fix(authentik-application): Improve documentation
This commit is contained in:
parent
5a18c7e1cf
commit
bdfb096a3a
16 changed files with 169 additions and 69 deletions
|
@ -66,6 +66,3 @@ Service for managing and receiving Alertmanager alerts on Matrix
|
|||
| serviceAccount.create | bool | `true` | |
|
||||
| serviceAccount.name | string | `""` | |
|
||||
| tolerations | list | `[]` | |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.11.2](https://github.com/norwoodj/helm-docs/releases/v1.11.2)
|
||||
|
|
|
@ -57,6 +57,3 @@ Receiver for alertmanager to forward to ntfy.sh
|
|||
| serviceAccount.create | bool | `true` | |
|
||||
| serviceAccount.name | string | `""` | |
|
||||
| tolerations | list | `[]` | |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.11.2](https://github.com/norwoodj/helm-docs/releases/v1.11.2)
|
||||
|
|
|
@ -1,6 +1,67 @@
|
|||
apiVersion: v2
|
||||
name: authentik-application
|
||||
description: A Chart to deploy a secret for the authentik blueprint-sidecar
|
||||
type: application
|
||||
|
||||
version: 0.3.4
|
||||
description: |-
|
||||
A Chart to deploy a secret for the authentik blueprint-sidecar.
|
||||
|
||||
for usage, deploy:
|
||||
https://github.com/goauthentik/helm/pull/146
|
||||
|
||||
or use:
|
||||
```yaml
|
||||
serviceAccount:
|
||||
create: true
|
||||
|
||||
additionalContainers:
|
||||
- name: sidecar-blueprints
|
||||
image: "ghcr.io/kiwigrid/k8s-sidecar:1.25.1"
|
||||
env:
|
||||
- name: "FOLDER"
|
||||
value: "/blueprints/sidecar"
|
||||
- name: "LABEL"
|
||||
value: "goauthentik_blueprint"
|
||||
- name: "LABEL_VALUE"
|
||||
value: "1"
|
||||
# - name: "NAMESPACE"
|
||||
# value: "ALL"
|
||||
- name: "RESOURCE"
|
||||
value: "both"
|
||||
- name: "UNIQUE_FILENAMES"
|
||||
value: "true"
|
||||
volumeMounts:
|
||||
- name: sidecar-blueprints
|
||||
mountPath: /blueprints/sidecar
|
||||
|
||||
volumeMounts:
|
||||
- name: sidecar-blueprints
|
||||
mountPath: /blueprints/sidecar
|
||||
|
||||
volumes:
|
||||
- name: sidecar-blueprints
|
||||
emptyDir: {}
|
||||
```
|
||||
and create an serviceaccount to read secrets:
|
||||
```yaml
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: authentik-blueprint-sidecar
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: Role
|
||||
name: authentik-blueprint-sidecar
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: authentik
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: Role
|
||||
metadata:
|
||||
name: authentik-blueprint-sidecar
|
||||
rules:
|
||||
- apiGroups: [""]
|
||||
resources: ["configmaps", "secrets"]
|
||||
verbs: ["get", "watch", "list"]
|
||||
```
|
||||
|
|
|
@ -2,27 +2,87 @@
|
|||
|
||||
 
|
||||
|
||||
A Chart to deploy a secret for the authentik blueprint-sidecar
|
||||
A Chart to deploy a secret for the authentik blueprint-sidecar.
