Merge branch 'master' into qbittorrent

This commit is contained in:
Nicholas St. Germain 2020-09-26 01:10:40 -05:00 committed by GitHub
commit 053d99b0fe
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 35 additions and 9 deletions

View File

@ -2,7 +2,7 @@ apiVersion: v2
name: traefik-forward-auth name: traefik-forward-auth
description: A minimal forward authentication service that provides OAuth/SSO login and authentication for the traefik reverse proxy/load balancer description: A minimal forward authentication service that provides OAuth/SSO login and authentication for the traefik reverse proxy/load balancer
type: application type: application
version: 1.0.0 version: 1.0.1
appVersion: 2.2.0 appVersion: 2.2.0
keywords: keywords:
- traefik - traefik

View File

@ -1,6 +1,6 @@
# traefik-forward-auth # traefik-forward-auth
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 1.0.0](https://img.shields.io/badge/Version-1.0.0-informational?style=flat-square) ![AppVersion: 2.2.0](https://img.shields.io/badge/AppVersion-2.2.0-informational?style=flat-square) [![ArtifactHub](https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/traefik-forward-auth)](https://artifacthub.io/packages/helm/traefik-forward-auth) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 1.0.1](https://img.shields.io/badge/Version-1.0.1-informational?style=flat-square) ![AppVersion: 2.2.0](https://img.shields.io/badge/AppVersion-2.2.0-informational?style=flat-square) [![ArtifactHub](https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/traefik-forward-auth)](https://artifacthub.io/packages/helm/traefik-forward-auth)
A minimal forward authentication service that provides OAuth/SSO login and authentication for the traefik reverse proxy/load balancer A minimal forward authentication service that provides OAuth/SSO login and authentication for the traefik reverse proxy/load balancer
@ -75,6 +75,8 @@ helm install traefik-forward-auth k8s-at-home/traefik-forward-auth --values valu
| ingress.hosts[0].paths | list | `[]` | | | ingress.hosts[0].paths | list | `[]` | |
| ingress.tls | list | `[]` | | | ingress.tls | list | `[]` | |
| lifetime | string | `""` | Lifetime in seconds (default: 43200) | | lifetime | string | `""` | Lifetime in seconds (default: 43200) |
| livenessProbe | object | {"periodSeconds":20,"tcpSocket":{"port":"http"}} | Liveness probe configuration |
| livenessProbe.enabled | bool | `true` | Enable liveness probe |
| logging.format | string | `""` | [text|json|pretty] Log format (default: text) | | logging.format | string | `""` | [text|json|pretty] Log format (default: text) |
| logging.level | string | `""` | [trace|debug|info|warn|error|fatal|panic] Log level (default: warn) | | logging.level | string | `""` | [trace|debug|info|warn|error|fatal|panic] Log level (default: warn) |
| logoutRedirect | string | `""` | URL to redirect to following logout | | logoutRedirect | string | `""` | URL to redirect to following logout |
@ -102,6 +104,8 @@ helm install traefik-forward-auth k8s-at-home/traefik-forward-auth --values valu
| providers.oidc.enabled | bool | `false` | Enable the generic OIDC provider | | providers.oidc.enabled | bool | `false` | Enable the generic OIDC provider |
| providers.oidc.issuerUrl | string | `""` | Issuer URL | | providers.oidc.issuerUrl | string | `""` | Issuer URL |
| providers.oidc.resource | string | `""` | Optional resource indicator | | providers.oidc.resource | string | `""` | Optional resource indicator |
| readinessProbe | object | {"periodSeconds":10,"tcpSocket":{"port":"http"}} | Readiness probe configuration |
| readinessProbe.enabled | bool | `true` | Enable readiness probe |
| replicaCount | int | `1` | | | replicaCount | int | `1` | |
| resources | object | `{}` | | | resources | object | `{}` | |
| restrictions.domain | string | `""` | Only allow given email domains. (Comma delimited) | | restrictions.domain | string | `""` | Only allow given email domains. (Comma delimited) |
@ -117,4 +121,4 @@ helm install traefik-forward-auth k8s-at-home/traefik-forward-auth --values valu
| serviceAccount.create | bool | `true` | | | serviceAccount.create | bool | `true` | |
| serviceAccount.name | string | `""` | | | serviceAccount.name | string | `""` | |
| tolerations | list | `[]` | | | tolerations | list | `[]` | |
| urlPath | string | `""` | Callback URL Path (default: /_oauth) | | urlPath | string | `""` | Callback URL Path (default: /_oauth) |

View File

@ -181,14 +181,18 @@ spec:
- name: http - name: http
containerPort: 4181 containerPort: 4181
protocol: TCP protocol: TCP
{{- $livenessProbe := .Values.livenessProbe }}
{{- if $livenessProbe.enabled }}
livenessProbe: livenessProbe:
httpGet: {{- $livenessProbe := unset $livenessProbe "enabled" }}
path: / {{- toYaml $livenessProbe | nindent 12 }}
port: http {{- end }}
{{- $readinessProbe := .Values.readinessProbe }}
{{- if $readinessProbe.enabled }}
readinessProbe: readinessProbe:
httpGet: {{- $readinessProbe := unset $readinessProbe "enabled" }}
path: / {{- toYaml $readinessProbe | nindent 12 }}
port: http {{- end }}
{{- with .Values.resources }} {{- with .Values.resources }}
resources: resources:
{{- toYaml . | nindent 12 }} {{- toYaml . | nindent 12 }}

View File

@ -117,6 +117,24 @@ securityContext: {}
# runAsNonRoot: true # runAsNonRoot: true
# runAsUser: 1000 # runAsUser: 1000
# livenessProbe -- Liveness probe configuration
# @default -- {"periodSeconds":20,"tcpSocket":{"port":"http"}}
livenessProbe:
# livenessProbe.enabled -- Enable liveness probe
enabled: true
tcpSocket:
port: http
periodSeconds: 20
# readinessProbe -- Readiness probe configuration
# @default -- {"periodSeconds":10,"tcpSocket":{"port":"http"}}
readinessProbe:
# readinessProbe.enabled -- Enable readiness probe
enabled: true
tcpSocket:
port: http
periodSeconds: 10
service: service:
type: ClusterIP type: ClusterIP
port: 4181 port: 4181