-
Notifications
You must be signed in to change notification settings - Fork 3
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
fix!: sso failing deployment when it is disabled (#115)
## Description This hotfixes sso killing a deployment when it is disabled. ## Related Issue Fixes #N/A ## Type of change - [X] Bug fix (non-breaking change which fixes an issue) - [ ] New feature (non-breaking change which adds functionality) - [ ] Other (security config, docs update, etc) ## Checklist before merging - [X] Test, docs, adr added or updated as needed - [X] [Contributor Guide Steps](https://github.com/defenseunicorns/uds-package-gitlab/blob/main/CONTRIBUTING.md#developer-workflow) followed --------- Co-authored-by: Eric Wyles <[email protected]>
- Loading branch information
Showing
5 changed files
with
44 additions
and
6 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,36 @@ | ||
# This secret will be used if sso is disabled, instead of the templated one in uds-package.yaml. | ||
# GitLab needs to mount the secret and creating it this way avoids creating an unnecessary | ||
# client in the keycloak realm and unnecessary secret data in the cluster. | ||
{{- if not .Values.sso.enabled }} | ||
|
||
apiVersion: v1 | ||
kind: Secret | ||
metadata: | ||
name: {{ .Values.sso.secretName }} | ||
namespace: {{ .Release.Namespace }} | ||
type: "Opaque" | ||
stringData: | ||
providers: | | ||
{ | ||
"name": "openid_connect", | ||
"label": "Dummy SSO", | ||
"args": { | ||
"name": "openid_connect", | ||
"scope": [ | ||
"openid", | ||
"profile" | ||
], | ||
"response_type": "code", | ||
"issuer": "https://sso.{{ .Values.domain }}/realms/uds", | ||
"client_auth_method": "query", | ||
"discovery": true, | ||
"uid_field": "preferred_username", | ||
"client_options": { | ||
"identifier": "dummy_identifier", | ||
"secret": "dummy_secret", | ||
"redirect_uri": "https://dummy_redirect_uri.com", | ||
"end_session_endpoint": "https://dummy_end_session_endpoint.com" | ||
} | ||
} | ||
} | ||
{{- end }} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters