You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Helm chart for deploying [Codefresh On-Premises](https://codefresh.io/docs/docs/getting-started/intro-to-codefresh/) to Kubernetes.
6
6
@@ -1209,7 +1209,30 @@ OpenID Connect (OIDC) allows Codefresh Builds to access resources in your cloud
1209
1209
1210
1210
> **NOTE!** In production usage use [External Secrets Operator](https://external-secrets.io/latest/) or [HashiCorp Vault](https://developer.hashicorp.com/vault/docs/platform/k8s) to create secrets. The following example uses `kubectl` for brevity.
1211
1211
1212
-
```shell
1212
+
For JWKS use **Public and Private Keypair Set** (if generated at [mkjwk.org](https://mkjwk.org/)), for example:
1213
+
1214
+
`cf-oidc-provider-jwks.json`:
1215
+
```json
1216
+
{
1217
+
"keys": [
1218
+
{
1219
+
"p": "...",
1220
+
"kty": "RSA",
1221
+
"q": "...",
1222
+
"d": "...",
1223
+
"e": "AQAB",
1224
+
"use": "sig",
1225
+
"qi": "...",
1226
+
"dp": "...",
1227
+
"alg": "RS256",
1228
+
"dq": "...",
1229
+
"n": "..."
1230
+
}
1231
+
]
1232
+
}
1233
+
```
1234
+
1235
+
```console
1213
1236
# Creating secret containing JWKS.
1214
1237
# The secret KEY is `cf-oidc-provider-jwks.json`. It then referenced in`OIDC_JWKS_PRIVATE_KEYS_PATH` environment variable in`cf-oidc-provider`.
1215
1238
# The secret NAME is referenced in`.volumes.jwks-file.nameOverride` (volumeMount is configured in the chart already)
Copy file name to clipboardExpand all lines: codefresh/README.md.gotmpl
+25-1Lines changed: 25 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1214,7 +1214,31 @@ OpenID Connect (OIDC) allows Codefresh Builds to access resources in your cloud
1214
1214
1215
1215
> **NOTE!** In production usage use [External Secrets Operator](https://external-secrets.io/latest/) or [HashiCorp Vault](https://developer.hashicorp.com/vault/docs/platform/k8s) to create secrets. The following example uses `kubectl` for brevity.
1216
1216
1217
-
```shell
1217
+
For JWKS use **Public and Private Keypair Set** (if generated at [mkjwk.org](https://mkjwk.org/)), for example:
1218
+
1219
+
`cf-oidc-provider-jwks.json`:
1220
+
```json
1221
+
{
1222
+
"keys": [
1223
+
{
1224
+
"p": "...",
1225
+
"kty": "RSA",
1226
+
"q": "...",
1227
+
"d": "...",
1228
+
"e": "AQAB",
1229
+
"use": "sig",
1230
+
"qi": "...",
1231
+
"dp": "...",
1232
+
"alg": "RS256",
1233
+
"dq": "...",
1234
+
"n": "..."
1235
+
}
1236
+
]
1237
+
}
1238
+
```
1239
+
1240
+
1241
+
```console
1218
1242
# Creating secret containing JWKS.
1219
1243
# The secret KEY is `cf-oidc-provider-jwks.json`. It then referenced in `OIDC_JWKS_PRIVATE_KEYS_PATH` environment variable in `cf-oidc-provider`.
1220
1244
# The secret NAME is referenced in `.volumes.jwks-file.nameOverride` (volumeMount is configured in the chart already)
0 commit comments