No introduction found. Create it?
Install with:
helm repo add oauth2-proxy https://oauth2-proxy.github.io/manifests/
helm install oauth2-proxy oauth2-proxy/oauth2-proxy -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
oauth2-proxy | Diaoul/home-ops | 57 | 7.5.4 | 7 days ago |
oauth2-proxy | xunholy/k8s-gitops | 449 | 7.5.4 | 8 days ago |
oauth2-proxy | blackjid/k8s-gitops | 79 | 6.23.1 | 5 months ago |
See the most popular values for this chart:
Key | Types |
---|---|
image.repository (7) quay.io/oauth2-proxy/oauth2-proxy | string |
image.tag (5) v7.6.0 | string |
boolean | |
ingress.hosts[] (7) - auth.${DOMAIN} | string |
ingress.path (7) /oauth2 | string |
ingress.tls[].hosts[] (6) - auth.${DOMAIN} | string |
ingress.tls[].secretName (3) auth-tls | string |
string | |
ingress.pathType (4) Prefix | string |
string | |
ingress.annotations."external-dns.alpha.kubernetes.io/target" (3) ipv4.${SECRET_DOMAIN} | string |
ingress.annotations."cert-manager.io/cluster-issuer" (2) letsencrypt-production | string |
string | |
string | |
string | |
string | |
config.configFile (5) provider = "github"
auth_logging = true
cookie_domains = ".${clusterDomain}"
cookie_httponly = true
cookie_name = "_taonet_oauth"
cookie_refresh = "1h"
cookie_samesite = "lax"
cookie_secure = true
email_domains = [ "*" ]
pass_access_token = true
pass_authorization_header = true
pass_basic_auth = false
request_logging = true
session_store_type = "cookie"
silence_ping_logging = true
set_authorization_header = true
set_xauthrequest = true
skip_jwt_bearer_tokens = true
skip_provider_button = true
ssl_insecure_skip_verify = false
standard_logging = true
upstreams = [ "static://202" ]
whitelist_domains = ".${clusterDomain}"
github_org = "taonet-cloud"
reverse_proxy = true
redirect_url = "https://auth.${clusterDomain}/oauth2/callback" | string |
config.clientID (3) ${OAUTH2_PROXY_CLIENT_ID} | string |
config.clientSecret (3) ${OAUTH2_PROXY_CLIENT_SECRET} | string |
config.existingSecret (3) oauth2-proxy-secret | string |
config.cookieSecret (2) ${OAUTH2_PROXY_COOKIE_SECRET} | string |
boolean | |
authenticatedEmailsFile.restricted_access (4) ${EMAIL_ADDRESS_1}
${EMAIL_ADDRESS_2} | string |
extraArgs.cookie-domain (4) .${DOMAIN} | string |
string | |
extraArgs.whitelist-domain (4) .${DOMAIN} | string |
string | |
extraArgs.oidc-issuer-url (2) https://rickcoxdev.us.auth0.com/ | string |
extraArgs.provider-display-name (2) an authenticated email | string |
extraArgs.client-id (1) ${OAUTH_PROXY_CLIENT_ID:='kubernetes-oauth-proxy'} | string |
extraArgs.client-secret (1) ${OAUTH_PROXY_CLIENT_SECRET} | string |
string | |
extraArgs.login-url (1) ${OAUTH_PROXY_SERVER}/realms/${OAUTH_PROXY_SERVER_REALM:=master}/protocol/openid-connect/auth | string |
string | |
extraArgs.redeem-url (1) ${OAUTH_PROXY_SERVER}/realms/${OAUTH_PROXY_SERVER_REALM:=master}/protocol/openid-connect/token | string |
boolean | |
string | |
extraArgs.validate-url (1) ${OAUTH_PROXY_SERVER}/realms/${OAUTH_PROXY_SERVER_REALM:=master}/protocol/openid-connect/userinfo | string |
number | |
boolean | |
boolean | |
boolean |