|
||||
|
||||
for usage, deploy:
|
||||
https://github.com/goauthentik/helm/pull/146
|
||||
|
||||
or use:
|
||||
```yaml
|
||||
serviceAccount:
|
||||
create: true
|
||||
|
||||
additionalContainers:
|
||||
- name: sidecar-blueprints
|
||||
image: "ghcr.io/kiwigrid/k8s-sidecar:1.25.1"
|
||||
env:
|
||||
- name: "FOLDER"
|
||||
value: "/blueprints/sidecar"
|
||||
- name: "LABEL"
|
||||
value: "goauthentik_blueprint"
|
||||
- name: "LABEL_VALUE"
|
||||
value: "1"
|
||||
# - name: "NAMESPACE"
|
||||
# value: "ALL"
|
||||
- name: "RESOURCE"
|
||||
value: "both"
|
||||
- name: "UNIQUE_FILENAMES"
|
||||
value: "true"
|
||||
volumeMounts:
|
||||
- name: sidecar-blueprints
|
||||
mountPath: /blueprints/sidecar
|
||||
|
||||
volumeMounts:
|
||||
- name: sidecar-blueprints
|
||||
mountPath: /blueprints/sidecar
|
||||
|
||||
volumes:
|
||||
- name: sidecar-blueprints
|
||||
emptyDir: {}
|
||||
```
|
||||
and create an serviceaccount to read secrets:
|
||||
```yaml
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: authentik-blueprint-sidecar
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: Role
|
||||
name: authentik-blueprint-sidecar
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: authentik
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: Role
|
||||
metadata:
|
||||
name: authentik-blueprint-sidecar
|
||||
rules:
|
||||
- apiGroups: [""]
|
||||
resources: ["configmaps", "secrets"]
|
||||
verbs: ["get", "watch", "list"]
|
||||
```
|
||||
|
||||
## Values
|
||||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| blueprint.application.bindPolicyID | string | `nil` | uuid for bindPolicyID for group - if not set generated on secret for be stable (or groups: [] filled) |
|
||||
| blueprint.application.description | string | `""` | |
|
||||
| blueprint.application.group | string | `""` | |
|
||||
| blueprint.application.icon | string | `""` | |
|
||||
| blueprint.application.description | string | `""` | description of application |
|
||||
| blueprint.application.group | string | `""` | put this application in authentik in group |
|
||||
| blueprint.application.icon | string | `""` | icon of application (url) |
|
||||
| blueprint.application.launchURL | string | `""` | |
|
||||
| blueprint.application.name | string | `""` | |
|
||||
| blueprint.application.openInNewTab | bool | `false` | |
|
||||
| blueprint.application.name | string | `""` | application name in menu |
|
||||
| blueprint.application.openInNewTab | bool | `false` | open application in new tab |
|
||||
| blueprint.application.policyEngineMode | string | `"any"` | |
|
||||
| blueprint.application.publisher | string | `""` | |
|
||||
| blueprint.application.slug | string | `"app-name"` | |
|
||||
| blueprint.authentik.domain | string | `"https://auth.wrenix.eu"` | |
|
||||
| blueprint.groups | string | `nil` | additional groups disable any groups by set groups: [] (to a slice) example: - slug: "app: grafana-admin" parent: "app: infra" bindID: uuid |
|
||||
| blueprint.labels.goauthentik_blueprint | string | `"1"` | |
|
||||
| blueprint.application.publisher | string | `""` | publisher of application |
|
||||
| blueprint.application.slug | string | `"app-name"` | application slug |
|
||||
| blueprint.authentik.domain | string | `"https://auth.wrenix.eu"` | domain to authentik, used in generated url (like issuer) |
|
||||
| blueprint.groups | string | `nil` | authentik groups created / give access to this application disable any groups by set groups: [] (to a slice) example: - slug: "app: grafana-admin" parent: "app: infra" bindID: uuid |
|
||||
| blueprint.labels | object | `{"goauthentik_blueprint":"1"}` | label of generated secret with blueprint |
|
||||
| blueprint.provider.authorizationFlow | string | `"default-provider-authorization-implicit-consent"` | |
|
||||
| blueprint.provider.enabled | bool | `true` | |
|
||||
| blueprint.provider.enabled | bool | `true` | creat an provider for authentification (otherwise just a like in menu is created) |
|
||||
| blueprint.provider.name | string | `""` | |
|
||||
| blueprint.provider.oidc.clientID | string | `nil` | client id - generated if secret enabled |
|
||||
| blueprint.provider.oidc.clientSecret | string | `nil` | client secret - generated if secret enabled |
|
||||
|
