@@ -17,14 +17,14 @@ You can:
17
17
18
18
1 . Download the [ cli] [ cli-download ] and add it to your ` $PATH ` .
19
19
1 . Get a k8s cluster. [ k3d] [ k3d ] is a convenient way to get a cluster up and
20
- running fast. Follow their [ installation] instructions and create a default
20
+ running fast. Follow their installation instructions and create a default
21
21
cluster.
22
22
1 . Grant your email address access to the cluster. Choose ` cluster-admin ` if
23
23
you'd like something simple to check out how things work. For more details on
24
- the minimum possible permissions, read the [ Authorization] section. The email
25
- address is what you'll be using to authenticate against. It can either be the
26
- one associated with a google or github account. Note, the ID used for login
27
- and the providers available can all be configured.
24
+ the minimum possible permissions, read the [ Authorization] ( #authorization )
25
+ section. The email address is what you'll be using to authenticate against.
26
+ It can either be the one associated with a google or github account. Note,
27
+ the ID used for login and the providers available can all be configured.
28
28
29
29
``` bash
30
30
kuberift users grant < cluster-role> < email-address>
@@ -84,9 +84,9 @@ your cluster, you can run:
84
84
85
85
``` bash
86
86
helm install kuberift oci://ghcr.io/grampelberg/helm/kuberift \
87
- -n kuberift --create-namespace \
88
- --version $( curl -L https://api.github.com/repos/grampelberg/kuberift/tags | jq -r ' .[0].name' | cut -c2-) \
89
- -f https://raw.githubusercontent.com/grampelberg/kuberift/main/helm/getting-started.yaml
87
+ -n kuberift --create-namespace \
88
+ --version $( curl -L https://api.github.com/repos/grampelberg/kuberift/tags | jq -r ' .[0].name' | cut -c2-) \
89
+ -f https://raw.githubusercontent.com/grampelberg/kuberift/main/helm/getting-started.yaml
90
90
```
91
91
92
92
Note: this exposes the kuberift service externally by default. To get that IP
@@ -264,22 +264,3 @@ the design decisions section for an explanation of what's happening there.
264
264
265
265
- See releases for the latest tagged release.
266
266
- The ` unstable ` tag is updated on every merge to main.
267
-
268
- ## TODO
269
-
270
- - Groups are probably what most users are going to want to use to configure all
271
- this. The closest to the OpenID spec would be via adding extra scopes that add
272
- the data required to the token and then map back to a group. Imagine:
273
-
274
- ``` yaml
275
- user : email
276
- group : https://myapp.example.com/group
277
- ` ` `
278
-
279
- The downside to using this kind of configuration is that it'll need to be
280
- handled in the provider backend and it is unclear how easy that'll be. It is
281
- possible in auth0, so I'll go down this route for now.
282
-
283
- - Is there a way to do FPS on a per-session basis with prometheus? Naively the
284
- way to do it would be to have a per-session label value, but that would be
285
- crazy for cardinality.
0 commit comments