Kpt v1.0 package for ASM User Auth.
issuer-uri
: OAuth2 IDP URI.client-id
: ClientID configured in OAuth2 IDP, must be base64 encoded.client-secret
: ClientSecret configured in OAuth2 IDP, must be base64 encoded.image
: The UserAuth image. Default:gcr.io/gke-release/ais_preview:1.2.0
.secret-name
: The K8s secret UserAuth reads from. Default:"oauth-secret"
.secret-namespace
: The namespace of the secret above. Default:"asm-user-auth"
.redirect-host
: Redirect URI hostname for OAuth2 OIDC. Default:""
.redirect-path
: Redirect URI path for OAuth2 OIDC. Default:"/_gcp_asm_authenticate"
.jwt-audience
: Output JWT Audience field name from UserAuth. Default:"test_audience"
.ca-cert
: This is a Base64 encoded, PEM formatted certificate authority certificate. If it is""
, User Auth will use the system default root CA certs. Default:""
.scopes
: Comma-separated list of identifiers used to specify what access privileges are being requested in addition to "openid" scope, e.g. "groups,allatclaim". Default:""
.groupsClaim
: Name of the claim in the OIDC ID Token that holds the user's group information. If it is""
, no groups will be considered. Default:""
.hosts
: Array of hosts that are allowed by UserAuth. Default:- '*'
, which will allow any host. This setter can only be set by kpt functionConfig file.proxy
: Optional HTTP proxy to IDP with formathttp://user:[email protected]:8888
. Default:""
.attributeMapping
: Contains one or more claim mappings fromidtoken
followed CEL expressions. All claims should be referenced byassertion.X
,assertion
is referenced to the original IDToken, for exampleaud_copy: assertion.aud
.
-
Set the value using setters, there are two ways to set values:
-
(Recommended) Create and maintain kpt functionConfig file in source control, user can setup different setters files and use them as needed. Example can be found as reference.
Apply the functionConfig file:
kpt fn eval pkg --image gcr.io/kpt-fn/apply-setters:v0.2 --fn-config ./samples/kpt-setters.yaml
-
Use
kpt fn eval pkg --image gcr.io/kpt-fn/apply-setters:v0.2 --
followed bysetter=value
to set the custom values.Example:
kpt fn eval pkg --image gcr.io/kpt-fn/apply-setters:v0.2 -- \ client-id="ZmFrZS5hcHBzLmdvb2dsZXVzZXJjb250ZW50LmNvbQ==" \ client-secret="ZmFrZXNlY3JldA==" \ issuer-uri="https://issuer.sample.com"
IMPORTANT Setters with no default values must be set before apply, e.g.
issuer-uri
,client-id
,client-secret
. -
-
Apply CRD then the rest of the pkg.
# Remove the potential alpha version CRD if exists. kubectl delete crd userauthconfigs.security.anthos.io kubectl apply -f ./pkg/asm_user_auth_config_v1beta1.yaml kubectl apply -f ./pkg