@ -30,11 +90,12 @@ A Chart to deploy a secret for the authentik blueprint-sidecar
|
|||
| blueprint.provider.oidc.redirectURL | string | `""` | |
|
||||
| blueprint.provider.oidc.scopes | string | `nil` | Scope |
|
||||
| blueprint.provider.oidc.signingKey | string | `""` | Need for non-curve / RSA |
|
||||
| blueprint.provider.proxy | object | `{"cookieDomain":"","externalHost":null,"ingress":{"backend":"authentik","domain":null,"enabled":false},"skipPathRegex":""}` | used for proxy provider |
|
||||
| blueprint.provider.proxy.ingress | object | `{"backend":"authentik","domain":null,"enabled":false}` | not yet supported |
|
||||
| blueprint.provider.type | string | `"oidc"` | |
|
||||
| secret.labels | object | `{}` | |
|
||||
| secret.name | string | `""` | |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.11.2](https://github.com/norwoodj/helm-docs/releases/v1.11.2)
|
||||
| blueprint.provider.proxy.cookieDomain | string | `""` | |
|
||||
| blueprint.provider.proxy.externalHost | string | `nil` | |
|
||||
| blueprint.provider.proxy.ingress.backend | string | `"authentik"` | service backend to authentik |
|
||||
| blueprint.provider.proxy.ingress.domain | string | `nil` | domain of application (where outpost should be deployed) |
|
||||
| blueprint.provider.proxy.ingress.enabled | bool | `false` | deploy ingress on application domain for e.g. logout (WIP) |
|
||||
| blueprint.provider.proxy.skipPathRegex | string | `""` | |
|
||||
| blueprint.provider.type | string | `"oidc"` | type of application connection, current support: oidc and proxy |
|
||||
| secret.labels | object | `{}` | label of secret to store generated secret |
|
||||
| secret.name | string | `""` | name of secret to store generated secret (like clientI) |
|
||||
|
|
|
@ -1,18 +1,23 @@
|
|||
secret:
|
||||
# -- name of secret to store generated secret (like clientI)
|
||||
name: ""
|
||||
# -- label of secret to store generated secret
|
||||
labels: {}
|
||||
|
||||
blueprint:
|
||||
authentik:
|
||||
# -- domain to authentik, used in generated url (like issuer)
|
||||
domain: "https://auth.wrenix.eu"
|
||||
# -- label of generated secret with blueprint
|
||||
labels:
|
||||
goauthentik_blueprint: "1"
|
||||
provider:
|
||||
# -- creat an provider for authentification (otherwise just a like in menu is created)
|
||||
enabled: true
|
||||
name: ""
|
||||
authorizationFlow: "default-provider-authorization-implicit-consent"
|
||||
# -- type of application connection, current support: oidc and proxy
|
||||
type: "oidc" # or proxy
|
||||
# used for oidc provider
|
||||
oidc:
|
||||
clientType: "confidential"
|
||||
# -- client id - generated if secret enabled
|
||||
|
@ -24,30 +29,38 @@ blueprint:
|
|||
signingKey: ""
|
||||
# -- Scope
|
||||
scopes:
|
||||
# -- used for proxy provider
|
||||
proxy:
|
||||
externalHost:
|
||||
skipPathRegex: ""
|
||||
cookieDomain: ""
|
||||
# -- not yet supported
|
||||
ingress:
|
||||
# -- deploy ingress on application domain for e.g. logout (WIP)
|
||||
enabled: false
|
||||
# -- domain of application (where outpost should be deployed)
|
||||
domain:
|
||||
# service backend
|
||||
# -- service backend to authentik
|
||||
backend: authentik
|
||||
application:
|
||||
# -- application name in menu
|
||||
name: ""
|
||||
# -- application slug
|
||||
slug: "app-name"
|
||||
# -- put this application in authentik in group
|
||||
group: ""
|
||||
# url to application
|
||||
launchURL: ""
|
||||
# -- open application in new tab
|
||||
openInNewTab: false
|
||||
# -- icon of application (url)
|
||||
icon: ""
|
||||
# -- description of application
|
||||
description: ""
|
||||
# -- publisher of application
|
||||
publisher: ""
|
||||
# -- uuid for bindPolicyID for group - if not set generated on secret for be stable (or groups: [] filled)
|
||||
bindPolicyID:
|
||||
policyEngineMode: "any"
|
||||
group: ""
|
||||
launchURL: ""
|
||||
openInNewTab: false
|
||||
icon: ""
|
||||
description: ""
|
||||
publisher: ""
|
||||
# -- additional groups
|
||||
# -- authentik groups created / give access to this application
|
||||
# disable any groups by set groups: [] (to a slice)
|
||||
# example:
|
||||
# - slug: "app: grafana-admin"
|
||||
|
|
|
@ -76,6 +76,3 @@ Conduit is a simple, fast and reliable chat server powered by Matrix.
|
|||
| wellknown.service.port | int | `8080` | |
|
||||
| wellknown.service.type | string | `"ClusterIP"` | |
|
||||
| wellknown.tolerations | list | `[]` | |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.11.2](https://github.com/norwoodj/helm-docs/releases/v1.11.2)
|
||||
|
|
|
@ -47,6 +47,3 @@ Deploy runner for an forgejo instance (default codeberg.org)
|
|||
| tolerations | list | `[]` | |
|
||||
| volumeMounts | list | `[]` | |
|
||||
| volumes | list | `[]` | |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.11.2](https://github.com/norwoodj/helm-docs/releases/v1.11.2)
|
||||
|
|
|
@ -39,6 +39,3 @@ A simple Headscale web UI for small-scale deployments.
|
|||
| serviceAccount.create | bool | `true` | |
|
||||
| serviceAccount.name | string | `""` | |
|
||||
| tolerations | list | `[]` | |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.11.2](https://github.com/norwoodj/helm-docs/releases/v1.11.2)
|
||||
|
|
|
@ -80,6 +80,3 @@ An open source, self-hosted implementation of the Tailscale control server.
|
|||
| serviceAccount.create | bool | `true` | |
|
||||
| serviceAccount.name | string | `""` | |
|
||||
| tolerations | list | `[]` | |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.11.2](https://github.com/norwoodj/helm-docs/releases/v1.11.2)
|
||||
|
|
|
@ -47,6 +47,3 @@ A Helm Chart to install hydrogen-web (a nextgen Matrix Webclient)
|
|||
| serviceAccount.create | bool | `true` | |
|
||||
| serviceAccount.name | string | `""` | |
|
||||
| tolerations | list | `[]` | |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.11.2](https://github.com/norwoodj/helm-docs/releases/v1.11.2)
|
||||
|
|
|
@ -48,6 +48,3 @@ The Free Software Media System
|
|||
| serviceAccount.create | bool | `true` | |
|
||||
| serviceAccount.name | string | `""` | |
|
||||
| tolerations | list | `[]` | |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.11.2](https://github.com/norwoodj/helm-docs/releases/v1.11.2)
|
||||
|
|
|
@ -73,6 +73,3 @@ A Helm chart for Kubernetes
|
|||
| serviceAccount.create | bool | `true` | |
|
||||
| serviceAccount.name | string | `""` | |
|
||||
| tolerations | list | `[]` | |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.11.2](https://github.com/norwoodj/helm-docs/releases/v1.11.2)
|
||||
|
|
|
@ -32,6 +32,3 @@ Deploy helper for probes and scrapeconfig of prometheus-operator
|
|||
| scrapes[1].metricsPath | string | `"/minio/v2/metrics/node"` | metric path on scrape |
|
||||
| scrapes[1].name | string | `"minio"` | name of scrape |
|
||||
| scrapes[1].scheme | string | `"http"` | schema on scrape |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.11.2](https://github.com/norwoodj/helm-docs/releases/v1.11.2)
|
||||
|
|
|
@ -100,6 +100,3 @@ A Helm chart for Kubernetes
|
|||
| serviceAccount.create | bool | `true` | |
|
||||
| serviceAccount.name | string | `""` | |
|
||||
| tolerations | list | `[]` | |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.11.2](https://github.com/norwoodj/helm-docs/releases/v1.11.2)
|
||||
|
|
|
@ -39,6 +39,3 @@ A Helm chart for running PostgreSQL (Postgres) database
|
|||
| serviceAccount.create | bool | `false` | |
|
||||
| serviceAccount.name | string | `""` | |
|
||||
| tolerations | list | `[]` | |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.11.2](https://github.com/norwoodj/helm-docs/releases/v1.11.2)
|
||||
|
|
|
@ -2,13 +2,14 @@
|
|||
|
||||
HELM_REPO=${HELM_REPO:-oci://codeberg.org/wrenix/helm-charts}
|
||||
|
||||
helm-docs -t ./README.md.gotmpl
|
||||
|
||||
for p in * ; do
|
||||
if [ ! -d $p ]; then
|
||||
continue;
|
||||
fi
|
||||
|
||||
echo "${p}:";
|
||||
helm-docs -t ../README.md.gotmpl
|
||||
|
||||
# last pkg
|
||||
lastTag=$(git tag -l "${p}-v*" | tail -1)
|
||||
|
|
Loading…
Add table
Reference in a new issue