Skip to content

Commit

Permalink
feat(authelia): 4.36.0 (#171)
Browse files Browse the repository at this point in the history
  • Loading branch information
james-d-elliott authored Jun 28, 2022
1 parent 5be3783 commit 86f4783
Show file tree
Hide file tree
Showing 5 changed files with 73 additions and 43 deletions.
4 changes: 2 additions & 2 deletions charts/authelia/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
apiVersion: v2
name: authelia
version: 0.8.34
version: 0.8.35
kubeVersion: ">= 1.13.0-0"
description: Authelia is a Single Sign-On Multi-Factor portal for web apps
type: application
Expand All @@ -26,6 +26,6 @@ maintainers:
email: [email protected]
url: https://github.com/james-d-elliott
icon: https://avatars2.githubusercontent.com/u/59122411?s=200&v=4
appVersion: 4.35.6
appVersion: 4.36.0
deprecated: false
annotations: {}
11 changes: 11 additions & 0 deletions charts/authelia/templates/_helpers.tpl
Original file line number Diff line number Diff line change
Expand Up @@ -1019,3 +1019,14 @@ squote a list joined by comma
- {{ . | squote }}
{{- end }}
{{- end -}}

{{/*
Returns the password reset disabled value.
*/}}
{{- define "authelia.config.password_reset.disable" -}}
{{- if hasKey .Values.configMap.authentication_backend "disable_reset_password" }}
{{- .Values.configMap.authentication_backend.disable_reset_password }}
{{- else }}
{{- .Values.configMap.authentication_backend.password_reset.disable | default false }}
{{- end }}
{{- end -}}
10 changes: 9 additions & 1 deletion charts/authelia/templates/configMap.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -81,9 +81,14 @@ data:
{{- end }}
{{- with $auth := .Values.configMap.authentication_backend }}
authentication_backend:
disable_reset_password: {{ $auth.disable_reset_password }}
{{- if semverCompare "<4.36.0" (include "authelia.version" $) }}
disable_reset_password: {{ include "authelia.config.password_reset.disable" $ }}
{{- end }}
{{- if semverCompare ">=4.35.0" (include "authelia.version" $) }}
password_reset:
{{- if semverCompare ">=4.36.0" (include "authelia.version" $) }}
disable: {{ include "authelia.config.password_reset.disable" $ }}
{{- end }}
custom_url: {{ $auth.password_reset.custom_url | default "" | quote }}
{{- end }}
{{- if $auth.file.enabled }}
Expand Down Expand Up @@ -133,6 +138,9 @@ data:
{{- if semverCompare ">=4.35.2" (include "authelia.version" $) }}
permit_referrals: {{ $auth.ldap.permit_referrals }}
{{- end }}
{{- if semverCompare ">=4.36.0" (include "authelia.version" $) }}
permit_unauthenticated_bind: {{ $auth.ldap.permit_unauthenticated_bind }}
{{- end }}
user: {{ $auth.ldap.user }}
{{- end }}
{{- end }}
Expand Down
46 changes: 27 additions & 19 deletions charts/authelia/values.local.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -434,11 +434,11 @@ configMap:
## Customize Authelia headers.
headers:
## Read the Authelia docs before setting this advanced option.
## https://www.authelia.com/docs/configuration/server.html#csp_template.
## https://www.authelia.com/configuration/miscellaneous/server/#csp_template.
csp_template: ""

## Buffers usually should be configured to be the same value.
## Explanation at https://www.authelia.com/docs/configuration/server.html
## Explanation at https://www.authelia.com/configuration/miscellaneous/server/
## Read buffer size adjusts the server's max incoming request size in bytes.
## Write buffer size does the same for outgoing responses.
read_buffer_size: 4096
Expand Down Expand Up @@ -488,13 +488,13 @@ configMap:

## The TOTP algorithm to use.
## It is CRITICAL you read the documentation before changing this option:
## https://www.authelia.com/docs/configuration/one-time-password.html#algorithm
## https://www.authelia.com/configuration/second-factor/time-based-one-time-password/#algorithm
algorithm: sha1

## The number of digits a user has to input. Must either be 6 or 8.
## Changing this option only affects newly generated TOTP configurations.
## It is CRITICAL you read the documentation before changing this option:
## https://www.authelia.com/docs/configuration/one-time-password.html#digits
## https://www.authelia.com/configuration/second-factor/time-based-one-time-password/#digits
digits: 6

## The period in seconds a one-time password is valid for.
Expand All @@ -503,7 +503,7 @@ configMap:

## The skew controls number of one-time passwords either side of the current one that are valid.
## Warning: before changing skew read the docs link below.
## See: https://www.authelia.com/docs/configuration/one-time-password.html#period-and-skew to read the documentation.
## See: https://www.authelia.com/configuration/second-factor/time-based-one-time-password/#input-validation to read the documentation.
skew: 1

## The size of the generated shared secrets. Default is 32 and is sufficient in most use cases, minimum is 20.
Expand Down Expand Up @@ -572,16 +572,24 @@ configMap:
##
## The available providers are: `file`, `ldap`. You must use one and only one of these providers.
authentication_backend:
## Disable both the HTML element and the API for reset password functionality
disable_reset_password: false

## Password Reset Options.
password_reset:

## Disable both the HTML element and the API for reset password functionality
disable: false

## External reset password url that redirects the user to an external reset portal. This disables the internal reset
## functionality.
custom_url: ""

## The amount of time to wait before we refresh data from the authentication backend. Uses duration notation.
## To disable this feature set it to 'disable', this will slightly reduce security because for Authelia, users will
## always belong to groups they belonged to at the time of login even if they have been removed from them in LDAP.
## To force update on every request you can set this to '0' or 'always', this will increase processor demand.
## See the below documentation for more information.
## Duration Notation docs: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
## Refresh Interval docs: https://www.authelia.com/docs/configuration/authentication/ldap.html#refresh-interval
## Duration Notation docs: https://www.authelia.com/configuration/prologue/common/#duration-notation-format
## Refresh Interval docs: https://www.authelia.com/configuration/first-factor/ldap/#refresh-interval
refresh_interval: 5m

## LDAP backend configuration.
Expand All @@ -602,7 +610,7 @@ configMap:
##
## Depending on the option here certain other values in this section have a default value, notably all of the
## attribute mappings have a default value that this config overrides, you can read more about these default values
## at https://www.authelia.com/docs/configuration/authentication/ldap.html#defaults
## at https://www.authelia.com/reference/guides/ldap/#defaults
implementation: activedirectory

## The url to the ldap server. Format: <scheme>://<address>[:<port>].
Expand Down Expand Up @@ -704,9 +712,9 @@ configMap:
## to be scaled to more than one instance. The options under 'password' have sane defaults, and as it has security
## implications it is highly recommended you leave the default values. Before considering changing these settings
## please read the docs page below:
## https://www.authelia.com/docs/configuration/authentication/file.html#password-hash-algorithm-tuning
## https://www.authelia.com/reference/guides/passwords/#tuning
##
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
## Important: Kubernetes (or HA) users must read https://www.authelia.com/overview/authorization/statelessness/
##
file:
enabled: true
Expand Down Expand Up @@ -865,7 +873,7 @@ configMap:
name: authelia_session

## Sets the Cookie SameSite value. Possible options are none, lax, or strict.
## Please read https://www.authelia.com/docs/configuration/session.html#same_site
## Please read https://www.authelia.com/configuration/session/introduction/#same_site
same_site: lax

## The time in seconds before the cookie expires and session is reset.
Expand All @@ -876,15 +884,15 @@ configMap:

## The remember me duration.
## Value is in seconds, or duration notation. Value of 0 disables remember me.
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
## See: https://www.authelia.com/configuration/prologue/common/#duration-notation-format
## Longer periods are considered less secure because a stolen cookie will last longer giving attackers more time to
## spy or attack. Currently the default is 1M or 1 month.
remember_me_duration: 1M

##
## Redis Provider
##
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
## Important: Kubernetes (or HA) users must read https://www.authelia.com/overview/authorization/statelessness/
##
## The redis connection details
redis:
Expand Down Expand Up @@ -960,11 +968,11 @@ configMap:

