Skip to content

Commit b4ea6ca

Browse files
onprem: 2.2.1 release (#1198)
1 parent 9dd9357 commit b4ea6ca

File tree

4 files changed

+57
-9
lines changed

4 files changed

+57
-9
lines changed

codefresh/Chart.lock

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -155,5 +155,5 @@ dependencies:
155155
- name: cf-oidc-provider
156156
repository: oci://quay.io/codefresh/charts
157157
version: 0.0.12
158-
digest: sha256:00e272664f19b5a9366b8252e3469d57d02a9d8f6d012395209bbafa7cd0c2f4
159-
generated: "2023-12-21T15:39:10.200712245+03:00"
158+
digest: sha256:c41647766a703dc3ef7d25f551f14f9ef22444fb889de45471a300719e01c2d1
159+
generated: "2023-12-22T18:56:48.912063009+03:00"

codefresh/Chart.yaml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
apiVersion: v2
22
description: Helm Chart for Codefresh On-Prem
33
name: codefresh
4-
version: 2.2.0
4+
version: 2.2.1
55
keywords:
66
- codefresh
77
home: https://codefresh.io/
@@ -14,10 +14,11 @@ maintainers:
1414
appVersion: 2.2.0
1515
annotations:
1616
artifacthub.io/alternativeName: "codefresh-onprem"
17-
artifacthub.io/prerelease: "true"
1817
artifacthub.io/changes: |
1918
- kind: changed
20-
description: Onprem 2.2.0 release
19+
description: Update docs about JWKS for OIDC Provider
20+
- kind: changed
21+
description: Lock argo-platform version
2122
dependencies:
2223
- name: cf-common
2324
repository: oci://quay.io/codefresh/charts
@@ -230,7 +231,7 @@ dependencies:
230231
repository: oci://quay.io/codefresh/charts
231232
condition: argo-platform.enabled
232233
- name: argo-platform
233-
version: "*"
234+
version: "1.2577.0"
234235
repository: oci://quay.io/codefresh/charts
235236
condition: argo-platform.enabled
236237
- name: argo-hub-platform

codefresh/README.md

Lines changed: 25 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
## Codefresh On-Premises
22

3-
![Version: 2.2.0](https://img.shields.io/badge/Version-2.2.0-informational?style=flat-square) ![AppVersion: 2.2.0](https://img.shields.io/badge/AppVersion-2.2.0-informational?style=flat-square)
3+
![Version: 2.2.1](https://img.shields.io/badge/Version-2.2.1-informational?style=flat-square) ![AppVersion: 2.2.0](https://img.shields.io/badge/AppVersion-2.2.0-informational?style=flat-square)
44

55
Helm chart for deploying [Codefresh On-Premises](https://codefresh.io/docs/docs/getting-started/intro-to-codefresh/) to Kubernetes.
66

@@ -1209,7 +1209,30 @@ OpenID Connect (OIDC) allows Codefresh Builds to access resources in your cloud
12091209
12101210
> **NOTE!** In production usage use [External Secrets Operator](https://external-secrets.io/latest/) or [HashiCorp Vault](https://developer.hashicorp.com/vault/docs/platform/k8s) to create secrets. The following example uses `kubectl` for brevity.
12111211
1212-
```shell
1212+
For JWKS use **Public and Private Keypair Set** (if generated at [mkjwk.org](https://mkjwk.org/)), for example:
1213+
1214+
`cf-oidc-provider-jwks.json`:
1215+
```json
1216+
{
1217+
"keys": [
1218+
{
1219+
"p": "...",
1220+
"kty": "RSA",
1221+
"q": "...",
1222+
"d": "...",
1223+
"e": "AQAB",
1224+
"use": "sig",
1225+
"qi": "...",
1226+
"dp": "...",
1227+
"alg": "RS256",
1228+
"dq": "...",
1229+
"n": "..."
1230+
}
1231+
]
1232+
}
1233+
```
1234+
1235+
```console
12131236
# Creating secret containing JWKS.
12141237
# The secret KEY is `cf-oidc-provider-jwks.json`. It then referenced in `OIDC_JWKS_PRIVATE_KEYS_PATH` environment variable in `cf-oidc-provider`.
12151238
# The secret NAME is referenced in `.volumes.jwks-file.nameOverride` (volumeMount is configured in the chart already)

codefresh/README.md.gotmpl

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1214,7 +1214,31 @@ OpenID Connect (OIDC) allows Codefresh Builds to access resources in your cloud
12141214

12151215
> **NOTE!** In production usage use [External Secrets Operator](https://external-secrets.io/latest/) or [HashiCorp Vault](https://developer.hashicorp.com/vault/docs/platform/k8s) to create secrets. The following example uses `kubectl` for brevity.
12161216

1217-
```shell
1217+
For JWKS use **Public and Private Keypair Set** (if generated at [mkjwk.org](https://mkjwk.org/)), for example:
1218+
1219+
`cf-oidc-provider-jwks.json`:
1220+
```json
1221+
{
1222+
"keys": [
1223+
{
1224+
"p": "...",
1225+
"kty": "RSA",
1226+
"q": "...",
1227+
"d": "...",
1228+
"e": "AQAB",
1229+
"use": "sig",
1230+
"qi": "...",
1231+
"dp": "...",
1232+
"alg": "RS256",
1233+
"dq": "...",
1234+
"n": "..."
1235+
}
1236+
]
1237+
}
1238+
```
1239+
1240+
1241+
```console
12181242
# Creating secret containing JWKS.
12191243
# The secret KEY is `cf-oidc-provider-jwks.json`. It then referenced in `OIDC_JWKS_PRIVATE_KEYS_PATH` environment variable in `cf-oidc-provider`.
12201244
# The secret NAME is referenced in `.volumes.jwks-file.nameOverride` (volumeMount is configured in the chart already)

0 commit comments

Comments
 (0)