providers/proxy: update ingress controller to work with k8s 1.22

Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
This commit is contained in:
Jens Langhammer 2021-10-18 10:00:24 +02:00
parent e5906a4115
commit 98a56c77e3
3 changed files with 59 additions and 50 deletions

View file

@ -26,9 +26,9 @@ drf-spectacular = "*"
facebook-sdk = "*"
geoip2 = "*"
gunicorn = "*"
kubernetes = "*"
kubernetes = "==v19.15.0b1"
ldap3 = "*"
lxml = ">=4.6.3"
lxml = "*"
packaging = "*"
psycopg2-binary = "*"
pycryptodome = "*"
@ -52,7 +52,7 @@ codespell = "*"
[dev-packages]
bandit = "*"
black = "==21.5b1"
black = "==21.9b0"
bump2version = "*"
colorama = "*"
coverage = {extras = ["toml"],version = "*"}

31
Pipfile.lock generated
View file

@ -1,7 +1,7 @@
{
"_meta": {
"hash": {
"sha256": "2928ad096a32a4ed1b96c4357a52bf111ca8b9000b86d9d1f2f1afb8318fab29"
"sha256": "ca7c64798cac0dfeb6aa088d6bf0261895398db26c4769274b77ef974ee06501"
},
"pipfile-spec": 6,
"requires": {},
@ -650,11 +650,11 @@
},
"kubernetes": {
"hashes": [
"sha256:0c72d00e7883375bd39ae99758425f5e6cb86388417cf7cc84305c211b2192cf",
"sha256:ff31ec17437293e7d4e1459f1228c42d27c7724dfb56b4868aba7a901a5b72c9"
"sha256:82d7d58f3e3b59fee227740e01af8d14e5d853d37cef6e71b4ee51a4f1a5d0d8",
"sha256:b7fce8b8d8e92d8023929d83cdb5e6e381f99e905d4488533c05280e18a03ced"
],
"index": "pypi",
"version": "==18.20.0"
"version": "==v19.15.0b1"
},
"ldap3": {
"hashes": [
@ -1527,13 +1527,6 @@
}
},
"develop": {
"appdirs": {
"hashes": [
"sha256:7d5d0167b2b1ba821647616af46a749d1c653740dd0d2415100fe26e27afdf41",
"sha256:a841dacd6b99318a741b166adb07e19ee71a274450e68237b4650ca1055ab128"
],
"version": "==1.4.4"
},
"astroid": {
"hashes": [
"sha256:0e361da0744d5011d4f5d57e64473ba9b7ab4da1e2d45d6631ebd67dd28c3cce",
@ -1568,11 +1561,11 @@
},
"black": {
"hashes": [
"sha256:23695358dbcb3deafe7f0a3ad89feee5999a46be5fec21f4f1d108be0bcdb3b1",
"sha256:8a60071a0043876a4ae96e6c69bd3a127dad2c1ca7c8083573eb82f92705d008"
"sha256:380f1b5da05e5a1429225676655dddb96f5ae8c75bdf91e53d798871b902a115",
"sha256:7de4cfc7eb6b710de325712d40125689101d21d25283eed7e9998722cf10eb91"
],
"index": "pypi",
"version": "==21.5b1"
"version": "==21.9b0"
},
"bump2version": {
"hashes": [
@ -1778,7 +1771,7 @@
"sha256:9c2ea1e62d871267b78307fe511c0838ba0da28698c5732d54e2790bf3ba9899",
"sha256:e17d6e2b81095c9db0a03a8025a957f334d6ea30b26f9ec70805411e5c7c81f2"
],
"markers": "python_version < '4.0' and python_full_version >= '3.6.1'",
"markers": "python_version < '4' and python_full_version >= '3.6.1'",
"version": "==5.9.3"
},
"lazy-object-proxy": {
@ -2125,6 +2118,14 @@
"markers": "python_version >= '3.5'",
"version": "==0.9.2"
},
"typing-extensions": {
"hashes": [
"sha256:49f75d16ff11f1cd258e1b988ccff82a3ca5570217d7ad8c5f48205dd99a677e",
"sha256:d8226d10bc02a29bcc81df19a26e56a9647f8b0a6d4a83924139f4a8b01f17b7",
"sha256:f1d25edafde516b146ecd0613dabcc61409817af4766fbbcfb8d1ad4ec441a34"
],
"version": "==3.10.0.2"
},
"urllib3": {
"extras": [
"secure"

View file

@ -3,15 +3,17 @@ from typing import TYPE_CHECKING
from urllib.parse import urlparse
from kubernetes.client import (
NetworkingV1beta1Api,
NetworkingV1beta1HTTPIngressPath,
NetworkingV1beta1HTTPIngressRuleValue,
NetworkingV1beta1Ingress,
NetworkingV1beta1IngressBackend,
NetworkingV1beta1IngressSpec,
NetworkingV1beta1IngressTLS,
NetworkingV1Api,
V1HTTPIngressPath,
V1HTTPIngressRuleValue,
V1Ingress,
V1IngressSpec,
V1IngressTLS,
V1ServiceBackendPort,
)
from kubernetes.client.models.networking_v1beta1_ingress_rule import NetworkingV1beta1IngressRule
from kubernetes.client.models.v1_ingress_backend import V1IngressBackend
from kubernetes.client.models.v1_ingress_rule import V1IngressRule
from kubernetes.client.models.v1_ingress_service_backend import V1IngressServiceBackend
from authentik.outposts.controllers.base import FIELD_MANAGER
from authentik.outposts.controllers.k8s.base import KubernetesObjectReconciler
@ -22,14 +24,14 @@ if TYPE_CHECKING:
from authentik.outposts.controllers.kubernetes import KubernetesController
class IngressReconciler(KubernetesObjectReconciler[NetworkingV1beta1Ingress]):
class IngressReconciler(KubernetesObjectReconciler[V1Ingress]):
"""Kubernetes Ingress Reconciler"""
def __init__(self, controller: "KubernetesController") -> None:
super().__init__(controller)
self.api = NetworkingV1beta1Api(controller.client)
self.api = NetworkingV1Api(controller.client)
def _check_annotations(self, reference: NetworkingV1beta1Ingress):
def _check_annotations(self, reference: V1Ingress):
"""Check that all annotations *we* set are correct"""
for key, value in self.get_ingress_annotations().items():
if key not in reference.metadata.annotations:
@ -37,7 +39,7 @@ class IngressReconciler(KubernetesObjectReconciler[NetworkingV1beta1Ingress]):
if reference.metadata.annotations[key] != value:
raise NeedsUpdate()
def reconcile(self, current: NetworkingV1beta1Ingress, reference: NetworkingV1beta1Ingress):
def reconcile(self, current: V1Ingress, reference: V1Ingress):
super().reconcile(current, reference)
self._check_annotations(reference)
# Create a list of all expected host and tls hosts
@ -93,7 +95,7 @@ class IngressReconciler(KubernetesObjectReconciler[NetworkingV1beta1Ingress]):
annotations.update(self.controller.outpost.config.kubernetes_ingress_annotations)
return annotations
def get_reference_object(self) -> NetworkingV1beta1Ingress:
def get_reference_object(self) -> V1Ingress:
"""Get deployment object for outpost"""
meta = self.get_object_meta(
name=self.name,
@ -112,31 +114,37 @@ class IngressReconciler(KubernetesObjectReconciler[NetworkingV1beta1Ingress]):
ProxyMode.FORWARD_SINGLE,
ProxyMode.FORWARD_DOMAIN,
]:
rule = NetworkingV1beta1IngressRule(
rule = V1IngressRule(
host=external_host_name.hostname,
http=NetworkingV1beta1HTTPIngressRuleValue(
http=V1HTTPIngressRuleValue(
paths=[
NetworkingV1beta1HTTPIngressPath(
backend=NetworkingV1beta1IngressBackend(
service_name=self.name,
service_port="http",
V1HTTPIngressPath(
backend=V1IngressBackend(
service=V1IngressServiceBackend(
name=self.name,
port=V1ServiceBackendPort(name="http"),
),
),
path="/akprox",
path_type="ImplementationSpecific",
)
]
),
)
else:
rule = NetworkingV1beta1IngressRule(
rule = V1IngressRule(
host=external_host_name.hostname,
http=NetworkingV1beta1HTTPIngressRuleValue(
http=V1HTTPIngressRuleValue(
paths=[
NetworkingV1beta1HTTPIngressPath(
backend=NetworkingV1beta1IngressBackend(
service_name=self.name,
service_port="http",
V1HTTPIngressPath(
backend=V1IngressBackend(
service=V1IngressServiceBackend(
name=self.name,
port=V1ServiceBackendPort(name="http"),
),
),
path="/",
path_type="ImplementationSpecific",
)
]
),
@ -144,16 +152,16 @@ class IngressReconciler(KubernetesObjectReconciler[NetworkingV1beta1Ingress]):
rules.append(rule)
tls_config = None
if tls_hosts:
tls_config = NetworkingV1beta1IngressTLS(
tls_config = V1IngressTLS(
hosts=tls_hosts,
secret_name=self.controller.outpost.config.kubernetes_ingress_secret_name,
)
return NetworkingV1beta1Ingress(
return V1Ingress(
metadata=meta,
spec=NetworkingV1beta1IngressSpec(rules=rules, tls=[tls_config]),
spec=V1IngressSpec(rules=rules, tls=[tls_config]),
)
def create(self, reference: NetworkingV1beta1Ingress):
def create(self, reference: V1Ingress):
if len(reference.spec.rules) < 1:
self.logger.debug("No hosts defined, not creating ingress.")
return None
@ -161,13 +169,13 @@ class IngressReconciler(KubernetesObjectReconciler[NetworkingV1beta1Ingress]):
self.namespace, reference, field_manager=FIELD_MANAGER
)
def delete(self, reference: NetworkingV1beta1Ingress):
def delete(self, reference: V1Ingress):
return self.api.delete_namespaced_ingress(reference.metadata.name, self.namespace)
def retrieve(self) -> NetworkingV1beta1Ingress:
def retrieve(self) -> V1Ingress:
return self.api.read_namespaced_ingress(self.name, self.namespace)
def update(self, current: NetworkingV1beta1Ingress, reference: NetworkingV1beta1Ingress):
def update(self, current: V1Ingress, reference: V1Ingress):
return self.api.patch_namespaced_ingress(
current.metadata.name,
self.namespace,