Sensitive OAuth source settings via Kubernetes secret #242
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
As of today it is only possible to pass
keyandsecretvalues for OAuth sources as plaintext which might not secure enough for users. Similar to LDAP or admin user settings it should be possible to provide such sensitive data via Kubernetes secrets.