Skip to content
Merged
Show file tree
Hide file tree
Changes from 5 commits
Commits
Show all changes
25 commits
Select commit Hold shift + click to select a range
0d59e5f
feat(cloud-native): add support for gRPC bridge
iromli Feb 26, 2026
fd82f10
chore: update FLEX_SOURCE_VERSION
iromli Feb 26, 2026
0e1bc72
fix: strip /jans-auth when calling authzen-configuration
iromli Feb 27, 2026
a7fd0e2
Merge branch 'main' into cn-grpc-bridge
iromli Feb 28, 2026
75d0829
fix: add missing routes for protected endpoints
iromli Mar 1, 2026
f396fad
Merge branch 'main' into cn-grpc-bridge
iromli Mar 6, 2026
18831b1
refactor: create subchart for gateway-api
iromli Mar 6, 2026
57bf70a
chore: explicit appProtocol for grpc service
iromli Mar 6, 2026
2e8e803
chore: fix grpc comments
iromli Mar 6, 2026
3d66ef6
refactor: move gatewayApi configuration to gateway-api
iromli Mar 6, 2026
004ed46
fix: resolve gateway-api chart name
iromli Mar 6, 2026
4453504
chore: mention about required auth-server.lockEnabled flag
iromli Mar 7, 2026
637e5e1
chore: adjust labels and NOTES
iromli Mar 7, 2026
adc4038
refactor(openbanking): change gatewayApi to gateway-api
iromli Mar 7, 2026
0f65a9b
chore: use scoped airlock-gw-params name
iromli Mar 7, 2026
76bd04d
fix: resolve jans-lock endpoints
iromli Mar 7, 2026
2c24bac
refactor: reorganize GA implementation
iromli Mar 9, 2026
958c4fc
Merge branch 'main' into cn-grpc-bridge
iromli Mar 9, 2026
f1c3825
chore: sync openbanking-values.yaml
iromli Mar 9, 2026
7da5cbf
chore: add Gateway API default labels
iromli Mar 9, 2026
391a9f5
chore: set defaultMode for CA cert volume
iromli Mar 9, 2026
d3047e2
refactor: reorganize GA implementation
iromli Mar 9, 2026
f895593
chore: revert FLEX_SOURCE_VERSION
iromli Mar 9, 2026
66d5fa6
Merge branch 'main' into cn-grpc-bridge
moabu Mar 10, 2026
d6bb3e7
docs: update comment for Loadbalancer IP in YAML
moabu Mar 10, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 7 additions & 5 deletions charts/gluu-all-in-one/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Kubernetes: `>=v1.23.0-0`
| admin-ui.ingress.adminUiLabels | object | `{}` | Admin UI ingress resource labels. key app is taken. |
| adminPassword | string | `"Test1234#"` | Admin password to log in to the UI. |
| alb.ingress | bool | `false` | switches the service to Nodeport for ALB ingress |
| auth-server | object | `{"appLoggers":{"auditStatsLogLevel":"INFO","auditStatsLogTarget":"FILE","authLogLevel":"INFO","authLogTarget":"STDOUT","enableStdoutLogPrefix":"true","httpLogLevel":"INFO","httpLogTarget":"FILE","persistenceDurationLogLevel":"INFO","persistenceDurationLogTarget":"FILE","persistenceLogLevel":"INFO","persistenceLogTarget":"FILE","scriptLogLevel":"INFO","scriptLogTarget":"FILE"},"authEncKeys":"RSA1_5 RSA-OAEP","authSigKeys":"RS256 RS384 RS512 ES256 ES384 ES512 PS256 PS384 PS512","cnCustomJavaOptions":"","enabled":true,"ingress":{"authServerAdditionalAnnotations":{},"authServerEnabled":true,"authServerLabels":{},"authServerProtectedRegister":false,"authServerProtectedRegisterAdditionalAnnotations":{},"authServerProtectedRegisterLabels":{},"authServerProtectedToken":false,"authServerProtectedTokenAdditionalAnnotations":{},"authServerProtectedTokenLabels":{},"authzenAdditionalAnnotations":{},"authzenConfigEnabled":true,"authzenConfigLabels":{},"deviceCodeAdditionalAnnotations":{},"deviceCodeEnabled":true,"deviceCodeLabels":{},"firebaseMessagingAdditionalAnnotations":{},"firebaseMessagingEnabled":true,"firebaseMessagingLabels":{},"lockAdditionalAnnotations":{},"lockConfigAdditionalAnnotations":{},"lockConfigEnabled":false,"lockConfigLabels":{},"lockEnabled":false,"lockLabels":{},"openidAdditionalAnnotations":{},"openidConfigEnabled":true,"openidConfigLabels":{},"u2fAdditionalAnnotations":{},"u2fConfigEnabled":true,"u2fConfigLabels":{},"uma2AdditionalAnnotations":{},"uma2ConfigEnabled":true,"uma2ConfigLabels":{},"webdiscoveryAdditionalAnnotations":{},"webdiscoveryEnabled":true,"webdiscoveryLabels":{},"webfingerAdditionalAnnotations":{},"webfingerEnabled":true,"webfingerLabels":{}},"lockEnabled":false}` | Parameters used globally across all services helm charts. |
