docs: Add vouch-proxy OAuth example (#10929)
This commit is contained in:
parent
5acc4230ee
commit
7d75abb0ff
4 changed files with 218 additions and 54 deletions
|
|
@ -51,25 +51,72 @@ into a Kubernetes cluster and use it to protect the Kubernetes Dashboard using G
|
|||
|
||||

|
||||
|
||||
3. Configure oauth2_proxy values in the file [`oauth2-proxy.yaml`](https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/docs/examples/auth/oauth-external-auth/oauth2-proxy.yaml) with the values:
|
||||
3. Configure values in the file [`oauth2-proxy.yaml`](https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/docs/examples/auth/oauth-external-auth/oauth2-proxy.yaml) with the values:
|
||||
|
||||
- OAUTH2_PROXY_CLIENT_ID with the github `<Client ID>`
|
||||
- OAUTH2_PROXY_CLIENT_SECRET with the github `<Client Secret>`
|
||||
- OAUTH2_PROXY_COOKIE_SECRET with value of `python -c 'import os,base64; print(base64.b64encode(os.urandom(16)).decode("ascii"))'`
|
||||
- (optional, but recommended) OAUTH2_PROXY_GITHUB_USERS with GitHub usernames to allow to login
|
||||
- `__INGRESS_HOST__` with a valid FQDN (e.g. `foo.bar.com`)
|
||||
- `__INGRESS_SECRET__` with a Secret with a valid SSL certificate
|
||||
|
||||
4. Customize the contents of the file [`dashboard-ingress.yaml`](https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/docs/examples/auth/oauth-external-auth/dashboard-ingress.yaml):
|
||||
|
||||
Replace `__INGRESS_HOST__` with a valid FQDN and `__INGRESS_SECRET__` with a Secret with a valid SSL certificate.
|
||||
|
||||
5. Deploy the oauth2 proxy and the ingress rules running:
|
||||
4. Deploy the oauth2 proxy and the ingress rules by running:
|
||||
|
||||
```console
|
||||
$ kubectl create -f oauth2-proxy.yaml,dashboard-ingress.yaml
|
||||
$ kubectl create -f oauth2-proxy.yaml
|
||||
```
|
||||
|
||||
### Test
|
||||
#### Test
|
||||
|
||||
Test the oauth integration accessing the configured URL, e.g. `https://foo.bar.com`
|
||||
Test the integration by accessing the configured URL, e.g. `https://foo.bar.com`
|
||||
|
||||

|
||||
|
||||

|
||||
|
||||

|
||||
|
||||
|
||||
### Example: Vouch Proxy + Kubernetes-Dashboard
|
||||
|
||||
This example will show you how to deploy [`Vouch Proxy`](https://github.com/vouch/vouch-proxy)
|
||||
into a Kubernetes cluster and use it to protect the Kubernetes Dashboard using GitHub as the OAuth2 provider.
|
||||
|
||||
#### Prepare
|
||||
|
||||
1. Install the kubernetes dashboard
|
||||
|
||||
```console
|
||||
kubectl create -f https://raw.githubusercontent.com/kubernetes/kops/master/addons/kubernetes-dashboard/v1.10.1.yaml
|
||||
```
|
||||
|
||||
2. Create a [custom GitHub OAuth application](https://github.com/settings/applications/new)
|
||||
|
||||

|
||||
|
||||
- Homepage URL is the FQDN in the Ingress rule, like `https://foo.bar.com`
|
||||
- Authorization callback URL is the same as the base FQDN plus `/oauth2/auth`, like `https://foo.bar.com/oauth2/auth`
|
||||
|
||||

|
||||
|
||||
3. Configure Vouch Proxy values in the file [`vouch-proxy.yaml`](https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/docs/examples/auth/oauth-external-auth/vouch-proxy.yaml) with the values:
|
||||
|
||||
- VOUCH_COOKIE_DOMAIN with value of `<Ingress Host>`
|
||||
- OAUTH_CLIENT_ID with the github `<Client ID>`
|
||||
- OAUTH_CLIENT_SECRET with the github `<Client Secret>`
|
||||
- (optional, but recommended) VOUCH_WHITELIST with GitHub usernames to allow to login
|
||||
- `__INGRESS_HOST__` with a valid FQDN (e.g. `foo.bar.com`)
|
||||
- `__INGRESS_SECRET__` with a Secret with a valid SSL certificate
|
||||
|
||||
4. Deploy Vouch Proxy and the ingress rules by running:
|
||||
|
||||
```console
|
||||
$ kubectl create -f vouch-proxy.yaml
|
||||
```
|
||||
|
||||
#### Test
|
||||
|
||||
Test the integration by accessing the configured URL, e.g. `https://foo.bar.com`
|
||||
|
||||

|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue