Documentation
¶
Index ¶
- func GetAdditionalHeaders(ctx *pulumi.Context) string
- func GetBasePath(ctx *pulumi.Context) string
- func GetClientId(ctx *pulumi.Context) string
- func GetClientSecret(ctx *pulumi.Context) string
- func GetClientTimeout(ctx *pulumi.Context) int
- func GetInitialLogin(ctx *pulumi.Context) bool
- func GetPassword(ctx *pulumi.Context) string
- func GetRealm(ctx *pulumi.Context) string
- func GetRedHatSso(ctx *pulumi.Context) bool
- func GetRootCaCertificate(ctx *pulumi.Context) string
- func GetTlsInsecureSkipVerify(ctx *pulumi.Context) bool
- func GetUrl(ctx *pulumi.Context) string
- func GetUsername(ctx *pulumi.Context) string
- func PkgVersion() (semver.Version, error)
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func GetAdditionalHeaders ¶
func GetBasePath ¶
func GetClientId ¶
func GetClientSecret ¶
func GetClientTimeout ¶
Timeout (in seconds) of the Keycloak client
func GetInitialLogin ¶
Whether or not to login to Keycloak instance on provider initialization
func GetPassword ¶
func GetRedHatSso ¶
When true, the provider will treat the Keycloak instance as a Red Hat SSO server, specifically when parsing the version returned from the /serverinfo API endpoint.
func GetRootCaCertificate ¶
Allows x509 calls using an unknown CA certificate (for development purposes)
func GetTlsInsecureSkipVerify ¶
Allows ignoring insecure certificates when set to true. Defaults to false. Disabling security check is dangerous and should be avoided.
func GetUsername ¶
func PkgVersion ¶
PkgVersion uses reflection to determine the version of the current package. If a version cannot be determined, v1 will be assumed. The second return value is always nil.
Types ¶
This section is empty.