| auth-server | object | `{"appLoggers":{"auditStatsLogLevel":"INFO","auditStatsLogTarget":"FILE","authLogLevel":"INFO","authLogTarget":"STDOUT","enableStdoutLogPrefix":"true","httpLogLevel":"INFO","httpLogTarget":"FILE","lockLogLevel":"INFO","lockLogTarget":"STDOUT","persistenceDurationLogLevel":"INFO","persistenceDurationLogTarget":"FILE","persistenceLogLevel":"INFO","persistenceLogTarget":"FILE","scriptLogLevel":"INFO","scriptLogTarget":"FILE"},"authEncKeys":"RSA1_5 RSA-OAEP","authSigKeys":"RS256 RS384 RS512 ES256 ES384 ES512 PS256 PS384 PS512","cnCustomJavaOptions":"","enabled":true,"ingress":{"authServerAdditionalAnnotations":{},"authServerEnabled":true,"authServerLabels":{},"authServerProtectedRegister":false,"authServerProtectedRegisterAdditionalAnnotations":{},"authServerProtectedRegisterLabels":{},"authServerProtectedToken":false,"authServerProtectedTokenAdditionalAnnotations":{},"authServerProtectedTokenLabels":{},"authzenAdditionalAnnotations":{},"authzenConfigEnabled":true,"authzenConfigLabels":{},"deviceCodeAdditionalAnnotations":{},"deviceCodeEnabled":true,"deviceCodeLabels":{},"firebaseMessagingAdditionalAnnotations":{},"firebaseMessagingEnabled":true,"firebaseMessagingLabels":{},"lockAdditionalAnnotations":{},"lockAuditEnabled":false,"lockConfigAdditionalAnnotations":{},"lockConfigEnabled":false,"lockConfigLabels":{},"lockLabels":{},"openidAdditionalAnnotations":{},"openidConfigEnabled":true,"openidConfigLabels":{},"u2fAdditionalAnnotations":{},"u2fConfigEnabled":true,"u2fConfigLabels":{},"uma2AdditionalAnnotations":{},"uma2ConfigEnabled":true,"uma2ConfigLabels":{},"webdiscoveryAdditionalAnnotations":{},"webdiscoveryEnabled":true,"webdiscoveryLabels":{},"webfingerAdditionalAnnotations":{},"webfingerEnabled":true,"webfingerLabels":{}},"lockEnabled":false}` | Parameters used globally across all services helm charts. |
| auth-server-key-rotation | object | `{"additionalAnnotations":{},"additionalLabels":{},"cronJobSchedule":"","customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","enabled":true,"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/cloudtools","tag":"0.0.0-nightly"},"initKeysLife":48,"keysLife":48,"keysPushDelay":0,"keysPushStrategy":"NEWER","keysStrategy":"NEWER","lifecycle":{},"nodeSelector":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for regenerating auth-keys per x hours |
| auth-server-key-rotation.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} |
| auth-server-key-rotation.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} |
Expand Down Expand Up @@ -64,14 +64,16 @@ Kubernetes: `>=v1.23.0-0`
| auth-server-key-rotation.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 |
| auth-server-key-rotation.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers |
| auth-server-key-rotation.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod |
| auth-server.appLoggers | object | `{"auditStatsLogLevel":"INFO","auditStatsLogTarget":"FILE","authLogLevel":"INFO","authLogTarget":"STDOUT","enableStdoutLogPrefix":"true","httpLogLevel":"INFO","httpLogTarget":"FILE","persistenceDurationLogLevel":"INFO","persistenceDurationLogTarget":"FILE","persistenceLogLevel":"INFO","persistenceLogTarget":"FILE","scriptLogLevel":"INFO","scriptLogTarget":"FILE"}` | App loggers can be configured to define where the logs will be redirected to and the level of each in which it should be displayed. |
| auth-server.appLoggers | object | `{"auditStatsLogLevel":"INFO","auditStatsLogTarget":"FILE","authLogLevel":"INFO","authLogTarget":"STDOUT","enableStdoutLogPrefix":"true","httpLogLevel":"INFO","httpLogTarget":"FILE","lockLogLevel":"INFO","lockLogTarget":"STDOUT","persistenceDurationLogLevel":"INFO","persistenceDurationLogTarget":"FILE","persistenceLogLevel":"INFO","persistenceLogTarget":"FILE","scriptLogLevel":"INFO","scriptLogTarget":"FILE"}` | App loggers can be configured to define where the logs will be redirected to and the level of each in which it should be displayed. |
| auth-server.appLoggers.auditStatsLogLevel | string | `"INFO"` | jans-auth_audit.log level |
| auth-server.appLoggers.auditStatsLogTarget | string | `"FILE"` | jans-auth_script.log target |
| auth-server.appLoggers.auditStatsLogTarget | string | `"FILE"` | jans-auth_audit.log target |
| auth-server.appLoggers.authLogLevel | string | `"INFO"` | jans-auth.log level |
| auth-server.appLoggers.authLogTarget | string | `"STDOUT"` | jans-auth.log target |
| auth-server.appLoggers.enableStdoutLogPrefix | string | `"true"` | Enable log prefixing which enables prepending the STDOUT logs with the file name. i.e auth-server-script ===> 2022-12-20 17:49:55,744 INFO |
| auth-server.appLoggers.httpLogLevel | string | `"INFO"` | http_request_response.log level |
| auth-server.appLoggers.httpLogTarget | string | `"FILE"` | http_request_response.log target |
| auth-server.appLoggers.lockLogLevel | string | `"INFO"` | jans-lock.log level |
| auth-server.appLoggers.lockLogTarget | string | `"STDOUT"` | jans-lock.log target |
| auth-server.appLoggers.persistenceDurationLogLevel | string | `"INFO"` | jans-auth_persistence_duration.log level |
| auth-server.appLoggers.persistenceDurationLogTarget | string | `"FILE"` | jans-auth_persistence_duration.log target |
| auth-server.appLoggers.persistenceLogLevel | string | `"INFO"` | jans-auth_persistence.log level |
Expand All @@ -82,7 +84,7 @@ Kubernetes: `>=v1.23.0-0`
| auth-server.authSigKeys | string | `"RS256 RS384 RS512 ES256 ES384 ES512 PS256 PS384 PS512"` | space-separated key algorithm for signing (default to `RS256 RS384 RS512 ES256 ES384 ES512 PS256 PS384 PS512`) |
| auth-server.cnCustomJavaOptions | string | `""` | passing custom java options to auth-server. Notice you do not need to pass in any loggers options as they are introduced below in appLoggers. DO NOT PASS JAVA_OPTIONS in envs. |
| auth-server.enabled | bool | `true` | Boolean flag to enable/disable auth-server chart. You should never set this to false. |
| auth-server.ingress | object | `{"authServerAdditionalAnnotations":{},"authServerEnabled":true,"authServerLabels":{},"authServerProtectedRegister":false,"authServerProtectedRegisterAdditionalAnnotations":{},"authServerProtectedRegisterLabels":{},"authServerProtectedToken":false,"authServerProtectedTokenAdditionalAnnotations":{},"authServerProtectedTokenLabels":{},"authzenAdditionalAnnotations":{},"authzenConfigEnabled":true,"authzenConfigLabels":{},"deviceCodeAdditionalAnnotations":{},"deviceCodeEnabled":true,"deviceCodeLabels":{},"firebaseMessagingAdditionalAnnotations":{},"firebaseMessagingEnabled":true,"firebaseMessagingLabels":{},"lockAdditionalAnnotations":{},"lockConfigAdditionalAnnotations":{},"lockConfigEnabled":false,"lockConfigLabels":{},"lockEnabled":false,"lockLabels":{},"openidAdditionalAnnotations":{},"openidConfigEnabled":true,"openidConfigLabels":{},"u2fAdditionalAnnotations":{},"u2fConfigEnabled":true,"u2fConfigLabels":{},"uma2AdditionalAnnotations":{},"uma2ConfigEnabled":true,"uma2ConfigLabels":{},"webdiscoveryAdditionalAnnotations":{},"webdiscoveryEnabled":true,"webdiscoveryLabels":{},"webfingerAdditionalAnnotations":{},"webfingerEnabled":true,"webfingerLabels":{}}` | Enable endpoints in either istio or nginx ingress depending on users choice |
| auth-server.ingress | object | `{"authServerAdditionalAnnotations":{},"authServerEnabled":true,"authServerLabels":{},"authServerProtectedRegister":false,"authServerProtectedRegisterAdditionalAnnotations":{},"authServerProtectedRegisterLabels":{},"authServerProtectedToken":false,"authServerProtectedTokenAdditionalAnnotations":{},"authServerProtectedTokenLabels":{},"authzenAdditionalAnnotations":{},"authzenConfigEnabled":true,"authzenConfigLabels":{},"deviceCodeAdditionalAnnotations":{},"deviceCodeEnabled":true,"deviceCodeLabels":{},"firebaseMessagingAdditionalAnnotations":{},"firebaseMessagingEnabled":true,"firebaseMessagingLabels":{},"lockAdditionalAnnotations":{},"lockAuditEnabled":false,"lockConfigAdditionalAnnotations":{},"lockConfigEnabled":false,"lockConfigLabels":{},"lockLabels":{},"openidAdditionalAnnotations":{},"openidConfigEnabled":true,"openidConfigLabels":{},"u2fAdditionalAnnotations":{},"u2fConfigEnabled":true,"u2fConfigLabels":{},"uma2AdditionalAnnotations":{},"uma2ConfigEnabled":true,"uma2ConfigLabels":{},"webdiscoveryAdditionalAnnotations":{},"webdiscoveryEnabled":true,"webdiscoveryLabels":{},"webfingerAdditionalAnnotations":{},"webfingerEnabled":true,"webfingerLabels":{}}` | Enable endpoints in either istio or nginx ingress depending on users choice |
| auth-server.ingress.authServerAdditionalAnnotations | object | `{}` | Auth server ingress resource additional annotations. |
| auth-server.ingress.authServerEnabled | bool | `true` | Enable Auth server endpoints /jans-auth |
| auth-server.ingress.authServerLabels | object | `{}` | Auth server ingress resource labels. key app is taken |
Expand All @@ -102,10 +104,10 @@ Kubernetes: `>=v1.23.0-0`
| auth-server.ingress.firebaseMessagingEnabled | bool | `true` | Enable endpoint /firebase-messaging-sw.js |
| auth-server.ingress.firebaseMessagingLabels | object | `{}` | Firebase Messaging ingress resource labels. key app is taken |
| auth-server.ingress.lockAdditionalAnnotations | object | `{}` | Lock ingress resource additional annotations. |
| auth-server.ingress.lockAuditEnabled | bool | `false` | Enable gRPC endpoint /io.jans.lock.audit.AuditService |
| auth-server.ingress.lockConfigAdditionalAnnotations | object | `{}` | Lock config ingress resource additional annotations. |
| auth-server.ingress.lockConfigEnabled | bool | `false` | Enable endpoint /.well-known/lock-server-configuration |
| auth-server.ingress.lockConfigLabels | object | `{}` | Lock config ingress resource labels. key app is taken |
| auth-server.ingress.lockEnabled | bool | `false` | Enable endpoint /jans-lock |
| auth-server.ingress.lockLabels | object | `{}` | Lock ingress resource labels. key app is taken |
| auth-server.ingress.openidAdditionalAnnotations | object | `{}` | openid-configuration ingress resource additional annotations. |
| auth-server.ingress.openidConfigEnabled | bool | `true` | Enable endpoint /.well-known/openid-configuration |
Expand Down
2 changes: 2 additions & 0 deletions charts/gluu-all-in-one/templates/configmap.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -94,6 +94,8 @@ data:
| replace "scriptLogLevel" "script_log_level"
| replace "auditStatsLogTarget" "audit_log_target"
| replace "auditStatsLogLevel" "audit_log_level"
| replace "lockLogTarget" "lock_log_target"
| replace "lockLogLevel" "lock_log_level"
| replace "enableStdoutLogPrefix" "enable_stdout_log_prefix"
| squote
}}
Expand Down
4 changes: 2 additions & 2 deletions charts/gluu-all-in-one/templates/deployment.yml
Original file line number Diff line number Diff line change
Expand Up @@ -77,8 +77,8 @@ spec:
value: {{ include "saml.customJavaOptions" . | trim }}
- name: CN_SCIM_JAVA_OPTIONS
value: {{ include "scim.customJavaOptions" . | trim }}
{{- include "flex-all-in-one.usr-envs" . | indent 12 }}
{{- include "flex-all-in-one.usr-secret-envs" . | indent 12 }}
{{- include "flex-all-in-one.usr-envs" . | indent 10 }}
{{- include "flex-all-in-one.usr-secret-envs" . | indent 10 }}
securityContext:
runAsUser: 1000
runAsNonRoot: true
Expand Down
165 changes: 124 additions & 41 deletions charts/gluu-all-in-one/templates/gateway-api.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,9 @@ spec:
hostnames:
- {{ .Values.fqdn | quote }}
rules:


{{- /* DON'T remove `/jans-auth` prefix in filters; they will be stripped in AIO image internally */}}

{{- /* 1. OpenID Configuration */}}
{{- if index .Values "auth-server" "ingress" "openidConfigEnabled" }}
- matches:
Expand Down Expand Up @@ -265,25 +267,8 @@ spec:
- name: {{ $svcName }}
port: {{ $svcPort }}
{{- end }}

{{- /* 13. Jans Lock */}}
{{- if and (index .Values "auth-server" "lockEnabled") (index .Values "auth-server" "ingress" "lockEnabled") }}
- matches:
- path:
type: Exact
value: /jans-lock
filters:
- type: URLRewrite
urlRewrite:
path:
type: ReplaceFullPath
replaceFullPath: /jans-auth
backendRefs:
- name: {{ $svcName }}
port: {{ $svcPort }}
{{- end }}

{{- /* 14. Admin UI */}}
{{- /* 13. Admin UI */}}
{{- if index .Values "admin-ui" "ingress" "adminUiEnabled" }}
- matches:
- path:
Expand Down Expand Up @@ -376,17 +361,6 @@ spec:
port: {{ $svcPort }}
{{- end }}

{{- /* 6. SAML (/kc) */}}
{{- if .Values.saml.ingress.samlEnabled }}
- matches:
- path:
type: PathPrefix
value: /kc
backendRefs:
- name: {{ $svcName }}
port: {{ $svcPort }}
{{- end }}

---
{{- /* ======================================================== */}}
{{- /* ROUTE 3: SECURE APPS (HTTP REDIRECT) */}}
Expand All @@ -413,9 +387,9 @@ spec:
hostnames:
- {{ .Values.fqdn | quote }}
rules:

{{- /* Same 6 Rules, but with Redirect Filter instead of BackendRef */}}

{{- /* 1. Auth Server Redirect */}}
{{- if index .Values "auth-server" "ingress" "authServerEnabled" }}
- matches:
Expand Down Expand Up @@ -481,17 +455,126 @@ spec:
statusCode: 301
{{- end }}

