Documentation ¶
Overview ¶
+kubebuilder:object:generate=true +groupName=oidc.keycloak.crossplane.io +versionName=v1alpha1
Index ¶
- Constants
- Variables
- type IdentityProvider
- func (in *IdentityProvider) DeepCopy() *IdentityProvider
- func (in *IdentityProvider) DeepCopyInto(out *IdentityProvider)
- func (in *IdentityProvider) DeepCopyObject() runtime.Object
- func (mg *IdentityProvider) GetCondition(ct xpv1.ConditionType) xpv1.Condition
- func (tr *IdentityProvider) GetConnectionDetailsMapping() map[string]string
- func (mg *IdentityProvider) GetDeletionPolicy() xpv1.DeletionPolicy
- func (tr *IdentityProvider) GetID() string
- func (tr *IdentityProvider) GetInitParameters() (map[string]any, error)
- func (mg *IdentityProvider) GetManagementPolicies() xpv1.ManagementPolicies
- func (tr *IdentityProvider) GetMergedParameters(shouldMergeInitProvider bool) (map[string]any, error)
- func (tr *IdentityProvider) GetObservation() (map[string]any, error)
- func (tr *IdentityProvider) GetParameters() (map[string]any, error)
- func (mg *IdentityProvider) GetProviderConfigReference() *xpv1.Reference
- func (mg *IdentityProvider) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
- func (mg *IdentityProvider) GetTerraformResourceType() string
- func (tr *IdentityProvider) GetTerraformSchemaVersion() int
- func (mg *IdentityProvider) GetWriteConnectionSecretToReference() *xpv1.SecretReference
- func (tr *IdentityProvider) Hub()
- func (tr *IdentityProvider) LateInitialize(attrs []byte) (bool, error)
- func (mg *IdentityProvider) ResolveReferences(ctx context.Context, c client.Reader) error
- func (mg *IdentityProvider) SetConditions(c ...xpv1.Condition)
- func (mg *IdentityProvider) SetDeletionPolicy(r xpv1.DeletionPolicy)
- func (mg *IdentityProvider) SetManagementPolicies(r xpv1.ManagementPolicies)
- func (tr *IdentityProvider) SetObservation(obs map[string]any) error
- func (tr *IdentityProvider) SetParameters(params map[string]any) error
- func (mg *IdentityProvider) SetProviderConfigReference(r *xpv1.Reference)
- func (mg *IdentityProvider) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
- func (mg *IdentityProvider) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
- type IdentityProviderInitParameters
- type IdentityProviderList
- type IdentityProviderObservation
- type IdentityProviderParameters
- type IdentityProviderSpec
- type IdentityProviderStatus
Constants ¶
const ( CRDGroup = "oidc.keycloak.crossplane.io" CRDVersion = "v1alpha1" )
Package type metadata.
Variables ¶
var ( // CRDGroupVersion is the API Group Version used to register the objects CRDGroupVersion = schema.GroupVersion{Group: CRDGroup, Version: CRDVersion} // SchemeBuilder is used to add go types to the GroupVersionKind scheme SchemeBuilder = &scheme.Builder{GroupVersion: CRDGroupVersion} // AddToScheme adds the types in this group-version to the given scheme. AddToScheme = SchemeBuilder.AddToScheme )
var ( IdentityProvider_Kind = "IdentityProvider" IdentityProvider_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: IdentityProvider_Kind}.String() IdentityProvider_KindAPIVersion = IdentityProvider_Kind + "." + CRDGroupVersion.String() IdentityProvider_GroupVersionKind = CRDGroupVersion.WithKind(IdentityProvider_Kind) )
Repository type metadata.
Functions ¶
This section is empty.
Types ¶
type IdentityProvider ¶
type IdentityProvider struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata,omitempty"` // +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.alias) || (has(self.initProvider) && has(self.initProvider.alias))",message="spec.forProvider.alias is a required parameter" // +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.authorizationUrl) || (has(self.initProvider) && has(self.initProvider.authorizationUrl))",message="spec.forProvider.authorizationUrl is a required parameter" // +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.clientSecretSecretRef)",message="spec.forProvider.clientSecretSecretRef is a required parameter" // +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.tokenUrl) || (has(self.initProvider) && has(self.initProvider.tokenUrl))",message="spec.forProvider.tokenUrl is a required parameter" Spec IdentityProviderSpec `json:"spec"` Status IdentityProviderStatus `json:"status,omitempty"` }
IdentityProvider is the Schema for the IdentityProviders API. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,keycloak}
func (*IdentityProvider) DeepCopy ¶
func (in *IdentityProvider) DeepCopy() *IdentityProvider
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IdentityProvider.
