You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| advancedConfig | object |`{}`| Advanced configuration. You can pass here any valid Polaris or Quarkus configuration property. Any property that is defined here takes precedence over all the other configuration values generated by this chart. Properties can be passed "flattened" or as nested YAML objects (see examples below). Note: values should be strings; avoid using numbers, booleans, or other types. |
191
191
| affinity | object |`{}`| Affinity and anti-affinity for polaris pods. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity.|
| authentication.authenticator | object |`{"type":"default"}`| The type of authentication to use. Two built-in types are supported: default and test; test is not recommended for production. |
194
-
| authentication.tokenBroker | object |`{"maxTokenGeneration":"PT1H","secret":{"name":null,"privateKey":"private.pem","publicKey":"public.pem","rsaKeyPair":{"privateKey":"private.pem","publicKey":"public.pem"},"secretKey":"symmetric.pem","symmetricKey":{"secretKey":"symmetric.pem"}},"type":"rsa-key-pair"}`| The type of token broker to use. Two built-in types are supported: rsa-key-pair and symmetric-key. |
| authentication.activeRolesProvider | object |`{"type":"default"}`| The `ActiveRolesProvider` implementation to use. Only one built-in type is supported: default. |
194
+
| authentication.authenticator | object |`{"type":"default"}`| The `Authenticator` implementation to use. Only one built-in type is supported: default. |
| authentication.tokenBroker | object |`{"maxTokenGeneration":"PT1H","secret":{"name":null,"privateKey":"private.pem","publicKey":"public.pem","rsaKeyPair":{"privateKey":"private.pem","publicKey":"public.pem"},"secretKey":"symmetric.key","symmetricKey":{"secretKey":"symmetric.key"}},"type":"rsa-key-pair"}`| The TokenBroker implementation to use. Two built-in types are supported: rsa-key-pair and symmetric-key. |
195
197
| authentication.tokenBroker.maxTokenGeneration | string |`"PT1H"`| Maximum token generation duration (e.g., PT1H for 1 hour). |
196
-
| authentication.tokenBroker.secret | object |`{"name":null,"privateKey":"private.pem","publicKey":"public.pem","rsaKeyPair":{"privateKey":"private.pem","publicKey":"public.pem"},"secretKey":"symmetric.pem","symmetricKey":{"secretKey":"symmetric.pem"}}`| The secret name to pull the public and private keys, or the symmetric key secret from. |
198
+
| authentication.tokenBroker.secret | object |`{"name":null,"privateKey":"private.pem","publicKey":"public.pem","rsaKeyPair":{"privateKey":"private.pem","publicKey":"public.pem"},"secretKey":"symmetric.key","symmetricKey":{"secretKey":"symmetric.key"}}`| The secret name to pull the public and private keys, or the symmetric key secret from. |
197
199
| authentication.tokenBroker.secret.name | string |`nil`| The name of the secret to pull the keys from. If not provided, a key pair will be generated. This is not recommended for production. |
198
200
| authentication.tokenBroker.secret.privateKey | string |`"private.pem"`| DEPRECATED: Use `authentication.tokenBroker.secret.rsaKeyPair.privateKey` instead. Key name inside the secret for the private key |
199
201
| authentication.tokenBroker.secret.publicKey | string |`"public.pem"`| DEPRECATED: Use `authentication.tokenBroker.secret.rsaKeyPair.publicKey` instead. Key name inside the secret for the public key |
200
202
| authentication.tokenBroker.secret.rsaKeyPair | object |`{"privateKey":"private.pem","publicKey":"public.pem"}`| Optional: configuration specific to RSA key pair secret. |
201
203
| authentication.tokenBroker.secret.rsaKeyPair.privateKey | string |`"private.pem"`| Key name inside the secret for the private key |
202
204
| authentication.tokenBroker.secret.rsaKeyPair.publicKey | string |`"public.pem"`| Key name inside the secret for the public key |
203
-
| authentication.tokenBroker.secret.secretKey | string |`"symmetric.pem"`| DEPRECATED: Use `authentication.tokenBroker.secret.symmetricKey.secretKey` instead. Key name inside the secret for the symmetric key |
204
-
| authentication.tokenBroker.secret.symmetricKey | object |`{"secretKey":"symmetric.pem"}`| Optional: configuration specific to symmetric key secret. |
205
-
| authentication.tokenBroker.secret.symmetricKey.secretKey | string |`"symmetric.pem"`| Key name inside the secret for the symmetric key |
206
-
| authentication.tokenService | object |`{"type":"default"}`| The type of token service to use. Two built-in types are supported: default and test; test is not recommended for production. |
205
+
| authentication.tokenBroker.secret.secretKey | string |`"symmetric.key"`| DEPRECATED: Use `authentication.tokenBroker.secret.symmetricKey.secretKey` instead. Key name inside the secret for the symmetric key |
206
+
| authentication.tokenBroker.secret.symmetricKey | object |`{"secretKey":"symmetric.key"}`| Optional: configuration specific to symmetric key secret. |
207
+
