helm-charts/authentik-application
2023-11-03 15:48:54 +01:00
..
templates fix(authentik-application): do not create group with empty list 2023-09-26 19:24:18 +02:00
.helmignore fix(authentik-application): init 2023-09-03 15:04:04 +02:00
Chart.yaml fix(authentik-application): Improve documentation 2023-11-03 15:48:54 +01:00
README.adoc fix(authentik-application): init 2023-09-03 15:04:04 +02:00
README.md fix(authentik-application): Improve documentation 2023-11-03 15:48:54 +01:00
values.yaml fix(authentik-application): Improve documentation 2023-11-03 15:48:54 +01:00

authentik-application

Version: 0.3.4 Type: application

A Chart to deploy a secret for the authentik blueprint-sidecar.

for usage, deploy: https://github.com/goauthentik/helm/pull/146

or use:

serviceAccount:
  create: true

additionalContainers:
  - name: sidecar-blueprints
    image: "ghcr.io/kiwigrid/k8s-sidecar:1.25.1"
    env:
      - name: "FOLDER"
        value: "/blueprints/sidecar"
      - name: "LABEL"
        value: "goauthentik_blueprint"
      - name: "LABEL_VALUE"
        value: "1"
      # - name: "NAMESPACE"
      #   value: "ALL"
      - name: "RESOURCE"
        value: "both"
      - name: "UNIQUE_FILENAMES"
        value: "true"
    volumeMounts:
      - name: sidecar-blueprints
        mountPath: /blueprints/sidecar

volumeMounts:
  - name: sidecar-blueprints
    mountPath: /blueprints/sidecar

volumes:
  - name: sidecar-blueprints
    emptyDir: {}

and create an serviceaccount to read secrets:

apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
  name: authentik-blueprint-sidecar
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: Role
  name: authentik-blueprint-sidecar
subjects:
  - kind: ServiceAccount
    name: authentik
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
  name: authentik-blueprint-sidecar
rules:
  - apiGroups: [""]
    resources: ["configmaps", "secrets"]
    verbs: ["get", "watch", "list"]

Values

Key Type Default Description
blueprint.application.bindPolicyID string nil uuid for bindPolicyID for group - if not set generated on secret for be stable (or groups: [] filled)
blueprint.application.description string "" description of application
blueprint.application.group string "" put this application in authentik in group
blueprint.application.icon string "" icon of application (url)
blueprint.application.launchURL string ""
blueprint.application.name string "" application name in menu
blueprint.application.openInNewTab bool false open application in new tab
blueprint.application.policyEngineMode string "any"
blueprint.application.publisher string "" publisher of application
blueprint.application.slug string "app-name" application slug
blueprint.authentik.domain string "https://auth.wrenix.eu" domain to authentik, used in generated url (like issuer)
blueprint.groups string nil authentik groups created / give access to this application disable any groups by set groups: [] (to a slice) example: - slug: "app: grafana-admin" parent: "app: infra" bindID: uuid
blueprint.labels object {"goauthentik_blueprint":"1"} label of generated secret with blueprint
blueprint.provider.authorizationFlow string "default-provider-authorization-implicit-consent"
blueprint.provider.enabled bool true creat an provider for authentification (otherwise just a like in menu is created)
blueprint.provider.name string ""
blueprint.provider.oidc.clientID string nil client id - generated if secret enabled
blueprint.provider.oidc.clientSecret string nil client secret - generated if secret enabled
blueprint.provider.oidc.clientType string "confidential"
blueprint.provider.oidc.redirectURL string ""
blueprint.provider.oidc.scopes string nil Scope
blueprint.provider.oidc.signingKey string "" Need for non-curve / RSA
blueprint.provider.proxy.cookieDomain string ""
blueprint.provider.proxy.externalHost string nil
blueprint.provider.proxy.ingress.backend string "authentik" service backend to authentik
blueprint.provider.proxy.ingress.domain string nil domain of application (where outpost should be deployed)
blueprint.provider.proxy.ingress.enabled bool false deploy ingress on application domain for e.g. logout (WIP)
blueprint.provider.proxy.skipPathRegex string ""
blueprint.provider.type string "oidc" type of application connection, current support: oidc and proxy
secret.labels object {} label of secret to store generated secret
secret.name string "" name of secret to store generated secret (like clientI)