You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: Added support for using external-secrets with kratos (#48)
* feat: Added support for using external-secrets with kratos
* fix: Switched to a more generic form for supplying the external secret source. Changed vars so that JWKS content is passed in instead of secret name.
* fix: Allow user-auth to be used without external-secrets
* chore: Remove brackets around conditional
| auth\_namespace | Namespace to use for auth resources |`string`|`"user-auth"`| no |
36
35
| backend\_service\_domain | Domain of the backend service |`string`| n/a | yes |
37
-
| cookie\_sigining\_secret\_key | Default secret key for signing cookies |`string`| n/a | yes |
36
+
| cookie\_signing\_secret\_key | Default secret key for signing cookies |`string`| n/a | yes |
38
37
| create\_namespace | Whether to create the auth namespace(defaults to true), otherwise just references the namespace |`bool`|`true`| no |
38
+
| external\_secret\_backend | The backend external-secrets will pull secret data from to create a corresponding secret in kubernetes. If empty, external-secrets will not be used. You'll need to make sure the secret is created manually. |`string`|`"secretsManager"`| no |
39
+
| external\_secret\_name | Name of a secret in an external secrets backend that contains the content to pull into a kubernetes secret for Kratos to use |`string`| n/a | yes |
39
40
| frontend\_service\_domain | Domain of the frontend |`string`| n/a | yes |
40
-
| jwks\_secret\_name| The name of a secret in the auth namespace containing a JWKS file for Oathkeeper |`string`| n/a | yes |
41
+
| jwks\_content| The content of a JWKS file for Oathkeeper |`string`| n/a | yes |
41
42
| k8s\_local\_exec\_context | Custom resource (Oathkeeper Rules are created using local-exec with kubectl), if not specified it will target your current context from kubeconfig |`string`|`""`| no |
42
43
| kratos\_secret\_name | Secret name for kratos to access Database credentials, created from pre-k8s script |`string`| n/a | yes |
44
+
| kubectl\_extra\_args | Arguments that will be passed to kubectl when using the local executor in cases where the terraform k8s support is not enough |`string`| n/a | yes |
43
45
| name | The name to create user-auth components(kratos/oathkeeper), must be unique in the cluster for helm-resources |`string`| n/a | yes |
44
46
| user\_auth\_mail\_from\_address | Mail from the user management system will come from this address |`string`|`""`| no |
45
47
| whitelisted\_return\_urls | URLs that can be redirected to after completing a flow initialized with the return\_to parameter |`list(string)`|`[]`| no |
description="Default secret key for signing cookies"
58
59
type=string
59
60
sensitive=true
60
61
}
62
+
63
+
variable"kubectl_extra_args" {
64
+
description="Arguments that will be passed to kubectl when using the local executor in cases where the terraform k8s support is not enough"
65
+
type=string
66
+
}
67
+
68
+
variable"external_secret_backend" {
69
+
description="The backend external-secrets will pull secret data from to create a corresponding secret in kubernetes. If empty, external-secrets will not be used. You'll need to make sure the secret is created manually."
70
+
type=string
71
+
default="secretsManager"
72
+
}
73
+
74
+
variable"external_secret_name" {
75
+
description="Name of a secret in an external secrets backend that contains the content to pull into a kubernetes secret for Kratos to use"
0 commit comments