## The time range during which the user can attempt login before being banned. The user is banned if the
## authentication failed 'max_retries' times in a 'find_time' seconds window. Find Time accepts duration notation.
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
## See: https://www.authelia.com/configuration/prologue/common/#duration-notation-format
find_time: 2m

## The length of time before a banned user can login again. Ban Time accepts duration notation.
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
## See: https://www.authelia.com/configuration/prologue/common/#duration-notation-format
ban_time: 5m


Expand All @@ -979,7 +987,7 @@ configMap:
## This stores the data in a SQLite3 Database.
## This is only recommended for lightweight non-stateful installations.
##
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
## Important: Kubernetes (or HA) users must read https://www.authelia.com/overview/authorization/statelessness/
##
local:
enabled: true
Expand Down Expand Up @@ -1027,7 +1035,7 @@ configMap:
##
## File System (Notification Provider)
##
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
## Important: Kubernetes (or HA) users must read https://www.authelia.com/overview/authorization/statelessness/
##
filesystem:
enabled: true
Expand Down
45 changes: 24 additions & 21 deletions charts/authelia/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -432,11 +432,11 @@ configMap:
## Customize Authelia headers.
headers:
## Read the Authelia docs before setting this advanced option.
## https://www.authelia.com/docs/configuration/server.html#csp_template.
## https://www.authelia.com/configuration/miscellaneous/server/#csp_template.
csp_template: ""

## Buffers usually should be configured to be the same value.
## Explanation at https://www.authelia.com/docs/configuration/server.html
## Explanation at https://www.authelia.com/configuration/miscellaneous/server/
## Read buffer size adjusts the server's max incoming request size in bytes.
## Write buffer size does the same for outgoing responses.
read_buffer_size: 4096
Expand Down Expand Up @@ -486,13 +486,13 @@ configMap:

## The TOTP algorithm to use.
## It is CRITICAL you read the documentation before changing this option:
## https://www.authelia.com/docs/configuration/one-time-password.html#algorithm
## https://www.authelia.com/configuration/second-factor/time-based-one-time-password/#algorithm
algorithm: sha1

## The number of digits a user has to input. Must either be 6 or 8.
## Changing this option only affects newly generated TOTP configurations.
## It is CRITICAL you read the documentation before changing this option:
## https://www.authelia.com/docs/configuration/one-time-password.html#digits
## https://www.authelia.com/configuration/second-factor/time-based-one-time-password/#digits
digits: 6

## The period in seconds a one-time password is valid for.
Expand All @@ -501,7 +501,7 @@ configMap:

## The skew controls number of one-time passwords either side of the current one that are valid.
## Warning: before changing skew read the docs link below.
## See: https://www.authelia.com/docs/configuration/one-time-password.html#period-and-skew to read the documentation.
## See: https://www.authelia.com/configuration/second-factor/time-based-one-time-password/#input-validation to read the documentation.
skew: 1

## The size of the generated shared secrets. Default is 32 and is sufficient in most use cases, minimum is 20.
Expand Down Expand Up @@ -570,12 +570,13 @@ configMap:
##
## The available providers are: `file`, `ldap`. You must use one and only one of these providers.
authentication_backend:
## Disable both the HTML element and the API for reset password functionality
disable_reset_password: false

## Password Reset Options.
password_reset:

## Disable both the HTML element and the API for reset password functionality
disable: false

## External reset password url that redirects the user to an external reset portal. This disables the internal reset
## functionality.
custom_url: ""
Expand All @@ -585,8 +586,8 @@ configMap:
## always belong to groups they belonged to at the time of login even if they have been removed from them in LDAP.
## To force update on every request you can set this to '0' or 'always', this will increase processor demand.
## See the below documentation for more information.
## Duration Notation docs: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
## Refresh Interval docs: https://www.authelia.com/docs/configuration/authentication/ldap.html#refresh-interval
## Duration Notation docs: https://www.authelia.com/configuration/prologue/common/#duration-notation-format
## Refresh Interval docs: https://www.authelia.com/configuration/first-factor/ldap/#refresh-interval
refresh_interval: 5m

