Parameters
The parent key for all of the following parameters is lieutenant_keycloak_idp_controller
.
namespace
type |
string |
default |
|
The namespace in which to deploy this component.
manifests_version
type |
string |
default |
|
The Git reference to the controller deployment manifests. The default is the tag of the controller image.
controller.env
type |
dict |
default |
|
example |
|
The environment variables to set for the controller container.
String values are taken verbatim as the value
fiels, dictionary values are rendered as valueFrom
fields.
controller.args
type |
list |
default |
|
The arguments to pass to the controller container.
controller.resources
type |
dict |
default |
|
The resource limits and requests for the controller container.
templates
type |
dict |
default |
See |
The templates for the controller to use.
Templates can include each other using the import
function.
Default template creates a client with the following settings:
- full scope is disabled for security reasons
- access type is confidential
- standard flow is enabled
- direct access grants are enabled
- client role restricted-access
is created for github.com/sventorben/keycloak-restrict-client-auth#role-based-mode
- client roles are mapped to the roles
key of the JWT token
secrets
type |
dict |
default |
|
example |
|
This parameter allows to deploy arbitrary secrets. Each entry is transformed into a Secret resource. The key is used as the name of the resulting resource. The provided value is merged with an empty Secret resource.
Always use stringData when using Vault references in secret configurations.
|
config_maps
type |
dict |
default |
|
This parameter allows to deploy arbitrary config maps. Each entry is transformed into a ConfigMap resource. The key is used as the name of the resulting resource. The provided value is merged with an empty ConfigMap resource.