From 0129f545372a614b636c7b1a1c4505893b222e19 Mon Sep 17 00:00:00 2001 From: Joao Victor Portal Date: Fri, 14 Jul 2023 14:01:05 -0300 Subject: [PATCH] Update Dex image and chart versions Story: 2010703 Task: 48391 Signed-off-by: Joao Victor Portal Change-Id: I6d29c71ec6c701a06f9ba47d21092c1b06ca22a2 --- .../kubernetes/configure-oidc-auth-applications.rst | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/doc/source/security/kubernetes/configure-oidc-auth-applications.rst b/doc/source/security/kubernetes/configure-oidc-auth-applications.rst index cdd951c53..811fec61c 100644 --- a/doc/source/security/kubernetes/configure-oidc-auth-applications.rst +++ b/doc/source/security/kubernetes/configure-oidc-auth-applications.rst @@ -305,17 +305,17 @@ Configure OIDC Auth Applications For the complete list of dex helm chart values supported, see `Dex Helm Chart Values - `__. + `__. For the complete list of parameters of the dex |LDAP| connector configuration, see `Authentication Through LDAP `__. The overall Dex documentation is available on `dexidp.io `__. The configuration of dex server version - v2.31.1 is described on github - (https://github.com/dexidp/dex/blob/v2.31.1/config.yaml.dist) with example + v2.36.0 is described on github + (https://github.com/dexidp/dex/blob/v2.36.0/config.yaml.dist) with example ``config.dev.yaml`` - (https://github.com/dexidp/dex/blob/v2.31.1/config.dev.yaml). + (https://github.com/dexidp/dex/blob/v2.36.0/config.dev.yaml). The example below configures a token expiry of ten hours, a single |LDAP| connector to an Active Directory service using HTTPS (LDAPS) using the @@ -468,7 +468,7 @@ are: image: repository: ghcr.io/dexidp/dex pullPolicy: IfNotPresent - tag: v2.31.1 + tag: v2.36.0 imagePullSecrets: - name: default-registry-key env: