Design overviewΒΆ
Gafaelfawr is deployed as an auth subrequest handler for a Kubernetes cluster that uses an NGINX ingress.
Gafaelfawr does not act as a proxy. Instead, the NGINX ingress makes a subrequest to Gafaelfawr to check the authorization of each request, and may redirect the user to a route served by Gafaelfawr directly for initial authentication, logout, or token maintenance.
Authentication is handled by an external identity provider to which the user will be redirected as necessary. Gafaelfawr will also make direct requests to that identity provider to get information about the user after authentication.
For protected services that only understand OpenID Connect, Gafaelfawr also includes a minimal OpenID Connect server. This was designed with just enough features to support Chronograf. It may not work with other applications without additional changes.
Gafaelfawr also deploys a Kubernetes operator to create Gafaelfawr-protected ingresses and maintain service tokens in Kubernetes secrets for the use of other services deployed in the same cluster.
Finally, Gafaelfawr deploys a CronJob
to perform maintenance on its storage, and a CronJob
to audit storage for inconsistencies.