You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| advancedConfig | object |`{}`| Advanced configuration. You can pass here any valid Polaris or Quarkus configuration property. Any property that is defined here takes precedence over all the other configuration values generated by this chart. Properties can be passed "flattened" or as nested YAML objects (see examples below). Note: values should be strings; avoid using numbers, booleans, or other types. |
191
191
| affinity | object |`{}`| Affinity and anti-affinity for polaris pods. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity.|
| authentication.authenticator | object |`{"type":"default"}`| The type of authentication to use. Two built-in types are supported: default and test; test is not recommended for production. |
194
-
| authentication.tokenBroker | object |`{"maxTokenGeneration":"PT1H","secret":{"name":null,"privateKey":"private.pem","publicKey":"public.pem","rsaKeyPair":{"privateKey":"private.pem","publicKey":"public.pem"},"secretKey":"symmetric.pem","symmetricKey":{"secretKey":"symmetric.pem"}},"type":"rsa-key-pair"}`| The type of token broker to use. Two built-in types are supported: rsa-key-pair and symmetric-key. |
| authentication.activeRolesProvider | object |`{"type":"default"}`| The `ActiveRolesProvider` implementation to use. Only one built-in type is supported: default. |
194
+
| authentication.authenticator | object |`{"type":"default"}`| The `Authenticator` implementation to use. Only one built-in type is supported: default. |
| authentication.tokenBroker | object |`{"maxTokenGeneration":"PT1H","secret":{"name":null,"privateKey":"private.pem","publicKey":"public.pem","rsaKeyPair":{"privateKey":"private.pem","publicKey":"public.pem"},"secretKey":"symmetric.pem","symmetricKey":{"secretKey":"symmetric.key"}},"type":"rsa-key-pair"}`| The `TokenBroker` implementation to use. Two built-in types are supported: rsa-key-pair and symmetric-key. Only relevant when using internal (or mixed) authentication. When using external authentication, the token broker is not used. |
195
197
| authentication.tokenBroker.maxTokenGeneration | string |`"PT1H"`| Maximum token generation duration (e.g., PT1H for 1 hour). |
196
-
| authentication.tokenBroker.secret | object |`{"name":null,"privateKey":"private.pem","publicKey":"public.pem","rsaKeyPair":{"privateKey":"private.pem","publicKey":"public.pem"},"secretKey":"symmetric.pem","symmetricKey":{"secretKey":"symmetric.pem"}}`| The secret name to pull the public and private keys, or the symmetric key secret from. |
198
+
| authentication.tokenBroker.secret | object |`{"name":null,"privateKey":"private.pem","publicKey":"public.pem","rsaKeyPair":{"privateKey":"private.pem","publicKey":"public.pem"},"secretKey":"symmetric.pem","symmetricKey":{"secretKey":"symmetric.key"}}`| The secret name to pull the public and private keys, or the symmetric key secret from. |
197
199
| authentication.tokenBroker.secret.name | string |`nil`| The name of the secret to pull the keys from. If not provided, a key pair will be generated. This is not recommended for production. |
198
200
| authentication.tokenBroker.secret.privateKey | string |`"private.pem"`| DEPRECATED: Use `authentication.tokenBroker.secret.rsaKeyPair.privateKey` instead. Key name inside the secret for the private key |
199
201
| authentication.tokenBroker.secret.publicKey | string |`"public.pem"`| DEPRECATED: Use `authentication.tokenBroker.secret.rsaKeyPair.publicKey` instead. Key name inside the secret for the public key |
200
202
| authentication.tokenBroker.secret.rsaKeyPair | object |`{"privateKey":"private.pem","publicKey":"public.pem"}`| Optional: configuration specific to RSA key pair secret. |
201
203
| authentication.tokenBroker.secret.rsaKeyPair.privateKey | string |`"private.pem"`| Key name inside the secret for the private key |
202
204
| authentication.tokenBroker.secret.rsaKeyPair.publicKey | string |`"public.pem"`| Key name inside the secret for the public key |
203
205
| authentication.tokenBroker.secret.secretKey | string |`"symmetric.pem"`| DEPRECATED: Use `authentication.tokenBroker.secret.symmetricKey.secretKey` instead. Key name inside the secret for the symmetric key |
204
-
| authentication.tokenBroker.secret.symmetricKey | object |`{"secretKey":"symmetric.pem"}`| Optional: configuration specific to symmetric key secret. |
205
-
| authentication.tokenBroker.secret.symmetricKey.secretKey | string |`"symmetric.pem"`| Key name inside the secret for the symmetric key |
206
-
| authentication.tokenService | object |`{"type":"default"}`| The type of token service to use. Two built-in types are supported: default and test; test is not recommended for production. |
206
+
| authentication.tokenBroker.secret.symmetricKey | object |`{"secretKey":"symmetric.key"}`| Optional: configuration specific to symmetric key secret. |
207
+
| authentication.tokenBroker.secret.symmetricKey.secretKey | string |`"symmetric.key"`| Key name inside the secret for the symmetric key |
208
+
| authentication.tokenService | object |`{"type":"default"}`| The token service (`IcebergRestOAuth2ApiService`) implementation to use. Two built-in types are supported: default and disabled. Only relevant when using internal (or mixed) authentication. When using external authentication, the token service is always disabled. |
209
+
| authentication.type | string |`"internal"`| The type of authentication to use. Three built-in types are supported: internal, external, and mixed. |
207
210
| autoscaling.enabled | bool |`false`| Specifies whether automatic horizontal scaling should be enabled. Do not enable this when using in-memory version store type. |
208
211
| autoscaling.maxReplicas | int |`3`| The maximum number of replicas to maintain. |
209
212
| autoscaling.minReplicas | int |`1`| The minimum number of replicas to maintain. |
| metrics.enabled | bool |`true`| Specifies whether metrics for the polaris server should be enabled. |
284
287
| metrics.tags | object |`{}`| Additional tags (dimensional labels) to add to the metrics. |
285
288
| nodeSelector | object |`{}`| Node labels which must match for the polaris pod to be scheduled on that node. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector.|
289
+
| oidc | object |`{"authServeUrl":null,"client":{"id":"polaris","secret":{"key":"clientSecret","name":null}},"principalMapper":{"idClaimPath":null,"nameClaimPath":null,"type":"default"},"principalRolesMapper":{"filter":null,"mappings":[],"rolesClaimPath":null,"type":"default"}}`| Polaris OIDC configuration. Only relevant when at least one realm is configured for external (or mixed) authentication. The currently supported configuration is for a single, default OIDC tenant. For more complex scenarios, including OIDC multi-tenancy, you will need to provide the relevant configuration using the `advancedConfig` section. |
290
+
| oidc.authServeUrl | string |`nil`| The authentication server URL. Must be provided if at least one realm is configured for external authentication. |
291
+
| oidc.client | object |`{"id":"polaris","secret":{"key":"clientSecret","name":null}}`| The client to use when authenticating with the authentication server. |
292
+
| oidc.client.id | string |`"polaris"`| The client ID to use when contacting the authentication server's introspection endpoint in order to validate tokens. |
293
+
| oidc.client.secret | object |`{"key":"clientSecret","name":null}`| The secret to pull the client secret from. If no client secret is required, leave the secret name unset. |
294
+
| oidc.client.secret.key | string |`"clientSecret"`| The key name inside the secret to pull the client secret from. |
295
+
| oidc.client.secret.name | string |`nil`| The name of the secret to pull the client secret from. If not provided, the client is assumed to not require a client secret when contacting the introspection endpoint. |
296
+
| oidc.principalMapper | object |`{"idClaimPath":null,"nameClaimPath":null,"type":"default"}`| Principal mapping configuration. |
297
+
| oidc.principalMapper.idClaimPath | string |`nil`| The path to the claim that contains the principal ID. Nested paths can be expressed using "/" as a separator, e.g. "polaris/principal_id" would look for the "principal_id" field inside the "polaris" object in the token claims. Optional. Either this option or `nameClaimPath` (or both) must be provided. |
298
+
| oidc.principalMapper.nameClaimPath | string |`nil`| The claim that contains the principal name. Nested paths can be expressed using "/" as a separator, e.g. "polaris/principal_name" would look for the "principal_name" field inside the "polaris" object in the token claims. Optional. Either this option or `idClaimPath` (or both) must be provided. |
299
+
| oidc.principalMapper.type | string |`"default"`| The `PrincipalMapper` implementation to use. Only one built-in type is supported: default. |
300
+
| oidc.principalRolesMapper | object |`{"filter":null,"mappings":[],"rolesClaimPath":null,"type":"default"}`| Principal roles mapping configuration. |
301
+
| oidc.principalRolesMapper.filter | string |`nil`| A regular expression that matches the role names in the identity. Only roles that match this regex will be included in the Polaris-specific roles. |
302
+
| oidc.principalRolesMapper.mappings | list |`[]`| A list of regex mappings that will be applied to each role name in the identity. This can be used to transform the role names in the identity into role names as expected by Polaris. The default ActiveRolesProvider expects the security identity to expose role names in the format `POLARIS_ROLE:<role name>`. |
303
+
| oidc.principalRolesMapper.rolesClaimPath | string |`nil`| The path to the claim that contains the principal roles. Nested paths can be expressed using "/" as a separator, e.g. "polaris/principal_roles" would look for the "principal_roles" field inside the "polaris" object in the token claims. If not set, Quarkus looks for roles in standard locations. See https://quarkus.io/guides/security-oidc-bearer-token-authentication#token-claims-and-security-identity-roles.|
304
+
| oidc.principalRolesMapper.type | string |`"default"`| The `PrincipalRolesMapper` implementation to use. Only one built-in type is supported: default. |
| persistence.relationalJdbc | object |`{"secret":{"jdbcUrl":"jdbcUrl","name":null,"password":"password","username":"username"}}`| The configuration for the relational-jdbc persistence manager. |
288
307
| persistence.relationalJdbc.secret | object |`{"jdbcUrl":"jdbcUrl","name":null,"password":"password","username":"username"}`| The secret name to pull the database connection properties from. |
0 commit comments