Skip to content

Commit

Permalink
Update entrypoint to only copy *.crt again
Browse files Browse the repository at this point in the history
  • Loading branch information
nabadger authored and nabadger committed Jun 4, 2018
1 parent 30babd8 commit 3ddcd5b
Show file tree
Hide file tree
Showing 3 changed files with 293 additions and 1 deletion.
85 changes: 85 additions & 0 deletions charts/dex-k8s-authenticator/values.mine.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,85 @@
# Default values for dex-k8s-authenticator.

# Deploy environment label, e.g. dev, test, prod
global:
deployEnv: dev

replicaCount: 1

image:
#repository: mintel/dex-k8s-authenticator
repository: nabadger/dex-k8s-authenticator
tag: latest
pullPolicy: Always

dexK8sAuthenticator:
port: 5555
debug: false
#logoUrl: http://<path-to-your-logo.png>
#tlsCert: /path/to/dex-client.crt
#tlsKey: /path/to/dex-client.key
clusters:
- name: my-cluster
short_description: "My Cluster"
description: "Example Cluster Long Description..."
client_secret: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok
issuer: http://dex.minikube.test/dex
k8s_master_uri: http://my-cluster.example.com
client_id: my-cluster
redirect_uri: http://dex.minikube.test/dexk8sauth/login/callback
k8s_ca_uri: https://url-to-your-ca.crt

service:
type: ClusterIP
port: 5555

ingress:
enabled: true
annotations:
nginx.ingress.kubernetes.io/add-base-url: "true"
nginx.ingress.kubernetes.io/rewrite-target: "/"
path: /dexk8sauth
hosts:
- dex.minikube.test

resources: {}
# We usually recommend not to specify default resources and to leave this as a conscious
# choice for the user. This also increases chances charts run on environments with little
# resources, such as Minikube. If you do want to specify resources, uncomment the following
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 128Mi

caCerts:
enabled: false
secrets: {}
# Array of Self Signed Certificates
# cat CA.crt | base64 -w 0
#
# name: The internal k8s name of the secret we create. It's also used in
# the volumeMount name. It must respect the k8s naming convension (avoid
# upper-case and '.' to be safe).
#
# filename: The filename of the CA to be mounted. It must end in .crt for
# update-ca-certificates to work
#
# value: The base64 encoded value of the CA
#
#secrets:
#- name: ca-cert1
# filename: ca1.crt
# value: LS0tLS1......X2F
#- name: ca-cert2
# filename: ca2.crt
# value: DS1tFA1......X2F


nodeSelector: {}

tolerations: []

affinity: {}
207 changes: 207 additions & 0 deletions charts/dex/values.mine.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,207 @@
# Default values for dex

# Deploy environment label, e.g. dev, test, prod
global:
deployEnv: dev

replicaCount: 1

image:
repository: quay.io/coreos/dex
tag: v2.9.0
pullPolicy: IfNotPresent

service:
type: ClusterIP
port: 5556

ingress:
enabled: true
#annotations:
# nginx.ingress.kubernetes.io/rewrite-target: /
path: /dex
hosts:
- dex.minikube.test

rbac:
# Specifies whether RBAC resources should be created
create: true

serviceAccount:
# Specifies whether a ServiceAccount should be created
create: true
# The name of the ServiceAccount to use.
# If not set and create is true, a name is generated using the fullname template
name:

resources:
# We usually recommend not to specify default resources and to leave this as a conscious
# choice for the user. This also increases chances charts run on environments with little
# resources, such as Minikube. If you do want to specify resources, uncomment the following
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
limits:
cpu: 100m
memory: 50Mi
requests:
cpu: 100m
memory: 50Mi

nodeSelector: {}

tolerations: []

