Compare commits

..

1 Commits

Author SHA1 Message Date
Gitea Actions Bot 0fc585f17c Auto-update README with current k8s applications
Keycloak Terraform / Terraform (pull_request) Successful in 19s
Generated by CI/CD workflow on 2026-05-18 23:58:07

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2026-05-18 23:58:07 +00:00
3 changed files with 16 additions and 24 deletions
+15 -18
View File
@@ -17,23 +17,20 @@ spec:
PGADMIN_CONFIG_OAUTH2_CONFIG: |-
[
{
'OAUTH2_NAME': 'Keycloak',
'OAUTH2_DISPLAY_NAME': 'Keycloak',
'OAUTH2_CLIENT_ID': '{{ .client_id }}',
'OAUTH2_CLIENT_SECRET': '{{ .client_secret }}',
'OAUTH2_TOKEN_URL': '{{ .keycloak_url }}/realms/hexor/protocol/openid-connect/token',
'OAUTH2_AUTHORIZATION_URL': '{{ .keycloak_url }}/realms/hexor/protocol/openid-connect/auth',
'OAUTH2_SERVER_METADATA_URL': '{{ .keycloak_url }}/realms/hexor/.well-known/openid-configuration',
'OAUTH2_API_BASE_URL': '{{ .keycloak_url }}',
'OAUTH2_USERINFO_ENDPOINT': '{{ .keycloak_url }}/realms/hexor/protocol/openid-connect/userinfo',
'OAUTH2_SCOPE': 'openid profile email',
'OAUTH2_USERNAME_CLAIM': 'email',
'OAUTH2_BUTTON_COLOR': '#000000',
'OAUTH2_SSL_CERT_VERIFICATION': False,
'OAUTH2_LOGOUT_URL': '{{ .keycloak_url }}/realms/hexor/protocol/openid-connect/logout',
'OAUTH2_NAME': 'Authentik',
'OAUTH2_DISPLAY_NAME': 'Authentik',
'OAUTH2_CLIENT_ID': '{{ .client_id }}',
'OAUTH2_CLIENT_SECRET': '{{ .client_secret }}',
'OAUTH2_TOKEN_URL': '{{ .pgadmin_url }}/application/o/token/',
'OAUTH2_AUTHORIZATION_URL': '{{ .pgadmin_url }}/application/o/authorize/',
'OAUTH2_SERVER_METADATA_URL': '{{ .pgadmin_url }}/application/o/pgadmin/.well-known/openid-configuration',
'OAUTH2_API_BASE_URL': '{{ .pgadmin_url }}',
'OAUTH2_USERINFO_ENDPOINT': '{{ .pgadmin_url }}/application/o/userinfo/',
'OAUTH2_SCOPE': 'openid profile email',
'OAUTH2_USERNAME_CLAIM': 'email',
'OAUTH2_BUTTON_COLOR': '#000000',
'OAUTH2_SSL_CERT_VERIFICATION': False,
'OAUTH2_LOGOUT_URL': '{{ .pgadmin_url }}/application/o/pgadmin/end-session/'
}
]
data:
@@ -81,7 +78,7 @@ spec:
metadataPolicy: None
key: 832042b9-7edb-4f4c-9254-3c8884ba9733
property: fields[1].value
- secretKey: keycloak_url
- secretKey: pgadmin_url
sourceRef:
storeRef:
name: vaultwarden-login
+1 -1
View File
@@ -8,7 +8,7 @@ resource "keycloak_realm" "hexor" {
display_name = "Hexor"
login_theme = "keycloak.v2"
login_theme = "hacker"
account_theme = "keycloak.v3"
registration_allowed = false
-5
View File
@@ -29,11 +29,6 @@ oauth2_applications = {
post_logout_redirect_uris = ["https://ag.hexor.cy/*"]
extra_optional_scopes = ["offline_access"]
}
PGAdmin = {
redirect_uris = ["https://pg.hexor.cy/oauth2/authorize"]
web_origins = ["https://pg.hexor.cy"]
post_logout_redirect_uris = ["https://pg.hexor.cy/*"]
}
Grafana = {
redirect_uris = ["https://gf.hexor.cy/login/generic_oauth"]
web_origins = ["https://gf.hexor.cy"]