Home Concourse Teams - Authentication and Automation
Post
Cancel

Concourse Teams - Authentication and Automation

Configuring authentication providers in Concourse is often a source of confusion, with gotcha’s that make it easy for newcomers to remove their colleagues’ access. In this post I explain how Concourse auth can be configured, and why I made concourse-mgmt to make the process more reliable.

Ever since version 2.0 Concourse has supported dividing a single Concourse installation into one or more teams. These teams can be configured so that only certain individuals can access the pipelines within them. As of now there are multiple supported auth providers and a variety of RBAC roles that can be applied.

I’ve helped many companies with Concourse over the years. A common point of confusion is around how Concourse authentication is configured and how it relates to teams.

At a high level, the configuration of authentication in Concourse is split into two different steps: deployment and team configuration.

A rule of thumb is that you tell Concourse how it can authorise users when you deploy Concourse. This is when you configure one or more auth providers. Once an auth provider is configured you can use fly set-team to tell Concourse which users within an auth provider can access a specific team.

I find the GitHub auth provider is a good example. At deployment you tell Concourse how to talk to GitHub and when you configure a team you tell Concourse which users can interact with that team based on the entities (organisations or teams) they are a part of in GitHub.

To understand it further, lets walk though the addition of GitHub auth to a Concourse deployment and how to subsequently use it when creating a team.

Configuring the Provider

Before configuring any teams using GitHub auth we need to configure the auth provider on the web instance of our Concourse.

This involves:

  • creating a new OAuth application
  • setting the CONCOURSE_GITHUB_CLIENT_ID and CONCOURSE_GITHUB_CLIENT_SECRET environment variables for the web executable
  • redeploying the web instance.

The specific mechanism for setting these variables depends on how you are deploying your Concourse (i.e. Helm, BOSH, Docker, etc).

Once the web instance is started with this new configuration you might think that you wouldn’t be able to log into anything until a team has been created to use the GitHub auth provider. You would be wrong.

github-no-access

As you can see I was able to log in, but since I don’t have access to any teams the Concourse appears to be empty.

When you configure an auth provider you are effectively saying that any user within that provider can log into your Concourse and they can be given access to a team.

It’s worth noting that all basic auth user:password pairs need to be defined at deploy time.

Configuring the Team

Now that we’ve told Concourse how to talk to GitHub we can create a team that utilises it.

The only way to configure (non-main) teams is through the fly set-team command. The main team is a special case in that it can only be configured when deploying Concourse.

Thankfully the set-team command can take a YAML config file as an input which lets you keep team auth setup in source control. A good reference for the different keys for each auth type can be found in the team_config_* test fixtures in the Concourse source code.

For example this is the GitHub auth example from the test fixtures:

1
2
3
4
5
6
7
8
9
10
11
roles:
  - name: member
    github:
      users: ["some-user"]
  - name: viewer
    github:
      teams: ["some-org:some-team"]
      users: ["some-github-user"]
  - name: owner
    github:
      orgs: ["some-other-org"]

When applied with

1
2
3
fly set-team \
  --team-name=github-team \
  --config=team_config_with_github_auth.yml

this will create a team called github-team with the following roles:

Role GitHub Org GitHub Team GitHub User
Member - - some-user
Viewer some-org some-team -
Viewer - - some-github-user
Owner some-other-org - -

Be careful with fly set-team

It’s quite easy to accidentally revoke your own access to a team when trying to give a new user access. I’ve seen this a lot and have done it myself a few times. fly set-team is not an additive command. Suppose you want to add my GitHub user ‘crsimmons’ as an owner of the github-team team created above.

If you assume that fly set-team is additive (as I initially did) you would do something like:

1
2
3
fly set-team \
  --team-name=github-team \
  --github-user=crsimmons

However the result of this is:

Role GitHub Org GitHub Team GitHub User
Owner - - crsimmons

All the other permissions are gone. Oops! Someone who was owner before running this command is not an owner anymore. This means they can’t undo their mistake. Double oops!

Using the config files instead of imperative commands helps avoid this problem a little bit but fly set-team’s non-additive nature still often leads to team owners accidentally removing their own access to the team they manage. This is usually recoverable because owners of the main team are effectively owners of every team implicitly. This allows Concourse administrators to restore lost permissions to team owners.

Once a Concourse grows to have multiple teams with decentralized owners this problem can start to consume a lot of the administrators’ time. This coupled with the time it takes to configure a new team with fly suggests some kind of automation would be useful for team management.

Automating Teams

From the perspective of automating team configuration it’s quite convenient that both team creation and authentication configuration are handled by the same fly command.

Based on what I’ve seen at various companies, the main wants for team automation are:

  • having all team configuration stored in source control
  • limit the amount of time an errant fly set-team can break access to Concourse
  • make addition of new teams as easy as possible

Automatic removal of old teams is something that I’ve proposed but it is usually seen as too dangerous for the first pass by customers.

With VMWare’s excellent cf-mgmt tool in mind I created concourse-mgmt as an example pipeline for managing auth. The readme in the repo describes how to use the pipeline so I won’t repeat it here. If you find it useful with your Concourse installation we’d be interested to hear about it.

Originally posted in 2020

This post is licensed under CC BY 4.0 by the author.
Contents