Skip to content

Commit 6acd91b

Browse files
authored
Fix repo rename (#39)
* Fix go imports * Remove legacy secrets * Renmae ci and chart names * Fix logger na dmetrics prefix * Update docs
1 parent 108b902 commit 6acd91b

25 files changed

+176
-115
lines changed

.github/workflows/publish.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ on:
33
release:
44
types: [published]
55
env:
6-
NAME: "azdo-proxy"
6+
NAME: "git-auth-proxy"
77
jobs:
88
helm:
99
runs-on: ubuntu-latest

Dockerfile

+3-3
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@ FROM golang:1.17 as builder
22
RUN mkdir /build
33
ADD . /build/
44
WORKDIR /build
5-
RUN CGO_ENABLED=0 GOOS=linux go build -a -installsuffix cgo -ldflags '-extldflags "-static"' -o azdo-proxy .
5+
RUN CGO_ENABLED=0 GOOS=linux go build -a -installsuffix cgo -ldflags '-extldflags "-static"' -o git-auth-proxy .
66

77
FROM gcr.io/distroless/static:nonroot
8-
COPY --from=builder /build/azdo-proxy /app/
8+
COPY --from=builder /build/git-auth-proxy /app/
99
WORKDIR /app
1010
USER nonroot:nonroot
11-
ENTRYPOINT ["./azdo-proxy"]
11+
ENTRYPOINT ["./git-auth-proxy"]

Makefile

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
TAG = $$(git rev-parse --short HEAD)
2-
IMG ?= ghcr.io/xenitab/azdo-proxy:$(TAG)
2+
IMG ?= ghcr.io/xenitab/git-auth-proxy:$(TAG)
33

44
assets:
55
draw.io -b 10 -x -f png -p 0 -o assets/architecture.png assets/diagram.drawio

README.md

+80-38
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,40 @@
1-
# Azure DevOps Proxy
1+
# Git Auth Proxy
22

3-
[![Go Report Card](https://goreportcard.com/badge/github.com/XenitAB/azdo-proxy)](https://goreportcard.com/report/github.com/XenitAB/azdo-proxy)
4-
[![Docker Repository on Quay](https://quay.io/repository/xenitab/azdo-proxy/status "Docker Repository on Quay")](https://quay.io/repository/xenitab/azdo-proxy)
3+
[![Go Report Card](https://goreportcard.com/badge/github.com/XenitAB/git-auth-proxy)](https://goreportcard.com/report/github.com/XenitAB/git-auth-proxy)
54

6-
Proxy to allow sharing of a Azure DevOps Personal Access Token in a Kubernetes cluster.
5+
Proxy to allow multi tenant sharing of GitHub and Azure DevOps credentials in Kubernetes.
76

8-
Azure DevOps allows the use of Personal Access Tokens (PAT) to authenticate access to both its
9-
API and Git repositories. Sadly it does not provide an API to create new PAT, making the process
10-
of automation cumbersome if multiple tokens are needed with limited scopes.
7+
Most Git providers offer mutliple ways of authenticating when cloning repositories and communicating with their API. These authentication methods are usually tied to a specific user and in the best
8+
case offer the ability to scope the permissions. The lack of organization API keys leads to solutions like GitHubs soltution to [create a machine user](https://docs.github.com/en/developers/overview/managing-deploy-keys#machine-users)
9+
that has limited permissions. The need for machine user accounts is especially important for GitOps deployment flows with projects like [Flux](https://docs.github.com/en/developers/overview/managing-deploy-keys#machine-users)
10+
and [ArgoCD](https://github.com/argoproj/argo-cd). These tools need an authentication method that supports accessing multiple repositories, without sharing the global credentials with all users.
1111

1212
<p align="center">
1313
<img src="./assets/architecture.png">
1414
</p>
1515

