@continuoussecuritytooling/keycloak-reporter 0.5.1 → 0.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.eslintrc.cjs +4 -3
- package/.github/workflows/pipeline.yml +37 -10
- package/.github/workflows/release.yml +1 -1
- package/.prettierrc +2 -2
- package/Dockerfile +19 -2
- package/README.md +4 -3
- package/artifacthub-repo.yml +6 -0
- package/charts/keycloak-reporter/Chart.yaml +9 -3
- package/charts/keycloak-reporter/README.md +7 -21
- package/charts/keycloak-reporter/templates/_helpers.tpl +8 -8
- package/charts/keycloak-reporter/templates/cronjob.yaml +21 -16
- package/charts/keycloak-reporter/templates/secret.yaml +6 -8
- package/charts/keycloak-reporter/values.yaml +42 -39
- package/cli.ts +54 -87
- package/config/schema.json +6 -1
- package/index.ts +1 -1
- package/lib/client.ts +10 -37
- package/lib/output.ts +2 -2
- package/lib/user.ts +86 -49
- package/package.json +5 -4
- package/renovate.json +12 -5
- package/src/commands.ts +27 -0
- package/src/config.ts +6 -18
- package/config.json +0 -9
- package/dist/cli.js +0 -130
- package/dist/cli.js.map +0 -1
- package/dist/config/schema.json +0 -65
- package/dist/index.js +0 -4
- package/dist/index.js.map +0 -1
- package/dist/lib/client.js +0 -41
- package/dist/lib/client.js.map +0 -1
- package/dist/lib/convert.js +0 -9
- package/dist/lib/convert.js.map +0 -1
- package/dist/lib/output.js +0 -113
- package/dist/lib/output.js.map +0 -1
- package/dist/lib/user.js +0 -75
- package/dist/lib/user.js.map +0 -1
- package/dist/src/cli.js +0 -19
- package/dist/src/cli.js.map +0 -1
- package/dist/src/config.js +0 -57
- package/dist/src/config.js.map +0 -1
- package/k8s.yaml +0 -51
- package/keycloak-reporter-0.5.0.tgz +0 -0
- package/src/cli.ts +0 -26
- package/test.values.yaml +0 -8
package/.eslintrc.cjs
CHANGED
|
@@ -2,13 +2,14 @@
|
|
|
2
2
|
module.exports = {
|
|
3
3
|
env: {
|
|
4
4
|
node: true,
|
|
5
|
-
commonjs: true
|
|
5
|
+
commonjs: true,
|
|
6
6
|
},
|
|
7
7
|
extends: ['eslint:recommended', 'plugin:@typescript-eslint/recommended'],
|
|
8
8
|
parser: '@typescript-eslint/parser',
|
|
9
9
|
plugins: ['@typescript-eslint'],
|
|
10
10
|
root: true,
|
|
11
11
|
rules: {
|
|
12
|
-
quotes: [2, 'single', { avoidEscape: true }]
|
|
13
|
-
|
|
12
|
+
quotes: [2, 'single', { avoidEscape: true }],
|
|
13
|
+
'comma-dangle': ['error', 'only-multiline'],
|
|
14
|
+
},
|
|
14
15
|
};
|
|
@@ -6,6 +6,8 @@ on:
|
|
|
6
6
|
push:
|
|
7
7
|
branches:
|
|
8
8
|
- develop
|
|
9
|
+
tags:
|
|
10
|
+
- '*'
|
|
9
11
|
|
|
10
12
|
jobs:
|
|
11
13
|
build:
|
|
@@ -23,7 +25,7 @@ jobs:
|
|
|
23
25
|
steps:
|
|
24
26
|
- uses: actions/checkout@v4
|
|
25
27
|
- name: 'Use Node.js ${{ matrix.node_version }}'
|
|
26
|
-
uses: actions/setup-node@
|
|
28
|
+
uses: actions/setup-node@v4
|
|
27
29
|
with:
|
|
28
30
|
node-version: '${{ matrix.node_version }}'
|
|
29
31
|
- name: npm build and test
|
|
@@ -53,7 +55,7 @@ jobs:
|
|
|
53
55
|
check-latest: true
|
|
54
56
|
|
|
55
57
|
- name: Helm Chart Testing
|
|
56
|
-
uses: helm/chart-testing-action@v2.
|
|
58
|
+
uses: helm/chart-testing-action@v2.6.0
|
|
57
59
|
|
|
58
60
|
- name: Run chart-testing (list-changed)
|
|
59
61
|
id: list-changed
|
|
@@ -92,7 +94,7 @@ jobs:
|
|
|
92
94
|
steps:
|
|
93
95
|
- uses: actions/checkout@v4
|
|
94
96
|
- name: 'Use Node.js ${{ matrix.node_version }}'
|
|
95
|
-
uses: actions/setup-node@
|
|
97
|
+
uses: actions/setup-node@v4
|
|
96
98
|
with:
|
|
97
99
|
node-version: '${{ matrix.node_version }}'
|
|
98
100
|
- name: Install Java
|
|
@@ -131,24 +133,38 @@ jobs:
|
|
|
131
133
|
- end2end
|
|
132
134
|
steps:
|
|
133
135
|
- uses: actions/checkout@v4
|
|
134
|
-
- uses: actions/setup-node@
|
|
135
|
-
# TODO: Support Node 16+
|
|
136
|
+
- uses: actions/setup-node@v4
|
|
136
137
|
with:
|
|
137
|
-
|
|
138
|
+
# renovate: datasource=docker depName=node
|
|
139
|
+
node-version: '18'
|
|
138
140
|
- name: 'Build Package'
|
|
139
141
|
run: |
|
|
140
142
|
npm run clean
|
|
141
143
|
npm run build
|
|
142
|
-
|
|
144
|
+
|
|
145
|
+
- name: Write version vars
|
|
146
|
+
run: |
|
|
147
|
+
BUILD_DATE=`date -u +"%Y-%m-%dT%H:%M:%SZ"`
|
|
148
|
+
VERSION=${GITHUB_REF_NAME#v}
|
|
149
|
+
echo Version: $VERSION
|
|
150
|
+
echo "VERSION=$VERSION" >> $GITHUB_ENV
|
|
151
|
+
echo "APP_VERSION=$VERSION" >> $GITHUB_ENV
|
|
152
|
+
echo "BUILD_DATE=$BUILD_DATE" >> $GITHUB_ENV
|
|
153
|
+
|
|
154
|
+
- name: Build Container Image
|
|
143
155
|
id: build-image
|
|
144
156
|
uses: redhat-actions/buildah-build@v2
|
|
145
157
|
with:
|
|
146
158
|
image: continuoussecuritytooling/keycloak-reporting-cli
|
|
147
|
-
tags: '
|
|
159
|
+
tags: 'rc_build ${{ github.sha }}'
|
|
148
160
|
containerfiles: |
|
|
149
161
|
./Dockerfile
|
|
162
|
+
build-args: |
|
|
163
|
+
BUILD_DATE=${{env.BUILD_DATE}}
|
|
164
|
+
APP_VERSION=${{env.APP_VERSION}}
|
|
165
|
+
|
|
150
166
|
- name: Push To Docker Hub
|
|
151
|
-
id: push-to-dockerhub
|
|
167
|
+
id: push-to-dockerhub-preview
|
|
152
168
|
uses: redhat-actions/push-to-registry@v2
|
|
153
169
|
with:
|
|
154
170
|
image: ${{ steps.build-image.outputs.image }}
|
|
@@ -156,4 +172,15 @@ jobs:
|
|
|
156
172
|
registry: registry.hub.docker.com
|
|
157
173
|
username: continuoussecuritytooling
|
|
158
174
|
password: ${{ secrets.DOCKER_HUB_TOKEN }}
|
|
159
|
-
if: github.ref == 'refs/heads/develop'
|
|
175
|
+
if: github.ref == 'refs/heads/develop'
|
|
176
|
+
|
|
177
|
+
- name: Push To Docker Hub
|
|
178
|
+
id: push-to-dockerhub-tagged
|
|
179
|
+
uses: redhat-actions/push-to-registry@v2
|
|
180
|
+
with:
|
|
181
|
+
image: ${{ steps.build-image.outputs.image }}
|
|
182
|
+
tags: latest ${VERSION}
|
|
183
|
+
registry: registry.hub.docker.com
|
|
184
|
+
username: continuoussecuritytooling
|
|
185
|
+
password: ${{ secrets.DOCKER_HUB_TOKEN }}
|
|
186
|
+
if: github.ref_type == 'tag'
|
package/.prettierrc
CHANGED
package/Dockerfile
CHANGED
|
@@ -1,6 +1,15 @@
|
|
|
1
1
|
FROM node:18
|
|
2
2
|
|
|
3
|
-
|
|
3
|
+
ARG BUILD_DATE
|
|
4
|
+
ARG APP_VERSION
|
|
5
|
+
|
|
6
|
+
LABEL org.opencontainers.image.authors='Martin Reinhardt (martin@m13t.de)' \
|
|
7
|
+
org.opencontainers.image.created=$BUILD_DATE \
|
|
8
|
+
org.opencontainers.image.version=$APP_VERSION \
|
|
9
|
+
org.opencontainers.image.url='https://hub.docker.com/r/continuoussecuritytooling/keycloak-reporting-cli' \
|
|
10
|
+
org.opencontainers.image.documentation='https://github.com/ContinuousSecurityTooling/keycloak-reporter' \
|
|
11
|
+
org.opencontainers.image.source='https://github.com/ContinuousSecurityTooling/keycloak-reporter.git' \
|
|
12
|
+
org.opencontainers.image.licenses='MIT'
|
|
4
13
|
|
|
5
14
|
ENV CONFIG_FILE=/app/config.json
|
|
6
15
|
|
|
@@ -8,6 +17,14 @@ COPY dist/ docker_entrypoint.sh package.json /app
|
|
|
8
17
|
|
|
9
18
|
WORKDIR /app
|
|
10
19
|
|
|
11
|
-
RUN cd /app && npm
|
|
20
|
+
RUN cd /app && npm install --omit=dev &&\
|
|
21
|
+
chown -R 1000:2000 /app
|
|
22
|
+
|
|
23
|
+
# apt update
|
|
24
|
+
RUN apt-get update && apt-get -y upgrade &&\
|
|
25
|
+
# clean up to slim image
|
|
26
|
+
apt-get clean autoclean && apt-get autoremove --yes && rm -rf /var/lib/{apt,dpkg,cache,log}/
|
|
27
|
+
|
|
28
|
+
USER 1000
|
|
12
29
|
|
|
13
30
|
ENTRYPOINT ["/app/docker_entrypoint.sh"]
|
package/README.md
CHANGED
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
# Keycloak Reporter
|
|
2
2
|
|
|
3
|
+
Keycloak user and client reporting tool for automated regular access checks.
|
|
3
4
|
|
|
4
5
|
[](LICENSE)
|
|
5
6
|
[](https://github.com/ContinuousSecurityTooling/keycloak-reporter/actions/workflows/pipeline.yml)
|
|
@@ -7,8 +8,8 @@
|
|
|
7
8
|
[](https://www.npmjs.com/package/@continuoussecuritytooling/keycloak-reporter)
|
|
8
9
|
[](https://hub.docker.com/r/continuoussecuritytooling/keycloak-reporting-cli/)
|
|
9
10
|
[](https://snyk.io/test/github/ContinuousSecurityTooling/keycloak-reporter)
|
|
10
|
-
|
|
11
11
|
[](https://hub.docker.com/r/continuoussecuritytooling/keycloak-reporting-cli/)
|
|
12
|
+
[](https://artifacthub.io/packages/helm/keycloak-reporter/keycloak-reporter)
|
|
12
13
|
|
|
13
14
|
## Usage
|
|
14
15
|
|
|
@@ -58,10 +59,10 @@ Valid commands are:
|
|
|
58
59
|
|
|
59
60
|
### Helm
|
|
60
61
|
|
|
61
|
-
To install the Helm Chart use the OCI Package:
|
|
62
|
+
To install the Helm Chart use the [OCI Package Registry](https://github.com/orgs/CloudTooling/packages):
|
|
62
63
|
|
|
63
64
|
```
|
|
64
|
-
helm install keycloak-reporter oci://cloudtooling/helm-charts
|
|
65
|
+
helm install keycloak-reporter oci://ghcr.io/cloudtooling/helm-charts
|
|
65
66
|
```
|
|
66
67
|
|
|
67
68
|
### Config file
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
apiVersion: v2
|
|
2
2
|
name: keycloak-reporter
|
|
3
|
-
description:
|
|
3
|
+
description: Keycloak user and client reporting tool for automated regular access checks.
|
|
4
4
|
|
|
5
5
|
# A chart can be either an 'application' or a 'library' chart.
|
|
6
6
|
#
|
|
@@ -15,15 +15,21 @@ type: application
|
|
|
15
15
|
# This is the chart version. This version number should be incremented each time you make changes
|
|
16
16
|
# to the chart and its templates, including the app version.
|
|
17
17
|
# Versions are expected to follow Semantic Versioning (https://semver.org/)
|
|
18
|
-
version: 1.
|
|
18
|
+
version: 1.1.0
|
|
19
19
|
|
|
20
20
|
# This is the version number of the application being deployed. This version number should be
|
|
21
21
|
# incremented each time you make changes to the application. Versions are not expected to
|
|
22
22
|
# follow Semantic Versioning. They should reflect the version the application is using.
|
|
23
23
|
# It is recommended to use it with quotes.
|
|
24
24
|
# renovate: datasource=github-tags depName=ContinuousSecurityTooling/keycloak-reporter
|
|
25
|
-
appVersion:
|
|
25
|
+
appVersion: '0.6.0'
|
|
26
26
|
maintainers:
|
|
27
27
|
# Martin Reinhardt
|
|
28
28
|
- name: hypery2k
|
|
29
29
|
email: martin@m13t.de
|
|
30
|
+
annotations:
|
|
31
|
+
artifacthub.io/links: |
|
|
32
|
+
- name: GitHub
|
|
33
|
+
url: https://github.com/ContinuousSecurityTooling/keycloak-reporter
|
|
34
|
+
- name: Keycloak Auditor
|
|
35
|
+
url: https://github.com/ContinuousSecurityTooling/keycloak-auditor
|
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
# keycloak-reporter
|
|
2
2
|
|
|
3
|
-
  
|
|
4
4
|
|
|
5
|
-
|
|
5
|
+
Keycloak user and client reporting tool for automated regular access checks.
|
|
6
6
|
|
|
7
7
|
## Maintainers
|
|
8
8
|
|
|
@@ -15,37 +15,23 @@ A Helm chart for Kubernetes
|
|
|
15
15
|
| Key | Type | Default | Description |
|
|
16
16
|
|-----|------|---------|-------------|
|
|
17
17
|
| affinity | object | `{}` | |
|
|
18
|
-
| cronjobs
|
|
19
|
-
|
|
|
20
|
-
| cronjobs[0].script | string | `"/app/index.js listClients"` | |
|
|
21
|
-
| cronjobs[1].name | string | `"users"` | |
|
|
22
|
-
| cronjobs[1].schedule | string | `"0 0 1 */3 *"` | |
|
|
23
|
-
| cronjobs[1].script | string | `"/app/index.js listUsers"` | |
|
|
24
|
-
| env | object | `{}` | |
|
|
18
|
+
| cronjobs | map | `{"clients":"0 0 1 */3 *","users":"0 0 1 */3 *"}` | Cron configuration |
|
|
19
|
+
| env | map | `{}` | additonal environment variables |
|
|
25
20
|
| fullnameOverride | string | `""` | |
|
|
26
21
|
| image.pullPolicy | string | `"IfNotPresent"` | |
|
|
27
22
|
| image.repository | string | `"continuoussecuritytooling/keycloak-reporting-cli"` | |
|
|
28
|
-
| image.tag | string | `"
|
|
23
|
+
| image.tag | string | `""` | |
|
|
29
24
|
| imagePullSecrets | list | `[]` | |
|
|
30
|
-
| keycloak
|
|
31
|
-
| keycloak.config.clientSecret | string | `""` | |
|
|
32
|
-
| keycloak.config.output | string | `"webhook"` | |
|
|
33
|
-
| keycloak.config.url | string | `""` | |
|
|
25
|
+
| keycloak | map | `{"config":{"clientId":"","clientSecret":"","output":"webhook","url":"","useAuditingEndpoint":false,"webhookMessage":"","webhookType":"","webhookUrl":""},"volumes":{"reports":""}}` | Keycloak configuration |
|
|
34
26
|
| keycloak.config.webhookMessage | string | `""` | optional message for the webhook post |
|
|
35
|
-
| keycloak.config.webhookType | string | `""` | |
|
|
36
|
-
| keycloak.config.webhookUrl | string | `""` | |
|
|
37
|
-
| keycloak.volumes.reports | string | `""` | |
|
|
38
27
|
| nameOverride | string | `""` | |
|
|
39
28
|
| nodeSelector | object | `{}` | |
|
|
40
29
|
| podAnnotations | object | `{}` | |
|
|
41
|
-
| podSecurityContext | object | `{}` | |
|
|
42
30
|
| replicaCount | int | `1` | |
|
|
43
|
-
| resources | object | `{}` | |
|
|
44
|
-
| securityContext | object | `{}` | |
|
|
45
31
|
| serviceAccount.annotations | object | `{}` | |
|
|
46
32
|
| serviceAccount.create | bool | `true` | |
|
|
47
33
|
| serviceAccount.name | string | `""` | |
|
|
48
34
|
| tolerations | list | `[]` | |
|
|
49
35
|
|
|
50
36
|
----------------------------------------------
|
|
51
|
-
Autogenerated from chart metadata using [helm-docs v1.11.
|
|
37
|
+
Autogenerated from chart metadata using [helm-docs v1.11.3](https://github.com/norwoodj/helm-docs/releases/v1.11.3)
|
|
@@ -66,18 +66,18 @@ Create the name of the service account to use
|
|
|
66
66
|
{{/*
|
|
67
67
|
Create the name of the service account to use
|
|
68
68
|
*/}}
|
|
69
|
-
{{- define "keycloak-reporter.cronJobs" }}
|
|
70
|
-
{{- $cronJobs := list -}}
|
|
69
|
+
{{- define "keycloak-reporter.cronJobs" -}}
|
|
71
70
|
{{- if .Values.cronjobs.users }}
|
|
72
|
-
|
|
73
|
-
|
|
71
|
+
users:
|
|
72
|
+
script: "listUsers"
|
|
73
|
+
schedule: {{ .Values.cronjobs.users }}
|
|
74
74
|
{{- end }}
|
|
75
75
|
{{- if .Values.cronjobs.clients }}
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
{{
|
|
79
|
-
{{ join "," $cronJobs }}
|
|
76
|
+
clients:
|
|
77
|
+
script: "listClients"
|
|
78
|
+
schedule: {{ .Values.cronjobs.clients }}
|
|
80
79
|
{{- end }}
|
|
80
|
+
{{- end -}}
|
|
81
81
|
|
|
82
82
|
|
|
83
83
|
|
|
@@ -1,38 +1,47 @@
|
|
|
1
1
|
{{- $fullName := include "keycloak-reporter.fullname" . }}
|
|
2
|
-
{{- range include "keycloak-reporter.cronJobs" $ |
|
|
2
|
+
{{- range $name, $config := include "keycloak-reporter.cronJobs" $ | fromYaml }}
|
|
3
3
|
apiVersion: batch/v1
|
|
4
4
|
kind: CronJob
|
|
5
5
|
metadata:
|
|
6
|
-
name: {{ printf "%s-job-%s" $fullName
|
|
6
|
+
name: {{ printf "%s-job-%s" $fullName $name }}
|
|
7
7
|
spec:
|
|
8
|
-
schedule:
|
|
8
|
+
schedule: {{ $config.schedule }}
|
|
9
9
|
jobTemplate:
|
|
10
10
|
spec:
|
|
11
11
|
template:
|
|
12
12
|
{{- with $.Values.podAnnotations }}
|
|
13
13
|
annotations:
|
|
14
|
-
{{- toYaml
|
|
14
|
+
{{- toYaml $ | nindent 10 }}
|
|
15
15
|
{{- end }}
|
|
16
16
|
spec:
|
|
17
17
|
{{- with $.Values.imagePullSecrets }}
|
|
18
18
|
imagePullSecrets:
|
|
19
|
-
{{- toYaml . | nindent
|
|
19
|
+
{{- toYaml . | nindent 12 }}
|
|
20
20
|
{{- end }}
|
|
21
|
+
# automountServiceAccountToken: false # fix KubernetesClustersShouldDisableAutomountingAPICredentialsMonitoringEffect OPA policy
|
|
22
|
+
serviceAccountName: {{ default "default" ($.Values.serviceAccount).name }}
|
|
23
|
+
securityContext:
|
|
24
|
+
{{- toYaml $.Values.podSecurityContext | nindent 12 }}
|
|
21
25
|
containers:
|
|
22
|
-
- name: {{
|
|
26
|
+
- name: {{ $name }}
|
|
23
27
|
image: "{{ $.Values.image.repository }}:{{ $.Values.image.tag | default $.Chart.AppVersion }}"
|
|
24
28
|
imagePullPolicy: {{ $.Values.image.pullPolicy }}
|
|
25
29
|
command:
|
|
26
|
-
-
|
|
27
|
-
-
|
|
28
|
-
-
|
|
29
|
-
node /app/cli.js {{ .script }}
|
|
30
|
+
- node
|
|
31
|
+
- /app/cli.js
|
|
32
|
+
- {{ $config.script }}
|
|
30
33
|
env:
|
|
31
34
|
- name: CONFIG_FILE
|
|
32
35
|
value: "/app/config.json"
|
|
33
36
|
{{- with $.Values.env }}
|
|
34
37
|
{{- tpl (toYaml .) $ | nindent 12 }}
|
|
35
38
|
{{- end }}
|
|
39
|
+
{{- if $.Values.resources }}
|
|
40
|
+
resources:
|
|
41
|
+
{{- toYaml $.Values.resources | nindent 16 }}
|
|
42
|
+
{{- end }}
|
|
43
|
+
securityContext:
|
|
44
|
+
{{- toYaml $.Values.securityContext | nindent 16 }}
|
|
36
45
|
volumeMounts:
|
|
37
46
|
- name: config-file
|
|
38
47
|
mountPath: "/app/config.json"
|
|
@@ -43,17 +52,13 @@ spec:
|
|
|
43
52
|
mountPath: "/app/reports"
|
|
44
53
|
{{- end }}
|
|
45
54
|
restartPolicy: OnFailure
|
|
46
|
-
{{- if $.Values.resources }}
|
|
47
|
-
resources:
|
|
48
|
-
{{ toYaml $.Values.resources }}
|
|
49
|
-
{{- end }}
|
|
50
55
|
{{- if $.Values.nodeSelector }}
|
|
51
56
|
nodeSelector:
|
|
52
|
-
{{ toYaml $.Values.nodeSelector |
|
|
57
|
+
{{ toYaml $.Values.nodeSelector | nindent 12 }}
|
|
53
58
|
{{- end }}
|
|
54
59
|
{{- if $.Values.tolerations }}
|
|
55
60
|
tolerations:
|
|
56
|
-
{{ toYaml $.Values.tolerations |
|
|
61
|
+
{{ toYaml $.Values.tolerations | nindent 12 }}
|
|
57
62
|
{{- end }}
|
|
58
63
|
volumes:
|
|
59
64
|
- name: config-file
|
|
@@ -4,11 +4,9 @@ kind: Secret
|
|
|
4
4
|
metadata:
|
|
5
5
|
name: {{ $fullName }}
|
|
6
6
|
stringData:
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
reports: /app/reports
|
|
14
|
-
{{- end }}
|
|
7
|
+
config.json: |
|
|
8
|
+
{{- $config:= .Values.keycloak.config }}
|
|
9
|
+
{{- if (.Values.keycloak.config.volumes).reports }}
|
|
10
|
+
$config := merge $config (dict "reports" "/app/reports")
|
|
11
|
+
{{- end }}
|
|
12
|
+
{{ $config | toJson }}
|
|
@@ -8,11 +8,11 @@ image:
|
|
|
8
8
|
repository: continuoussecuritytooling/keycloak-reporting-cli
|
|
9
9
|
pullPolicy: IfNotPresent
|
|
10
10
|
# Overrides the image tag whose default is the chart appVersion.
|
|
11
|
-
|
|
11
|
+
tag: ""
|
|
12
12
|
|
|
13
13
|
imagePullSecrets: []
|
|
14
|
-
nameOverride:
|
|
15
|
-
fullnameOverride:
|
|
14
|
+
nameOverride: ''
|
|
15
|
+
fullnameOverride: ''
|
|
16
16
|
|
|
17
17
|
serviceAccount:
|
|
18
18
|
# Specifies whether a service account should be created
|
|
@@ -21,52 +21,55 @@ serviceAccount:
|
|
|
21
21
|
annotations: {}
|
|
22
22
|
# The name of the service account to use.
|
|
23
23
|
# If not set and create is true, a name is generated using the fullname template
|
|
24
|
-
name:
|
|
24
|
+
name: ''
|
|
25
25
|
|
|
26
26
|
podAnnotations: {}
|
|
27
|
-
|
|
28
|
-
podSecurityContext:
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
27
|
+
# @ignore, Configure pod security context
|
|
28
|
+
podSecurityContext:
|
|
29
|
+
runAsNonRoot: true
|
|
30
|
+
runAsUser: 1000
|
|
31
|
+
fsGroup: 2000
|
|
32
|
+
# @ignore, Configure security context
|
|
33
|
+
securityContext:
|
|
34
|
+
runAsUser: 1000
|
|
35
|
+
runAsNonRoot: true
|
|
36
|
+
readOnlyRootFilesystem: true
|
|
37
|
+
allowPrivilegeEscalation: false
|
|
38
|
+
# Hardening
|
|
39
|
+
capabilities:
|
|
40
|
+
drop: ['ALL']
|
|
41
|
+
seccompProfile:
|
|
42
|
+
type: 'RuntimeDefault'
|
|
43
|
+
# -- (map) additonal environment variables
|
|
33
44
|
env: {}
|
|
34
|
-
|
|
35
|
-
# drop:
|
|
36
|
-
# - ALL
|
|
37
|
-
# readOnlyRootFilesystem: true
|
|
38
|
-
# runAsNonRoot: true
|
|
39
|
-
# runAsUser: 1000
|
|
40
|
-
|
|
45
|
+
# -- (map) Keycloak configuration
|
|
41
46
|
keycloak:
|
|
42
47
|
config:
|
|
43
|
-
url:
|
|
44
|
-
clientId:
|
|
45
|
-
clientSecret:
|
|
46
|
-
output:
|
|
47
|
-
webhookType:
|
|
48
|
-
webhookUrl:
|
|
48
|
+
url: ''
|
|
49
|
+
clientId: ''
|
|
50
|
+
clientSecret: ''
|
|
51
|
+
output: 'webhook'
|
|
52
|
+
webhookType: ''
|
|
53
|
+
webhookUrl: ''
|
|
54
|
+
useAuditingEndpoint: false
|
|
49
55
|
# -- optional message for the webhook post
|
|
50
|
-
webhookMessage:
|
|
56
|
+
webhookMessage: ''
|
|
51
57
|
volumes:
|
|
52
|
-
reports:
|
|
58
|
+
reports: ''
|
|
53
59
|
|
|
60
|
+
# -- (map) Cron configuration
|
|
54
61
|
cronjobs:
|
|
55
|
-
clients:
|
|
56
|
-
users:
|
|
57
|
-
|
|
58
|
-
resources: {}
|
|
59
|
-
# We usually recommend not to specify default resources and to leave this as a conscious
|
|
60
|
-
# choice for the user. This also increases chances charts run on environments with little
|
|
61
|
-
# resources, such as Minikube. If you do want to specify resources, uncomment the following
|
|
62
|
-
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
|
|
63
|
-
# limits:
|
|
64
|
-
# cpu: 100m
|
|
65
|
-
# memory: 128Mi
|
|
66
|
-
# requests:
|
|
67
|
-
# cpu: 100m
|
|
68
|
-
# memory: 128Mi
|
|
62
|
+
clients: '0 0 1 */3 *'
|
|
63
|
+
users: '0 0 1 */3 *'
|
|
69
64
|
|
|
65
|
+
# @ignore, Configure resource limits
|
|
66
|
+
resources:
|
|
67
|
+
limits:
|
|
68
|
+
cpu: 200m
|
|
69
|
+
memory: 256Mi
|
|
70
|
+
requests:
|
|
71
|
+
cpu: 100m
|
|
72
|
+
memory: 128Mi
|
|
70
73
|
|
|
71
74
|
nodeSelector: {}
|
|
72
75
|
|