deprecating forwardauth chart (#117)

Signed-off-by: Jeff Billimek <jeffrey_k_billimek@homedepot.com>
This commit is contained in:
Jeff Billimek 2020-01-10 15:40:58 -05:00 committed by GitHub
parent ee33737bfb
commit a92e2f4c7c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
9 changed files with 0 additions and 278 deletions

View File

@ -1,25 +0,0 @@
# Patterns to ignore when building packages.
# This supports shell glob matching, relative path matching, and
# negation (prefixed with !). Only one pattern per line.
.DS_Store
# Common VCS dirs
.git/
.gitignore
.bzr/
.bzrignore
.hg/
.hgignore
.svn/
# Common backup files
*.swp
*.bak
*.tmp
*~
# Various IDEs
.project
.idea/
*.tmproj
config/
target/
.mvn
src/

View File

@ -1,9 +0,0 @@
apiVersion: v1
appVersion: "1.0"
description: A Helm chart for Kubernetes to install Auth0 Authorization application for Traefik forward authentication.
name: forwardauth
version: 0.1.0
home: https://github.com/billimek/billimek-charts/tree/master/forwardauth
maintainers:
- name: dniel
email: dniel@engfeldt.net

View File

@ -1,19 +0,0 @@
1. Get the application URL by running these commands:
{{- if .Values.ingress.enabled }}
{{- range .Values.ingress.hosts }}
http{{ if $.Values.ingress.tls }}s{{ end }}://{{ . }}{{ $.Values.ingress.path }}
{{- end }}
{{- else if contains "NodePort" .Values.service.type }}
export NODE_PORT=$(kubectl get --namespace {{ .Release.Namespace }} -o jsonpath="{.spec.ports[0].nodePort}" services {{ template "helm.fullname" . }})
export NODE_IP=$(kubectl get nodes --namespace {{ .Release.Namespace }} -o jsonpath="{.items[0].status.addresses[0].address}")
echo http://$NODE_IP:$NODE_PORT
{{- else if contains "LoadBalancer" .Values.service.type }}
NOTE: It may take a few minutes for the LoadBalancer IP to be available.
You can watch the status of by running 'kubectl get svc -w {{ template "helm.fullname" . }}'
export SERVICE_IP=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ template "helm.fullname" . }} -o jsonpath='{.status.loadBalancer.ingress[0].ip}')
echo http://$SERVICE_IP:{{ .Values.service.port }}
{{- else if contains "ClusterIP" .Values.service.type }}
export POD_NAME=$(kubectl get pods --namespace {{ .Release.Namespace }} -l "app={{ template "helm.name" . }},release={{ .Release.Name }}" -o jsonpath="{.items[0].metadata.name}")
echo "Visit http://127.0.0.1:8080 to use your application"
kubectl port-forward $POD_NAME 8080:80
{{- end }}

View File

@ -1,32 +0,0 @@
{{/* vim: set filetype=mustache: */}}
{{/*
Expand the name of the chart.
*/}}
{{- define "helm.name" -}}
{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}}
{{- end -}}
{{/*
Create a default fully qualified app name.
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
If release name contains chart name it will be used as a full name.
*/}}
{{- define "helm.fullname" -}}
{{- if .Values.fullnameOverride -}}
{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" -}}
{{- else -}}
{{- $name := default .Chart.Name .Values.nameOverride -}}
{{- if contains $name .Release.Name -}}
{{- .Release.Name | trunc 63 | trimSuffix "-" -}}
{{- else -}}
{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}}
{{- end -}}
{{- end -}}
{{- end -}}
{{/*
Create chart name and version as used by the chart label.
*/}}
{{- define "helm.chart" -}}
{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}}
{{- end -}}

View File

@ -1,12 +0,0 @@
apiVersion: v1
kind: ConfigMap
metadata:
name: {{ template "helm.fullname" . }}-config
labels:
app: {{ template "helm.name" . }}
chart: {{ template "helm.chart" . }}
release: {{ .Release.Name }}
heritage: {{ .Release.Service }}
data:
application.yaml: |
{{ toYaml .Values.applicationYaml | indent 4 }}

View File

@ -1,64 +0,0 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: {{ template "helm.fullname" . }}
labels:
app: {{ template "helm.name" . }}
chart: {{ template "helm.chart" . }}
release: {{ .Release.Name }}
heritage: {{ .Release.Service }}
spec:
replicas: {{ .Values.replicaCount }}
selector:
matchLabels:
app: {{ template "helm.name" . }}
release: {{ .Release.Name }}
template:
metadata:
labels:
app: {{ template "helm.name" . }}
release: {{ .Release.Name }}
spec:
containers:
- name: {{ .Chart.Name }}
image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}"
imagePullPolicy: {{ .Values.image.pullPolicy }}
ports:
- name: http
containerPort: 8080
protocol: TCP
volumeMounts:
- name: config-volume
mountPath: /config
env:
- name: JVM_OPTS
value: -XX:+UnlockExperimentalVMOptions -XX:+UseCGroupMemoryLimitForHeap -XX:MaxRAMFraction=1
- name: ENV
value: "{{ .Values.logLevel }}"
livenessProbe:
httpGet:
path: /actuator/health
port: http
readinessProbe:
httpGet:
path: /actuator/health
port: http
resources:
{{ toYaml .Values.resources | indent 12 }}
volumes:
- name: config-volume
configMap:
name: {{ template "helm.fullname" . }}-config
{{- with .Values.nodeSelector }}
nodeSelector:
{{ toYaml . | indent 8 }}
{{- end }}
{{- with .Values.affinity }}
affinity:
{{ toYaml . | indent 8 }}
{{- end }}
{{- with .Values.tolerations }}
tolerations:
{{ toYaml . | indent 8 }}
{{- end }}

View File

@ -1,36 +0,0 @@
{{- if .Values.ingress.enabled -}}
{{- $fullName := include "helm.fullname" . -}}
{{- $servicePort := .Values.service.port -}}
{{- $ingressPath := .Values.ingress.path -}}
apiVersion: extensions/v1beta1
kind: Ingress
metadata:
name: {{ $fullName }}
labels:
app: {{ template "helm.name" . }}
chart: {{ template "helm.chart" . }}
release: {{ .Release.Name }}
heritage: {{ .Release.Service }}
{{- with .Values.ingress.annotations }}
annotations:
{{ toYaml . | indent 4 }}
{{- end }}
spec:
{{- if .Values.ingress.tls }}
tls:
{{- range .Values.ingress.tls }}
- hosts:
{{- range .hosts }}
- {{ . }}
{{- end }}
secretName: {{ .secretName }}
{{- end }}
{{- end }}
rules:
- http:
paths:
- backend:
serviceName: {{ $fullName }}
servicePort: http
path: /oauth2
{{- end }}

View File

@ -1,19 +0,0 @@
apiVersion: v1
kind: Service
metadata:
name: {{ template "helm.fullname" . }}
labels:
app: {{ template "helm.name" . }}
chart: {{ template "helm.chart" . }}
release: {{ .Release.Name }}
heritage: {{ .Release.Service }}
spec:
type: {{ .Values.service.type }}
ports:
- port: {{ .Values.service.port }}
targetPort: 8080
protocol: TCP
name: http
selector:
app: {{ template "helm.name" . }}
release: {{ .Release.Name }}

View File

@ -1,62 +0,0 @@
replicaCount: 1
image:
repository: index.docker.io/dniel/forwardauth
tag: latest
pullPolicy: Always
# set logLevel to DEBUG, TEST, or PRODUCTION to control the verbosity of logs
logLevel: DEBUG
service:
type: ClusterIP
port: 80
ingress:
enabled: true
annotations:
kubernetes.io/ingress.class: traefik
traefik.frontend.rule.type: PathPrefixStrip
traefik.ingress.kubernetes.io/priority: "99999"
path: /oauth2
## Uncomment and complete the following section to set the configuration
# applicationYaml:
# domain: https://xxxxx.xx.auth0.com/
# token-endpoint: https://xxx.xx.auth0.com/oauth/token
# authorize-url: https://xxxx.xx.auth0.com/authorize
# default:
# name: www.example.test
# client-id: <from auth0 application config>
# client-secret: <from auth0 application config>
# audience: <from auth0 api config> or blank
# scope: "profile openid email"
# redirect-uri: http://www.example.test/oauth2/signin
# token-cookie-domain: example.test
# apps:
# - name: www.example.test
# client-id: <from auth0 application config>
# client-secret: <from auth0 application config>
# audience: <from auth0 api config> or blank
# scope: "profile openid email"
# redirect-uri: http://www.example.test/oauth2/signin
# token-cookie-domain: example.test
# - name: traefik.example.test
# client-id: <from auth0 application config>
# client-secret: <from auth0 application config>
# audience: <from auth0 api config> or blank
# scope: "profile openid email"
# redirect-uri: http://traefik.example.test/oauth2/signin
# token-cookie-domain: traefik.example.test
resources:
limits:
memory: 512Mi
requests:
memory: 512Mi
nodeSelector: {}
tolerations: []
affinity: {}