Compare commits

...

12 Commits

Author SHA1 Message Date
83cf48b2a9 feat: Cache docker builds
All checks were successful
Build and deploy / build (push) Successful in 7m51s
2025-12-23 03:38:36 +01:00
fc9f34939b feat: Default access policy one factor if no rules 2025-12-23 03:38:36 +01:00
c80024972c chore: Remove ./ from kustomization for consistency
All checks were successful
Build and deploy / build (push) Successful in 10m13s
2025-12-23 01:38:44 +01:00
eed5b44916 feat: Create namespace and set it explicitly 2025-12-23 01:38:44 +01:00
948473c171 chore: Update workflow
All checks were successful
Build and deploy / build (push) Successful in 9m40s
2025-12-22 23:44:35 +01:00
6863261c3e chore: Update dependencies 2025-12-22 23:42:52 +01:00
f03ab650fd Trigger reconcile webhook once build is done
All checks were successful
Build and deploy / build (push) Successful in 5m34s
kustomization/authelia-controller/325cc95e reconciliation succeeded
2025-04-23 20:47:11 +02:00
7512ed35b8 Use reusable workflow
All checks were successful
Build and deploy / build (push) Successful in 6m44s
kustomization/authelia-controller/325cc95e reconciliation succeeded
2025-04-23 14:15:24 +02:00
3b439f15e2 Update rust 1.85 -> 1.86
All checks were successful
Build and deploy / Build container and manifests (push) Successful in 7m50s
kustomization/authelia-controller/325cc95e reconciliation succeeded
2025-04-18 15:39:21 +02:00
e9fe169a9a Include git based version
All checks were successful
Build and deploy / Build container and manifests (push) Successful in 6m29s
2025-04-18 15:30:52 +02:00
d602220c4b Added age column to kubectl output
All checks were successful
Build and deploy / Build container and manifests (push) Successful in 7m34s
2025-04-18 15:00:14 +02:00
988c475c5e Added print columns
All checks were successful
Build and deploy / Build container and manifests (push) Successful in 9m52s
2025-04-18 04:05:16 +02:00
18 changed files with 623 additions and 583 deletions

View File

@@ -1,3 +1,4 @@
* *
!src !src
!Cargo.* !Cargo.*
!.cargo/config.toml

View File

@@ -7,89 +7,9 @@ on:
tags: tags:
- v*.*.* - v*.*.*
env:
OCI_REPO: git.huizinga.dev/dreaded_x/${{ gitea.event.repository.name}}
jobs: jobs:
build: build:
name: Build container and manifests uses: infra/workflows/.gitea/workflows/docker.yaml@956337b9bd5e72a93d3a57513cd421e7554dd61d
runs-on: ubuntu-latest secrets: inherit
steps: with:
- name: Checkout webhook_url: ${{ secrets.WEBHOOK_URL }}
uses: actions/checkout@v4
with:
fetch-depth: 0
fetch-tags: true
# TODO: Actually set an env variable and use it in the application
- name: Set version string
run: |
git describe --always --dirty="-modified"
- name: Get Git commit timestamps
run: echo "TIMESTAMP=$(git log -1 --pretty=%ct)" >> $GITHUB_ENV
- name: Login to registry
uses: docker/login-action@v3
with:
registry: git.huizinga.dev
username: ${{ gitea.actor }}
password: ${{ secrets.REGISTRY_TOKEN }}
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- name: Install kustomize
run: |
curl -s "https://raw.githubusercontent.com/kubernetes-sigs/kustomize/master/hack/install_kustomize.sh" | bash
- name: Setup Flux CLI
uses: https://github.com/fluxcd/flux2/action@main
with:
version: v2.5.0
- name: Docker meta
id: meta
uses: docker/metadata-action@v5
with:
images: ${{ env.OCI_REPO }}
tags: |
type=edge
type=ref,event=branch
type=semver,pattern=v{{version}}
type=semver,pattern=v{{major}}.{{minor}}
type=semver,pattern=v{{major}}
- name: Build container
id: build
uses: docker/build-push-action@v6
with:
context: .
push: true
sbom: true
provenance: mode=max
tags: ${{ steps.meta.outputs.tags }}
annotations: ${{ steps.meta.outputs.annotations }}
cache-from: type=gha
cache-to: type=gha,mode=max
env:
SOURCE_DATE_EPOCH: ${{ env.TIMESTAMP }}
- name: Generate CRDs
run: |
docker run --rm ${{ env.OCI_REPO }}@${{ steps.build.outputs.imageid }} /crdgen > ./manifests/crds.yaml
- name: Kustomize manifests
run: |
./kustomize build ./manifests | sed "s/\${DIGEST}/${{ steps.build.outputs.digest }}/" > ./manifests.yaml
- name: Push manifests
run: |
flux push artifact oci://${{ env.OCI_REPO }}/manifests:${{ gitea.head_ref || gitea.ref_name }} \
--path="./manifests.yaml" \
--source="$(git config --get remote.origin.url)" \
--revision="$(git rev-parse HEAD)" \
$(echo "${{ steps.meta.outputs.labels }}" | sed -e 's/^/-a /')
flux tag artifact oci://${{ env.OCI_REPO }}/manifests:${{ gitea.head_ref || gitea.ref_name }} \
$(echo "${{ steps.meta.outputs.tags }}" | sed -e 's/^.*:/--tag /')

