lifecycle: run worker as root and drop perms later to fix docker permission issues
Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
This commit is contained in:
		
							
								
								
									
										10
									
								
								Dockerfile
									
									
									
									
									
								
							
							
						
						
									
										10
									
								
								Dockerfile
									
									
									
									
									
								
							@ -48,7 +48,7 @@ ARG GIT_BUILD_HASH
 | 
				
			|||||||
ENV GIT_BUILD_HASH=$GIT_BUILD_HASH
 | 
					ENV GIT_BUILD_HASH=$GIT_BUILD_HASH
 | 
				
			||||||
 | 
					
 | 
				
			||||||
RUN apt-get update && \
 | 
					RUN apt-get update && \
 | 
				
			||||||
    apt-get install -y --no-install-recommends curl ca-certificates gnupg git && \
 | 
					    apt-get install -y --no-install-recommends curl ca-certificates gnupg git runit && \
 | 
				
			||||||
    curl https://www.postgresql.org/media/keys/ACCC4CF8.asc | apt-key add - && \
 | 
					    curl https://www.postgresql.org/media/keys/ACCC4CF8.asc | apt-key add - && \
 | 
				
			||||||
    echo "deb http://apt.postgresql.org/pub/repos/apt buster-pgdg main" > /etc/apt/sources.list.d/pgdg.list && \
 | 
					    echo "deb http://apt.postgresql.org/pub/repos/apt buster-pgdg main" > /etc/apt/sources.list.d/pgdg.list && \
 | 
				
			||||||
    apt-get update && \
 | 
					    apt-get update && \
 | 
				
			||||||
@ -58,14 +58,7 @@ RUN apt-get update && \
 | 
				
			|||||||
    apt-get autoremove --purge -y && \
 | 
					    apt-get autoremove --purge -y && \
 | 
				
			||||||
    apt-get clean && \
 | 
					    apt-get clean && \
 | 
				
			||||||
    rm -rf /tmp/* /var/lib/apt/lists/* /var/tmp/ && \
 | 
					    rm -rf /tmp/* /var/lib/apt/lists/* /var/tmp/ && \
 | 
				
			||||||
    # This is quite hacky, but docker has no guaranteed Group ID
 | 
					 | 
				
			||||||
    # we could instead check for the GID of the socket and add the user dynamically,
 | 
					 | 
				
			||||||
    # but then we have to drop permmissions later
 | 
					 | 
				
			||||||
    groupadd -g 998 docker_998 && \
 | 
					 | 
				
			||||||
    groupadd -g 999 docker_999 && \
 | 
					 | 
				
			||||||
    adduser --system --no-create-home --uid 1000 --group --home /authentik authentik && \
 | 
					    adduser --system --no-create-home --uid 1000 --group --home /authentik authentik && \
 | 
				
			||||||
    usermod -a -G docker_998 authentik && \
 | 
					 | 
				
			||||||
    usermod -a -G docker_999 authentik && \
 | 
					 | 
				
			||||||
    mkdir /backups && \
 | 
					    mkdir /backups && \
 | 
				
			||||||
    chown authentik:authentik /backups
 | 
					    chown authentik:authentik /backups
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@ -77,7 +70,6 @@ COPY ./lifecycle/ /lifecycle
 | 
				
			|||||||
COPY --from=builder /work/authentik /authentik-proxy
 | 
					COPY --from=builder /work/authentik /authentik-proxy
 | 
				
			||||||
 | 
					
 | 
				
			||||||
USER authentik
 | 
					USER authentik
 | 
				
			||||||
STOPSIGNAL SIGINT
 | 
					 | 
				
			||||||
ENV TMPDIR /dev/shm/
 | 
					ENV TMPDIR /dev/shm/
 | 
				
			||||||
ENV PYTHONUBUFFERED 1
 | 
					ENV PYTHONUBUFFERED 1
 | 
				
			||||||
ENTRYPOINT [ "/lifecycle/bootstrap.sh" ]
 | 
					ENTRYPOINT [ "/lifecycle/bootstrap.sh" ]
 | 
				
			||||||
 | 
				
			|||||||
@ -64,8 +64,13 @@ services:
 | 
				
			|||||||
      AUTHENTIK_POSTGRESQL__NAME: ${PG_DB:-authentik}
 | 
					      AUTHENTIK_POSTGRESQL__NAME: ${PG_DB:-authentik}
 | 
				