16-
Azure DevOps Proxy (azdo-proxy) is an attempt to solve this issue by enabling a single PAT
17-
to be shared by many applications, while at the same time limiting access for each application.
18-
Tokens are generated automatically and written as a Kubernetes secrets to one or multiple namespaces,
19-
the application just needs to mount the secret and use it when communicating with the proxy.
20-
Requests are sent to azdo-proxy together with a token, which gives access to a specific repository.
21-
The request is checked and if allowed forwarded to Azure DevOps with the PAT appended to the request.
16+
Git Auth Proxy attemps to solve this problem by implementing its own authentication and authorization layer inbetween the client and the Git provider. It works by generating static tokens that are
17+
specific to a Git repository. These tokens are then written to a Kubernetes secret in the Kubernetes namespaces which should have access to the repositories. When a repository is cloned through the
18+
proxy, the token will be checked agains the repository cloned, and if valid it will be replaced with the correct credentials. The request will be denied if a token is used to clone any other
19+
repository which is does not have access to.
2220

2321
## How To
2422

25-
Start off by [creating a new PAT](https://docs.microsoft.com/en-us/azure/devops/organizations/accounts/use-personal-access-tokens-to-authenticate?view=azure-devops&tabs=preview-page) as it has to be given to the proxy.
23+
The proxy reads its configuration from a JSON file. It contains a list of repositories that can be accessed through the proxy and the Kubernetes namespaces which should receive a Secret.
24+
25+
When using Azure DevOps a [PAT](https://docs.microsoft.com/en-us/azure/devops/organizations/accounts/use-personal-access-tokens-to-authenticate?view=azure-devops&tabs=preview-page) has to be
26+
configured for Git Auth Proxy to append to authorized requests.
2627

27-
The proxy reads its configuration from a JSON file. The file will contain the PAT used to authenticate
28-
requests with, the Azure DevOps organization, and a list of repositories that can be accessed through
29-
the froxy from the specified namespaces.
3028
```json
3129
{
3230
"organizations": [
3331
{
32+
"provider": "azuredevops",
33+
"azuredevops": {
34+
"pat": "<PAT>"
35+
},
36+
"host": "dev.azure.com",
3437
"name": "xenitab",
35-
"pat": "foobar",
3638
"repositories": [
3739
{
3840
"name": "fleet-infra",
@@ -48,42 +50,81 @@ the froxy from the specified namespaces.
4850
}
4951
```
5052

53+
When using GitHub a [GitHub Application](https://docs.github.com/en/developers/apps) has to be created and installed. The PEM key needs to be extracted and passed as a base64 endoded string in the
54+
configuration file. Note that the project field is not required when using GitHub as projects do not exists in GitHub.
55+
56+
```json
57+
{
58+
"organizations": [
59+
{
60+
"provider": "github",
61+
"github": {
62+
"appID": 123,
63+
"installationID: 123,
64+
"privateKey: "<BASE64>"
65+
},
66+
"host": "github.com",
67+
"name": "xenitab",
68+
"repositories": [
69+
{
70+
"name": "fleet-infra",
71+
"namespaces": [
72+
"foo",
73+
"bar"
74+
]
75+
}
76+
]
77+
}
78+
]
79+
}
80+
```
81+
5182
Add the Helm repository and install the chart, be sure to set the config content.
83+
5284
```shell
53-
helm repo add https://xenitab.github.io/azdo-proxy/
54-
helm install azdo-proxy --set config=<config>
85+
helm repo add https://xenitab.github.io/git-auth-proxy/
86+
helm install git-auth-proxy --set config=<config>
5587
```
5688

57-
There should now be a azdo-proxy Pod and Service in the cluster, ready to proxy traffic.
89+
There should now be a `git-auth-proxy` Deployment and Service in the cluster, ready to proxy traffic.
5890

5991
### Git
6092

61-
Cloning a repository through the proxy is not too different from doing so directly from Azure DevOps.
62-
The only limitation is that it is not possible to clone through ssh, as azdo-proxy only proxies HTTP traffic.
63-
To clone the repository `repo-1` [get the clone URL from the repository page](https://docs.microsoft.com/en-us/azure/devops/repos/git/clone?view=azure-devops&tabs=visual-studio#get-the-clone-url-to-your-repo).
64-
Then replace the host part of the URL with `azdo-proxy` and add the token as a basic auth parameter. The result should be similar to below.
93+
Cloning a repository through the proxy is not too different from doing so directly from GitHub or Azure DevOps. The only limitation is that it is not possible to clone through ssh, as Git Auth Proxy
94+
only proxies HTTP traffic. To clone the repository `repo-1` [get the clone URL from the repository page](https://docs.microsoft.com/en-us/azure/devops/repos/git/clone?view=azure-devops&tabs=visual-studio#get-the-clone-url-to-your-repo).
95+
Then replace the host part of the URL with `git-auth-proxy` and add the token as a basic auth parameter. The result should be similar to below.
96+
6597
```shell
66-
git clone http://<token-1>@azdo-proxy/org/proj/_git/repo-1
98+
git clone http://<token-1>@git-auth-proxy/org/proj/_git/repo-1
6799
```
68100

