forked from mintel/dex-k8s-authenticator
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Update entrypoint to only copy *.crt again
- Loading branch information
nabadger
authored and
nabadger
committed
Jun 4, 2018
1 parent
30babd8
commit 3ddcd5b
Showing
3 changed files
with
293 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,85 @@ | ||
# Default values for dex-k8s-authenticator. | ||
|
||
# Deploy environment label, e.g. dev, test, prod | ||
global: | ||
deployEnv: dev | ||
|
||
replicaCount: 1 | ||
|
||
image: | ||
#repository: mintel/dex-k8s-authenticator | ||
repository: nabadger/dex-k8s-authenticator | ||
tag: latest | ||
pullPolicy: Always | ||
|
||
dexK8sAuthenticator: | ||
port: 5555 | ||
debug: false | ||
#logoUrl: http://<path-to-your-logo.png> | ||
#tlsCert: /path/to/dex-client.crt | ||
#tlsKey: /path/to/dex-client.key | ||
clusters: | ||
- name: my-cluster | ||
short_description: "My Cluster" | ||
description: "Example Cluster Long Description..." | ||
client_secret: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok | ||
issuer: http://dex.minikube.test/dex | ||
k8s_master_uri: http://my-cluster.example.com | ||
client_id: my-cluster | ||
redirect_uri: http://dex.minikube.test/dexk8sauth/login/callback | ||
k8s_ca_uri: https://url-to-your-ca.crt | ||
|
||
service: | ||
type: ClusterIP | ||
port: 5555 | ||
|
||
ingress: | ||
enabled: true | ||
annotations: | ||
nginx.ingress.kubernetes.io/add-base-url: "true" | ||
nginx.ingress.kubernetes.io/rewrite-target: "/" | ||
path: /dexk8sauth | ||
hosts: | ||
- dex.minikube.test | ||
|
||
resources: {} | ||
# We usually recommend not to specify default resources and to leave this as a conscious | ||
# choice for the user. This also increases chances charts run on environments with little | ||
# resources, such as Minikube. If you do want to specify resources, uncomment the following | ||
# lines, adjust them as necessary, and remove the curly braces after 'resources:'. | ||
# limits: | ||
# cpu: 100m | ||
# memory: 128Mi | ||
# requests: | ||
# cpu: 100m | ||
# memory: 128Mi | ||
|
||
caCerts: | ||
enabled: false | ||
secrets: {} | ||
# Array of Self Signed Certificates | ||
# cat CA.crt | base64 -w 0 | ||
# | ||
# name: The internal k8s name of the secret we create. It's also used in | ||
# the volumeMount name. It must respect the k8s naming convension (avoid | ||
# upper-case and '.' to be safe). | ||
# | ||
# filename: The filename of the CA to be mounted. It must end in .crt for | ||
# update-ca-certificates to work | ||
# | ||
# value: The base64 encoded value of the CA | ||
# | ||
#secrets: | ||
#- name: ca-cert1 | ||
# filename: ca1.crt | ||
# value: LS0tLS1......X2F | ||
#- name: ca-cert2 | ||
# filename: ca2.crt | ||
# value: DS1tFA1......X2F | ||
|
||
|
||
nodeSelector: {} | ||
|
||
tolerations: [] | ||
|
||
affinity: {} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,207 @@ | ||
# Default values for dex | ||
|
||
# Deploy environment label, e.g. dev, test, prod | ||
global: | ||
deployEnv: dev | ||
|
||
replicaCount: 1 | ||
|
||
image: | ||
repository: quay.io/coreos/dex | ||
tag: v2.9.0 | ||
pullPolicy: IfNotPresent | ||
|
||
service: | ||
type: ClusterIP | ||
port: 5556 | ||
|
||
ingress: | ||
enabled: true | ||
#annotations: | ||
# nginx.ingress.kubernetes.io/rewrite-target: / | ||
path: /dex | ||
hosts: | ||
- dex.minikube.test | ||
|
||
rbac: | ||
# Specifies whether RBAC resources should be created | ||
create: true | ||
|
||
serviceAccount: | ||
# Specifies whether a ServiceAccount should be created | ||
create: true | ||
# The name of the ServiceAccount to use. | ||
# If not set and create is true, a name is generated using the fullname template | ||
name: | ||
|
||
resources: | ||
# We usually recommend not to specify default resources and to leave this as a conscious | ||
# choice for the user. This also increases chances charts run on environments with little | ||
# resources, such as Minikube. If you do want to specify resources, uncomment the following | ||
# lines, adjust them as necessary, and remove the curly braces after 'resources:'. | ||
limits: | ||
cpu: 100m | ||
memory: 50Mi | ||
requests: | ||
cpu: 100m | ||
memory: 50Mi | ||
|
||
nodeSelector: {} | ||
|
||
tolerations: [] | ||
|
||
affinity: {} | ||
|
||
|
||
# Configuration file for Dex | ||
# Certainly secret fields can use environment variables | ||
# | ||
config: |- | ||
issuer: http://dex.minikube.test/dex | ||
storage: | ||
type: kubernetes | ||
config: | ||
inCluster: true | ||
web: | ||
http: 0.0.0.0:5556 | ||