{{- /* 6. SAML Redirect */}}
{{- if .Values.saml.ingress.samlEnabled }}
{{- if and (index .Values "auth-server" "lockEnabled") (index .Values "auth-server" "ingress" "lockAuditEnabled") }}
---
{{- /* ======================================================== */}}
{{- /* ROUTE 4: gRPC APPS */}}
{{- /* These endpoints use gRPC */}}
{{- /* ======================================================== */}}
apiVersion: gateway.networking.k8s.io/v1
{{- if eq .Values.gatewayApi.gatewayClassName "istio" }}
{{- /* Use HTTPRoute in istio to avoid routes being overriden by another route type */}}
kind: HTTPRoute
{{- else }}
kind: GRPCRoute
{{- end }}
metadata:
name: {{ $fullName }}-grpc-routes
namespace: {{ .Release.Namespace }}
labels:
app: {{ $fullName }}-routes
{{- if .Values.gatewayApi.routeLabels }}
{{- toYaml .Values.gatewayApi.routeLabels | nindent 4 }}
{{- end }}
{{- if .Values.gatewayApi.routeAnnotations }}
annotations:
{{- toYaml .Values.gatewayApi.routeAnnotations | nindent 4 }}
{{- end }}
spec:
parentRefs:
- name: {{ .Values.gatewayApi.name }}
sectionName: https
hostnames:
- {{ .Values.fqdn | quote }}
rules:
{{- /* 1. Lock Server Audit */}}
{{- /* List all routable methods explicitly to satisfy different gateway implementation */}}
{{- if eq .Values.gatewayApi.gatewayClassName "istio" }}
{{- /* HTTPRoute matches for istio */}}
- matches:
- path:
type: PathPrefix
value: /kc
filters:
- type: RequestRedirect
requestRedirect:
scheme: https
statusCode: 301
value: /io.jans.lock.audit.AuditService
backendRefs:
- name: {{ $svcName }}-grpc
port: 50051
{{- else }}
- matches:
- method:
service: io.jans.lock.audit.AuditService
method: ProcessLog
- method:
service: io.jans.lock.audit.AuditService
method: ProcessBulkLog
- method:
service: io.jans.lock.audit.AuditService
method: ProcessHealth
- method:
service: io.jans.lock.audit.AuditService
method: ProcessBulkHealth
- method:
service: io.jans.lock.audit.AuditService
method: ProcessTelemetry
- method:
service: io.jans.lock.audit.AuditService
method: ProcessBulkTelemetry
backendRefs:
- name: {{ $svcName }}-grpc
port: 50051
{{- end }}
{{- end }}

{{- end }}
{{- if or (index .Values "auth-server" "ingress" "authServerProtectedToken") (index .Values "auth-server" "ingress" "authServerProtectedRegister") }}
---
{{- /* ======================================================== */}}
{{- /* ROUTE: SECURE APPS (PROTECTED HTTPS TRAFFIC) */}}
{{- /* These endpoints serve the app when reached on HTTPS */}}
{{- /* ======================================================== */}}
apiVersion: gateway.networking.k8s.io/v1
kind: HTTPRoute
metadata:
name: {{ $fullName }}-routes-protected
namespace: {{ .Release.Namespace }}
labels:
app: {{ $fullName }}-routes
{{- if .Values.gatewayApi.routeLabels }}
{{- toYaml .Values.gatewayApi.routeLabels | nindent 4 }}
{{- end }}
{{- if .Values.gatewayApi.routeAnnotations }}
annotations:
{{- toYaml .Values.gatewayApi.routeAnnotations | nindent 4 }}
{{- end }}
spec:
parentRefs:
- name: {{ .Values.gatewayApi.name }}
sectionName: https
hostnames:
- {{ .Values.fqdn | quote }}
rules:

{{- /* DON'T remove `/jans-auth` prefix in filters; they will be stripped in AIO image internally */}}

{{- /* 1. Auth Server protected token (/jans-auth/restv1/token) */}}
{{- if index .Values "auth-server" "ingress" "authServerProtectedToken" }}
- matches:
- path:
type: PathPrefix
value: /jans-auth/restv1/token
backendRefs:
- name: {{ $svcName }}
port: {{ $svcPort }}
{{- end }}

{{- /* 2. Auth Server protected register (/jans-auth/restv1/register) */}}
{{- if index .Values "auth-server" "ingress" "authServerProtectedRegister" }}
- matches:
- path:
type: PathPrefix
value: /jans-auth/restv1/register
backendRefs:
- name: {{ $svcName }}
port: {{ $svcPort }}
{{- end }}
{{- end }}

{{- end }}
Loading
Loading