Update argocd/sealed-secrets/values.yaml, argocd/oauth2-proxy/Chart.yaml, argocd/oauth2-proxy/values.yaml, argocd/oauth2-proxy/templates/oauth-credentials.yaml, argocd/argocd/apps/oauth2-proxy.yaml
This commit is contained in:
20
argocd/argocd/apps/oauth2-proxy.yaml
Normal file
20
argocd/argocd/apps/oauth2-proxy.yaml
Normal file
@@ -0,0 +1,20 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: oauth2-proxy
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/linode.git
|
||||
targetRevision: main
|
||||
path: argocd/oauth2-proxy
|
||||
destination:
|
||||
namespace: oauth2-proxy
|
||||
name: in-cluster
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
14
argocd/oauth2-proxy/Chart.yaml
Normal file
14
argocd/oauth2-proxy/Chart.yaml
Normal file
@@ -0,0 +1,14 @@
|
||||
apiVersion: v2
|
||||
name: oauth2-proxy
|
||||
description: A Helm chart for Kubernetes
|
||||
type: application
|
||||
version: 0.0.1
|
||||
appVersion: 0.0.1
|
||||
|
||||
dependencies:
|
||||
- name: oauth2-proxy
|
||||
repository: https://oauth2-proxy.github.io/manifests
|
||||
version: 6.2.1
|
||||
|
||||
|
||||
|
||||
17
argocd/oauth2-proxy/templates/oauth-credentials.yaml
Normal file
17
argocd/oauth2-proxy/templates/oauth-credentials.yaml
Normal file
@@ -0,0 +1,17 @@
|
||||
apiVersion: bitnami.com/v1alpha1
|
||||
kind: SealedSecret
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
name: oauth-credentials
|
||||
namespace: oauth2-proxy
|
||||
spec:
|
||||
encryptedData:
|
||||
client-id: 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
|
||||
client-secret: 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
|
||||
cookie-secret: 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
|
||||
template:
|
||||
data: null
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
name: oauth-credentials
|
||||
namespace: oauth2-proxy
|
||||
163
argocd/oauth2-proxy/values.yaml
Normal file
163
argocd/oauth2-proxy/values.yaml
Normal file
@@ -0,0 +1,163 @@
|
||||
oauth2-proxy:
|
||||
kubeVersion:
|
||||
|
||||
config:
|
||||
annotations: {}
|
||||
existingSecret: oauth-credentials
|
||||
cookieName: ""
|
||||
google: {}
|
||||
configFile: |-
|
||||
email_domains = [ "*" ]
|
||||
upstreams = [ "file:///dev/null" ]
|
||||
provider = "gitlab"
|
||||
set_xauthrequest=true
|
||||
pass_host_header=true
|
||||
pass_user_headers=true
|
||||
request_logging=true
|
||||
cookie_secure=true
|
||||
|
||||
alphaConfig:
|
||||
enabled: false
|
||||
annotations: {}
|
||||
serverConfigData: {}
|
||||
metricsConfigData: {}
|
||||
configData: {}
|
||||
existingConfig: ~
|
||||
|
||||
image:
|
||||
repository: "quay.io/oauth2-proxy/oauth2-proxy"
|
||||
tag: "v7.2.1"
|
||||
pullPolicy: "Always"
|
||||
|
||||
extraArgs:
|
||||
upstream: "file:///dev/null"
|
||||
email-domain: "*"
|
||||
redirect-url: "https://oauth.durp.info/oauth2/callback"
|
||||
whitelist-domain: ".durp.info"
|
||||
cookie-domain: ".durp.info"
|
||||
|
||||
extraEnv: []
|
||||
|
||||
customLabels: {}
|
||||
|
||||
authenticatedEmailsFile:
|
||||
enabled: false
|
||||
persistence: configmap
|
||||
template: ""
|
||||
restrictedUserAccessKey: ""
|
||||
restricted_access: ""
|
||||
annotations: {}
|
||||
|
||||
service:
|
||||
type: ClusterIP
|
||||
portNumber: 80
|
||||
annotations: {}
|
||||
|
||||
serviceAccount:
|
||||
enabled: true
|
||||
name:
|
||||
annotations: {}
|
||||
|
||||
ingress:
|
||||
enabled: true
|
||||
path: /
|
||||
pathType: Prefix
|
||||
hosts:
|
||||
- oauth.durp.info
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: nginx
|
||||
kubernetes.io/tls-acme: "true"
|
||||
cert-manager.io/cluster-issuer: letsencrypt-production
|
||||
tls:
|
||||
- secretName: oauth-tls
|
||||
hosts:
|
||||
- oauth.durp.info
|
||||
|
||||
resources:
|
||||
limits:
|
||||
cpu: 100m
|
||||
memory: 300Mi
|
||||
requests:
|
||||
cpu: 100m
|
||||
memory: 300Mi
|
||||
|
||||
extraVolumes: []
|
||||
|
||||
extraVolumeMounts: []
|
||||
|
||||
priorityClassName: ""
|
||||
|
||||
hostAlias:
|
||||
enabled: failureThreshold
|
||||
|
||||
tolerations: []
|
||||
|
||||
nodeSelector: {}
|
||||
|
||||
proxyVarsAsSecrets: true
|
||||
|
||||
livenessProbe:
|
||||
enabled: true
|
||||
initialDelaySeconds: 0
|
||||
timeoutSeconds: 1
|
||||
|
||||
readinessProbe:
|
||||
enabled: true
|
||||
initialDelaySeconds: 0
|
||||
timeoutSeconds: 1
|
||||
periodSeconds: 10
|
||||
successThreshold: 1
|
||||
|
||||
securityContext:
|
||||
enabled: false
|
||||
runAsNonRoot: true
|
||||
|
||||
deploymentAnnotations: {}
|
||||
podAnnotations: {}
|
||||
podLabels: {}
|
||||
replicaCount: 1
|
||||
|
||||
podDisruptionBudget:
|
||||
enabled: true
|
||||
minAvailable: 1
|
||||
|
||||
podSecurityContext: {}
|
||||
|
||||
httpScheme: http
|
||||
|
||||
htpasswdFile:
|
||||
enabled: false
|
||||
existingSecret: ""
|
||||
entries: {}
|
||||
|
||||
sessionStorage:
|
||||
type: cookie
|
||||
redis:
|
||||
existingSecret: ""
|
||||
password: ""
|
||||
clientType: "standalone"
|
||||
standalone:
|
||||
connectionUrl: ""
|
||||
cluster:
|
||||
connectionUrls: []
|
||||
sentinel:
|
||||
password: ""
|
||||
masterName: ""
|
||||
connectionUrls: []
|
||||
|
||||
redis:
|
||||
enabled: false
|
||||
checkDeprecation: true
|
||||
|
||||
metrics:
|
||||
enabled: true
|
||||
port: 44180
|
||||
servicemonitor:
|
||||
enabled: false
|
||||
namespace: ""
|
||||
prometheusInstance: default
|
||||
interval: 60s
|
||||
scrapeTimeout: 30s
|
||||
labels: {}
|
||||
|
||||
extraObjects: []
|
||||
@@ -141,4 +141,4 @@
|
||||
# labels: {}
|
||||
# namespace: ""
|
||||
#
|
||||
#
|
||||
#
|
||||
|
||||
Reference in New Issue
Block a user