No introduction found. Create it?
Install with:
helm repo add oauth2-proxy https://oauth2-proxy.github.io/manifests/
helm install oauth2-proxy oauth2-proxy/oauth2-proxy -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
oauth2-proxy | xunholy/k8s-gitops | 467 | 7.5.4 | 3 months ago |
See the most popular values for this chart:
Key | Types |
---|---|
image.repository (4) quay.io/oauth2-proxy/oauth2-proxy | string |
image.tag (3) v7.6.0 | string |
boolean | |
ingress.hosts[] (4) - auth.${SECRET_DOMAIN} | string |
ingress.path (4) /oauth2 | string |
ingress.tls[].hosts[] (4) - auth.${SECRET_DOMAIN} | string |
ingress.tls[].secretName (2) auth-tls | string |
string | |
ingress.annotations."external-dns.alpha.kubernetes.io/target" (3) ipv4.${SECRET_DOMAIN} | string |
ingress.annotations."cert-manager.io/cluster-issuer" (2) letsencrypt-production | string |
string | |
ingress.pathType (2) Prefix | string |
boolean | |
authenticatedEmailsFile.restricted_access (3) "${MY_EMAIL}" | string |
config.configFile (3) email_domains = []
upstreams = [ "file:///dev/null" ] | string |
config.clientID (2) ${OAUTH2_PROXY_CLIENT_ID} | string |
config.clientSecret (2) ${OAUTH2_PROXY_CLIENT_SECRET} | string |
config.existingSecret (2) oauth2-proxy-client-secrets | string |
config.cookieSecret (1) ${OAUTH2_PROXY_COOKIE_SECRET} | string |
extraArgs.cookie-domain (3) .${DOMAIN} | string |
string | |
extraArgs.whitelist-domain (3) .${DOMAIN} | string |
string | |
extraArgs.provider-display-name (2) an authenticated email | string |
extraArgs.client-id (1) ${OAUTH_PROXY_CLIENT_ID:='kubernetes-oauth-proxy'} | string |
extraArgs.client-secret (1) ${OAUTH_PROXY_CLIENT_SECRET} | string |
string | |
extraArgs.login-url (1) ${OAUTH_PROXY_SERVER}/realms/${OAUTH_PROXY_SERVER_REALM:=master}/protocol/openid-connect/auth | string |
extraArgs.oidc-issuer-url (1) https://rickcoxdev.us.auth0.com/ | string |
string | |
extraArgs.redeem-url (1) ${OAUTH_PROXY_SERVER}/realms/${OAUTH_PROXY_SERVER_REALM:=master}/protocol/openid-connect/token | string |
boolean | |
string | |
extraArgs.validate-url (1) ${OAUTH_PROXY_SERVER}/realms/${OAUTH_PROXY_SERVER_REALM:=master}/protocol/openid-connect/userinfo | string |
number | |
boolean | |
boolean | |
boolean |