titan-iac/services/keycloak/kustomization.yaml

34 lines
1.1 KiB
YAML
Raw Normal View History

# services/keycloak/kustomization.yaml
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
namespace: sso
resources:
- namespace.yaml
- pvc.yaml
- deployment.yaml
2026-01-02 03:38:50 -03:00
- realm-settings-job.yaml
2026-01-03 14:35:23 -03:00
- portal-e2e-client-job.yaml
2026-01-04 03:35:26 -03:00
- portal-e2e-client-secret-sync-rbac.yaml
- portal-e2e-client-secret-sync-cronjob.yaml
- portal-e2e-target-client-job.yaml
- portal-e2e-token-exchange-permissions-job.yaml
- portal-e2e-token-exchange-test-job.yaml
2026-01-04 00:41:45 -03:00
- portal-e2e-execute-actions-email-test-job.yaml
- ldap-federation-job.yaml
2026-01-03 06:14:56 -03:00
- user-overrides-job.yaml
- mas-secrets-ensure-job.yaml
- synapse-oidc-secret-ensure-job.yaml
2026-01-09 08:54:07 -03:00
- logs-oidc-secret-ensure-job.yaml
- service.yaml
- ingress.yaml
generatorOptions:
disableNameSuffixHash: true
configMapGenerator:
- name: portal-e2e-tests
files:
2026-01-13 12:07:03 -03:00
- test_portal_token_exchange.py=scripts/tests/test_portal_token_exchange.py
- test_keycloak_execute_actions_email.py=scripts/tests/test_keycloak_execute_actions_email.py
2026-01-04 03:35:26 -03:00
- name: portal-e2e-client-secret-sync-script
files:
2026-01-13 12:07:03 -03:00
- sso_portal_e2e_client_secret_sync.sh=scripts/sso_portal_e2e_client_secret_sync.sh