Skip to content

Commit 58ebb1b

Browse files
committed
[RFC-007] Implement GitHub app authentication for git repositories.
- API change to add new `github` provider field in `GitRepository` spec. - Controller change to use the GitHub authentication information specified in `.spec.secretRef` to create the auth options to authenticate to git repositories when the `provider` field is set to `github`, - Tests for new `github` provider field - Updated docs to use GitHub Apps for authentication in source-controller. Signed-off-by: Dipti Pai <[email protected]>
1 parent 4d34b3f commit 58ebb1b

File tree

6 files changed

+208
-24
lines changed

6 files changed

+208
-24
lines changed

api/v1/gitrepository_types.go

+6-2
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,10 @@ const (
3535
// GitProviderAzure provides support for authentication to azure
3636
// repositories using Managed Identity.
3737
GitProviderAzure string = "azure"
38+
39+
// GitProviderGitHub provides support for authentication to git
40+
// repositories using GitHub App authentication
41+
GitProviderGitHub string = "github"
3842
)
3943

4044
const (
@@ -88,9 +92,9 @@ type GitRepositorySpec struct {
8892
// +optional
8993
SecretRef *meta.LocalObjectReference `json:"secretRef,omitempty"`
9094

91-
// Provider used for authentication, can be 'azure', 'generic'.
95+
// Provider used for authentication, can be 'azure', 'github', 'generic'.
9296
// When not specified, defaults to 'generic'.
93-
// +kubebuilder:validation:Enum=generic;azure
97+
// +kubebuilder:validation:Enum=generic;azure;github
9498
// +optional
9599
Provider string `json:"provider,omitempty"`
96100

config/crd/bases/source.toolkit.fluxcd.io_gitrepositories.yaml

+2-1
Original file line numberDiff line numberDiff line change
@@ -105,11 +105,12 @@ spec:
105105
type: string
106106
provider:
107107
description: |-
108-
Provider used for authentication, can be 'azure', 'generic'.
108+
Provider used for authentication, can be 'azure', 'github', 'generic'.
109109
When not specified, defaults to 'generic'.
110110
enum:
111111
- generic
112112
- azure
113+
- github
113114
type: string
114115
proxySecretRef:
115116
description: |-

docs/api/v1/source.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -390,7 +390,7 @@ string
390390
</td>
391391
<td>
392392
<em>(Optional)</em>
393-
<p>Provider used for authentication, can be &lsquo;azure&rsquo;, &lsquo;generic&rsquo;.
393+
<p>Provider used for authentication, can be &lsquo;azure&rsquo;, &lsquo;github&rsquo;, &lsquo;generic&rsquo;.
394394
When not specified, defaults to &lsquo;generic&rsquo;.</p>
395395
</td>
396396
</tr>
@@ -1730,7 +1730,7 @@ string
17301730
</td>
17311731
<td>
17321732
<em>(Optional)</em>
1733-
<p>Provider used for authentication, can be &lsquo;azure&rsquo;, &lsquo;generic&rsquo;.
1733+
<p>Provider used for authentication, can be &lsquo;azure&rsquo;, &lsquo;github&rsquo;, &lsquo;generic&rsquo;.
17341734
When not specified, defaults to &lsquo;generic&rsquo;.</p>
17351735
</td>
17361736
</tr>

docs/spec/v1/gitrepositories.md

+59
Original file line numberDiff line numberDiff line change
@@ -221,6 +221,7 @@ Supported options are:
221221

222222
- `generic`
223223
- `azure`
224+
- `github`
224225

225226
When provider is not specified, it defaults to `generic` indicating that
226227
mechanisms using `spec.secretRef` are used for authentication.
@@ -296,6 +297,64 @@ must follow this format:
296297
```
297298
https://dev.azure.com/{your-organization}/{your-project}/_git/{your-repository}
298299
```
300+
#### GitHub
301+
302+
The `github` provider can be used to authenticate to Git repositories using
303+
[GitHub Apps](https://docs.github.com/en/apps/overview).
304+
305+
##### Pre-requisites
306+
307+
- [Register](https://docs.github.com/en/apps/creating-github-apps/registering-a-github-app/registering-a-github-app)
308+
the GitHub App with the necessary permissions and [generate a private
309+
key](https://docs.github.com/en/apps/creating-github-apps/authenticating-with-a-github-app/managing-private-keys-for-github-apps)
310+
for the app.
311+
312+
- [Install](https://docs.github.com/en/apps/using-github-apps/installing-your-own-github-app)
313+
the app in the organization/account configuring access to the necessary
314+
repositories.
315+
316+
##### Configure GitHub App secret
317+
318+
The GitHub App information is specified in `.spec.secretRef` in the format
319+
specified below:
320+
321+
- Get the App ID from the app settings page at
322+
`https://github.com/settings/apps/<app-name>`.
323+
- Get the App Installation ID from the app installations page at
324+
`https://github.com/settings/installations`. Click the installed app, the URL
325+
will contain the installation ID
326+
`https://github.com/settings/installations/<installation-id>`. For
327+
organizations, the first part of the URL may be different, but it follows the
328+
same pattern.
329+
- The private key that was generated in the pre-requisites.
330+
- (Optional) GitHub Enterprise Server users can set the base URL to
331+
`http(s)://HOSTNAME/api/v3`.
332+
333+
```yaml
334+
apiVersion: v1
335+
kind: Secret
336+
metadata:
337+
name: github-sa
338+
type: Opaque
339+
stringData:
340+
githubAppID: "<app-id>"
341+
githubAppInstallationID: "<app-installation-id>"
342+
githubAppPrivateKey: |
343+
-----BEGIN RSA PRIVATE KEY-----
344+
...
345+
-----END RSA PRIVATE KEY-----
346+
githubAppBaseURL: "<github-enterprise-api-url>" #optional, required only for GitHub Enterprise Server users
347+
```
348+
349+
Alternatively, the Flux CLI can be used to automatically create the secret with
350+
the github app authentication information.
351+
352+
```sh
353+
flux create secret githubapp ghapp-secret \
354+
--app-id=1 \
355+
--app-installation-id=3 \
356+
--app-private-key=~/private-key.pem
357+
```
299358

300359
### Interval
301360

internal/controller/gitrepository_controller.go

+44-11
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@ import (
2828

2929
securejoin "github.com/cyphar/filepath-securejoin"
3030
"github.com/fluxcd/pkg/auth/azure"
31+
"github.com/fluxcd/pkg/auth/github"
3132
"github.com/fluxcd/pkg/runtime/logger"
3233
"github.com/go-git/go-git/v5/plumbing/transport"
3334
corev1 "k8s.io/api/core/v1"
@@ -506,13 +507,8 @@ func (r *GitRepositoryReconciler) reconcileSource(ctx context.Context, sp *patch
506507

507508
authOpts, err := r.getAuthOpts(ctx, obj, *u)
508509
if err != nil {
509-
e := serror.NewGeneric(
510-
fmt.Errorf("failed to configure authentication options: %w", err),
511-
sourcev1.AuthenticationFailedReason,
512-
)
513-
conditions.MarkTrue(obj, sourcev1.FetchFailedCondition, e.Reason, "%s", e)
514510
// Return error as the world as observed may change
515-
return sreconcile.ResultEmpty, e
511+
return sreconcile.ResultEmpty, err
516512
}
517513

518514
// Fetch the included artifact metadata.
@@ -639,26 +635,63 @@ func (r *GitRepositoryReconciler) getAuthOpts(ctx context.Context, obj *sourcev1
639635
var err error
640636
authData, err = r.getSecretData(ctx, obj.Spec.SecretRef.Name, obj.GetNamespace())
641637
if err != nil {
642-
return nil, fmt.Errorf("failed to get secret '%s/%s': %w", obj.GetNamespace(), obj.Spec.SecretRef.Name, err)
638+
e := serror.NewGeneric(
639+
fmt.Errorf("failed to get secret '%s/%s': %w", obj.GetNamespace(), obj.Spec.SecretRef.Name, err),
640+
sourcev1.AuthenticationFailedReason,
641+
)
642+
conditions.MarkTrue(obj, sourcev1.FetchFailedCondition, e.Reason, "%s", e)
643+
return nil, e
643644
}
644645
}
645646

646647
// Configure authentication strategy to access the source
647648
authOpts, err := git.NewAuthOptions(u, authData)
648649
if err != nil {
649-
return nil, err
650+
e := serror.NewGeneric(
651+
fmt.Errorf("failed to configure authentication options: %w", err),
652+
sourcev1.AuthenticationFailedReason,
653+
)
654+
conditions.MarkTrue(obj, sourcev1.FetchFailedCondition, e.Reason, "%s", e)
655+
return nil, e
650656
}
651657