## LDAP backend configuration.
Expand All @@ -607,7 +608,7 @@ configMap:
##
## Depending on the option here certain other values in this section have a default value, notably all of the
## attribute mappings have a default value that this config overrides, you can read more about these default values
## at https://www.authelia.com/docs/configuration/authentication/ldap.html#defaults
## at https://www.authelia.com/reference/guides/ldap/#defaults
implementation: activedirectory

## The url to the ldap server. Format: <scheme>://<address>[:<port>].
Expand Down Expand Up @@ -698,6 +699,9 @@ configMap:
## This is especially useful for environments where read-only servers exist. Only implemented for write operations.
permit_referrals: false

## Strongly discouraged. See https://www.authelia.com/configuration/first-factor/ldap/#permit_unauthenticated_bind.
permit_unauthenticated_bind: false

## The username of the admin user.
user: CN=Authelia,DC=example,DC=com

Expand All @@ -708,10 +712,9 @@ configMap:
## Therefore, this backend is meant to be used in a dev environment and not in production since it prevents Authelia
## to be scaled to more than one instance. The options under 'password' have sane defaults, and as it has security
## implications it is highly recommended you leave the default values. Before considering changing these settings
## please read the docs page below:
## https://www.authelia.com/docs/configuration/authentication/file.html#password-hash-algorithm-tuning
## please read the docs page: https://www.authelia.com/reference/guides/passwords/#tuning
##
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
## Important: Kubernetes (or HA) users must read https://www.authelia.com/overview/authorization/statelessness/
##
file:
enabled: false
Expand Down Expand Up @@ -870,7 +873,7 @@ configMap:
name: authelia_session

## Sets the Cookie SameSite value. Possible options are none, lax, or strict.
## Please read https://www.authelia.com/docs/configuration/session.html#same_site
## Please read https://www.authelia.com/configuration/session/introduction/#same_site
same_site: lax

## The time in seconds before the cookie expires and session is reset.
Expand All @@ -881,15 +884,15 @@ configMap:

## The remember me duration.
## Value is in seconds, or duration notation. Value of 0 disables remember me.
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
## See: https://www.authelia.com/configuration/prologue/common/#duration-notation-format
## Longer periods are considered less secure because a stolen cookie will last longer giving attackers more time to
## spy or attack. Currently the default is 1M or 1 month.
remember_me_duration: 1M

##
## Redis Provider
##
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
## Important: Kubernetes (or HA) users must read https://www.authelia.com/overview/authorization/statelessness/
##
## The redis connection details
redis:
Expand Down Expand Up @@ -965,11 +968,11 @@ configMap:

## The time range during which the user can attempt login before being banned. The user is banned if the
## authentication failed 'max_retries' times in a 'find_time' seconds window. Find Time accepts duration notation.
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
## See: https://www.authelia.com/configuration/prologue/common/#duration-notation-format
find_time: 2m

## The length of time before a banned user can login again. Ban Time accepts duration notation.
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
## See: https://www.authelia.com/configuration/prologue/common/#duration-notation-format
ban_time: 5m


Expand All @@ -984,7 +987,7 @@ configMap:
## This stores the data in a SQLite3 Database.
## This is only recommended for lightweight non-stateful installations.
##
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
## Important: Kubernetes (or HA) users must read https://www.authelia.com/overview/authorization/statelessness/
##
local:
enabled: false
Expand Down Expand Up @@ -1033,7 +1036,7 @@ configMap:
##
## File System (Notification Provider)
##
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
## Important: Kubernetes (or HA) users must read https://www.authelia.com/overview/authorization/statelessness/
##
filesystem:
enabled: false
Expand Down Expand Up @@ -1083,7 +1086,7 @@ configMap:
identity_providers:
oidc:
## Enables this in the config map. Currently in beta stage.
## See https://www.authelia.com/docs/configuration/identity-providers/oidc.html#roadmap
## See https://www.authelia.com/r/openid-connect/
enabled: false

access_token_lifespan: 1h
Expand Down

0 comments on commit 86f4783

Please sign in to comment.