			||||||
      AUTHENTIK_POSTGRESQL__PASSWORD: ${PG_PASS}
 | 
					      AUTHENTIK_POSTGRESQL__PASSWORD: ${PG_PASS}
 | 
				
			||||||
      # AUTHENTIK_ERROR_REPORTING__ENABLED: "true"
 | 
					      # AUTHENTIK_ERROR_REPORTING__ENABLED: "true"
 | 
				
			||||||
 | 
					    # This is optional, and can be removed. If you remove this, the following will happen
 | 
				
			||||||
 | 
					    # - The permissions for the /backups and /media folders aren't fixed, so make sure they are 1000:1000
 | 
				
			||||||
 | 
					    # - The docker socket can't be accessed anymore
 | 
				
			||||||
 | 
					    user: root
 | 
				
			||||||
    volumes:
 | 
					    volumes:
 | 
				
			||||||
      - ./backups:/backups
 | 
					      - ./backups:/backups
 | 
				
			||||||
 | 
					      - ./media:/media
 | 
				
			||||||
      - /var/run/docker.sock:/var/run/docker.sock
 | 
					      - /var/run/docker.sock:/var/run/docker.sock
 | 
				
			||||||
      - ./custom-templates:/templates
 | 
					      - ./custom-templates:/templates
 | 
				
			||||||
      - geoip:/geoip
 | 
					      - geoip:/geoip
 | 
				
			||||||
 | 
				
			|||||||
@ -1,14 +1,29 @@
 | 
				
			|||||||
#!/bin/bash -e
 | 
					#!/bin/bash -e
 | 
				
			||||||
python -m lifecycle.wait_for_db
 | 
					python -m lifecycle.wait_for_db
 | 
				
			||||||
printf '{"event": "Bootstrap completed", "level": "info", "logger": "bootstrap", "command": "%s"}\n' "$@" > /dev/stderr
 | 
					printf '{"event": "Bootstrap completed", "level": "info", "logger": "bootstrap", "command": "%s"}\n' "$@" > /dev/stderr
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					function check_if_root {
 | 
				
			||||||
 | 
					    if [[ $EUID -ne 0 ]]; then
 | 
				
			||||||
 | 
					        printf '{"event": "Not running as root, disabling permission fixes", "level": "info", "logger": "bootstrap", "command": "%s"}\n' "$@" > /dev/stderr
 | 
				
			||||||
 | 
					        return
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    SOCKET="/var/run/docker.sock"
 | 
				
			||||||
 | 
					    if [[ -e "$SOCKET" ]]; then
 | 
				
			||||||
 | 
					        # Get group ID of the docker socket, so we can create a matching group and
 | 
				
			||||||
 | 
					        # add ourselves to it
 | 
				
			||||||
 | 
					        DOCKER_GID=$(stat -c '%g' $SOCKET)
 | 
				
			||||||
 | 
					        usermod -a -G $DOCKER_GID authentik
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    # Fix permissions of backups and media
 | 
				
			||||||
 | 
					    chown -R authentik:authentik /media /backups
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
if [[ "$1" == "server" ]]; then
 | 
					if [[ "$1" == "server" ]]; then
 | 
				
			||||||
    python -m lifecycle.migrate
 | 
					    python -m lifecycle.migrate
 | 
				
			||||||
    /authentik-proxy
 | 
					    /authentik-proxy
 | 
				
			||||||
elif [[ "$1" == "worker" ]]; then
 | 
					elif [[ "$1" == "worker" ]]; then
 | 
				
			||||||
    celery -A authentik.root.celery worker --autoscale 3,1 -E -B -s /tmp/celerybeat-schedule -Q authentik,authentik_scheduled,authentik_events
 | 
					    check_if_root
 | 
				
			||||||
elif [[ "$1" == "migrate" ]]; then
 | 
					    chpst -u authentik env HOME=/authentik celery -A authentik.root.celery worker --autoscale 3,1 -E -B -s /tmp/celerybeat-schedule -Q authentik,authentik_scheduled,authentik_events
 | 
				
			||||||
    printf "DEPERECATED: database migrations are now executed automatically on startup."
 | 
					 | 
				
			||||||
    python -m lifecycle.migrate
 | 
					 | 
				
			||||||
elif [[ "$1" == "backup" ]]; then
 | 
					elif [[ "$1" == "backup" ]]; then
 | 
				
			||||||
    python -m manage dbbackup --clean
 | 
					    python -m manage dbbackup --clean
 | 
				
			||||||
elif [[ "$1" == "restore" ]]; then
 | 
					elif [[ "$1" == "restore" ]]; then
 | 
				
			||||||
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user