-
Notifications
You must be signed in to change notification settings - Fork 146
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Option to handle dex-core client_secret via k8s secrets + alpine update #184
base: master
Are you sure you want to change the base?
Conversation
@nabadger any news? Did you check already? |
@nabadger Is that repo still under maintainer mode? No answer since month already. So is here any chance to get an update? Otherwise we need to think of a product change as we need some support with the current one. Thanks a lot. |
|
@nickmintel Can you please have a look? Thanks. |
@VF-mbrauer apologies - I've not been able to commit any time for this project recently (I'm not sure these circumstances will change either for a while). After talking to internal team here, I've decided to raise a ticket to see if we can find other owners/maintainers of this project: |
Hi @nabadger, fair point and I absolutely understand. So, no worries. Would be great if we could find other folks who take over as this product is great enrichment for the DEX-Core. |
Added functionality to overcome a security query where
client_secret
is in plain text inside the config.yaml, which is stored in a config map. So now it needs to be stored as a Base64 Encoded String and then the k8s-authenticator will decrypt internally and send the secret then towards the dexidp.Also, the Alpine version has been increased as well as the documentation is updated for the
client_secret
change.