func (*IdentityProvider) DeepCopyInto ¶
func (in *IdentityProvider) DeepCopyInto(out *IdentityProvider)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*IdentityProvider) DeepCopyObject ¶
func (in *IdentityProvider) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*IdentityProvider) GetCondition ¶
func (mg *IdentityProvider) GetCondition(ct xpv1.ConditionType) xpv1.Condition
GetCondition of this IdentityProvider.
func (*IdentityProvider) GetConnectionDetailsMapping ¶
func (tr *IdentityProvider) GetConnectionDetailsMapping() map[string]string
GetConnectionDetailsMapping for this IdentityProvider
func (*IdentityProvider) GetDeletionPolicy ¶
func (mg *IdentityProvider) GetDeletionPolicy() xpv1.DeletionPolicy
GetDeletionPolicy of this IdentityProvider.
func (*IdentityProvider) GetID ¶
func (tr *IdentityProvider) GetID() string
GetID returns ID of underlying Terraform resource of this IdentityProvider
func (*IdentityProvider) GetInitParameters ¶
func (tr *IdentityProvider) GetInitParameters() (map[string]any, error)
GetInitParameters of this IdentityProvider
func (*IdentityProvider) GetManagementPolicies ¶
func (mg *IdentityProvider) GetManagementPolicies() xpv1.ManagementPolicies
GetManagementPolicies of this IdentityProvider.
func (*IdentityProvider) GetMergedParameters ¶
func (tr *IdentityProvider) GetMergedParameters(shouldMergeInitProvider bool) (map[string]any, error)
GetInitParameters of this IdentityProvider
func (*IdentityProvider) GetObservation ¶
func (tr *IdentityProvider) GetObservation() (map[string]any, error)
GetObservation of this IdentityProvider
func (*IdentityProvider) GetParameters ¶
func (tr *IdentityProvider) GetParameters() (map[string]any, error)
GetParameters of this IdentityProvider
func (*IdentityProvider) GetProviderConfigReference ¶
func (mg *IdentityProvider) GetProviderConfigReference() *xpv1.Reference
GetProviderConfigReference of this IdentityProvider.
func (*IdentityProvider) GetPublishConnectionDetailsTo ¶
func (mg *IdentityProvider) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
GetPublishConnectionDetailsTo of this IdentityProvider.
func (*IdentityProvider) GetTerraformResourceType ¶
func (mg *IdentityProvider) GetTerraformResourceType() string
GetTerraformResourceType returns Terraform resource type for this IdentityProvider
func (*IdentityProvider) GetTerraformSchemaVersion ¶
func (tr *IdentityProvider) GetTerraformSchemaVersion() int
GetTerraformSchemaVersion returns the associated Terraform schema version
func (*IdentityProvider) GetWriteConnectionSecretToReference ¶
func (mg *IdentityProvider) GetWriteConnectionSecretToReference() *xpv1.SecretReference
GetWriteConnectionSecretToReference of this IdentityProvider.
func (*IdentityProvider) Hub ¶
func (tr *IdentityProvider) Hub()
Hub marks this type as a conversion hub.
func (*IdentityProvider) LateInitialize ¶
func (tr *IdentityProvider) LateInitialize(attrs []byte) (bool, error)
LateInitialize this IdentityProvider using its observed tfState. returns True if there are any spec changes for the resource.
func (*IdentityProvider) ResolveReferences ¶
ResolveReferences of this IdentityProvider.
func (*IdentityProvider) SetConditions ¶
func (mg *IdentityProvider) SetConditions(c ...xpv1.Condition)
SetConditions of this IdentityProvider.
func (*IdentityProvider) SetDeletionPolicy ¶
func (mg *IdentityProvider) SetDeletionPolicy(r xpv1.DeletionPolicy)
SetDeletionPolicy of this IdentityProvider.
func (*IdentityProvider) SetManagementPolicies ¶
func (mg *IdentityProvider) SetManagementPolicies(r xpv1.ManagementPolicies)
SetManagementPolicies of this IdentityProvider.
func (*IdentityProvider) SetObservation ¶
func (tr *IdentityProvider) SetObservation(obs map[string]any) error
SetObservation for this IdentityProvider
func (*IdentityProvider) SetParameters ¶
func (tr *IdentityProvider) SetParameters(params map[string]any) error
SetParameters for this IdentityProvider
func (*IdentityProvider) SetProviderConfigReference ¶
func (mg *IdentityProvider) SetProviderConfigReference(r *xpv1.Reference)
SetProviderConfigReference of this IdentityProvider.
func (*IdentityProvider) SetPublishConnectionDetailsTo ¶
func (mg *IdentityProvider) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
SetPublishConnectionDetailsTo of this IdentityProvider.
func (*IdentityProvider) SetWriteConnectionSecretToReference ¶
func (mg *IdentityProvider) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
SetWriteConnectionSecretToReference of this IdentityProvider.