frontend: | ||
theme: "coreos" | ||
issuer: "Example Co" | ||
issuerUrl: "https://example.com" | ||
logoUrl: https://example.com/images/logo-250x25.png | ||
expiry: | ||
signingKeys: "6h" | ||
idTokens: "24h" | ||
logger: | ||
level: debug | ||
format: json | ||
oauth2: | ||
responseTypes: ["code", "token", "id_token"] | ||
skipApprovalScreen: true | ||
# Remember you can have multiple connectors of the same 'type' (with different 'id's) | ||
# If you need e.g. logins with groups for two different Microsoft 'tenants' | ||
connectors: | ||
# GitHub configure 'OAuth Apps' -> 'New OAuth App', add callback URL | ||
# https://github.com/settings/developers | ||
- type: github | ||
id: github | ||
name: GitHub | ||
config: | ||
clientID: $GITHUB_CLIENT_ID | ||
clientSecret: $GITHUB_CLIENT_SECRET | ||
redirectURI: https://dex.example.com/callback | ||
# 'orgs' can be used to map groups from Github | ||
# https://github.com/coreos/dex/blob/master/Documentation/connectors/github.md | ||
#orgs: | ||
#- name: foo | ||
# teams: | ||
# - team-red | ||
# - team-blue | ||
#- name: bar | ||
# Google APIs account, 'Create Credentials' -> 'OAuth Client ID', add callback URL | ||
# https://console.developers.google.com/apis/credentials | ||
- type: oidc | ||
id: google | ||
name: Google | ||
config: | ||
issuer: https://accounts.google.com | ||
clientID: $GOOGLE_CLIENT_ID | ||
clientSecret: $GOOGLE_CLIENT_SECRET | ||
redirectURI: https://dex.example.com/callback | ||
# Google supports whitelisting allowed domains when using G Suite | ||
# (Google Apps). The following field can be set to a list of domains | ||
# that can log in: | ||
# hostedDomains: | ||
# - example.com | ||
# - other.example.com | ||
# Microsoft App Dev account, 'Add an app' | ||
# 'Application Secrets' -> 'Generate new password' | ||
# 'Platforms' -> 'Add Platform' -> 'Web', add the callback URL | ||
# https://apps.dev.microsoft.com/ | ||
- type: microsoft | ||
id: microsoft | ||
name: Microsoft | ||
config: | ||
clientID: $MICROSOFT_APPLICATION_ID | ||
clientSecret: $MICROSOFT_CLIENT_SECRET | ||
redirectURI: https://dex.example.com/callback | ||
# Restrict access to one tenant | ||
# tenant: <tenant name> or <tenant uuid> | ||
# Restrict access to certain groups | ||
# groups: | ||
# - group-red | ||
# - group-blue | ||
# These may not match the schema used by your LDAP server | ||
# https://github.com/coreos/dex/blob/master/Documentation/connectors/ldap.md | ||
- type: ldap | ||
id: ldap | ||
name: "LDAP" | ||
config: | ||
host: ldap.example.com:389 | ||
startTLS: true | ||
bindDN: "cn=serviceAccount,dc=example,dc=com" | ||
bindPW: $LDAP_BINDPW | ||
usernamePrompt: "Username" | ||
userSearch: | ||
# Query should be "(&(objectClass=inetorgperson)(cn=<username>))" | ||
baseDN: "ou=Users,dc=example,dc=com" | ||
filter: "(objectClass=inetorgperson)" | ||
username: cn | ||
# DN must be in capitals | ||
idAttr: DN | ||
emailAttr: mail | ||
nameAttr: displayName | ||
groupSearch: | ||
# Query should be "(&(objectClass=groupOfUniqueNames)(uniqueMember=<userAttr>))" | ||
baseDN: "ou=Groups,dc=example,dc=com" | ||
filter: "(objectClass=groupOfUniqueNames)" | ||
# DN must be in capitals | ||
userAttr: DN | ||
groupAttr: uniqueMember | ||
nameAttr: cn | ||
# The 'name' must match the k8s API server's 'oidc-client-id' | ||
staticClients: | ||
- id: my-cluster | ||
name: "my-cluster" | ||
secret: "pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok" | ||
redirectURIs: | ||
- http://dex.minikube.test/dexk8sauth/login/callback | ||
enablePasswordDB: True | ||
staticPasswords: | ||
- email: "[email protected]" | ||
# bcrypt hash of the string "password" | ||
hash: "$2a$10$2b2cU8CPhOTaGrs1HRQuAueS7JTT5ZHsHSzYiFPm1leZck7Mc8T4W" | ||
username: "admin" | ||
userID: "08a8684b-db88-4b73-90a9-3cd1661f5466" | ||
# You should not enter your secrets here if this file will be stored in source control | ||
# Instead create a separate file to hold or override these values | ||
# You need only list the environment variables you used in the 'config' above | ||
# You can add any additional ones you need, or remove ones you don't need | ||
# | ||
envSecrets: | ||
# GitHub | ||
GITHUB_CLIENT_ID: "override-me" | ||
GITHUB_CLIENT_SECRET: "override-me" | ||
# Google (oidc) | ||
GOOGLE_CLIENT_ID: "override-me" | ||
GOOGLE_CLIENT_SECRET: "override-me" | ||
# Microsoft | ||
MICROSOFT_APPLICATION_ID: "override-me" | ||
MICROSOFT_CLIENT_SECRET: "override-me" | ||
# LDAP | ||
LDAP_BINDPW: "override-me" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters