File tree Expand file tree Collapse file tree 3 files changed +9
-21
lines changed
chart/keycloak-controller/templates Expand file tree Collapse file tree 3 files changed +9
-21
lines changed Original file line number Diff line number Diff line change 9
9
- CGO_ENABLED=0
10
10
- id : proxy
11
11
binary : proxy
12
+ main : ./proxy
12
13
goos :
13
14
- linux
14
15
env :
@@ -117,6 +118,10 @@ docker_manifests:
117
118
image_templates :
118
119
- ghcr.io/doodlescheduling/{{ .ProjectName }}:v{{ .Version }}-amd64
119
120
- ghcr.io/doodlescheduling/{{ .ProjectName }}:v{{ .Version }}-arm64v8
121
+ - name_template : ghcr.io/doodlescheduling/{{ .ProjectName }}/proxy:v{{ .Major }}
122
+ image_templates :
123
+ - ghcr.io/doodlescheduling/{{ .ProjectName }}/proxy:v{{ .Version }}-amd64
124
+ - ghcr.io/doodlescheduling/{{ .ProjectName }}/proxy:v{{ .Version }}-arm64v8
120
125
- name_template : ghcr.io/doodlescheduling/{{ .ProjectName }}/proxy:v{{ .Version }}
121
126
image_templates :
122
127
- ghcr.io/doodlescheduling/{{ .ProjectName }}/proxy:v{{ .Version }}-amd64
Original file line number Diff line number Diff line change @@ -307,7 +307,7 @@ It is recommended to configure all realms to run with the proxy.
307
307
308
308
` ` ` yaml
309
309
apiVersion: rbac.authorization.k8s.io/v1
310
- kind: ClusterRole
310
+ kind: Role
311
311
metadata:
312
312
name: keycloakrealm-proxy
313
313
rules:
@@ -331,8 +331,8 @@ metadata:
331
331
name: keycloakrealm-default
332
332
roleRef:
333
333
apiGroup: rbac.authorization.k8s.io
334
- kind: ClusterRole
335
- name: keycloakrealm-default
334
+ kind: Role
335
+ name: keycloakrealm-proxy
336
336
subjects:
337
337
- kind: ServiceAccount
338
338
name: keycloakrealm-default
@@ -372,14 +372,11 @@ spec:
372
372
fieldPath: metadata.namespace
373
373
- name: PROXY_ADDRESS
374
374
value: 127.0.0.1:8080
375
- image: ghcr.io/doodlescheduling/keycloak-controller/proxy:v2.0.0
375
+ image: ghcr.io/doodlescheduling/keycloak-controller/proxy:v2
376
376
name: proxy
377
377
serviceAccount: keycloakrealm-default
378
378
` ` `
379
379
380
- **Note**: The proxy needs read access to keycloakrealms as well as patch access to the /status subresource.
381
- In the example above there is a ClusterRole called keycloakrealm-proxy granting just that. This ClusterRole also is bundled in the helm chart, you may use {releaseName}-reconcile-proxy for the RoleBinding.
382
-
383
380
# # Installation
384
381
385
382
# ## Helm
Original file line number Diff line number Diff line change 1
1
{{- if .Values.clusterRBAC.enabled -}}
2
2
apiVersion : rbac.authorization.k8s.io/v1
3
3
kind : ClusterRole
4
- metadata :
5
- name : {{ template "keycloak-controller.fullname" . }}-reconcile-proxy
6
- rules :
7
- - apiGroups : ["keycloak.infra.doodle.com"]
8
- resources :
9
- - keycloakrealms
10
- verbs : ["get"]
11
- - apiGroups : ["keycloak.infra.doodle.com"]
12
- resources :
13
- - keycloakrealms/status
14
- verbs : ["get", "update", "patch"]
15
- ---
16
- apiVersion : rbac.authorization.k8s.io/v1
17
- kind : ClusterRole
18
4
metadata :
19
5
name : {{ template "keycloak-controller.fullname" . }}
20
6
labels :
You can’t perform that action at this time.
0 commit comments