---
apiVersion: v1
kind: ConfigMap
metadata:
  name: kube-oidc-proxy-0.3.4-d2iq-defaults
  namespace: ${releaseNamespace}
data:
  values.yaml: |-
    ---
    # See: https://github.com/mesosphere/dkp-container-images/tree/main/kube-oidc-proxy
    image:
      repository: ghcr.io/mesosphere/dkp-container-images/kube-oidc-proxy
      tag: 1.0.6
    priorityClassName: "dkp-critical-priority"
    deploymentAnnotations:
      # Config changes and certificate rotation by cert-manager need a reload
      secret.reloader.stakater.com/reload: "kube-oidc-proxy-config,kube-oidc-proxy-server-tls" # If a fullNameOverride has been set, change the value of "kube-oidc-proxy" accordingly.
    ingress:
      enabled: true
      annotations:
        kubernetes.io/ingress.class: kommander-traefik
        ingress.kubernetes.io/protocol: https
        traefik.ingress.kubernetes.io/rule-type: PathPrefixStrip
        traefik.ingress.kubernetes.io/router.middlewares: "${workspaceNamespace}-stripprefixes@kubernetescrd"
        traefik.ingress.kubernetes.io/router.tls: "true"
      path: /dkp/api-server
      hosts:
        - ""
    oidc:
      clientId: kube-apiserver
      # will be overridden by the controller
      issuerUrl: https://dex.${releaseNamespace}.svc.cluster.local:8080/dex
      usernameClaim: email
      groupsClaim: groups
      groupsPrefix: "oidc:"
      # This must be set when using custom built image which is based on alpine.
      caSystemDefaultPath: "/etc/ssl/certs/certs-bundle.crt"
    tokenPassthrough:
      enabled: true
    certIssuerRef:
      kind: ${certificateIssuerKind:=Issuer}
      name: ${certificateIssuerName}
    dnsNames:
      - kube-oidc-proxy
      - kube-oidc-proxy.${releaseNamespace}
      - kube-oidc-proxy.${releaseNamespace}.svc
      - kube-oidc-proxy.${releaseNamespace}.svc.cluster
      - kube-oidc-proxy.${releaseNamespace}.svc.cluster.local