type IdentityProviderInitParameters ¶
type IdentityProviderInitParameters struct { // When true, the IDP will accept forwarded authentication requests that contain the prompt=none query parameter. Defaults to false. // This is just used together with Identity Provider Authenticator or when kc_idp_hint points to this identity provider. In case that client sends a request with prompt=none and user is not yet authenticated, the error will not be directly returned to client, but the request with prompt=none will be forwarded to this identity provider. AcceptsPromptNoneForwardFromClient *bool `json:"acceptsPromptNoneForwardFromClient,omitempty" tf:"accepts_prompt_none_forward_from_client,omitempty"` // When true, new users will be able to read stored tokens. This will automatically assign the broker.read-token role. Defaults to false. // Enable/disable if new users can read any stored tokens. This assigns the broker.read-token role. AddReadTokenRoleOnCreate *bool `json:"addReadTokenRoleOnCreate,omitempty" tf:"add_read_token_role_on_create,omitempty"` // The alias uniquely identifies an identity provider and it is also used to build the redirect uri. // The alias uniquely identifies an identity provider and it is also used to build the redirect uri. Alias *string `json:"alias,omitempty" tf:"alias,omitempty"` // Enable/disable authenticate users by default. AuthenticateByDefault *bool `json:"authenticateByDefault,omitempty" tf:"authenticate_by_default,omitempty"` // The Authorization Url. // OIDC authorization URL. AuthorizationURL *string `json:"authorizationUrl,omitempty" tf:"authorization_url,omitempty"` // Does the external IDP support backchannel logout? Defaults to true. // Does the external IDP support backchannel logout? BackchannelSupported *bool `json:"backchannelSupported,omitempty" tf:"backchannel_supported,omitempty"` // The client or client identifier registered within the identity provider. // Client ID. // +crossplane:generate:reference:type=github.com/stakater/provider-keycloak/apis/openidclient/v1alpha1.Client ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` // Reference to a Client in openidclient to populate clientId. // +kubebuilder:validation:Optional ClientIDRef *v1.Reference `json:"clientIdRef,omitempty" tf:"-"` // Selector for a Client in openidclient to populate clientId. // +kubebuilder:validation:Optional ClientIDSelector *v1.Selector `json:"clientIdSelector,omitempty" tf:"-"` // The scopes to be sent when asking for authorization. It can be a space-separated list of scopes. Defaults to openid. // The scopes to be sent when asking for authorization. It can be a space-separated list of scopes. Defaults to 'openid'. DefaultScopes *string `json:"defaultScopes,omitempty" tf:"default_scopes,omitempty"` // When true, disables the usage of the user info service to obtain additional user information. Defaults to false. // Disable usage of User Info service to obtain additional user information? Default is to use this OIDC service. DisableUserInfo *bool `json:"disableUserInfo,omitempty" tf:"disable_user_info,omitempty"` // Display name for the identity provider in the GUI. // Friendly name for Identity Providers. DisplayName *string `json:"displayName,omitempty" tf:"display_name,omitempty"` // When true, users will be able to log in to this realm using this identity provider. Defaults to true. // Enable/disable this identity provider. Enabled *bool `json:"enabled,omitempty" tf:"enabled,omitempty"` // A map of key/value pairs to add extra configuration to this identity provider. Use this attribute at your own risk, as custom attributes may conflict with top-level configuration attributes in future provider updates. // +mapType=granular ExtraConfig map[string]*string `json:"extraConfig,omitempty" tf:"extra_config,omitempty"` // The authentication flow to use when users log in for the first time through this identity provider. Defaults to first broker login. // Alias of authentication flow, which is triggered after first login with this identity provider. Term 'First Login' means that there is not yet existing Keycloak account linked with the authenticated identity provider account. FirstBrokerLoginFlowAlias *string `json:"firstBrokerLoginFlowAlias,omitempty" tf:"first_broker_login_flow_alias,omitempty"` // A number defining the order of this identity provider in the GUI. // GUI Order GuiOrder *string `json:"guiOrder,omitempty" tf:"gui_order,omitempty"` // When true, this provider will be hidden on the login page, and is only accessible when requested explicitly. Defaults to false. // Hide On Login Page. HideOnLoginPage *bool `json:"hideOnLoginPage,omitempty" tf:"hide_on_login_page,omitempty"` // The issuer identifier for the issuer of the response. If not provided, no validation will be performed. // The issuer identifier for the issuer of the response. If not provided, no validation will be performed. Issuer *string `json:"issuer,omitempty" tf:"issuer,omitempty"` // JSON Web Key Set URL. // JSON Web Key Set URL JwksURL *string `json:"jwksUrl,omitempty" tf:"jwks_url,omitempty"` // When true, users cannot login using this provider, but their existing accounts will be linked when possible. Defaults to false. // If true, users cannot log in through this provider. They can only link to this provider. This is useful if you don't want to allow login from the provider, but want to integrate with a provider LinkOnly *bool `json:"linkOnly,omitempty" tf:"link_only,omitempty"` // Pass login hint to identity provider. // Login Hint. LoginHint *string `json:"loginHint,omitempty" tf:"login_hint,omitempty"` // The Logout URL is the end session endpoint to use to logout user from external identity provider. // Logout URL LogoutURL *string `json:"logoutUrl,omitempty" tf:"logout_url,omitempty"` // The authentication flow to use after users have successfully logged in, which can be used to perform additional user verification (such as OTP checking). Defaults to an empty string, which means no post login flow will be used. // Alias of authentication flow, which is triggered after each login with this identity provider. Useful if you want additional verification of each user authenticated with this identity provider (for example OTP). Leave this empty if you don't want any additional authenticators to be triggered after login with this identity provider. Also note, that authenticator implementations must assume that user is already set in ClientSession as identity provider already set it. PostBrokerLoginFlowAlias *string `json:"postBrokerLoginFlowAlias,omitempty" tf:"post_broker_login_flow_alias,omitempty"` // The ID of the identity provider to use. Defaults to oidc, which should be used unless you have extended Keycloak and provided your own implementation. // provider id, is always oidc, unless you have a custom implementation ProviderID *string `json:"providerId,omitempty" tf:"provider_id,omitempty"` // The name of the realm. This is unique across Keycloak. // Realm Name // +crossplane:generate:reference:type=github.com/stakater/provider-keycloak/apis/realm/v1alpha1.Realm Realm *string `json:"realm,omitempty" tf:"realm,omitempty"` // Reference to a Realm in realm to populate realm. // +kubebuilder:validation:Optional RealmRef *v1.Reference `json:"realmRef,omitempty" tf:"-"` // Selector for a Realm in realm to populate realm. // +kubebuilder:validation:Optional RealmSelector *v1.Selector `json:"realmSelector,omitempty" tf:"-"` // When true, tokens will be stored after authenticating users. Defaults to true. // Enable/disable if tokens must be stored after authenticating users. StoreToken *bool `json:"storeToken,omitempty" tf:"store_token,omitempty"` // The default sync mode to use for all mappers attached to this identity provider. Can be once of IMPORT, FORCE, or LEGACY. // Sync Mode SyncMode *string `json:"syncMode,omitempty" tf:"sync_mode,omitempty"` // The Token URL. // Token URL. TokenURL *string `json:"tokenUrl,omitempty" tf:"token_url,omitempty"` // When true, email addresses for users in this provider will automatically be verified regardless of the realm's email verification policy. Defaults to false. // If enabled then email provided by this provider is not verified even if verification is enabled for the realm. TrustEmail *bool `json:"trustEmail,omitempty" tf:"trust_email,omitempty"` // Pass current locale to identity provider. Defaults to false. // Pass current locale to identity provider UILocales *bool `json:"uiLocales,omitempty" tf:"ui_locales,omitempty"` // User Info URL. // User Info URL UserInfoURL *string `json:"userInfoUrl,omitempty" tf:"user_info_url,omitempty"` // Enable/disable signature validation of external IDP signatures. Defaults to false. // Enable/disable signature validation of external IDP signatures. ValidateSignature *bool `json:"validateSignature,omitempty" tf:"validate_signature,omitempty"` }
func (*IdentityProviderInitParameters) DeepCopy ¶
func (in *IdentityProviderInitParameters) DeepCopy() *IdentityProviderInitParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IdentityProviderInitParameters.
func (*IdentityProviderInitParameters) DeepCopyInto ¶
func (in *IdentityProviderInitParameters) DeepCopyInto(out *IdentityProviderInitParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type IdentityProviderList ¶
type IdentityProviderList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []IdentityProvider `json:"items"` }
IdentityProviderList contains a list of IdentityProviders
func (*IdentityProviderList) DeepCopy ¶
func (in *IdentityProviderList) DeepCopy() *IdentityProviderList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IdentityProviderList.
func (*IdentityProviderList) DeepCopyInto ¶
func (in *IdentityProviderList) DeepCopyInto(out *IdentityProviderList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*IdentityProviderList) DeepCopyObject ¶
func (in *IdentityProviderList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*IdentityProviderList) GetItems ¶
func (l *IdentityProviderList) GetItems() []resource.Managed
GetItems of this IdentityProviderList.
