Parameters
The parent key for all of the following parameters is lieutenant_keycloak_idp_controller.
namespace
| type |
string |
| default |
|
The namespace in which to deploy this component.
manifests_version
| type |
string |
| default |
|
The Git reference to the controller deployment manifests. The default is the tag of the controller image.
controller.env
| type |
dict |
| default |
|
| example |
|
The environment variables to set for the controller container.
String values are taken verbatim as the value fiels, dictionary values are rendered as valueFrom fields.
controller.args
| type |
list |
| default |
|
The arguments to pass to the controller container.
controller.resources
| type |
dict |
| default |
|
The resource limits and requests for the controller container.
templates
| type |
dict |
| default |
See |
The templates for the controller to use.
Templates can include each other using the import function.
Default template creates a client with the following settings:
- full scope is disabled for security reasons
- access type is confidential
- standard flow is enabled
- direct access grants are enabled
- client role restricted-access is created for github.com/sventorben/keycloak-restrict-client-auth#role-based-mode
- client roles are mapped to the roles key of the JWT token
secrets
| type |
dict |
| default |
|
| example |
|
This parameter allows to deploy arbitrary secrets. Each entry is transformed into a Secret resource. The key is used as the name of the resulting resource. The provided value is merged with an empty Secret resource.
Always use stringData when using Vault references in secret configurations.
|
config_maps
| type |
dict |
| default |
|
This parameter allows to deploy arbitrary config maps. Each entry is transformed into a ConfigMap resource. The key is used as the name of the resulting resource. The provided value is merged with an empty ConfigMap resource.