Documentation ¶
Index ¶
- Constants
- Variables
- func ClientScopeDifferenceIntersection(a []v1alpha1.KeycloakClientScope, b []v1alpha1.KeycloakClientScope) (d []v1alpha1.KeycloakClientScope, i []v1alpha1.KeycloakClientScope)
- func ClientSecret(cr *v1alpha1.KeycloakClient) *v1.Secret
- func ClientSecretReconciled(cr *v1alpha1.KeycloakClient, currentState *v1.Secret) *v1.Secret
- func ClientSecretSelector(cr *v1alpha1.KeycloakClient) client.ObjectKey
- func DeprecatedClientSecret(cr *v1alpha1.KeycloakClient) *v1.Secret
- func DeprecatedClientSecretSelector(cr *v1alpha1.KeycloakClient) client.ObjectKey
- func FilterClientScopesByNames(clientScopes []v1alpha1.KeycloakClientScope, names []string) (filteredScopes []v1alpha1.KeycloakClientScope)
- func GenerateRandomBytes(n int) []byte
- func GenerateRandomString(s int) string
- func GetRealmUserSecretName(keycloakNamespace, realmName, userName string) string
- func IsIP(host []byte) bool
- func KeycloakAdminSecret(cr *v1alpha1.Keycloak) *v1.Secret
- func KeycloakAdminSecretReconciled(cr *v1alpha1.Keycloak, currentState *v1.Secret) *v1.Secret
- func KeycloakAdminSecretSelector(cr *v1alpha1.Keycloak) client.ObjectKey
- func MergeEnvs(a []v1.EnvVar, b []v1.EnvVar) []v1.EnvVar
- func RealmCredentialSecret(cr *v1alpha1.KeycloakRealm, user *v1alpha1.KeycloakAPIUser, ...) *v1.Secret
- func RealmCredentialSecretSelector(cr *v1alpha1.KeycloakRealm, user *v1alpha1.KeycloakAPIUser, ...) client.ObjectKey
- func RoleDifferenceIntersection(a []v1alpha1.RoleRepresentation, b []v1alpha1.RoleRepresentation) (d []v1alpha1.RoleRepresentation, i []v1alpha1.RoleRepresentation)
- func SanitizeNumberOfReplicas(numberOfReplicas int, isCreate bool) *int32
- func SanitizeResourceName(name string) string
- func SanitizeResourceNameWithAlphaNum(text string) string
Constants ¶
View Source
const ( ApplicationName = "keycloak" DefaultControllerNamespace = "keycloak" AdminUsernameProperty = "ADMIN_USERNAME" AdminPasswordProperty = "ADMIN_PASSWORD" ClientName = "KEYCLOAKCLIENT_CONTROLLER_NAME" ClientPassword = "KEYCLOAKCLIENT_CONTROLLER_PASSWORD" KeycloakClientSecretSeed = "SECRET_SEED" SecretSeedSecretName = "credential-keycloak-client-secret-seed" SALT = "803%%1Pas$3cow++#" ServingCertSecretName = "sso-x509-https-secret" // nolint ClientSecretName = ApplicationName + "-client-secret" ClientSecretClientIDProperty = "CLIENT_ID" ClientSecretClientSecretProperty = "CLIENT_SECRET" )
Constants for a community Keycloak installation
Variables ¶
View Source
var PodLabels = map[string]string{}
Functions ¶
func ClientScopeDifferenceIntersection ¶
func ClientScopeDifferenceIntersection(a []v1alpha1.KeycloakClientScope, b []v1alpha1.KeycloakClientScope) (d []v1alpha1.KeycloakClientScope, i []v1alpha1.KeycloakClientScope)
FIXME Find a better way to refactor this code with role difference part above returned clientScopes are always from a
func ClientSecret ¶
func ClientSecret(cr *v1alpha1.KeycloakClient) *v1.Secret
func ClientSecretReconciled ¶
func ClientSecretSelector ¶
func ClientSecretSelector(cr *v1alpha1.KeycloakClient) client.ObjectKey
func DeprecatedClientSecret ¶
func DeprecatedClientSecret(cr *v1alpha1.KeycloakClient) *v1.Secret
func DeprecatedClientSecretSelector ¶
func DeprecatedClientSecretSelector(cr *v1alpha1.KeycloakClient) client.ObjectKey
func FilterClientScopesByNames ¶
func FilterClientScopesByNames(clientScopes []v1alpha1.KeycloakClientScope, names []string) (filteredScopes []v1alpha1.KeycloakClientScope)
func GenerateRandomBytes ¶
GenerateRandomBytes returns securely generated random bytes. It will return an error if the system's secure random number generator fails to function correctly, in which case the caller should not continue.
func GenerateRandomString ¶
GenerateRandomString returns a URL-safe, base64 encoded securely generated random string. It will return an error if the system's secure random number generator fails to function correctly, in which case the caller should not continue.
func GetRealmUserSecretName ¶
func RealmCredentialSecret ¶
func RealmCredentialSecret(cr *v1alpha1.KeycloakRealm, user *v1alpha1.KeycloakAPIUser, keycloak *v1alpha1.Keycloak) *v1.Secret
func RealmCredentialSecretSelector ¶
func RealmCredentialSecretSelector(cr *v1alpha1.KeycloakRealm, user *v1alpha1.KeycloakAPIUser, keycloak *v1alpha1.Keycloak) client.ObjectKey
func RoleDifferenceIntersection ¶
func RoleDifferenceIntersection(a []v1alpha1.RoleRepresentation, b []v1alpha1.RoleRepresentation) (d []v1alpha1.RoleRepresentation, i []v1alpha1.RoleRepresentation)
returned roles are always from a
func SanitizeResourceName ¶
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.