deploy-templates/keycloak-idps/templates/keycloakidentityprovider_master.yaml (35 lines of code) (raw):
{{ if (lookup "v1.edp.epam.com/v1" "KeycloakRealmIdentityProvider" .Release.Namespace "openshift-master") }}
{{ else }}
apiVersion: v1.edp.epam.com/v1
kind: KeycloakRealmIdentityProvider
metadata:
name: openshift-master
annotations:
helm.sh/resource-policy: keep
spec:
realm: master
alias: openshift
authenticateByDefault: false
enabled: true
firstBrokerLoginFlowAlias: "{{ .Values.master.authFlows.fixFbl.name }}"
providerId: keycloak-oidc
displayName: "openshift-sso"
config:
clientId: "openshift"
clientSecret: {{ b64dec (lookup "v1" "Secret" .Release.Namespace "keycloak-client-openshift-secret").data.clientSecret }}
hideOnLoginPage: "false"
syncMode: "FORCE"
userInfoUrl: "{{ .Values.keycloak.url }}/realms/openshift/protocol/openid-connect/userinfo"
tokenUrl: "{{ .Values.keycloak.url }}/realms/openshift/protocol/openid-connect/token"
authorizationUrl: "{{ .Values.keycloak.url }}/realms/openshift/protocol/openid-connect/auth"
logoutUrl: "{{ .Values.keycloak.url }}/realms/openshift/protocol/openid-connect/logout"
clientAuthMethod: "client_secret_post"
mappers:
- config:
external.role: cp-cluster-mgmt-admin
role: admin
syncMode: FORCE
identityProviderAlias: openshift
identityProviderMapper: keycloak-oidc-role-to-role-idp-mapper
name: cp-cluster-mgmt-admin
{{ end }}