Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion parcellab/common/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: v2
name: common
description: A Helm chart library for parcelLab charts
type: library
version: 1.3.1
version: 1.3.2
maintainers:
- name: parcelLab
email: engineering@parcellab.com
9 changes: 9 additions & 0 deletions parcellab/common/templates/_securitypolicies.tpl
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,7 @@
{{- $claimToHeaders := coalesce $policy.claimToHeaders $globalClaimHeaders -}}
{{- $jwtProviderName := coalesce $policy.jwtProviderName $globalJwtProviderName "keycloak" -}}
{{- $jwksURI := coalesce $policy.jwksURI $globalJwksURI (printf "%s/protocol/openid-connect/certs" $issuer) -}}
{{- $backendRefs := coalesce $policy.backendRefs $security.backendRefs -}}
{{- $targetRef := $policy.targetRef -}}
{{- $targetRefs := $policy.targetRefs -}}
{{- $rawSelectors := list -}}
Expand Down Expand Up @@ -84,6 +85,10 @@ spec:
oidc:
provider:
issuer: {{ $issuer | quote }}
{{- with $backendRefs }}
backendRefs:
{{- toYaml . | nindent 8 }}
{{- end }}
clientID: {{ $clientID | quote }}
clientSecret:
name: {{ $clientSecretName | quote }}
Expand All @@ -104,6 +109,10 @@ spec:
remoteJWKS:
cacheDuration: 300s
uri: {{ $jwksURI | quote }}
{{- with $backendRefs }}
backendRefs:
{{- toYaml . | nindent 12 }}
{{- end }}
{{- with $claimToHeaders }}
claimToHeaders:
{{ toYaml . | nindent 8 }}
Expand Down
2 changes: 1 addition & 1 deletion parcellab/cronjob/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
apiVersion: v2
name: cronjob
description: Single cron job
version: 0.4.3
version: 0.5.0
dependencies:
- name: common
version: "*"
Expand Down
2 changes: 1 addition & 1 deletion parcellab/microservice/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
apiVersion: v2
name: microservice
description: Simple microservice
version: 0.5.1
version: 0.5.2
dependencies:
- name: common
version: "*"
Expand Down
12 changes: 12 additions & 0 deletions parcellab/microservice/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -116,6 +116,12 @@ envoy:
# claimToHeaders:
# - header: "x-user-email"
# claim: "email"
# backendRefs: # optional: used by both oidc.provider and jwt.remoteJWKS to route to the IdP service directly
# - group: ""
# kind: Service
# name: keycloak
# namespace: keycloak
# port: 80
# policies:
# - name: staff-only
# targetRef:
Expand All @@ -132,6 +138,12 @@ envoy:
# - name: groups
# valueType: StringArray
# values: ["staff"]
# backendRefs: # optional: overrides the global backendRefs above for this policy only
# - group: ""
# kind: Service
# name: keycloak
# namespace: keycloak
# port: 80

##
## Cronjob
Expand Down
2 changes: 1 addition & 1 deletion parcellab/monolith/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
apiVersion: v2
name: monolith
description: Application that may define multiple services and cronjobs
version: 0.5.1
version: 0.5.2
dependencies:
- name: common
version: "*"
Expand Down
12 changes: 12 additions & 0 deletions parcellab/monolith/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -145,12 +145,24 @@ envoy:
# claimToHeaders:
# - header: "x-user-email"
# claim: "email"
# backendRefs: # optional: backend service for oidc.provider and jwt.remoteJWKS; applies globally to all policies unless overridden per-policy
# - group: ""
# kind: Service
# name: keycloak
# namespace: keycloak
# port: 80
# policies:
# - name: staff-only
# targetRef:
# kind: HTTPRoute
# name: my-default-route
# group: "gateway.networking.k8s.io"
# backendRefs: # optional: overrides the global backendRefs above for this policy
# - group: ""
# kind: Service
# name: keycloak
# namespace: keycloak
# port: 80
# authorizationRules:
# - name: member-of-staff-group
# action: Allow
Expand Down