Skip to content

Commit 280ed83

Browse files
committed
s/keycloack/keycloak/
1 parent 2e1867f commit 280ed83

File tree

5 files changed

+27
-27
lines changed

5 files changed

+27
-27
lines changed

fleet/lib/kube-prometheus-stack-pre/externalsecret-grafana-keycloack.yaml renamed to fleet/lib/kube-prometheus-stack-pre/externalsecret-grafana-keycloak-credentials.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
apiVersion: external-secrets.io/v1beta1
22
kind: ExternalSecret
33
metadata:
4-
name: grafana-keycloack-credentials
4+
name: grafana-keycloak-credentials
55
spec:
66
secretStoreRef:
77
kind: ClusterSecretStore
88
name: onepassword
99
data:
1010
- remoteRef:
11-
key: grafana-keycloack-credentials
11+
key: grafana-keycloak-credentials
1212
property: username
1313
secretKey: client_id
1414
- remoteRef:
15-
key: grafana-keycloack-credentials
15+
key: grafana-keycloak-credentials
1616
property: credential
1717
secretKey: client_secret
1818
- remoteRef:
19-
key: grafana-keycloack-credentials
19+
key: grafana-keycloak-credentials
2020
property: hostname
21-
secretKey: keycloack_url
21+
secretKey: keycloak_url
2222
refreshInterval: 1h
2323
target:
2424
creationPolicy: Owner

fleet/lib/kube-prometheus-stack/aggregator/values.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -246,13 +246,13 @@ grafana:
246246
allow_sign_up: true
247247
api_url: https://keycloak.ls.lsst.org/realms/master/protocol/openid-connect/userinfo
248248
auth_url: https://keycloak.ls.lsst.org/realms/master/protocol/openid-connect/auth
249-
client_id: $__file{/etc/secrets/keycloack-credentials/client_id}
250-
client_secret: $__file{/etc/secrets/keycloack-credentials/client_secret}
249+
client_id: $__file{/etc/secrets/keycloak-credentials/client_id}
250+
client_secret: $__file{/etc/secrets/keycloak-credentials/client_secret}
251251
email_attribute_path: email
252252
enabled: true
253253
group_attribute_path: groups
254254
login_attribute_path: preferred_username
255-
name: keycloack.ls.lsst.org
255+
name: keycloak.ls.lsst.org
256256
role_attribute_path: contains(groups[*], 'grafana-admin') && 'GrafanaAdmin' || contains(groups[*], 'grafana-admin') && 'Admin' || contains(groups[*], 'grafana-editor') && 'Editor' || 'Viewer'
257257
scopes: openid profile email groups roles offline_access
258258
token_url: https://keycloak.ls.lsst.org/realms/master/protocol/openid-connect/token
@@ -292,9 +292,9 @@ grafana:
292292
datasources:
293293
enabled: true
294294
extraSecretMounts:
295-
- name: keycloack-credentials
296-
mountPath: /etc/secrets/keycloack-credentials
297-
secretName: grafana-keycloack-credentials
295+
- name: keycloak-credentials
296+
mountPath: /etc/secrets/keycloak-credentials
297+
secretName: grafana-keycloak-credentials
298298
readOnly: true
299299
datasources:
300300
datasource.yaml:

fleet/lib/opensearch-logging/clusters/logging-configmap.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ data:
3030
config:
3131
subject_key: preferred_username
3232
roles_key: roles
33-
openid_connect_url: "{{ .keycloackURL }}"
33+
openid_connect_url: "{{ .keycloakURL }}"
3434
authentication_backend:
3535
type: noop
3636
roles_mappings.yml: |

fleet/lib/opensearch-logging/clusters/logging-externalsecrets.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,23 +22,23 @@ spec:
2222
apiVersion: external-secrets.io/v1beta1
2323
kind: ExternalSecret
2424
metadata:
25-
name: os-dashboard-keycloack-credentials
25+
name: os-dashboard-keycloak-credentials
2626
spec:
2727
secretStoreRef:
2828
kind: ClusterSecretStore
2929
name: onepassword
3030
data:
3131
- secretKey: CLIENT_ID
3232
remoteRef:
33-
key: os-dashboard-keycloack-credentials
33+
key: os-dashboard-keycloak-credentials
3434
property: username
3535
- secretKey: CLIENT_SECRET
3636
remoteRef:
37-
key: os-dashboard-keycloack-credentials
37+
key: os-dashboard-keycloak-credentials
3838
property: credential
3939
- secretKey: url
4040
remoteRef:
41-
key: os-dashboard-keycloack-credentials
41+
key: os-dashboard-keycloak-credentials
4242
property: url
4343
target:
4444
creationPolicy: Owner
@@ -72,9 +72,9 @@ spec:
7272
kind: ClusterSecretStore
7373
name: onepassword
7474
data:
75-
- secretKey: keycloackURL
75+
- secretKey: keycloakURL
7676
remoteRef:
77-
key: os-dashboard-keycloack-credentials
77+
key: os-dashboard-keycloak-credentials
7878
property: url
7979
target:
8080
template:

fleet/lib/opensearch-logging/clusters/logging.yaml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -36,27 +36,27 @@ spec:
3636
opensearch_security.auth.type: '["basicauth", "openid"]'
3737
opensearch_security.auth.multiple_auth_enabled: "true"
3838
opensearch_security.openid.base_redirect_url: "https://opensearch.ayekan.dev.lsst.org/dashboard"
39-
opensearch_security.openid.client_id: "${KEYCLOACK_CLIENT_ID}"
40-
opensearch_security.openid.client_secret: "${KEYCLOACK_CLIENT_SECRET}"
41-
opensearch_security.openid.connect_url: "${KEYCLOACK_URL}"
39+
opensearch_security.openid.client_id: "${KEYCLOAK_CLIENT_ID}"
40+
opensearch_security.openid.client_secret: "${KEYCLOAK_CLIENT_SECRET}"
41+
opensearch_security.openid.connect_url: "${KEYCLOAK_URL}"
4242
opensearch_security.openid.header: "Authorization"
4343
opensearch_security.openid.scope: "openid profile email offline_access"
4444
opensearch_security.openid.trust_dynamic_headers: "true"
4545
env:
46-
- name: KEYCLOACK_CLIENT_ID
46+
- name: KEYCLOAK_CLIENT_ID
4747
valueFrom:
4848
secretKeyRef:
49-
name: os-dashboard-keycloack-credentials
49+
name: os-dashboard-keycloak-credentials
5050
key: CLIENT_ID
51-
- name: KEYCLOACK_CLIENT_SECRET
51+
- name: KEYCLOAK_CLIENT_SECRET
5252
valueFrom:
5353
secretKeyRef:
54-
name: os-dashboard-keycloack-credentials
54+
name: os-dashboard-keycloak-credentials
5555
key: CLIENT_SECRET
56-
- name: KEYCLOACK_URL
56+
- name: KEYCLOAK_URL
5757
valueFrom:
5858
secretKeyRef:
59-
name: os-dashboard-keycloack-credentials
59+
name: os-dashboard-keycloak-credentials
6060
key: url
6161
security:
6262
config:

0 commit comments

Comments
 (0)