affinity: {}


# Configuration file for Dex
# Certainly secret fields can use environment variables
#
config: |-
issuer: http://dex.minikube.test/dex
storage:
type: kubernetes
config:
inCluster: true
web:
http: 0.0.0.0:5556
frontend:
theme: "coreos"
issuer: "Example Co"
issuerUrl: "https://example.com"
logoUrl: https://example.com/images/logo-250x25.png
expiry:
signingKeys: "6h"
idTokens: "24h"
logger:
level: debug
format: json
oauth2:
responseTypes: ["code", "token", "id_token"]
skipApprovalScreen: true
# Remember you can have multiple connectors of the same 'type' (with different 'id's)
# If you need e.g. logins with groups for two different Microsoft 'tenants'
connectors:
# GitHub configure 'OAuth Apps' -> 'New OAuth App', add callback URL
# https://github.com/settings/developers
- type: github
id: github
name: GitHub
config:
clientID: $GITHUB_CLIENT_ID
clientSecret: $GITHUB_CLIENT_SECRET
redirectURI: https://dex.example.com/callback
# 'orgs' can be used to map groups from Github
# https://github.com/coreos/dex/blob/master/Documentation/connectors/github.md
#orgs:
#- name: foo
# teams:
# - team-red
# - team-blue
#- name: bar
# Google APIs account, 'Create Credentials' -> 'OAuth Client ID', add callback URL
# https://console.developers.google.com/apis/credentials
- type: oidc
id: google
name: Google
config:
issuer: https://accounts.google.com
clientID: $GOOGLE_CLIENT_ID
clientSecret: $GOOGLE_CLIENT_SECRET
redirectURI: https://dex.example.com/callback
# Google supports whitelisting allowed domains when using G Suite
# (Google Apps). The following field can be set to a list of domains
# that can log in:
# hostedDomains:
# - example.com
# - other.example.com
# Microsoft App Dev account, 'Add an app'
# 'Application Secrets' -> 'Generate new password'
# 'Platforms' -> 'Add Platform' -> 'Web', add the callback URL
# https://apps.dev.microsoft.com/
- type: microsoft
id: microsoft
name: Microsoft
config:
clientID: $MICROSOFT_APPLICATION_ID
clientSecret: $MICROSOFT_CLIENT_SECRET
redirectURI: https://dex.example.com/callback
# Restrict access to one tenant
# tenant: <tenant name> or <tenant uuid>
# Restrict access to certain groups
# groups:
# - group-red
# - group-blue
# These may not match the schema used by your LDAP server
# https://github.com/coreos/dex/blob/master/Documentation/connectors/ldap.md
- type: ldap
id: ldap
name: "LDAP"
config:
host: ldap.example.com:389
startTLS: true
bindDN: "cn=serviceAccount,dc=example,dc=com"
bindPW: $LDAP_BINDPW
usernamePrompt: "Username"
userSearch:
# Query should be "(&(objectClass=inetorgperson)(cn=<username>))"
baseDN: "ou=Users,dc=example,dc=com"
filter: "(objectClass=inetorgperson)"
username: cn
# DN must be in capitals
idAttr: DN
emailAttr: mail
nameAttr: displayName
groupSearch:
# Query should be "(&(objectClass=groupOfUniqueNames)(uniqueMember=<userAttr>))"
baseDN: "ou=Groups,dc=example,dc=com"
filter: "(objectClass=groupOfUniqueNames)"
# DN must be in capitals
userAttr: DN
groupAttr: uniqueMember
nameAttr: cn
# The 'name' must match the k8s API server's 'oidc-client-id'
staticClients:
- id: my-cluster
name: "my-cluster"
secret: "pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok"
redirectURIs:
- http://dex.minikube.test/dexk8sauth/login/callback
enablePasswordDB: True
staticPasswords:
- email: "[email protected]"
# bcrypt hash of the string "password"
hash: "$2a$10$2b2cU8CPhOTaGrs1HRQuAueS7JTT5ZHsHSzYiFPm1leZck7Mc8T4W"
username: "admin"
userID: "08a8684b-db88-4b73-90a9-3cd1661f5466"
# You should not enter your secrets here if this file will be stored in source control
# Instead create a separate file to hold or override these values
# You need only list the environment variables you used in the 'config' above
# You can add any additional ones you need, or remove ones you don't need
#
envSecrets:
# GitHub
GITHUB_CLIENT_ID: "override-me"
GITHUB_CLIENT_SECRET: "override-me"
# Google (oidc)
GOOGLE_CLIENT_ID: "override-me"
GOOGLE_CLIENT_SECRET: "override-me"
# Microsoft
MICROSOFT_APPLICATION_ID: "override-me"
MICROSOFT_CLIENT_SECRET: "override-me"
# LDAP
LDAP_BINDPW: "override-me"
2 changes: 1 addition & 1 deletion entrypoint.sh
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
#!/bin/sh

if [ ! -z "$(ls -A /certs)" ]; then
cp -L /certs/*.crt /certs/*.pem /usr/local/share/ca-certificates/ 2>/dev/null
cp -L /certs/*.crt /usr/local/share/ca-certificates/ 2>/dev/null
update-ca-certificates
fi

Expand Down

0 comments on commit 3ddcd5b

Please sign in to comment.