This repository has been archived on 2024-05-31. You can view files and clone it, but cannot push or open issues or pull requests.
authentik/authentik/providers/proxy/controllers/k8s/ingress.py
Jens Langhammer 53d0205e86 outposts/proxy: use Prefix in ingress for k8s
Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
2022-03-15 19:01:08 +01:00

188 lines
7.4 KiB
Python

"""Kubernetes Ingress Reconciler"""
from typing import TYPE_CHECKING
from urllib.parse import urlparse
from kubernetes.client import (
NetworkingV1Api,
V1HTTPIngressPath,
V1HTTPIngressRuleValue,
V1Ingress,
V1IngressSpec,
V1IngressTLS,
V1ServiceBackendPort,
)
from kubernetes.client.models.v1_ingress_backend import V1IngressBackend
from kubernetes.client.models.v1_ingress_rule import V1IngressRule
from kubernetes.client.models.v1_ingress_service_backend import V1IngressServiceBackend
from authentik.outposts.controllers.base import FIELD_MANAGER
from authentik.outposts.controllers.k8s.base import KubernetesObjectReconciler
from authentik.outposts.controllers.k8s.triggers import NeedsRecreate, NeedsUpdate
from authentik.providers.proxy.models import ProxyMode, ProxyProvider
if TYPE_CHECKING:
from authentik.outposts.controllers.kubernetes import KubernetesController
class IngressReconciler(KubernetesObjectReconciler[V1Ingress]):
"""Kubernetes Ingress Reconciler"""
def __init__(self, controller: "KubernetesController") -> None:
super().__init__(controller)
self.api = NetworkingV1Api(controller.client)
def _check_annotations(self, reference: V1Ingress):
"""Check that all annotations *we* set are correct"""
for key, value in self.get_ingress_annotations().items():
if key not in reference.metadata.annotations:
raise NeedsUpdate()
if reference.metadata.annotations[key] != value:
raise NeedsUpdate()
def reconcile(self, current: V1Ingress, reference: V1Ingress):
super().reconcile(current, reference)
self._check_annotations(reference)
# Create a list of all expected host and tls hosts
expected_hosts = []
expected_hosts_tls = []
for proxy_provider in ProxyProvider.objects.filter(
outpost__in=[self.controller.outpost],
):
proxy_provider: ProxyProvider
external_host_name = urlparse(proxy_provider.external_host)
expected_hosts.append(external_host_name.hostname)
if external_host_name.scheme == "https":
expected_hosts_tls.append(external_host_name.hostname)
expected_hosts.sort()
expected_hosts_tls.sort()
have_hosts = [rule.host for rule in current.spec.rules]
have_hosts.sort()
have_hosts_tls = []
if current.spec.tls:
for tls_config in current.spec.tls:
if not tls_config:
continue
if tls_config.hosts:
have_hosts_tls += tls_config.hosts
if (
tls_config.secret_name
!= self.controller.outpost.config.kubernetes_ingress_secret_name
):
raise NeedsUpdate()
have_hosts_tls.sort()
if have_hosts != expected_hosts:
raise NeedsUpdate()
if have_hosts_tls != expected_hosts_tls:
raise NeedsUpdate()
# If we have a current ingress, which wouldn't have any hosts, raise
# NeedsRecreate() so that its deleted, and check hosts on create
if len(have_hosts) < 1:
raise NeedsRecreate()
def get_ingress_annotations(self) -> dict[str, str]:
"""Get ingress annotations"""
annotations = {
# Ensure that with multiple proxy replicas deployed, the same CSRF request
# goes to the same pod
"nginx.ingress.kubernetes.io/affinity": "cookie",
"traefik.ingress.kubernetes.io/affinity": "true",
# Buffer sizes for large headers with JWTs
"nginx.ingress.kubernetes.io/proxy-buffers-number": "4",
"nginx.ingress.kubernetes.io/proxy-buffer-size": "16k",
# Enable TLS in traefik
"traefik.ingress.kubernetes.io/router.tls": "true",
}
annotations.update(self.controller.outpost.config.kubernetes_ingress_annotations)
return annotations
def get_reference_object(self) -> V1Ingress:
"""Get deployment object for outpost"""
meta = self.get_object_meta(
name=self.name,
annotations=self.get_ingress_annotations(),
)
rules = []
tls_hosts = []
for proxy_provider in ProxyProvider.objects.filter(
outpost__in=[self.controller.outpost],
):
proxy_provider: ProxyProvider
external_host_name = urlparse(proxy_provider.external_host)
if external_host_name.scheme == "https":
tls_hosts.append(external_host_name.hostname)
if proxy_provider.mode in [
ProxyMode.FORWARD_SINGLE,
ProxyMode.FORWARD_DOMAIN,
]:
rule = V1IngressRule(
host=external_host_name.hostname,
http=V1HTTPIngressRuleValue(
paths=[
V1HTTPIngressPath(
backend=V1IngressBackend(
service=V1IngressServiceBackend(
name=self.name,
port=V1ServiceBackendPort(name="http"),
),
),
path="/outpost.goauthentik.io",
path_type="Prefix",
)
]
),
)
else:
rule = V1IngressRule(
host=external_host_name.hostname,
http=V1HTTPIngressRuleValue(
paths=[
V1HTTPIngressPath(
backend=V1IngressBackend(
service=V1IngressServiceBackend(
name=self.name,
port=V1ServiceBackendPort(name="http"),
),
),
path="/",
path_type="Prefix",
)
]
),
)
rules.append(rule)
tls_config = None
if tls_hosts:
tls_config = V1IngressTLS(
hosts=tls_hosts,
secret_name=self.controller.outpost.config.kubernetes_ingress_secret_name,
)
return V1Ingress(
metadata=meta,
spec=V1IngressSpec(rules=rules, tls=[tls_config]),
)
def create(self, reference: V1Ingress):
if len(reference.spec.rules) < 1:
self.logger.debug("No hosts defined, not creating ingress.")
return None
return self.api.create_namespaced_ingress(
self.namespace, reference, field_manager=FIELD_MANAGER
)
def delete(self, reference: V1Ingress):
return self.api.delete_namespaced_ingress(reference.metadata.name, self.namespace)
def retrieve(self) -> V1Ingress:
return self.api.read_namespaced_ingress(self.name, self.namespace)
def update(self, current: V1Ingress, reference: V1Ingress):
return self.api.patch_namespaced_ingress(
current.metadata.name,
self.namespace,
reference,
field_manager=FIELD_MANAGER,
)