Giter VIP home page Giter VIP logo

idsvr-helm's Introduction

Curity Helm Chart Repository

Quality Availability

This repository contains the Curity Identity Server helm chart source code.

For more information on Curity and its capabilities, click here.

How to Install the Chart

$ helm repo add curity https://curityio.github.io/idsvr-helm/
$ helm repo update
$ helm install <release-name> curity/idsvr --set <option>=<value>

For more details see the chart README.md

More Information

Please visit curity.io for more information about the Curity Identity Server.

Copyright (C) 2020 Curity AB.

idsvr-helm's People

Contributors

anestos avatar arcriiad avatar arelion-org-bot avatar atifsaddique211f avatar bokristoffersson avatar bondarau avatar cjmalloy avatar daniellindau avatar gary-archer avatar iggbom avatar jacobideskog avatar jlmart88 avatar jmadureira avatar johanfylling avatar ju-cu avatar keeganwitt avatar kfreskgard avatar klowdo avatar marcmillien avatar mtrojanowski avatar piratekev avatar pjoshi2023 avatar shuaibiyy avatar slivkamiro avatar suren-khatana avatar teamsmiley avatar travisspencer avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar

idsvr-helm's Issues

curity.config.uiEnabled not effective

The default value for curity.config.uiEnabled is false and thus AdminUI and RESTConf interface should be disabled by default. However, the parameter only prevents the admin-port to be added to list of ports in the deployment template. Ports listed there are just informative. See https://kubernetes.io/docs/reference/kubernetes-api/workload-resources/pod-v1/#ports for reference. Port-forwarding will work nevertheless. I expect this parameter to disable the installation of the adminUI, i.e. run unattendinstall --without-admin-ui

Master branch should be protected

The master should be protected so that force pushes are disallowed. It will also help users mirroring the repo to be able to limit the mirroring to only protected branches (at the moment this results in no branches being mirrored or all branches being mirrored).

Missing secret key for pod to come up when using helm chart.

I am using the following command:

helm install curity-idsvr curity/idsvr \
  --namespace curity-idsvr \
  --set image.tag=latest \
  --set curity.config.password=Pass1 \
  --set curity.config.uiEnabled=true \
  --set curity.admin.livenessProbe.initialDelaySeconds=240 \
  --set curity.runtime.livenessProbe.initialDelaySeconds=240

And when I do check for the deployment, both admin and runtime pods gets this error:

Warning FailedMount 23s (x7 over 54s) kubelet MountVolume.SetUp failed for volume "cluster-xml" : references non-existent secret key: cluster-1.xml

As per reading the excellent docs, I think it has something wrong when building the proper secret, investigating the secret it creates a placeholder for it, but doesn't really creates the cluster-1.xml secret key and it is required so that the containers comes up.

kubectl describe secret -n curity-idsvr curity-idsvr-cluster-config-xml
Name:         curity-idsvr-cluster-config-xml
Namespace:    curity-idsvr
Labels:       <none>
Annotations:  helm.sh/hook: pre-install,pre-upgrade
              helm.sh/hook-weight: -5

Type:  Opaque

Data
====
placeholder:  6 bytes

Improve Backup process

We need the ability to modify the backup process and additionally copy the configuration after each change to AWS S3 Bucket. What if I prepare a pull request and move the backup script(data) to a values file, so we can take the value from the values file? This way, everyone can customize backup process it as needed.

Multiple runtime hosts

As the product supports multiple domain names/hosts to be used, the following values should be possible to submit as arrays in some way or form

  • ingress.runtime.host
  • ingress.runtime.tlshost
  • ingress.runtime.secretName

AWS IAM Service role

We need option add custom annotation to ServiceAccount
for example:
annotations:
helm.sh/hook: pre-install,pre-upgrade
helm.sh/hook-weight: "-5"
eks.amazonaws.com/role-arn: ARN_IAM_Role

Configuration File

I don't fully understand how the interaction with the configuration file works. What will happen if I make several changes and commit them one by one (a timestamp is created secretly)? What will happen if the Admin POD restarts or if I need to move it to another NODE? How will it load the latest configuration file from secrets or otherwise load the latest configuration file? Can you clarify?

unmarshal errors while trying to add the curity helm repo

Hi, I'm trying to add the curity helm repo so that I can use the charts. When doing so, I get this error:

Error: looks like "https://curityio.github.io/idsvr-helm" is not a valid chart repository or cannot be reached: error converting YAML to JSON: yaml: unmarshal errors:
  line 23: key "apiVersion" already set in map
  line 25: key "entries" already set in map

When I search for the repo using

helm search hub curity

the chart version is still listed as 0.12.2 and the app version as 8.1.1

Ability to port-forward to runtime service

It can be helpful to be able to port-forward to the runtime service. Currently, the runtime service selectors match both runtime and admin pods. Since admin pods don't have a http port, attempting to port-forward results in an error:

> kubectl port-forward service/curity-idsvr-runtime-svc 9000:80
error: Pod 'curity-idsvr-admin-pod' does not have a named port 'http-port'

One solution is to add a selector and matching label to the service and deployment respectively like in this commit.

TLS only configured if secretName is set

The TLS section of the ingress is not configured unless a secretName is provided, however this is not always necessary. An NGINX ingress controller can have a default certificate configured using the default-ssl-certificate. In these cases the NGINX will always use the certificate configured here for TLS where this is not configured in the ingress.

The issue is here. The conditional setting should not use secretName only as a condition for enabling TLS in the ingress. It should also enable e.g. if tlsHost are set or maybe a new enableTLS flag.

Add option to allow HTTP connections.

In some cases another service will be terminating TLS. It would be nice if during the initial install we could have an option to allow HTTP connections.

Ingress - Admin portal

Hi
I am trying to get the ingress for the admin portal to work without much success. Always get a 504. (timeout). Port forwarding works. Any suggestions ?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.