|
5 | 5 | {{- toYaml .Values.openshiftOauthProxy.securityContext | nindent 4 }} |
6 | 6 | image: "{{ .Values.openshiftOauthProxy.image.repository }}:{{ .Values.openshiftOauthProxy.image.tag }}" |
7 | 7 | env: |
8 | | - - name: COOKIE_SECRET |
9 | | - valueFrom: |
10 | | - secretKeyRef: |
11 | | - name: {{ default (printf "%s-cookie-secret" .Release.Name) .Values.authentication.cookieSecretName }} |
12 | | - key: COOKIE_SECRET |
13 | | - optional: false |
| 8 | + - name: COOKIE_SECRET |
| 9 | + valueFrom: |
| 10 | + secretKeyRef: |
| 11 | + name: {{ default (printf "%s-cookie-secret" .Release.Name) .Values.authentication.cookieSecretName }} |
| 12 | + key: COOKIE_SECRET |
| 13 | + optional: false |
| 14 | + {{- with (.Values.openshiftOauthProxy.config.extra).envVars }} |
| 15 | + {{- toYaml . | nindent 2 }} |
| 16 | + {{- end }} |
| 17 | + {{- with (.Values.openshiftOauthProxy.config.extra).inPod.reports.envVars }} |
| 18 | + {{- toYaml . | nindent 2 }} |
| 19 | + {{- end }} |
| 20 | + envFrom: |
| 21 | + {{- with (.Values.openshiftOauthProxy.config.extra).envSources }} |
| 22 | + {{- toYaml . | nindent 2 }} |
| 23 | + {{- end }} |
| 24 | + {{- with (.Values.openshiftOauthProxy.config.extra).inPod.reports.envSources }} |
| 25 | + {{- toYaml . | nindent 2 }} |
| 26 | + {{- end }} |
14 | 27 | args: |
15 | 28 | - --pass-access-token=false |
16 | 29 | - --pass-user-bearer-token=false |
|
52 | 65 | image: "{{ (.Values.oauth2Proxy).image.repository }}:{{ (.Values.oauth2Proxy).image.tag }}" |
53 | 66 | imagePullPolicy: {{ (.Values.oauth2Proxy).image.pullPolicy }} |
54 | 67 | env: |
55 | | - - name: OAUTH2_PROXY_CLIENT_ID |
56 | | - value: dummy |
57 | | - - name: OAUTH2_PROXY_CLIENT_SECRET |
58 | | - value: none |
59 | | - - name: OAUTH2_PROXY_HTTP_ADDRESS |
60 | | - value: 0.0.0.0:4180 |
61 | | - - name: OAUTH2_PROXY_HTTPS_ADDRESS |
62 | | - value: :8443 |
63 | | - - name: OAUTH2_PROXY_TLS_CERT_FILE |
64 | | - value: /etc/tls/private/cert |
65 | | - - name: OAUTH2_PROXY_TLS_KEY_FILE |
66 | | - value: /etc/tls/private/key |
67 | | - - name: OAUTH2_PROXY_UPSTREAMS |
68 | | - value: http://localhost:10001/ |
69 | | - - name: OAUTH2_PROXY_REDIRECT_URL |
70 | | - value: "http://localhost:4180/oauth2/callback" |
71 | | - - name: OAUTH2_PROXY_COOKIE_SECRET |
72 | | - valueFrom: |
73 | | - secretKeyRef: |
74 | | - name: {{ default (printf "%s-cookie-secret" .Release.Name) .Values.authentication.cookieSecretName }} |
75 | | - key: COOKIE_SECRET |
76 | | - optional: false |
77 | | - - name: OAUTH2_PROXY_EMAIL_DOMAINS |
78 | | - value: "*" |
79 | | - - name: OAUTH2_PROXY_HTPASSWD_USER_GROUP |
80 | | - value: write |
81 | | - - name: OAUTH2_PROXY_HTPASSWD_FILE |
82 | | - value: /etc/oauth2_proxy/basicauth/htpasswd |
83 | | - - name: OAUTH2_PROXY_SKIP_AUTH_ROUTES |
84 | | - value: "^/health$" |
85 | | - - name: OAUTH2_PROXY_PROXY_WEBSOCKETS |
86 | | - value: "false" |
| 68 | + - name: OAUTH2_PROXY_CLIENT_ID |
| 69 | + value: dummy |
| 70 | + - name: OAUTH2_PROXY_CLIENT_SECRET |
| 71 | + value: none |
| 72 | + - name: OAUTH2_PROXY_HTTP_ADDRESS |
| 73 | + value: 0.0.0.0:4180 |
| 74 | + - name: OAUTH2_PROXY_HTTPS_ADDRESS |
| 75 | + value: :8443 |
| 76 | + - name: OAUTH2_PROXY_TLS_CERT_FILE |
| 77 | + value: /etc/tls/private/cert |
| 78 | + - name: OAUTH2_PROXY_TLS_KEY_FILE |
| 79 | + value: /etc/tls/private/key |
| 80 | + - name: OAUTH2_PROXY_UPSTREAMS |
| 81 | + value: http://localhost:10001/ |
| 82 | + - name: OAUTH2_PROXY_REDIRECT_URL |
| 83 | + value: "http://localhost:4180/oauth2/callback" |
| 84 | + - name: OAUTH2_PROXY_COOKIE_SECRET |
| 85 | + valueFrom: |
| 86 | + secretKeyRef: |
| 87 | + name: {{ default (printf "%s-cookie-secret" .Release.Name) .Values.authentication.cookieSecretName }} |
| 88 | + key: COOKIE_SECRET |
| 89 | + optional: false |
| 90 | + - name: OAUTH2_PROXY_EMAIL_DOMAINS |
| 91 | + value: "*" |
| 92 | + - name: OAUTH2_PROXY_HTPASSWD_USER_GROUP |
| 93 | + value: write |
| 94 | + - name: OAUTH2_PROXY_HTPASSWD_FILE |
| 95 | + value: /etc/oauth2_proxy/basicauth/htpasswd |
| 96 | + - name: OAUTH2_PROXY_SKIP_AUTH_ROUTES |
| 97 | + value: "^/health$" |
| 98 | + - name: OAUTH2_PROXY_PROXY_WEBSOCKETS |
| 99 | + value: "false" |
| 100 | + {{- with (.Values.oauth2Proxy.config.extra).envVars }} |
| 101 | + {{- toYaml . | nindent 2 }} |
| 102 | + {{- end }} |
| 103 | + {{- with (.Values.oauth2Proxy.config.extra).inPod.reports.envVars }} |
| 104 | + {{- toYaml . | nindent 2 }} |
| 105 | + {{- end }} |
| 106 | + envFrom: |
| 107 | + {{- with (.Values.oauth2Proxy.config.extra).envSources }} |
| 108 | + {{- toYaml . | nindent 2 }} |
| 109 | + {{- end }} |
| 110 | + {{- with (.Values.oauth2Proxy.config.extra).inPod.reports.envSources }} |
| 111 | + {{- toYaml . | nindent 2 }} |
| 112 | + {{- end }} |
87 | 113 | ports: |
88 | 114 | - containerPort: 4180 |
89 | 115 | name: http |
|
108 | 134 | image: "{{ (.Values.oauth2Proxy).image.repository }}:{{ (.Values.oauth2Proxy).image.tag }}" |
109 | 135 | imagePullPolicy: {{ (.Values.oauth2Proxy).image.pullPolicy }} |
110 | 136 | env: |
111 | | - - name: OAUTH2_PROXY_CLIENT_ID |
112 | | - value: dummy |
113 | | - - name: OAUTH2_PROXY_CLIENT_SECRET |
114 | | - value: none |
115 | | - - name: OAUTH2_PROXY_HTTP_ADDRESS |
116 | | - value: 0.0.0.0:4180 |
117 | | - - name: OAUTH2_PROXY_UPSTREAMS |
118 | | - value: http://localhost:10001/ |
119 | | - - name: OAUTH2_PROXY_REDIRECT_URL |
120 | | - value: "http://localhost:4180/oauth2/callback" |
121 | | - - name: OAUTH2_PROXY_COOKIE_SECRET |
122 | | - valueFrom: |
123 | | - secretKeyRef: |
124 | | - name: {{ default (printf "%s-cookie-secret" .Release.Name) .Values.authentication.cookieSecretName }} |
125 | | - key: COOKIE_SECRET |
126 | | - optional: false |
127 | | - - name: OAUTH2_PROXY_EMAIL_DOMAINS |
128 | | - value: "*" |
129 | | - - name: OAUTH2_PROXY_HTPASSWD_USER_GROUP |
130 | | - value: write |
131 | | - - name: OAUTH2_PROXY_HTPASSWD_FILE |
132 | | - value: /etc/oauth2_proxy/basicauth/htpasswd |
133 | | - - name: OAUTH2_PROXY_SKIP_AUTH_ROUTES |
134 | | - value: "^/health$" |
135 | | - - name: OAUTH2_PROXY_PROXY_WEBSOCKETS |
136 | | - value: "false" |
| 137 | + - name: OAUTH2_PROXY_CLIENT_ID |
| 138 | + value: dummy |
| 139 | + - name: OAUTH2_PROXY_CLIENT_SECRET |
| 140 | + value: none |
| 141 | + - name: OAUTH2_PROXY_HTTP_ADDRESS |
| 142 | + value: 0.0.0.0:4180 |
| 143 | + - name: OAUTH2_PROXY_UPSTREAMS |
| 144 | + value: http://localhost:10001/ |
| 145 | + - name: OAUTH2_PROXY_REDIRECT_URL |
| 146 | + value: "http://localhost:4180/oauth2/callback" |
| 147 | + - name: OAUTH2_PROXY_COOKIE_SECRET |
| 148 | + valueFrom: |
| 149 | + secretKeyRef: |
| 150 | + name: {{ default (printf "%s-cookie-secret" .Release.Name) .Values.authentication.cookieSecretName }} |
| 151 | + key: COOKIE_SECRET |
| 152 | + optional: false |
| 153 | + - name: OAUTH2_PROXY_EMAIL_DOMAINS |
| 154 | + value: "*" |
| 155 | + - name: OAUTH2_PROXY_HTPASSWD_USER_GROUP |
| 156 | + value: write |
| 157 | + - name: OAUTH2_PROXY_HTPASSWD_FILE |
| 158 | + value: /etc/oauth2_proxy/basicauth/htpasswd |
| 159 | + - name: OAUTH2_PROXY_SKIP_AUTH_ROUTES |
| 160 | + value: "^/health$" |
| 161 | + - name: OAUTH2_PROXY_PROXY_WEBSOCKETS |
| 162 | + value: "false" |
| 163 | + {{- with (.Values.oauth2Proxy.config.extra).envVars }} |
| 164 | + {{- toYaml . | nindent 2 }} |
| 165 | + {{- end }} |
| 166 | + {{- with (.Values.oauth2Proxy.config.extra).inPod.reports.envVars }} |
| 167 | + {{- toYaml . | nindent 2 }} |
| 168 | + {{- end }} |
| 169 | + envFrom: |
| 170 | + {{- with (.Values.oauth2Proxy.config.extra).envSources }} |
| 171 | + {{- toYaml . | nindent 2 }} |
| 172 | + {{- end }} |
| 173 | + {{- with (.Values.oauth2Proxy.config.extra).inPod.reports.envSources }} |
| 174 | + {{- toYaml . | nindent 2 }} |
| 175 | + {{- end }} |
137 | 176 | ports: |
138 | 177 | - containerPort: 4180 |
139 | 178 | name: http |
|
0 commit comments