| authentication.tokenBroker.secret.symmetricKey.secretKey | string |`"symmetric.key"`| Key name inside the secret for the symmetric key |
208
+
| authentication.tokenService | object |`{"type":"default"}`| The token service (`IcebergRestOAuth2ApiService`) implementation to use. Two built-in types are supported: default and disabled. The disabled type is always used when `authentication.type` is set to external. |
209
+
| authentication.type | string |`"internal"`| The type of authentication to use. Three built-in types are supported: internal, external, and mixed. |
207
210
| autoscaling.enabled | bool |`false`| Specifies whether automatic horizontal scaling should be enabled. Do not enable this when using in-memory version store type. |
208
211
| autoscaling.maxReplicas | int |`3`| The maximum number of replicas to maintain. |
209
212
| autoscaling.minReplicas | int |`1`| The minimum number of replicas to maintain. |
| metrics.enabled | bool |`true`| Specifies whether metrics for the polaris server should be enabled. |
284
287
| metrics.tags | object |`{}`| Additional tags (dimensional labels) to add to the metrics. |
285
288
| nodeSelector | object |`{}`| Node labels which must match for the polaris pod to be scheduled on that node. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector.|
289
+
| oidc | object |`{"authServeUrl":null,"client":{"id":"polaris","secret":{"clientSecret":"clientSecret","name":null}},"principalMapper":{"idClaimPath":null,"nameClaimPath":null,"type":"default"},"principalRolesMapper":{"filter":null,"mappings":[],"rolesClaimPath":null,"type":"default"}}`| Polaris OIDC configuration. Only relevant when at least one realm is configured for external (or mixed) authentication. The currently supported configuration is for a single, default OIDC tenant. For more complex scenarios, including OIDC multi-tenancy, you will need to provide the relevant configuration using the `advancedConfig` section. |
290
+
| oidc.authServeUrl | string |`nil`| The authentication server URL. Must be provided if at least one realm is configured for external authentication. |
291
+
| oidc.client | object |`{"id":"polaris","secret":{"clientSecret":"clientSecret","name":null}}`| The client to use when authenticating with the authentication server. |
292
+
| oidc.client.id | string |`"polaris"`| The client ID to use when authenticating with the authentication server. |
293
+
| oidc.client.secret | object |`{"clientSecret":"clientSecret","name":null}`| The secret to pull the client secret from. |
294
+
| oidc.client.secret.clientSecret | string |`"clientSecret"`| The key name inside the secret to pull the client secret from. |
295
+
| oidc.client.secret.name | string |`nil`| The name of the secret to pull the client secret from. |
296
+
| oidc.principalMapper | object |`{"idClaimPath":null,"nameClaimPath":null,"type":"default"}`| Principal mapping configuration. |
297
+
| oidc.principalMapper.idClaimPath | string |`nil`| The path to the claim that contains the principal ID. Nested paths can be expressed using "/" as a separator, e.g. "polaris/principal_id" would look for the "principal_id" field inside the "polaris" object in the token claims. |
298
+
| oidc.principalMapper.nameClaimPath | string |`nil`| The claim that contains the principal name. Nested paths can be expressed using "/" as a separator, e.g. "polaris/principal_name" would look for the "principal_name" field inside the "polaris" object in the token claims. |
299
+
| oidc.principalMapper.type | string |`"default"`| The `PrincipalMapper` implementation to use. Only one built-in type is supported: default. |
300
+
| oidc.principalRolesMapper | object |`{"filter":null,"mappings":[],"rolesClaimPath":null,"type":"default"}`| Principal roles mapping configuration. |
301
+
| oidc.principalRolesMapper.filter | string |`nil`| A regular expression that matches the role names in the identity. Only roles that match this regex will be included in the Polaris-specific roles. |
302
+
| oidc.principalRolesMapper.mappings | list |`[]`| A list of regex mappings that will be applied to each role name in the identity. |
303
+
| oidc.principalRolesMapper.rolesClaimPath | string |`nil`| The path to the claim that contains the principal roles. Nested paths can be expressed using "/" as a separator, e.g. "polaris/principal_roles" would look for the "principal_roles" field inside the "polaris" object in the token claims. |
304
+
| oidc.principalRolesMapper.type | string |`"default"`| The `PrincipalRolesMapper` implementation to use. Only one built-in type is supported: default. |
| persistence.relationalJdbc | object |`{"secret":{"jdbcUrl":"jdbcUrl","name":null,"password":"password","username":"username"}}`| The configuration for the relational-jdbc persistence manager. |
288
307
| persistence.relationalJdbc.secret | object |`{"jdbcUrl":"jdbcUrl","name":null,"password":"password","username":"username"}`| The secret name to pull the database connection properties from. |
0 commit comments