We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vault.hashicorp.com/agent-inject-secret-oauth2-secrets.sh: "secret/[DC]/oidc-client-secret" vault.hashicorp.com/agent-inject-template-oauth2-secrets.sh: | {{- with secret "secret/[DC]/oidc-client-secret" -}} OAUTH2_PROXY_CLIENT_ID='name-oauth-client' OAUTH2_PROXY_CLIENT_SECRET={{ .Data.oidc_client_secret }} OAUTH2_PROXY_COOKIE_SECRET=dd if=/dev/urandom bs=32 count=1 2>/dev/null | base64 | tr -d -- '\n' | tr -- '+/' '-_' ; echo {{- end -}}
How can we set the above in deployment.yaml ?
@pierluigilenoci - Would appreciate any help on this.
The text was updated successfully, but these errors were encountered:
@himanshujaindev, could you help me understand exactly what you want to achieve?
I suggest having your sidecar inject a secret into the OAuth2 Proxy namespace. Then use this: https://github.com/oauth2-proxy/manifests/blob/main/helm/oauth2-proxy/values.yaml#L246.
Does this answer your question?
Sorry, something went wrong.
@himanshujaindev, can this #230 solve your problem?
No branches or pull requests
How can we set the above in deployment.yaml ?
@pierluigilenoci - Would appreciate any help on this.
The text was updated successfully, but these errors were encountered: