aboutsummaryrefslogtreecommitdiffstats
path: root/kubernetes/authentication/values.yaml
diff options
context:
space:
mode:
Diffstat (limited to 'kubernetes/authentication/values.yaml')
-rw-r--r--kubernetes/authentication/values.yaml35
1 files changed, 22 insertions, 13 deletions
diff --git a/kubernetes/authentication/values.yaml b/kubernetes/authentication/values.yaml
index ba99879e87..124bc18c8d 100644
--- a/kubernetes/authentication/values.yaml
+++ b/kubernetes/authentication/values.yaml
@@ -26,7 +26,7 @@ global:
postaddr: ""
keycloak:
- intURL: "http://keycloak-keycloakx-http.keycloak.svc.cluster.local/"
+ intURL: "http://keycloak-http.keycloak.svc.cluster.local/"
relativePath: "auth/"
ingressAuthentication:
enabled: false
@@ -38,12 +38,16 @@ ingressAuthentication:
onap-keycloak-config-cli:
image:
+ # "edge" is the latest build release and need to be replaced with a new version
+ # compatible with keycloak 26.x.y
+ tag: edge
+ #tag: "6.1.6-25.0.1"
pullSecrets:
- name: onap-docker-registry-key
#existingSecret: "keycloak-keycloakx-admin-creds"
env:
# internal KC URL plus relative path
- KEYCLOAK_URL: "http://keycloak-keycloakx-http.keycloak.svc.cluster.local/auth/"
+ KEYCLOAK_URL: "http://keycloak-http.keycloak.svc.cluster.local/auth/"
KEYCLOAK_SSLVERIFY: "false"
KEYCLOAK_AVAILABILITYCHECK_ENABLED: "true"
secrets:
@@ -71,6 +75,11 @@ onap-keycloak-config-cli:
memory: 10Mi
onap-oauth2-proxy:
+
+ # Addition for oauth2-proxy deployment
+ imagePullSecrets:
+ - name: '{{ include "common.namespace" . }}-docker-registry-key'
+
securityContext:
capabilities:
drop:
@@ -309,24 +318,24 @@ realmSettings:
- name: "Client Host"
protocolMapper: "oidc-usersessionmodel-note-mapper"
config:
- user.session.note : "clientHost"
- id.token.claim : "true"
- access.token.claim : "true"
- claim.name : "clientHost"
- jsonType.label : "String"
+ user.session.note: "clientHost"
+ id.token.claim: "true"
+ access.token.claim: "true"
+ claim.name: "clientHost"
+ jsonType.label: "String"
- name: "Client IP Address"
protocolMapper: "oidc-usersessionmodel-note-mapper"
config:
- user.session.note : "clientAddress"
- id.token.claim : "true"
- access.token.claim : "true"
- claim.name : "clientAddress"
- jsonType.label : "String"
+ user.session.note: "clientAddress"
+ id.token.claim: "true"
+ access.token.claim: "true"
+ claim.name: "clientAddress"
+ jsonType.label: "String"
defaultClientScopes:
- "onap_roles"
additionalClientScopes:
- name: onap_roles
- description: OpenID Connect scope for add user onap roles to the access token
+ description: "OpenID Connect scope for add user onap roles to the access token"
protocolMappers:
- name: aud
protocol: openid-connect