type IdentityProviderObservation ¶
type IdentityProviderObservation struct { // When true, the IDP will accept forwarded authentication requests that contain the prompt=none query parameter. Defaults to false. // This is just used together with Identity Provider Authenticator or when kc_idp_hint points to this identity provider. In case that client sends a request with prompt=none and user is not yet authenticated, the error will not be directly returned to client, but the request with prompt=none will be forwarded to this identity provider. AcceptsPromptNoneForwardFromClient *bool `json:"acceptsPromptNoneForwardFromClient,omitempty" tf:"accepts_prompt_none_forward_from_client,omitempty"` // When true, new users will be able to read stored tokens. This will automatically assign the broker.read-token role. Defaults to false. // Enable/disable if new users can read any stored tokens. This assigns the broker.read-token role. AddReadTokenRoleOnCreate *bool `json:"addReadTokenRoleOnCreate,omitempty" tf:"add_read_token_role_on_create,omitempty"` // The alias uniquely identifies an identity provider and it is also used to build the redirect uri. // The alias uniquely identifies an identity provider and it is also used to build the redirect uri. Alias *string `json:"alias,omitempty" tf:"alias,omitempty"` // Enable/disable authenticate users by default. AuthenticateByDefault *bool `json:"authenticateByDefault,omitempty" tf:"authenticate_by_default,omitempty"` // The Authorization Url. // OIDC authorization URL. AuthorizationURL *string `json:"authorizationUrl,omitempty" tf:"authorization_url,omitempty"` // Does the external IDP support backchannel logout? Defaults to true. // Does the external IDP support backchannel logout? BackchannelSupported *bool `json:"backchannelSupported,omitempty" tf:"backchannel_supported,omitempty"` // The client or client identifier registered within the identity provider. // Client ID. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` // The scopes to be sent when asking for authorization. It can be a space-separated list of scopes. Defaults to openid. // The scopes to be sent when asking for authorization. It can be a space-separated list of scopes. Defaults to 'openid'. DefaultScopes *string `json:"defaultScopes,omitempty" tf:"default_scopes,omitempty"` // When true, disables the usage of the user info service to obtain additional user information. Defaults to false. // Disable usage of User Info service to obtain additional user information? Default is to use this OIDC service. DisableUserInfo *bool `json:"disableUserInfo,omitempty" tf:"disable_user_info,omitempty"` // Display name for the identity provider in the GUI. // Friendly name for Identity Providers. DisplayName *string `json:"displayName,omitempty" tf:"display_name,omitempty"` // When true, users will be able to log in to this realm using this identity provider. Defaults to true. // Enable/disable this identity provider. Enabled *bool `json:"enabled,omitempty" tf:"enabled,omitempty"` // A map of key/value pairs to add extra configuration to this identity provider. Use this attribute at your own risk, as custom attributes may conflict with top-level configuration attributes in future provider updates. // +mapType=granular ExtraConfig map[string]*string `json:"extraConfig,omitempty" tf:"extra_config,omitempty"` // The authentication flow to use when users log in for the first time through this identity provider. Defaults to first broker login. // Alias of authentication flow, which is triggered after first login with this identity provider. Term 'First Login' means that there is not yet existing Keycloak account linked with the authenticated identity provider account. FirstBrokerLoginFlowAlias *string `json:"firstBrokerLoginFlowAlias,omitempty" tf:"first_broker_login_flow_alias,omitempty"` // A number defining the order of this identity provider in the GUI. // GUI Order GuiOrder *string `json:"guiOrder,omitempty" tf:"gui_order,omitempty"` // When true, this provider will be hidden on the login page, and is only accessible when requested explicitly. Defaults to false. // Hide On Login Page. HideOnLoginPage *bool `json:"hideOnLoginPage,omitempty" tf:"hide_on_login_page,omitempty"` ID *string `json:"id,omitempty" tf:"id,omitempty"` // (Computed) The unique ID that Keycloak assigns to the identity provider upon creation. // Internal Identity Provider Id InternalID *string `json:"internalId,omitempty" tf:"internal_id,omitempty"` // The issuer identifier for the issuer of the response. If not provided, no validation will be performed. // The issuer identifier for the issuer of the response. If not provided, no validation will be performed. Issuer *string `json:"issuer,omitempty" tf:"issuer,omitempty"` // JSON Web Key Set URL. // JSON Web Key Set URL JwksURL *string `json:"jwksUrl,omitempty" tf:"jwks_url,omitempty"` // When true, users cannot login using this provider, but their existing accounts will be linked when possible. Defaults to false. // If true, users cannot log in through this provider. They can only link to this provider. This is useful if you don't want to allow login from the provider, but want to integrate with a provider LinkOnly *bool `json:"linkOnly,omitempty" tf:"link_only,omitempty"` // Pass login