Jan Larwig
Jan Larwig
Was implemented in #2755
This can be done with a combination of `.deploymentAnnotations` or `.podAnnotations` and modifying the `image.command`: values.yaml: ``` deploymentAnnotations: vault.hashicorp.com/agent-inject-secret-oauth2-proxy-wrapper.sh: "secret/[DC]/oidc-client-secret" vault.hashicorp.com/agent-inject-template-oauth2-proxy-wrapper.sh: | #!/bin/sh # Source environment variables {{- with secret...
Hi @dabde, can you please add it to the v7.6 docs as well. That would be great.
@TuningYourCode as @ianroberts mentioned you need to make the same changes in `docs/versioned_docs/version-7.6.x`. The docs are versioned the latest doc for version `7.6.x` is stored in the directory above. The...
Hi @DimitryVo, unfortunately this is not well documented but groups and roles need to be written in plural form: `OAUTH2_PROXY_ALLOWED_GROUPS` and `OAUTH2_PROXY_ALLOWED_ROLES` Have a look at: https://oauth2-proxy.github.io/oauth2-proxy/configuration/overview#environment-variables
Hi @xrstf, sorry for the inconvenience. The project has been moving slowely for a while now. Always check the official docs as well :) It's mentioned in there: https://oauth2-proxy.github.io/oauth2-proxy/configuration/providers/github
I don't really understand why you want a separate file for the cookie secret? What's the issue with having it in the config file? And security best practices actually recommend...
You don't have to bombard me with an LLM response 😅 I do understand your use case I just find it peculiar that files are preferred to environment variables. I...
@sandy2008 please allow me to push to your PR / repo
@sandy2008 I added a changelog entry and documentation for the flag and did some minor refactoring to get rid of the unnecessary private getSecretFromFile method. Overall looks good now!