View File

@@ -2,7 +2,7 @@ fail_fast: true
repos: repos:
- repo: https://github.com/pre-commit/pre-commit-hooks - repo: https://github.com/pre-commit/pre-commit-hooks
rev: v5.0.0 rev: v6.0.0
hooks: hooks:
- id: trailing-whitespace - id: trailing-whitespace
- id: end-of-file-fixer - id: end-of-file-fixer
@@ -14,7 +14,7 @@ repos:
- id: check-merge-conflict - id: check-merge-conflict
- repo: https://github.com/crate-ci/typos - repo: https://github.com/crate-ci/typos
rev: v1.31.1 rev: typos-dict-v0.13.13
hooks: hooks:
- id: typos - id: typos
args: ["--force-exclude"] args: ["--force-exclude"]
@@ -72,6 +72,6 @@ repos:
pass_filenames: false pass_filenames: false
- repo: https://github.com/hadolint/hadolint - repo: https://github.com/hadolint/hadolint
rev: v2.12.0 rev: v2.14.0
hooks: hooks:
- id: hadolint - id: hadolint

959
Cargo.lock generated

File diff suppressed because it is too large Load Diff

View File

@@ -5,16 +5,17 @@ edition = "2024"
default-run = "authelia-controller" default-run = "authelia-controller"
[dependencies] [dependencies]
color-eyre = "0.6.3" color-eyre = "0.6.5"
dotenvy = "0.15.7" dotenvy = "0.15.7"
futures-util = "0.3.31" futures-util = "0.3.31"
k8s-openapi = { version = "0.24.0", features = ["v1_31"] } git-version = "0.3.9"
kube = { version = "0.99.0", features = ["derive", "runtime"] } k8s-openapi = { version = "0.26.1", features = ["v1_34"] }
schemars = "0.8.22" kube = { version = "2.0.1", features = ["derive", "runtime"] }
serde = { version = "1.0.219", features = ["derive"] } schemars = "1.1.0"
serde_json = "1.0.140" serde = { version = "1.0.228", features = ["derive"] }
serde_json = "1.0.146"
serde_yaml = "0.9.34" serde_yaml = "0.9.34"
thiserror = "2.0.12" thiserror = "2.0.17"
tokio = { version = "1.44.2", features = ["full"] } tokio = { version = "1.48.0", features = ["full"] }
tracing = "0.1.41" tracing = "0.1.44"
tracing-subscriber = { version = "0.3.19", features = ["env-filter", "json"] } tracing-subscriber = { version = "0.3.22", features = ["env-filter", "json"] }

View File

@@ -1,7 +1,7 @@
FROM rust:1.85 AS base FROM rust:1.92 AS base
ENV CARGO_REGISTRIES_CRATES_IO_PROTOCOL=sparse ENV CARGO_REGISTRIES_CRATES_IO_PROTOCOL=sparse
RUN cargo install cargo-chef --locked --version 0.1.71 && \ RUN cargo install cargo-chef --locked --version 0.1.73 && \
cargo install cargo-auditable --locked --version 0.6.6 cargo install cargo-auditable --locked --version 0.7.2
WORKDIR /app WORKDIR /app
FROM base AS planner FROM base AS planner
@@ -13,10 +13,13 @@ COPY --from=planner /app/recipe.json recipe.json
RUN cargo chef cook --release --recipe-path recipe.json RUN cargo chef cook --release --recipe-path recipe.json
COPY . . COPY . .
ENV RUSTC_BOOTSTRAP=1 ARG RELEASE_VERSION
RUN cargo auditable build --release ENV RELEASE_VERSION=${RELEASE_VERSION}
RUN cargo auditable build --release && /app/target/release/crdgen > /crds.yaml
FROM gcr.io/distroless/cc-debian12:nonroot AS runtime FROM scratch AS manifests
COPY --from=builder /crds.yaml /
FROM gcr.io/distroless/cc-debian13:nonroot AS runtime
COPY --from=builder /app/target/release/authelia-controller /authelia-controller COPY --from=builder /app/target/release/authelia-controller /authelia-controller
COPY --from=builder /app/target/release/crdgen /crdgen
CMD ["/authelia-controller"] CMD ["/authelia-controller"]

38
docker-bake.hcl Normal file
View File

@@ -0,0 +1,38 @@
variable "TAG_BASE" {}
variable "RELEASE_VERSION" {}
group "default" {
targets = ["authelia-controller", "manifests"]
}
target "docker-metadata-action" {}
target "cache" {
cache-from = [
{
type = "gha",
}
]
cache-to = [
{
type = "gha",
mode = "max"
}
]
}
target "authelia-controller" {
inherits = ["docker-metadata-action", "cache"]
context = "./"
dockerfile = "Dockerfile"
tags = [for tag in target.docker-metadata-action.tags : "${TAG_BASE}:${tag}"]
target = "runtime"
}
target "manifests" {
inherits = ["cache"]
context = "./"
dockerfile = "Dockerfile"
target = "manifests"
output = [{ type = "cacheonly" }, "manifests"]
}

View File

@@ -2,9 +2,11 @@ kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: authelia-controller name: authelia-controller
namespace: authelia
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: authelia-controller name: authelia-controller
namespace: authelia
roleRef: roleRef:
kind: ClusterRole kind: ClusterRole
name: authelia-controller name: authelia-controller

View File

@@ -2,6 +2,7 @@ kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: authelia-controller name: authelia-controller
namespace: authelia
rules: rules:
- apiGroups: - apiGroups:
- authelia.huizinga.dev - authelia.huizinga.dev

View File

@@ -2,6 +2,7 @@ apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: authelia-controller name: authelia-controller
namespace: authelia
labels: labels:
app: authelia-controller app: authelia-controller
app.kubernetes.io/name: authelia-controller app.kubernetes.io/name: authelia-controller
@@ -18,12 +19,17 @@ spec:
kubectl.kubernetes.io/default-container: authelia-controller kubectl.kubernetes.io/default-container: authelia-controller
spec: spec:
serviceAccountName: authelia-controller serviceAccountName: authelia-controller
securityContext: {} securityContext:
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
fsGroup: 1000
seccompProfile:
type: RuntimeDefault
containers: containers:
- name: authelia-controller - name: authelia-controller
image: git.huizinga.dev/dreaded_x/authelia-controller@${DIGEST} image: '{{ index .images "authelia-controller" }}'
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
securityContext: {}
resources: resources:
limits: limits:
cpu: 200m cpu: 200m
@@ -34,3 +40,9 @@ spec:
env: env:
- name: RUST_LOG - name: RUST_LOG
value: info,authelia_controller=debug value: info,authelia_controller=debug
securityContext:
allowPrivilegeEscalation: false
runAsNonRoot: true
capabilities:
drop:
- ALL

View File

@@ -1,9 +1,9 @@
apiVersion: kustomize.config.k8s.io/v1beta1 apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization kind: Kustomization
namespace: authelia
resources: resources:
- ./crds.yaml - namespace.yaml
- ./service-account.yaml - crds.yaml
- ./cluster-role.yaml - service-account.yaml
- ./cluster-role-binding.yaml - cluster-role.yaml
- ./deployment.yaml - cluster-role-binding.yaml
- deployment.yaml

4
manifests/namespace.yaml Normal file
View File

@@ -0,0 +1,4 @@
apiVersion: v1
kind: Namespace
metadata:
name: authelia

View File

@@ -2,6 +2,7 @@ apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: authelia-controller name: authelia-controller
namespace: authelia
labels: labels:
app: authelia-controller app: authelia-controller
app.kubernetes.io/name: authelia-controller app.kubernetes.io/name: authelia-controller

View File

@@ -1,4 +1,4 @@
[toolchain] [toolchain]
channel = "1.85" channel = "1.92"
profile = "default" profile = "default"
components = ["rust-analyzer"] components = ["rust-analyzer"]

View File

@@ -1,2 +1,5 @@
pub mod context; pub mod context;
pub mod resources; pub mod resources;
mod version;
pub use version::VERSION;

View File

@@ -1,6 +1,7 @@
use std::sync::Arc; use std::sync::Arc;
use std::time::Duration; use std::time::Duration;
use authelia_controller::VERSION;
use authelia_controller::context::Context; use authelia_controller::context::Context;
use authelia_controller::resources::AccessControlRule; use authelia_controller::resources::AccessControlRule;
use color_eyre::eyre::Context as _; use color_eyre::eyre::Context as _;
@@ -39,7 +40,7 @@ async fn main() -> color_eyre::Result<()> {
}) })
.unwrap_or(Ok(15))?; .unwrap_or(Ok(15))?;
info!("Starting"); info!(version = VERSION, "Starting");
let client = Client::try_default().await?; let client = Client::try_default().await?;
let access_control_rules = Api::<AccessControlRule>::all(client.clone()); let access_control_rules = Api::<AccessControlRule>::all(client.clone());

View File

@@ -29,7 +29,11 @@ enum AccessPolicy {
)] )]
#[kube( #[kube(
shortname = "acl", shortname = "acl",
doc = "Custom resource for managing authelia access rules" doc = "Custom resource for managing authelia access rules",
printcolumn = r#"{"name":"Domain", "type":"string", "jsonPath":".spec.domain"}"#,
printcolumn = r#"{"name":"Policy", "type":"string", "jsonPath":".spec.policy"}"#,
printcolumn = r#"{"name":"Subject", "type":"string", "jsonPath":".spec.subject"}"#,
printcolumn = r#"{"name":"Age", "type":"date", "jsonPath":".metadata.creationTimestamp"}"#
)] )]
#[serde(rename_all = "camelCase")] #[serde(rename_all = "camelCase")]
pub struct AccessControlRuleSpec { pub struct AccessControlRuleSpec {
@@ -41,6 +45,7 @@ pub struct AccessControlRuleSpec {
#[derive(Serialize, Deserialize, Clone, Debug, Hash)] #[derive(Serialize, Deserialize, Clone, Debug, Hash)]
struct AccessControl { struct AccessControl {
rules: Vec<AccessControlRuleSpec>, rules: Vec<AccessControlRuleSpec>,
default_policy: AccessPolicy,
} }
#[derive(Serialize, Deserialize, Clone, Debug, Hash)] #[derive(Serialize, Deserialize, Clone, Debug, Hash)]
@@ -56,14 +61,22 @@ impl AccessControlRule {
debug!("Updating acl"); debug!("Updating acl");
rules.sort_by_cached_key(|rule| rule.name_any()); rules.sort_by_cached_key(|rule| rule.name_any());
let rules = rules let rules: Vec<_> = rules
.iter() .iter()
.inspect(|rule| trace!(name = rule.name_any(), "Rule found")) .inspect(|rule| trace!(name = rule.name_any(), "Rule found"))
.map(|rule| rule.spec.clone()) .map(|rule| rule.spec.clone())
.collect(); .collect();
let top = TopLevel { let top = TopLevel {
access_control: AccessControl { rules }, access_control: AccessControl {
// TODO: Make sure configurable?
default_policy: if rules.is_empty() {
AccessPolicy::OneFactor
} else {
AccessPolicy::Deny
},
rules,
},
}; };
let contents = BTreeMap::from([( let contents = BTreeMap::from([(

11
src/version.rs Normal file
View File

@@ -0,0 +1,11 @@
pub const VERSION: &str = get_version();
const fn get_version() -> &'static str {
if let Some(version) = std::option_env!("RELEASE_VERSION")
&& !version.is_empty()
{
version
} else {
git_version::git_version!(fallback = "unknown")
}
}