hint to identity provider. // Login Hint. LoginHint *string `json:"loginHint,omitempty" tf:"login_hint,omitempty"` // The Logout URL is the end session endpoint to use to logout user from external identity provider. // Logout URL LogoutURL *string `json:"logoutUrl,omitempty" tf:"logout_url,omitempty"` // The authentication flow to use after users have successfully logged in, which can be used to perform additional user verification (such as OTP checking). Defaults to an empty string, which means no post login flow will be used. // Alias of authentication flow, which is triggered after each login with this identity provider. Useful if you want additional verification of each user authenticated with this identity provider (for example OTP). Leave this empty if you don't want any additional authenticators to be triggered after login with this identity provider. Also note, that authenticator implementations must assume that user is already set in ClientSession as identity provider already set it. PostBrokerLoginFlowAlias *string `json:"postBrokerLoginFlowAlias,omitempty" tf:"post_broker_login_flow_alias,omitempty"` // The ID of the identity provider to use. Defaults to oidc, which should be used unless you have extended Keycloak and provided your own implementation. // provider id, is always oidc, unless you have a custom implementation ProviderID *string `json:"providerId,omitempty" tf:"provider_id,omitempty"` // The name of the realm. This is unique across Keycloak. // Realm Name Realm *string `json:"realm,omitempty" tf:"realm,omitempty"` // When true, tokens will be stored after authenticating users. Defaults to true. // Enable/disable if tokens must be stored after authenticating users. StoreToken *bool `json:"storeToken,omitempty" tf:"store_token,omitempty"` // The default sync mode to use for all mappers attached to this identity provider. Can be once of IMPORT, FORCE, or LEGACY. // Sync Mode SyncMode *string `json:"syncMode,omitempty" tf:"sync_mode,omitempty"` // The Token URL. // Token URL. TokenURL *string `json:"tokenUrl,omitempty" tf:"token_url,omitempty"` // When true, email addresses for users in this provider will automatically be verified regardless of the realm's email verification policy. Defaults to false. // If enabled then email provided by this provider is not verified even if verification is enabled for the realm. TrustEmail *bool `json:"trustEmail,omitempty" tf:"trust_email,omitempty"` // Pass current locale to identity provider. Defaults to false. // Pass current locale to identity provider UILocales *bool `json:"uiLocales,omitempty" tf:"ui_locales,omitempty"` // User Info URL. // User Info URL UserInfoURL *string `json:"userInfoUrl,omitempty" tf:"user_info_url,omitempty"` // Enable/disable signature validation of external IDP signatures. Defaults to false. // Enable/disable signature validation of external IDP signatures. ValidateSignature *bool `json:"validateSignature,omitempty" tf:"validate_signature,omitempty"` }
func (*IdentityProviderObservation) DeepCopy ¶
func (in *IdentityProviderObservation) DeepCopy() *IdentityProviderObservation
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IdentityProviderObservation.
func (*IdentityProviderObservation) DeepCopyInto ¶
func (in *IdentityProviderObservation) DeepCopyInto(out *IdentityProviderObservation)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type IdentityProviderParameters ¶
type IdentityProviderParameters struct { // When true, the IDP will accept forwarded authentication requests that contain the prompt=none query parameter. Defaults to false. // This is just used together with Identity Provider Authenticator or when kc_idp_hint points to this identity provider. In case that client sends a request with prompt=none and user is not yet authenticated, the error will not be directly returned to client, but the request with prompt=none will be forwarded to this identity provider. // +kubebuilder:validation:Optional AcceptsPromptNoneForwardFromClient *bool `json:"acceptsPromptNoneForwardFromClient,omitempty" tf:"accepts_prompt_none_forward_from_client,omitempty"` // When true, new users will be able to read stored tokens. This will automatically assign the broker.read-token role. Defaults to false. // Enable/disable if new users can read any stored tokens. This assigns the broker.read-token role. // +kubebuilder:validation:Optional AddReadTokenRoleOnCreate *bool `json:"addReadTokenRoleOnCreate,omitempty" tf:"add_read_token_role_on_create,omitempty"` // The alias uniquely identifies an identity provider and it is also used to build the redirect uri. // The alias uniquely identifies an identity provider and it is also used to build the redirect uri. // +kubebuilder:validation:Optional Alias *string `json:"alias,omitempty" tf:"alias,omitempty"` // Enable/disable authenticate users by default. // +kubebuilder:validation:Optional AuthenticateByDefault *bool `json:"authenticateByDefault,omitempty" tf:"authenticate_by_default,omitempty"` // The Authorization Url. // OIDC authorization URL. // +kubebuilder:validation:Optional AuthorizationURL *string `json:"authorizationUrl,omitempty" tf:"authorization_url,omitempty"` // Does the external IDP support backchannel logout? Defaults to true. // Does the external IDP support backchannel logout? // +kubebuilder:validation:Optional BackchannelSupported *bool `json:"backchannelSupported,omitempty" tf:"backchannel_supported,omitempty"` // The client or client identifier registered within the identity provider. // Client ID. // +crossplane:generate:reference:type=github.com/stakater/provider-keycloak/apis/openidclient/v1alpha1.Client // +kubebuilder:validation:Optional ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` // Reference to a Client in openidclient to populate clientId. // +kubebuilder:validation:Optional ClientIDRef *v1.Reference `json:"clientIdRef,omitempty" tf:"-"` // Selector for a Client in openidclient to populate clientId. // +kubebuilder:validation:Optional ClientIDSelector *v1.Selector `json:"clientIdSelector,omitempty" tf:"-"` // The client or client secret registered within the identity provider. This field is able to obtain its value from vault, use $${vault.ID} format. // Client Secret. // +kubebuilder:validation:Optional ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` // The scopes to be sent when asking for authorization. It can be a space-separated list of scopes. Defaults to openid. // The scopes to be sent when asking for authorization. It can be a space-separated list of scopes. Defaults to 'openid'. // +kubebuilder:validation:Optional DefaultScopes *string `json:"defaultScopes,omitempty" tf:"default_scopes,omitempty"` // When true, disables the usage of the user info service to obtain additional user information. Defaults to false. // Disable usage of User Info service to obtain additional user information? Default is to use this OIDC service. // +kubebuilder:validation:Optional DisableUserInfo *bool `json:"disableUserInfo,omitempty" tf:"disable_user_info,omitempty"` // Display name for the identity provider in the GUI. // Friendly name for Identity Providers. // +kubebuilder:validation:Optional DisplayName *string `json:"displayName,omitempty" tf:"display_name,omitempty"` // When true, users will be able to log in to this realm using this identity provider. Defaults to true. // Enable/disable this identity provider. // +kubebuilder:validation:Optional Enabled *bool `json:"enabled,omitempty" tf:"enabled,omitempty"` // A map of key/value pairs to add extra configuration to this identity provider. Use this attribute at your own risk, as custom attributes may conflict with top-level configuration attributes in future provider updates. // +kubebuilder:validation:Optional // +mapType=granular ExtraConfig map[string]*string `json:"extraConfig,omitempty" tf:"extra_config,omitempty"` // The authentication flow to use when users log in for the first time through this identity provider. Defaults to first broker login. // Alias of authentication flow, which is triggered after first login with this identity provider. Term 'First Login' means that there is not yet existing Keycloak account linked with the authenticated identity provider account. // +kubebuilder:validation:Optional FirstBrokerLoginFlowAlias *string `json:"firstBrokerLoginFlowAlias,omitempty" tf:"first_broker_login_flow_alias,omitempty"` // A number defining the order of this identity provider in the GUI. // GUI Order // +kubebuilder:validation:Optional GuiOrder *string `json:"guiOrder,omitempty" tf:"gui_order,omitempty"` // When true, this provider will be hidden on the login page, and is only accessible when requested explicitly. Defaults to false. // Hide On Login Page. // +kubebuilder:validation:Optional HideOnLoginPage *bool `json:"hideOnLoginPage,omitempty" tf:"hide_on_login_page,omitempty"` // The issuer identifier for the issuer of the response. If not provided, no validation will be performed. // The issuer identifier for the issuer of the response. If not provided, no validation will be performed. // +kubebuilder:validation:Optional Issuer *string `json:"issuer,omitempty" tf:"issuer,omitempty"` // JSON Web Key Set URL. // JSON Web Key Set URL // +kubebuilder:validation:Optional JwksURL *string `json:"jwksUrl,omitempty" tf:"jwks_url,omitempty"` // When true, users cannot login using this provider, but their existing accounts will be linked when possible. Defaults to false. // If true, users cannot log in through this provider. They can only link to this provider. This is useful if you don't want to allow login from the provider, but want to integrate with a provider // +kubebuilder:validation:Optional LinkOnly *bool `json:"linkOnly,omitempty" tf:"link_only,omitempty"` // Pass login hint to identity provider. // Login Hint. // +kubebuilder:validation:Optional LoginHint *string `json:"loginHint,omitempty" tf:"login_hint,omitempty"` // The Logout URL is the end session endpoint to use to logout user from external identity provider. // Logout URL // +kubebuilder:validation:Optional LogoutURL *string `json:"logoutUrl,omitempty" tf:"logout_url,omitempty"` // The authentication flow to use after users have successfully logged in, which can be used to perform additional user verification (such as OTP checking). Defaults to an empty string, which means no post login flow will be used. // Alias of authentication flow, which is triggered after each login with this identity provider. Useful if you want additional verification of each user authenticated with this identity provider (for example OTP). Leave this empty if you don't want any additional authenticators to be triggered after login with this identity provider. Also note, that authenticator implementations must assume that user is already set in ClientSession as identity provider already set it. // +kubebuilder:validation:Optional PostBrokerLoginFlowAlias *string `json:"postBrokerLoginFlowAlias,omitempty" tf:"post_broker_login_flow_alias,omitempty"` // The ID of the identity provider to use. Defaults to oidc, which should be used unless you have extended Keycloak and provided your own implementation. // provider id, is always oidc, unless you have a custom implementation // +kubebuilder:validation:Optional ProviderID *string `json:"providerId,omitempty" tf:"provider_id,omitempty"` // The name of the realm. This is unique across Keycloak. // Realm Name // +crossplane:generate:reference:type=github.com/stakater/provider-keycloak/apis/realm/v1alpha1.Realm // +kubebuilder:validation:Optional Realm *string `json:"realm,omitempty" tf:"realm,omitempty"` // Reference to a Realm in realm to populate realm. // +kubebuilder:validation:Optional RealmRef *v1.Reference `json:"realmRef,omitempty" tf:"-"` // Selector for a Realm in realm to populate realm. // +kubebuilder:validation:Optional RealmSelector *v1.Selector `json:"realmSelector,omitempty" tf:"-"` // When true, tokens will be stored after authenticating users. Defaults to true. // Enable/disable if tokens must be stored after authenticating users. // +kubebuilder:validation:Optional StoreToken *bool `json:"storeToken,omitempty" tf:"store_token,omitempty"` // The default sync mode to use for all mappers attached to this identity provider. Can be once of IMPORT, FORCE, or LEGACY. // Sync Mode // +kubebuilder:validation:Optional SyncMode *string `json:"syncMode,omitempty" tf:"sync_mode,omitempty"` // The Token URL. // Token URL. // +kubebuilder:validation:Optional TokenURL *string `json:"tokenUrl,omitempty" tf:"token_url,omitempty"` // When true, email addresses for users in this provider will automatically be verified regardless of the realm's email verification policy. Defaults to false. // If enabled then email provided by this provider is not verified even if verification is enabled for the realm. // +kubebuilder:validation:Optional TrustEmail *bool `json:"trustEmail,omitempty" tf:"trust_email,omitempty"` // Pass current locale to identity provider. Defaults to false. // Pass current locale to identity provider // +kubebuilder:validation:Optional UILocales *bool `json:"uiLocales,omitempty" tf:"ui_locales,omitempty"` // User Info URL. // User Info URL // +kubebuilder:validation:Optional UserInfoURL *string `json:"userInfoUrl,omitempty" tf:"user_info_url,omitempty"` // Enable/disable signature validation of external IDP signatures. Defaults to false. // Enable/disable signature validation of external IDP signatures. // +kubebuilder:validation:Optional ValidateSignature *bool `json:"validateSignature,omitempty" tf:"validate_signature,omitempty"` }
func (*IdentityProviderParameters) DeepCopy ¶
func (in *IdentityProviderParameters) DeepCopy() *IdentityProviderParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IdentityProviderParameters.
func (*IdentityProviderParameters) DeepCopyInto ¶
func (in *IdentityProviderParameters) DeepCopyInto(out *IdentityProviderParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type IdentityProviderSpec ¶
type IdentityProviderSpec struct { v1.ResourceSpec `json:",inline"` ForProvider IdentityProviderParameters `json:"forProvider"` // THIS IS A BETA FIELD. It will be honored // unless the Management Policies feature flag is disabled. // InitProvider holds the same fields as ForProvider, with the exception // of Identifier and other resource reference fields. The fields that are // in InitProvider are merged into ForProvider when the resource is created. // The same fields are also added to the terraform ignore_changes hook, to // avoid updating them after creation. This is useful for fields that are // required on creation, but we do not desire to update them after creation, // for example because of an external controller is managing them, like an // autoscaler. InitProvider IdentityProviderInitParameters `json:"initProvider,omitempty"` }
IdentityProviderSpec defines the desired state of IdentityProvider
func (*IdentityProviderSpec) DeepCopy ¶
func (in *IdentityProviderSpec) DeepCopy() *IdentityProviderSpec
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IdentityProviderSpec.
func (*IdentityProviderSpec) DeepCopyInto ¶
func (in *IdentityProviderSpec) DeepCopyInto(out *IdentityProviderSpec)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type IdentityProviderStatus ¶
type IdentityProviderStatus struct { v1.ResourceStatus `json:",inline"` AtProvider IdentityProviderObservation `json:"atProvider,omitempty"` }
IdentityProviderStatus defines the observed state of IdentityProvider.
func (*IdentityProviderStatus) DeepCopy ¶
func (in *IdentityProviderStatus) DeepCopy() *IdentityProviderStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IdentityProviderStatus.
func (*IdentityProviderStatus) DeepCopyInto ¶
func (in *IdentityProviderStatus) DeepCopyInto(out *IdentityProviderStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.