Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Approving OIDC auth security capabilities #133

Merged
merged 7 commits into from
Oct 14, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions charts/oidc-forward-auth/Changelog.MD
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
### Chart version: 1.6.2
- Security settings for pod
- AppVersion update to 2.14.3
- No migrations necessary
6 changes: 3 additions & 3 deletions charts/oidc-forward-auth/Chart.lock
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
dependencies:
- name: gatekeeper
repository: https://gogatekeeper.github.io/helm-gogatekeeper
version: 0.1.49
digest: sha256:e05104bb333efa97b7508b152475f687a36b850f71b1b13785bee787c65771ad
generated: "2024-07-30T14:33:45.657958+02:00"
version: 0.1.50
digest: sha256:dd77b07d0cbcb477d733bf01bb8e20831679c8da99e4bbce7ed5182e42008ef8
generated: "2024-10-14T17:12:52.753392+02:00"
6 changes: 3 additions & 3 deletions charts/oidc-forward-auth/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ description: |
charts:
oidc-forward-auth:
namespace: routing
targetRevision: "1.0.0"
targetRevision: "1.6.2"
parameters:
gatekeeper.config.client-id: "${vault:whatever/data/keycloak/keycloak_proxy_admin#client_id}"
gatekeeper.config.client-secret: "${vault:whatever/data/keycloak/keycloak_proxy_admin#client_secret}"
Expand All @@ -34,9 +34,9 @@ description: |
enabled: true
```
name: oidc-forward-auth
version: 1.6.1
version: 1.6.2
dependencies:
- name: gatekeeper
repository: https://gogatekeeper.github.io/helm-gogatekeeper
version: 0.1.49
version: 0.1.50

10 changes: 6 additions & 4 deletions charts/oidc-forward-auth/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# oidc-forward-auth

![Version: 1.6.1](https://img.shields.io/badge/Version-1.6.1-informational?style=flat-square)
![Version: 1.6.2](https://img.shields.io/badge/Version-1.6.2-informational?style=flat-square)

Forward Auth proxy with gogatekeeper. It replaces the old proxy mechanism

Expand All @@ -10,7 +10,7 @@ Forward Auth proxy with gogatekeeper. It replaces the old proxy mechanism
charts:
oidc-forward-auth:
namespace: routing
targetRevision: "1.0.0"
targetRevision: "1.6.2"
parameters:
gatekeeper.config.client-id: "${vault:whatever/data/keycloak/keycloak_proxy_admin#client_id}"
gatekeeper.config.client-secret: "${vault:whatever/data/keycloak/keycloak_proxy_admin#client_secret}"
Expand Down Expand Up @@ -39,7 +39,7 @@ ingress:

| Repository | Name | Version |
|------------|------|---------|
| https://gogatekeeper.github.io/helm-gogatekeeper | gatekeeper | 0.1.49 |
| https://gogatekeeper.github.io/helm-gogatekeeper | gatekeeper | 0.1.50 |

## Values

Expand Down Expand Up @@ -68,7 +68,9 @@ ingress:
| gatekeeper.config.resources[0].uri | string | `"/*"` | |
| gatekeeper.config.server-read-timeout | string | `"10s"` | |
| gatekeeper.config.server-write-timeout | string | `"10s"` | |
| gatekeeper.image.tag | string | `"2.14.0"` | |
| gatekeeper.containerSecurityContext.allowPrivilegeEscalation | bool | `false` | |
| gatekeeper.containerSecurityContext.seccompProfile.type | string | `"RuntimeDefault"` | |
| gatekeeper.image.tag | string | `"2.14.3"` | |
| gatekeeper.livenessProbe.enabled | bool | `true` | |
| gatekeeper.replicaCount | int | `2` | |
| gatekeeper.resources.limits.cpu | string | `"100m"` | |
Expand Down
7 changes: 6 additions & 1 deletion charts/oidc-forward-auth/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,12 @@ gatekeeper:
enabled: true

image:
tag: 2.14.0
tag: 2.14.3

containerSecurityContext:
allowPrivilegeEscalation: false
seccompProfile:
type: RuntimeDefault

config:

Expand Down