No introduction found. Create it?
Install with:
helm repo add oauth2-proxy https://oauth2-proxy.github.io/manifests/
helm install oauth2-proxy oauth2-proxy/oauth2-proxy -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
oauth2-proxy | blackjid/k8s-gitops | 61 | 6.17.0 | 10 hours ago |
oauth2-proxy | Diaoul/home-ops | 54 | 6.17.0 | 13 days ago |
oauth2-proxy | xUnholy/k8s-gitops | 381 | 6.17.0 | 18 days ago |
See the most popular values for this chart:
Key | Types |
---|---|
image.repository (7) quay.io/oauth2-proxy/oauth2-proxy | string |
image.tag (6) v7.5.0 | string |
boolean | |
ingress.hosts[] (7) - auth.${SECRET_DOMAIN} | string |
ingress.path (7) /oauth2 | string |
ingress.tls[].hosts[] (7) - auth.${SECRET_DOMAIN} | string |
ingress.tls[].secretName (4) auth-tls | string |
string | |
ingress.annotations."external-dns.alpha.kubernetes.io/target" (4) ipv4.${SECRET_DOMAIN} | string |
ingress.annotations."cert-manager.io/cluster-issuer" (3) letsencrypt-production | string |
string | |
string | |
string | |
string | |
ingress.pathType (3) Prefix | string |
boolean | |
authenticatedEmailsFile.restricted_access (5) ${EMAIL_ADDRESS_1}
${EMAIL_ADDRESS_2} | string |
extraArgs.cookie-domain (5) .${SECRET_DOMAIN} | string |
string | |
extraArgs.whitelist-domain (5) .${SECRET_DOMAIN} | string |
string | |
extraArgs.oidc-issuer-url (2) https://rickcoxdev.us.auth0.com/ | string |
extraArgs.provider-display-name (2) an authenticated email | string |
extraArgs.client-id (1) ${OAUTH_PROXY_CLIENT_ID:='kubernetes-oauth-proxy'} | string |
extraArgs.client-secret (1) ${OAUTH_PROXY_CLIENT_SECRET} | string |
string | |
extraArgs.login-url (1) ${OAUTH_PROXY_SERVER}/realms/${OAUTH_PROXY_SERVER_REALM:=master}/protocol/openid-connect/auth | string |
string | |
extraArgs.redeem-url (1) ${OAUTH_PROXY_SERVER}/realms/${OAUTH_PROXY_SERVER_REALM:=master}/protocol/openid-connect/token | string |
boolean | |
string | |
extraArgs.validate-url (1) ${OAUTH_PROXY_SERVER}/realms/${OAUTH_PROXY_SERVER_REALM:=master}/protocol/openid-connect/userinfo | string |
config.clientID (4) ${OAUTH2_PROXY_CLIENT_ID} | string |
config.clientSecret (4) ${OAUTH2_PROXY_CLIENT_SECRET} | string |
config.configFile (4) provider = "oidc"
oidc_issuer_url = "https://dex.${DOMAIN}"
auth_logging = true
cookie_domains = ".${DOMAIN}"
cookie_secure = true
email_domains = []
pass_access_token = true
pass_authorization_header = true
whitelist_domains = ".${DOMAIN}" | string |
config.cookieSecret (3) ${OAUTH2_PROXY_COOKIE_SECRET} | string |
config.existingSecret (2) oauth2-proxy-client-secrets | string |
number | |
string | |
string | |
string | |
boolean | |
boolean | |
boolean |