652658
// Configure provider authentication if specified in spec
653-
if obj.GetProvider() == sourcev1.GitProviderAzure {
659+
switch obj.GetProvider() {
660+
case sourcev1.GitProviderAzure:
654661
authOpts.ProviderOpts = &git.ProviderOptions{
655-
Name: obj.GetProvider(),
662+
Name: sourcev1.GitProviderAzure,
656663
AzureOpts: []azure.OptFunc{
657664
azure.WithAzureDevOpsScope(),
658665
},
659666
}
660-
}
667+
case sourcev1.GitProviderGitHub:
668+
// if provider is github, but secret ref is not specified
669+
if obj.Spec.SecretRef == nil {
670+
e := serror.NewStalling(
671+
fmt.Errorf("secretRef with github app data must be specified when provider is set to github"),
672+
sourcev1.AuthenticationFailedReason,
673+
)
674+
conditions.MarkTrue(obj, sourcev1.FetchFailedCondition, e.Reason, "%s", e)
675+
return nil, e
676+
}
661677

678+
authOpts.ProviderOpts = &git.ProviderOptions{
679+
Name: sourcev1.GitProviderGitHub,
680+
GitHubOpts: []github.OptFunc{
681+
github.WithAppData(authData),
682+
},
683+
}
684+
default:
685+
// analyze secret, if it has github app data, perhaps provider should have been github.
686+
if appID := authData[github.AppIDKey]; len(appID) != 0 {
687+
e := serror.NewStalling(
688+
fmt.Errorf("secretRef '%s/%s' has github app data but provider is not set to github", obj.GetNamespace(), obj.Spec.SecretRef.Name),
689+
sourcev1.AuthenticationFailedReason,
690+
)
691+
conditions.MarkTrue(obj, sourcev1.FetchFailedCondition, e.Reason, "%s", e)
692+
return nil, e
693+
}
694+
}
662695
return authOpts, nil
663696
}
664697

internal/controller/gitrepository_controller_test.go

+95-8
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ import (
4848

4949
kstatus "github.com/fluxcd/cli-utils/pkg/kstatus/status"
5050
"github.com/fluxcd/pkg/apis/meta"
51+
"github.com/fluxcd/pkg/auth/github"
5152
"github.com/fluxcd/pkg/git"
5253
"github.com/fluxcd/pkg/gittestserver"
5354
"github.com/fluxcd/pkg/runtime/conditions"
@@ -686,46 +687,132 @@ func TestGitRepositoryReconciler_reconcileSource_authStrategy(t *testing.T) {
686687
func TestGitRepositoryReconciler_getAuthOpts_provider(t *testing.T) {
687688
tests := []struct {
688689
name string
690+
url string
691+
secret *corev1.Secret
689692
beforeFunc func(obj *sourcev1.GitRepository)
690693
wantProviderOptsName string
694+
wantErr error
691695
}{
692696
{
693697
name: "azure provider",
698+
url: "https://dev.azure.com/foo/bar/_git/baz",
694699
beforeFunc: func(obj *sourcev1.GitRepository) {
695700
obj.Spec.Provider = sourcev1.GitProviderAzure
696701
},
697702
wantProviderOptsName: sourcev1.GitProviderAzure,
698703
},
704+
{
705+
name: "github provider with no secret ref",
706+
url: "https://github.com/org/repo.git",
707+
beforeFunc: func(obj *sourcev1.GitRepository) {
708+
obj.Spec.Provider = sourcev1.GitProviderGitHub
709+
},
710+
wantProviderOptsName: sourcev1.GitProviderGitHub,
711+
wantErr: errors.New("secretRef with github app data must be specified when provider is set to github"),
712+
},
713+
{
714+
name: "github provider with secret ref that does not exist",
715+
url: "https://github.com/org/repo.git",
716+
beforeFunc: func(obj *sourcev1.GitRepository) {
717+
obj.Spec.Provider = sourcev1.GitProviderGitHub
718+
obj.Spec.SecretRef = &meta.LocalObjectReference{
719+
Name: "githubAppSecret",
720+
}
721+
},
722+
wantErr: errors.New("failed to get secret '/githubAppSecret': secrets \"githubAppSecret\" not found"),
723+
},
724+
{
725+
name: "github provider with github app data in secret",
726+
url: "https://example.com/org/repo",
727+
secret: &corev1.Secret{
728+
ObjectMeta: metav1.ObjectMeta{
729+
Name: "githubAppSecret",
730+
},
731+
Data: map[string][]byte{
732+
github.AppIDKey: []byte("123"),
733+
github.AppInstallationIDKey: []byte("456"),
734+
github.AppPrivateKey: []byte("abc"),
735+
},
736+
},
737+
beforeFunc: func(obj *sourcev1.GitRepository) {
738+
obj.Spec.Provider = sourcev1.GitProviderGitHub
739+
obj.Spec.SecretRef = &meta.LocalObjectReference{
740+
Name: "githubAppSecret",
741+
}
742+
},
743+
wantProviderOptsName: sourcev1.GitProviderGitHub,
744+
},
745+
{
746+
name: "generic provider with github app data in secret",
747+
url: "https://example.com/org/repo",
748+
secret: &corev1.Secret{
749+
ObjectMeta: metav1.ObjectMeta{
750+
Name: "githubAppSecret",
751+
},
752+
Data: map[string][]byte{
753+
github.AppIDKey: []byte("123"),
754+
},
755+
},
756+
beforeFunc: func(obj *sourcev1.GitRepository) {
757+
obj.Spec.Provider = sourcev1.GitProviderGeneric
758+
obj.Spec.SecretRef = &meta.LocalObjectReference{
759+
Name: "githubAppSecret",
760+
}
761+
},
762+
wantErr: errors.New("secretRef '/githubAppSecret' has github app data but provider is not set to github"),
763+
},
699764
{
700765
name: "generic provider",
766+
url: "https://example.com/org/repo",
701767
beforeFunc: func(obj *sourcev1.GitRepository) {
702768
obj.Spec.Provider = sourcev1.GitProviderGeneric
703769
},
704770
},
705771
{
772+
url: "https://example.com/org/repo",
706773
name: "no provider",
707774
},
708775
}
709776

710777
for _, tt := range tests {
711778
t.Run(tt.name, func(t *testing.T) {
712779
g := NewWithT(t)
780+
clientBuilder := fakeclient.NewClientBuilder().
781+
WithScheme(testEnv.GetScheme()).
782+
WithStatusSubresource(&sourcev1.GitRepository{})
783+
784+
if tt.secret != nil {
785+
clientBuilder.WithObjects(tt.secret)
786+
}
787+
713788
obj := &sourcev1.GitRepository{}
714-
r := &GitRepositoryReconciler{}
715-
url, _ := url.Parse("https://dev.azure.com/foo/bar/_git/baz")
789+
r := &GitRepositoryReconciler{
790+
EventRecorder: record.NewFakeRecorder(32),
791+
Client: clientBuilder.Build(),
792+
features: features.FeatureGates(),
793+
patchOptions: getPatchOptions(gitRepositoryReadyCondition.Owned, "sc"),
794+
}
795+
796+
url, err := url.Parse(tt.url)
797+
g.Expect(err).ToNot(HaveOccurred())
716798

717799
if tt.beforeFunc != nil {
718800
tt.beforeFunc(obj)
719801
}
720802
opts, err := r.getAuthOpts(context.TODO(), obj, *url)
721803

722-
g.Expect(err).ToNot(HaveOccurred())
723-
g.Expect(opts).ToNot(BeNil())
724-
if tt.wantProviderOptsName != "" {
725-
g.Expect(opts.ProviderOpts).ToNot(BeNil())
726-
g.Expect(opts.ProviderOpts.Name).To(Equal(tt.wantProviderOptsName))
804+
if tt.wantErr != nil {
805+
g.Expect(err).To(HaveOccurred())
806+
g.Expect(err.Error()).To(ContainSubstring(tt.wantErr.Error()))
727807
} else {
728-
g.Expect(opts.ProviderOpts).To(BeNil())
808+
g.Expect(err).ToNot(HaveOccurred())
809+
g.Expect(opts).ToNot(BeNil())
810+
if tt.wantProviderOptsName != "" {
811+
g.Expect(opts.ProviderOpts).ToNot(BeNil())
812+
g.Expect(opts.ProviderOpts.Name).To(Equal(tt.wantProviderOptsName))
813+
} else {
814+
g.Expect(opts.ProviderOpts).To(BeNil())
815+
}
729816
}
730817
})
731818
}

0 commit comments

Comments
 (0)