manifests icon indicating copy to clipboard operation
manifests copied to clipboard

For hosting manifests to allow for the deployment of OAuth2-Proxy/OAuth2-Proxy

Results 10 manifests issues
Sort by recently updated
recently updated
newest added

This change add option to configure traffic policy for the service. It is backward compatible and will not change the default behavior.

This pull request includes a minor change to the `helm/oauth2-proxy/templates/deployment.yaml` file. The change modifies the indentation level of the `deploymentAnnotations` from 8 spaces to 4 spaces in the `annotations` section...

In template expecting string https://github.com/oauth2-proxy/manifests/blob/oauth2-proxy-6.2.0/helm/oauth2-proxy/templates/deployment.yaml#L142 but in docs (https://github.com/oauth2-proxy/manifests/tree/main/helm/oauth2-proxy) descibed as a list

Hi, In deployment.yaml, there are many if conditions such as `{{- if or .Values.config.existingConfig .Values.config.configFile }}`. However, in the annotations, the template always tries to establish a checksum for .Values.config.configFile....

In AKS, Pod fails to start with the error mention in the tittle: ```shell [main.go:41] ERROR: failed to load alpha options: unable to load config file: read /etc/oauth2_proxy/oauth2_proxy.yml: is a...

After spending some time to figure that out, I wanted to ask if this is intended or a bug. When using `Redis` with `clientType.standalone` configure redis via values like suggested...

Hi, It would be useful to support templating of the `extraVolumes` list to allow us to have secrets named with a `{{ .Release.Name }}` prefix in blue-green deployments. Let me...

### OAuth2-Proxy Version 7.6 ### Provider keycloak-oidc ### Expected Behaviour Same behavior as using default `oauth2` proxy-prefix. ### Current Behaviour Attempting to login to an ingress using `oauth2proxy` as a...

bug
help wanted

``` vault.hashicorp.com/agent-inject-secret-oauth2-secrets.sh: "secret/[DC]/oidc-client-secret" vault.hashicorp.com/agent-inject-template-oauth2-secrets.sh: | {{- with secret "secret/[DC]/oidc-client-secret" -}} OAUTH2_PROXY_CLIENT_ID='name-oauth-client' OAUTH2_PROXY_CLIENT_SECRET={{ .Data.oidc_client_secret }} OAUTH2_PROXY_COOKIE_SECRET=dd if=/dev/urandom bs=32 count=1 2>/dev/null | base64 | tr -d -- '\n' | tr -- '+/'...