This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
FINAL=`curl -sk --data-raw '[{"id": '$manageUser',"name": "manage-users"},{"id": '$manageRealm',"name": "manage-realm"},{"id": '$manageClients',"name": "manage-clients"}]' --header "Content-Type: application/json" --header "Authorization: Bearer $TOKEN" $KEYCLOAK_URL/admin/realms/$REALM/users/$svcUserId/role-mappings/clients/$realmMgmtClientId` | |
echo $FINAL |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
SVC=`curl -sk --header "Content-Type: application/json" --header "Authorization: Bearer $TOKEN" $KEYCLOAK_URL/admin/realms/$REALM/clients/$kasClientId/service-account-user` | |
svcUserId=$(jq -r '.id' <<< $SVC) | |
echo $svcUserId |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
KAS=`curl -sk --header "Content-Type: application/json" --header "Authorization: Bearer $TOKEN" $KEYCLOAK_URL/admin/realms/$REALM/clients?clientId=admin-sa` | |
kasClientId=$(jq -r '.[].id' <<< $KAS) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ROLES=`curl -sk --header "Content-Type: application/json" --header "Authorization: Bearer $TOKEN" $KEYCLOAK_URL/admin/realms/$REALM/clients/$realmMgmtClientId/roles` | |
echo $ROLES | |
manageUser=$(jq -c '.[] | select( .name | contains("manage-users")).id' <<< $ROLES) | |
echo $manageUser | |
manageClients=$(jq -c '.[] | select( .name | contains("manage-clients")).id' <<< $ROLES) | |
echo $manageClients | |
manageRealm=$(jq -c '.[] | select( .name | contains("manage-realm")).id' <<< $ROLES) | |
echo $manageRealm |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
RE=`curl -sk --header "Content-Type: application/json" --header "Authorization: Bearer $TOKEN" $KEYCLOAK_URL/admin/realms/$REALM/clients?clientId=realm-management` | |
realmMgmtClientId=$(jq -r '.[].id' <<< $RE) | |
echo $realmMgmtClientId |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
CREATE=`curl -sk --data-raw '{ | |
"authorizationServicesEnabled": false, | |
"clientId": "admin-sa", | |
"description": "admin-sa", | |
"name": "admin-sa", | |
"secret":"admin-sa", | |
"directAccessGrantsEnabled": false, | |
"serviceAccountsEnabled": true, | |
"publicClient": false, | |
"protocol": "openid-connect" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
KEYCLOAK_URL=http://0.0.0.0:8084 | |
REALM=test | |
CLIENT_ID=admin-cli | |
USERNAME=admin | |
PASS=admin | |
TOKEN_PATH="/realms/master/protocol/openid-connect/token" | |
RESULT=`curl -sk --data "grant_type=password&client_id=$CLIENT_ID&username=$USERNAME&password=$PASS" $KEYCLOAK_URL$TOKEN_PATH` | |
TOKEN=$(jq -r '.access_token' <<< $RESULT) | |
echo $TOKEN |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
apiVersion: com.github.k8soperators.ch3/v1alpha1 | |
kind: GitOps | |
metadata: | |
name: gitops-sample | |
namespace: gitops | |
spec: | |
url: "" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Generated by Fabric8 CRDGenerator, manual edits might get overwritten! | |
apiVersion: apiextensions.k8s.io/v1 | |
kind: CustomResourceDefinition | |
metadata: | |
name: gitops.com.github.k8soperators.ch2 | |
spec: | |
group: com.github.k8soperators.ch2 | |
names: | |
kind: GitOps | |
plural: gitops |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
kind: Cluster | |
apiVersion: kind.x-k8s.io/v1alpha4 | |
# One control plane node and three "workers". | |
# | |
# While these will not add more real compute capacity and | |
# have limited isolation, this can be useful for testing | |
# rolling updates etc. | |
# | |
# The API-server and other control plane components will be | |
# on the control-plane node. |
NewerOlder