forked from TremoloSecurity/kube-oidc-proxy
-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deployment Guide: kube-oidc-proxy #13
Comments
apiVersion: helm.toolkit.fluxcd.io/v2
kind: HelmRelease
metadata:
name: kube-oidc-proxy
namespace: kube-oidc-proxy
spec:
chart:
spec:
chart: polymorphic-app
reconcileStrategy: ChartVersion
version: 2.2.1
sourceRef:
kind: HelmRepository
name: improwised
namespace: flux-system
interval: 10m0s
values:
prefixWithReleaseName:
enabled: false
services:
- name: kube-oidc-proxy
image:
repository: <imageRepo>/kube-oidc-proxy # {"$imagepolicy": "kube-oidc-proxy"}
tag: latest # {"$imagepolicy": "kube-oidc-proxy:latest"}
imagePullSecrets:
- name: <name>
healthcheck:
enabled: true
type: httpGet
path: /ready
port: health
ports:
- name: http
containerPort: 6443
- name: health
containerPort: 8080
service:
enabled: true
ports:
- name: http
port: 6443
targetPort: http
command: ["/bin/sh", "-c"]
args: ["./proxy",
"--clusters-config=<file path>",
"--oidc-issuer-url=<issuer url>",
"--oidc-client-id=<client id>",
"--oidc-ca-file=<file path>",
# if tls-cert-file and tls-private-key-file are not provided, it will generate self-signed certificate
"--tls-cert-file=<file path>",
"--tls-private-key-file=<file path>",
"--oidc-signing-algs=RS256",
"--oidc-groups-claim=groups",
"--oidc-username-claim=email",
# ops-dashboard host part
"--audit-webhook-server=<webhook server>",]
ingress:
enabled: true
className: nginx
hosts:
- host: kube-oidc-proxy.com
paths:
- path: /
pathType: Prefix
servicePort: http
|
This was referenced Jan 7, 2025
How to generate oidc client ID and secret.
Screencast.From.2025-01-08.10-06-51.mp4 |
How to create a client scopes and mapperScreencast.From.2025-01-10.12-34-57.mp4 |
How to create and assign roleScreencast.From.2025-01-20.10-59-43.mp4 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Follow the steps below to build and deploy the
kube-oidc-proxy
.Step 1: Build the Binary
Run the following command to build the binary for this repository:
This command generates a binary file named
proxy
.Step 2: Run the Proxy
Execute the binary with the appropriate flags as shown below:
Description of Flags
--clusters-config
: Points to a configuration file listing cluster names and their corresponding kubeconfig paths.--oidc-issuer-url
: URL of the OIDC provider. For Keycloak, use the formathttps://<server-url>/realms/<realm-name>
.--oidc-client-id
: OIDC client ID used for authentication.--oidc-ca-file
: File path for the certificate authority (CA) file. If omitted, the system's root CA will be used.--oidc-signing-algs
: Specify allowed JOSE signing algorithms. The default isRS256
.--tls-cert-file
: Path to the TLS certificate file. If omitted, a self-signed certificate is generated and saved.--tls-private-key-file
: Path to the TLS private key file. If omitted, a self-signed key is generated and saved.--oidc-groups-claim
: The token claim that maps to user groups. Default isgroups
.--role-config
: File path to the role configuration mapper containing roles, roleBindings, clusterRoles, clusterRoleBindings, and the associated cluster name.By following these steps, you should have the
kube-oidc-proxy
built and running successfully.The text was updated successfully, but these errors were encountered: