manifests
manifests copied to clipboard
For hosting manifests to allow for the deployment of OAuth2-Proxy/OAuth2-Proxy
This change add option to configure traffic policy for the service. It is backward compatible and will not change the default behavior.
Replaces #141
This pull request includes a minor change to the `helm/oauth2-proxy/templates/deployment.yaml` file. The change modifies the indentation level of the `deploymentAnnotations` from 8 spaces to 4 spaces in the `annotations` section...
In template expecting string https://github.com/oauth2-proxy/manifests/blob/oauth2-proxy-6.2.0/helm/oauth2-proxy/templates/deployment.yaml#L142 but in docs (https://github.com/oauth2-proxy/manifests/tree/main/helm/oauth2-proxy) descibed as a list
Hi, In deployment.yaml, there are many if conditions such as `{{- if or .Values.config.existingConfig .Values.config.configFile }}`. However, in the annotations, the template always tries to establish a checksum for .Values.config.configFile....
In AKS, Pod fails to start with the error mention in the tittle: ```shell [main.go:41] ERROR: failed to load alpha options: unable to load config file: read /etc/oauth2_proxy/oauth2_proxy.yml: is a...
After spending some time to figure that out, I wanted to ask if this is intended or a bug. When using `Redis` with `clientType.standalone` configure redis via values like suggested...
Hi, It would be useful to support templating of the `extraVolumes` list to allow us to have secrets named with a `{{ .Release.Name }}` prefix in blue-green deployments. Let me...
### OAuth2-Proxy Version 7.6 ### Provider keycloak-oidc ### Expected Behaviour Same behavior as using default `oauth2` proxy-prefix. ### Current Behaviour Attempting to login to an ingress using `oauth2proxy` as a...
``` vault.hashicorp.com/agent-inject-secret-oauth2-secrets.sh: "secret/[DC]/oidc-client-secret" vault.hashicorp.com/agent-inject-template-oauth2-secrets.sh: | {{- with secret "secret/[DC]/oidc-client-secret" -}} OAUTH2_PROXY_CLIENT_ID='name-oauth-client' OAUTH2_PROXY_CLIENT_SECRET={{ .Data.oidc_client_secret }} OAUTH2_PROXY_COOKIE_SECRET=dd if=/dev/urandom bs=32 count=1 2>/dev/null | base64 | tr -d -- '\n' | tr -- '+/'...