Compare commits

..

7 Commits

Author SHA1 Message Date
Gitea Actions Bot 41d32f97ff Auto-update README with current k8s applications
Terraform / Terraform (pull_request) Failing after 4s
Generated by CI/CD workflow on 2026-05-04 17:26:17

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2026-05-04 17:26:17 +00:00
Ultradesu d3ee23c3de Added oauth2 proxy
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 15s
Check with kubeconform / lint (push) Successful in 16s
Auto-update README / Generate README and Create MR (push) Successful in 13s
2026-05-04 18:25:42 +01:00
Ultradesu 0df274c0b2 Added oauth2 proxy
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 14s
Check with kubeconform / lint (push) Successful in 14s
Auto-update README / Generate README and Create MR (push) Successful in 12s
2026-05-04 18:24:04 +01:00
Ultradesu 658ec19ff1 Added oauth2 proxy
Check with kubeconform / lint (push) Successful in 14s
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 19s
Auto-update README / Generate README and Create MR (push) Successful in 19s
2026-05-04 18:21:44 +01:00
Ultradesu eb27dcf65b Added oauth2 proxy
Check with kubeconform / lint (push) Successful in 15s
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 24s
Auto-update README / Generate README and Create MR (push) Successful in 35s
2026-05-04 18:19:41 +01:00
Ultradesu e44cf95bb2 Added oauth2 proxy
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 13s
Check with kubeconform / lint (push) Successful in 21s
Auto-update README / Generate README and Create MR (push) Successful in 32s
2026-05-04 18:15:48 +01:00
Ultradesu df6ab28165 Added oauth2 proxy
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 15s
Check with kubeconform / lint (push) Successful in 16s
Auto-update README / Generate README and Create MR (push) Successful in 11s
2026-05-04 18:12:52 +01:00
5 changed files with 23 additions and 40 deletions
+13 -1
View File
@@ -1,5 +1,18 @@
---
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: keycloak-auth
spec:
forwardAuth:
address: http://oauth2-proxy.oauth2-proxy.svc:80
trustForwardHeader: true
authResponseHeaders:
- X-Auth-Request-User
- X-Auth-Request-Email
- X-Auth-Request-Groups
---
apiVersion: traefik.io/v1alpha1
kind: IngressRoute
metadata:
name: secret-reader
@@ -13,7 +26,6 @@ spec:
kind: Rule
middlewares:
- name: keycloak-auth
namespace: oauth2-proxy
services:
- name: secret-reader
port: 80
+5 -5
View File
@@ -10,10 +10,10 @@ spec:
template:
type: Opaque
data:
client_id: oauth2-proxy
client_secret: |-
client-id: oauth2-proxy
client-secret: |-
{{ .client_secret }}
cookie_secret: |-
cookie-secret: |-
{{ .cookie_secret }}
data:
- secretKey: client_secret
@@ -25,7 +25,7 @@ spec:
conversionStrategy: Default
decodingStrategy: None
metadataPolicy: None
key: PLACEHOLDER_VAULTWARDEN_ITEM_ID
key: e62e8c4d-d538-43b2-a682-9cdf2a5a1165
property: login.password
- secretKey: cookie_secret
sourceRef:
@@ -36,5 +36,5 @@ spec:
conversionStrategy: Default
decodingStrategy: None
metadataPolicy: None
key: PLACEHOLDER_VAULTWARDEN_ITEM_ID
key: e62e8c4d-d538-43b2-a682-9cdf2a5a1165
property: fields[0].value
+1 -2
View File
@@ -4,12 +4,11 @@ kind: Kustomization
resources:
- app.yaml
- external-secrets.yaml
- middleware.yaml
helmCharts:
- name: oauth2-proxy
repo: https://oauth2-proxy.github.io/manifests
version: 7.12.6
version: 10.4.3
releaseName: oauth2-proxy
namespace: oauth2-proxy
valuesFile: values.yaml
+3 -15
View File
@@ -1,15 +1,3 @@
---
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: keycloak-auth
namespace: oauth2-proxy
spec:
forwardAuth:
address: http://oauth2-proxy.oauth2-proxy.svc:80/oauth2/auth
trustForwardHeader: true
authResponseHeaders:
- X-Auth-Request-User
- X-Auth-Request-Email
- X-Auth-Request-Groups
- Authorization
# Middleware is deployed per-namespace alongside each IngressRoute
# because Traefik does not allow cross-namespace middleware references.
# See k8s/apps/mtproxy/secret-reader-ingress.yaml for example.
+1 -17
View File
@@ -1,6 +1,7 @@
replicaCount: 1
config:
existingSecret: oauth2-proxy-creds
configFile: |-
provider = "keycloak-oidc"
provider_display_name = "Keycloak"
@@ -21,23 +22,6 @@ config:
code_challenge_method = "S256"
scope = "openid profile email"
extraEnv:
- name: OAUTH2_PROXY_CLIENT_ID
valueFrom:
secretKeyRef:
name: oauth2-proxy-creds
key: client_id
- name: OAUTH2_PROXY_CLIENT_SECRET
valueFrom:
secretKeyRef:
name: oauth2-proxy-creds
key: client_secret
- name: OAUTH2_PROXY_COOKIE_SECRET
valueFrom:
secretKeyRef:
name: oauth2-proxy-creds
key: cookie_secret
ingress:
enabled: true
className: traefik