69101
### API
70102

71-
Authenticated API calls can also be done through the proxy. Currently only repository specific
72-
requests will be permitted. This may change in future releases. As an example execute the
73-
following command to list all pull requests in the repository `repo-1`.
103+
API calls can also be done through the proxy. Currently only repository specific requests will be permitted as authorization is done per repository. This may change in future releases.
104+
105+
#### GitHub
106+
107+
The proxy assumes that the requests sent to it are in a GitHub enterprise format due to the way GitHub clients behave when configured with a host that is not `github.com`. The main difference between
108+
GitHub Enterprise and non GitHub Enterprise is the API format. The GitHub Enterprise API expects all requests to the API to have the prefix `/api/v3/` while non GitHub Enterprise API requests are sent
109+
to the host `api.github.com`.
110+
111+
#### Azure DevOps
112+
113+
Execute the following command to list all pull requests in the repository `repo-1` using the local token to authenticate to the proxy.
114+
74115
```shell
75-
curl http://<token-1>@azdo-proxy/org/proj/_apis/git/repositories/repo-1/pullrequests?api-version=5.1
116+
curl http://<token-1>@git-auth-proxy/org/proj/_apis/git/repositories/repo-1/pullrequests?api-version=5.1
76117
```
77118

78119
> :warning: **If you intend on using a language specific API**: Please read this!
79120
80121
Some APIs built by Microsoft, like [azure-devops-go-api](https://github.com/microsoft/azure-devops-go-api), will make a request to the [Resource Areas API](https://docs.microsoft.com/en-us/azure/devops/extend/develop/work-with-urls?view=azure-devops&tabs=http#how-to-get-an-organizations-url)
81-
which returns a list of location URLs for a specific organization. They will then use those URLs
82-
when making additional requests, skipping the proxy. To avoid this you need to explicitly create
83-
your client instead of allowing it to be created automatically.
122+
which returns a list of location URLs for a specific organization. They will then use those URLs when making additional requests, skipping the proxy. To avoid this you need to explicitly create your
123+
client instead of allowing it to be created automatically.
84124

85125
In the case of Go you should create a client in the following way.
86-
```golang
126+
127+
```go
87128
package main
88129

89130
import (
@@ -92,16 +133,17 @@ import (
92133
)
93134

94135
func main() {
95-
connection := azuredevops.NewAnonymousConnection("http://azdo-proxy")
96-
client := connection.GetClientByUrl("http://azdo-proxy")
136+
connection := azuredevops.NewAnonymousConnection("http://git-auth-proxy")
137+
client := connection.GetClientByUrl("http://git-auth-proxy")
97138
gitClient := &git.ClientImpl{
98139
Client: *client,
99140
}
100141
}
101142
```
102143

103144
Instead of the cleaner solution which would ignore the proxy.
104-
```golang
145+
146+
```go
105147
package main
106148

107149
import (
@@ -112,7 +154,7 @@ import (
112154
)
113155

114156
func main() {
115-
connection := azuredevops.NewAnonymousConnection("http://azdo-proxy")
157+
connection := azuredevops.NewAnonymousConnection("http://git-auth-proxy")
116158
ctx := context.Background()
117159
gitClient, _ := git.NewClient(ctx, connection)
118160
}

assets/architecture.png

6.54 KB
Loading

assets/diagram.drawio

+1-1
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
<mxfile host="Electron" modified="2020-07-09T12:44:40.518Z" agent="5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) draw.io/13.3.5 Chrome/83.0.4103.119 Electron/9.0.5 Safari/537.36" etag="ny_sSromxSdBE-dT1N06" version="13.3.5" type="device"><diagram id="gbA4HWZm-8l8qiuZn7tg" name="architecture">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</diagram></mxfile>
1+
<mxfile host="Electron" modified="2021-10-07T12:52:09.415Z" agent="5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) draw.io/15.4.0 Chrome/89.0.4389.128 Electron/12.2.1 Safari/537.36" etag="MLVpu5QK5Lus0AjYw-5j" version="15.4.0" type="device"><diagram id="gbA4HWZm-8l8qiuZn7tg" name="architecture">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</diagram></mxfile>
File renamed without changes.
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
apiVersion: v2
2-
name: azdo-proxy
3-
description: A Helm chart for azdo-proxy
2+
name: git-auth-proxy
3+
description: A Helm chart for git-auth-proxy
44
type: application
55
version: v0.4.1
66
appVersion: v0.4.1

charts/azdo-proxy/templates/_helpers.tpl renamed to charts/git-auth-proxy/templates/_helpers.tpl

+8-8
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
{{/*
33
Expand the name of the chart.
44
*/}}
5-
{{- define "azdo-proxy.name" -}}
5+
{{- define "git-auth-proxy.name" -}}
66
{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }}
77
{{- end }}
88

@@ -11,7 +11,7 @@ Create a default fully qualified app name.
1111
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
1212
If release name contains chart name it will be used as a full name.
1313
*/}}
14-
{{- define "azdo-proxy.fullname" -}}
14+
{{- define "git-auth-proxy.fullname" -}}
1515
{{- if .Values.fullnameOverride }}
1616
{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" }}
1717
{{- else }}
@@ -27,16 +27,16 @@ If release name contains chart name it will be used as a full name.
2727
{{/*
2828
Create chart name and version as used by the chart label.
2929
*/}}
30-
{{- define "azdo-proxy.chart" -}}
30+
{{- define "git-auth-proxy.chart" -}}
3131
{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }}
3232
{{- end }}
3333

3434
{{/*
3535
Common labels
3636
*/}}
37-
{{- define "azdo-proxy.labels" -}}
38-
helm.sh/chart: {{ include "azdo-proxy.chart" . }}
39-
{{ include "azdo-proxy.selectorLabels" . }}
37+
{{- define "git-auth-proxy.labels" -}}
38+
helm.sh/chart: {{ include "git-auth-proxy.chart" . }}
39+
{{ include "git-auth-proxy.selectorLabels" . }}
4040
{{- if .Chart.AppVersion }}
4141
app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
4242
{{- end }}
@@ -46,7 +46,7 @@ app.kubernetes.io/managed-by: {{ .Release.Service }}
4646
{{/*
4747
Selector labels
4848
*/}}
49-
{{- define "azdo-proxy.selectorLabels" -}}
50-
app.kubernetes.io/name: {{ include "azdo-proxy.name" . }}
49+
{{- define "git-auth-proxy.selectorLabels" -}}
50+
app.kubernetes.io/name: {{ include "git-auth-proxy.name" . }}
5151
app.kubernetes.io/instance: {{ .Release.Name }}
5252
{{- end }}
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
apiVersion: v1
22
kind: ConfigMap
33
metadata:
4-
name: {{ include "azdo-proxy.fullname" . }}
4+
name: {{ include "git-auth-proxy.fullname" . }}
55
labels:
6-
{{- include "azdo-proxy.labels" . | nindent 4 }}
6+
{{- include "git-auth-proxy.labels" . | nindent 4 }}
77
data:
88
config.json: {{ required "Config has to be set." .Values.config | quote }}

charts/azdo-proxy/templates/deployment.yaml renamed to charts/git-auth-proxy/templates/deployment.yaml

+6-6
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
apiVersion: apps/v1
22
kind: Deployment
33
metadata:
4-
name: {{ include "azdo-proxy.fullname" . }}
4+
name: {{ include "git-auth-proxy.fullname" . }}
55
labels:
6-
{{- include "azdo-proxy.labels" . | nindent 4 }}
6+
{{- include "git-auth-proxy.labels" . | nindent 4 }}
77
spec:
88
replicas: {{ .Values.replicaCount }}
99
strategy:
1010
type: Recreate
1111
selector:
1212
matchLabels:
13-
{{- include "azdo-proxy.selectorLabels" . | nindent 6 }}
13+
{{- include "git-auth-proxy.selectorLabels" . | nindent 6 }}
1414
template:
1515
metadata:
1616
annotations:
@@ -19,9 +19,9 @@ spec:
1919
{{- toYaml . | nindent 8 }}
2020
{{- end }}
2121
labels:
22-
{{- include "azdo-proxy.selectorLabels" . | nindent 8 }}
22+
{{- include "git-auth-proxy.selectorLabels" . | nindent 8 }}
2323
spec:
24-
serviceAccountName: {{ include "azdo-proxy.fullname" . }}
24+
serviceAccountName: {{ include "git-auth-proxy.fullname" . }}
2525
{{- with .Values.imagePullSecrets }}
2626
imagePullSecrets:
2727
{{- toYaml . | nindent 8 }}
@@ -62,7 +62,7 @@ spec:
6262
volumes:
6363
- name: config
6464
configMap:
65-
name: {{ include "azdo-proxy.fullname" . }}
65+
name: {{ include "git-auth-proxy.fullname" . }}
6666
{{- if .Values.priorityClassName }}
6767
priorityClassName: {{ .Values.priorityClassName }}
6868
{{- end }}

charts/azdo-proxy/templates/networkpolicy.yaml renamed to charts/git-auth-proxy/templates/networkpolicy.yaml

+3-3
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,13 @@
22
apiVersion: networking.k8s.io/v1
33
kind: NetworkPolicy
44
metadata:
5-
name: {{ include "azdo-proxy.fullname" . }}
5+
name: {{ include "git-auth-proxy.fullname" . }}
66
labels:
7-
{{- include "azdo-proxy.labels" . | nindent 4 }}
7+
{{- include "git-auth-proxy.labels" . | nindent 4 }}
88
spec:
99
podSelector:
1010
matchLabels:
11-
{{- include "azdo-proxy.selectorLabels" . | nindent 8 }}
11+
{{- include "git-auth-proxy.selectorLabels" . | nindent 8 }}
1212
policyTypes:
1313
- Ingress
1414
- Egress
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
apiVersion: v1
22
kind: ServiceAccount
33
metadata:
4-
name: {{ include "azdo-proxy.fullname" . }}
4+
name: {{ include "git-auth-proxy.fullname" . }}
55
labels:
6-
{{- include "azdo-proxy.labels" . | nindent 4 }}
6+
{{- include "git-auth-proxy.labels" . | nindent 4 }}
77
---
88
apiVersion: rbac.authorization.k8s.io/v1
99
kind: ClusterRole
1010
metadata:
11-
name: {{ include "azdo-proxy.fullname" . }}
11+
name: {{ include "git-auth-proxy.fullname" . }}
1212
labels:
13-
{{- include "azdo-proxy.labels" . | nindent 4 }}
13+
{{- include "git-auth-proxy.labels" . | nindent 4 }}
1414
rules:
1515
- apiGroups: [""]
1616
resources: ["secrets"]
@@ -19,15 +19,15 @@ rules:
1919
apiVersion: rbac.authorization.k8s.io/v1
2020
kind: ClusterRoleBinding
2121
metadata:
22-
name: {{ include "azdo-proxy.fullname" . }}
22+
name: {{ include "git-auth-proxy.fullname" . }}
2323
labels:
24-
{{- include "azdo-proxy.labels" . | nindent 4 }}
24+
{{- include "git-auth-proxy.labels" . | nindent 4 }}
2525
roleRef:
2626
apiGroup: rbac.authorization.k8s.io
2727
kind: ClusterRole
28-
name: {{ include "azdo-proxy.fullname" . }}
28+
name: {{ include "git-auth-proxy.fullname" . }}
2929
subjects:
3030
- apiGroup: ""
3131
kind: ServiceAccount
32-
name: {{ include "azdo-proxy.fullname" . }}
32+
name: {{ include "git-auth-proxy.fullname" . }}
3333
namespace: {{ .Release.Namespace }}

0 commit comments

Comments
 (0)