-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add OAUTH2 usage #105
Add OAUTH2 usage #105
Conversation
860dda2
to
120c349
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
authorizeUrl: "" | ||
tokenUrl: "" | ||
userUrl: "" | ||
scopes: "profile email" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we need a scopes value?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes. If I don't set the default value (the same we have in the runtime), as helm will always populate this value (even with an empty string), this would be the passed value, and sending an empty string doesn't look appropriate
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah okay i wondered because we had here an empty string trento-project/ansible@3bd8cf2#diff-018072a0a2fd65ea8a5deb35db17eb24ec9297cc2fffd3ec7979e6cf402577e7R37.
Thanks for clarification!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I will add the default actually in the ansible code.
thanks!
Add OAUTH2 support.
Based on: trento-project/web#2953
Usage example (keycloak):
Attention: the configured urls must be reachable by the k3s containers. Don't use
localhost