oidc-forward-auth-1.6.0
Forward Auth proxy with gogatekeeper. It replaces the old proxy mechanism ## Installing the Chart with iits ArgoCD yaml charts: oidc-forward-auth: namespace: routing targetRevision: "1.0.0" parameters: gatekeeper.config.client-id: "${vault:whatever/data/keycloak/keycloak_proxy_admin#client_id}" gatekeeper.config.client-secret: "${vault:whatever/data/keycloak/keycloak_proxy_admin#client_secret}" gatekeeper.config.discovery-url: "https://{{.Values.projectValues.authDomain}}/realms/{{.Values.projectValues.context}}" ingress.host: "my.protected.domain"
## Then use it like this yaml ingress: enabled: true # -- Mandatory, replace it with your host address host: annotations: traefik.ingress.kubernetes.io/router.entrypoints: websecure traefik.ingress.kubernetes.io/router.tls: "true" #namespace-name@kubernetescrd traefik.ingress.kubernetes.io/router.middlewares: routing-oidc-forward-auth@kubernetescrd # Creates default Ingress with tls and the given host from .Values.ingress.host defaultIngress: enabled: true