)%"
rules: {}

View File

@ -5,11 +5,17 @@ resources:
- ./resources/hydra-dispatcher-deployment.yaml - ./resources/hydra-dispatcher-deployment.yaml
- ./resources/hydra-dispatcher-service.yaml - ./resources/hydra-dispatcher-service.yaml
generatorOptions:
labels:
com.cadoles.forge.sso-kustom/session: redis
configMapGenerator: configMapGenerator:
- name: hydra-dispatcher-env - name: hydra-dispatcher-env
literals: literals:
- APP_ENV=prod - APP_ENV=prod
- APP_DEBUG=false - APP_DEBUG=false
- PHP_FPM_MEMORY_LIMIT=256m
- NGINX_APP_SERVER_LISTEN=80
- HYDRA_BASE_URL=http://hydra:4444 - HYDRA_BASE_URL=http://hydra:4444
- HYDRA_ADMIN_BASE_URL=http://hydra:4445 - HYDRA_ADMIN_BASE_URL=http://hydra:4445
- HYDRA_REWRITE_ISSUER=yes - HYDRA_REWRITE_ISSUER=yes
@ -19,6 +25,7 @@ configMapGenerator:
- COOKIE_PATH=/ - COOKIE_PATH=/
- DEFAULT_LOCALE=fr - DEFAULT_LOCALE=fr
- APP_LOCALES=fr,en - APP_LOCALES=fr,en
- REDIS_DSN="redis://redis:6379"
- name: hydra-dispatcher-apps - name: hydra-dispatcher-apps
files: files:
- ./files/hydra/default.yaml - apps.yaml=./files/hydra/default.yaml

View File

@ -17,20 +17,75 @@ spec:
io.kompose.service: hydra-dispatcher io.kompose.service: hydra-dispatcher
spec: spec:
containers: containers:
- name: hydra-dispatcher - name: hydra-dispatcher-php-fpm
image: reg.cadoles.com/cadoles/hydra-dispatcher-v1:v0.0.0-218-g4b5e1d9 image: reg.cadoles.com/cadoles/hydra-dispatcher-base:2023.12.15-develop.903.b675347
args: ["/usr/sbin/php-fpm81", "-F", "-e"]
readinessProbe:
exec:
command:
- sh
- -c
- test -f /etc/php81/php-fpm.d/www.conf
livenessProbe:
exec:
command:
- php
- bin/console
- -V
initialDelaySeconds: 10
periodSeconds: 30
env:
- name: PHP_FPM_LISTEN
value: 127.0.0.1:9000
- name: PHP_MEMORY_LIMIT
value: 128m
- name: PHP_FPM_MEMORY_LIMIT
value: 128m
envFrom: envFrom:
- configMapRef: - configMapRef:
name: hydra-dispatcher-env name: hydra-dispatcher-env
volumeMounts: volumeMounts:
- mountPath: /var/www/config/hydra - mountPath: /app/config/hydra
name: hydra-dispatcher-apps name: hydra-dispatcher-apps
resources: {}
- image: reg.cadoles.com/cadoles/hydra-dispatcher-base:2023.12.15-develop.903.b675347
imagePullPolicy: Always
name: hydra-dispatcher-nginx
args: ["/usr/sbin/nginx"]
readinessProbe:
httpGet:
path: /health
port: 80
initialDelaySeconds: 5
timeoutSeconds: 5
periodSeconds: 10
livenessProbe:
httpGet:
path: /health
port: 80
initialDelaySeconds: 15
timeoutSeconds: 5
periodSeconds: 15
envFrom:
- configMapRef:
name: hydra-dispatcher-env
env:
- name: NGINX_APP_UPSTREAM_BACKEND_SERVER
value: 127.0.0.1:9000
- name: NGINX_APP_ROOT
value: "/public/"
- name: NGINX_APP_PHP_INDEX
value: "/index.php"
- name: NGINX_ERROR_LOG_LEVEL
value: "warn"
- name: NGINX_APP_PHP_NON_FILE_PATTERN
value: "^/index\\.php(/|$)"
ports: ports:
- containerPort: 80 - containerPort: 8080
resources: {} resources: {}
restartPolicy: Always restartPolicy: Always
volumes: volumes:
- name: hydra-dispatcher-apps - name: hydra-dispatcher-apps
configMap: configMap:
name: hydra-dispatcher-apps name: hydra-dispatcher-apps

View File

@ -9,6 +9,7 @@ resources:
- ./resources/hydra-serviceaccount.yaml - ./resources/hydra-serviceaccount.yaml
- ./resources/hydra-migrate-job.yaml - ./resources/hydra-migrate-job.yaml
- ./resources/hydra-maester - ./resources/hydra-maester
- ./resources/hydra-janitor-cronjob.yaml
secretGenerator: secretGenerator:
- name: hydra-secret - name: hydra-secret

View File

@ -0,0 +1,34 @@
apiVersion: batch/v1
kind: CronJob
metadata:
name: hydra-janitor
labels:
app.kubernetes.io/name: hydra-janitor
spec:
concurrencyPolicy: Forbid
schedule: "0 */1 * * *"
jobTemplate:
spec:
template:
metadata:
labels:
app.kubernetes.io/name: hydra-janitor
spec:
restartPolicy: OnFailure
serviceAccountName: hydra-sa
containers:
- name: janitor
image: reg.cadoles.com/proxy_cache/oryd/hydra:v2.0.3
envFrom:
- configMapRef:
name: hydra-env
imagePullPolicy: IfNotPresent
command: ["hydra"]
env: []
args:
- janitor
- --read-from-env
- --grants
- --requests
- --tokens
resources: {}

View File

@ -2,14 +2,14 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization kind: Kustomization
resources: resources:
- ./resources/hydra-maester-deployment.yaml - ./resources/hydra-maester-deployment.yaml
- ./resources/hydra-maester-rbac.yaml - ./resources/hydra-maester-rbac.yaml
- https://raw.githubusercontent.com/ory/k8s/v0.28.2/helm/charts/hydra-maester/crds/crd-oauth2clients.yaml #- https://raw.githubusercontent.com/ory/k8s/v0.28.2/helm/charts/hydra-maester/crds/crd-oauth2clients.yaml
configMapGenerator: configMapGenerator:
- name: hydra-maester-env - name: hydra-maester-env
literals: literals:
- APP_ENV=prod - APP_ENV=prod
- APP_DEBUG=false - APP_DEBUG=false
- HYDRA_ADMIN_BASE_URL=http://hydra - HYDRA_ADMIN_BASE_URL=http://hydra
- HYDRA_ADMIN_PORT=4445 - HYDRA_ADMIN_PORT=4445