This commit modifies the `Chart.yaml` file for the Keycloak Helm chart.
The changes include restructuring dependency entries for `postgresql`
to use a list format instead of a single line. Additionally, the
version number has been updated from `25.2.0` to `25.2.0-test1`.
These changes improve clarity and organization of the dependencies
section, making it easier to manage configurations in the future.
No breaking changes are introduced, and the chart remains
compatible with existing deployments.
This commit introduces several changes to the `values.yaml` file for the
Keycloak chart. Specifically, it adds new configuration options for an
`adminIngress` section to enable or disable the admin ingress resource,
defaulting to `false`. This provides clearer control over unnecessary
exposure of the Keycloak admin interface.
Additionally, a new `rbac` section has been added, with a default value
for creating RBAC resources set to `false`. This change allows users to
have more granular control over RBAC settings for the Keycloak deployment.
These modifications were made to enhance flexibility and security
configuration of Keycloak in Kubernetes environments. No breaking
changes were introduced, but users interested in these new options
should review and adjust their Helm chart values accordingly.
This update introduces significant enhancements to the Keycloak chart,
particularly regarding TLS certificate management. The changes include:
- Added the capability to automatically generate and manage TLS certificates
using Cert-Manager or Helm, improving the security posture by using
self-signed certificates in development scenarios.
- Implemented a dedicated ConfigMap to hold keycloak-config-cli
configurations and ensured that it is integrated with the job for
configuration synchronization.
- Enhanced the handling of admin ingress settings and TLS secrets,
facilitating smoother access and management for multi-host deployments.
- Refactored and reorganized sections to improve readability and maintainability
of templates, ensuring adherence to best practices in Helm charts.
These improvements aim to streamline deployment, enhance security features,
and simplify the management of certificates, facilitating easier
Kubernetes operations for users.
revert Update Keycloak image and version to 26.3.3
The Keycloak Docker image has been updated from
26.3.2-debian-12-r1 to 26.3.3-debian-12-r0 in both the Chart.yaml
and values.yaml files. This change was necessary to incorporate
the latest security patches and improvements provided in the
newer version.
Additionally, the appVersion and chart version in the Chart.yaml
file have been updated to 26.3.3 and 25.2.0 respectively to ensure
consistency with the image versioning. These updates help maintain
compatibility and ensure that users benefit from the latest enhancements.
The Keycloak Docker image has been updated from
26.3.2-debian-12-r1 to 26.3.3-debian-12-r0 in both the Chart.yaml
and values.yaml files. This change was necessary to incorporate
the latest security patches and improvements provided in the
newer version.
Additionally, the appVersion and chart version in the Chart.yaml
file have been updated to 26.3.3 and 25.2.0 respectively to ensure
consistency with the image versioning. These updates help maintain
compatibility and ensure that users benefit from the latest enhancements.
The version of the Keycloak chart has been reverted from 24.9.2 to
24.9.1. This change was necessary to align with the stability
requirements of our deployment environment, as issues were
identified in the newer version that could impact performance
and reliability. It's important to monitor further updates
from the Keycloak team to ensure we can upgrade once the
issues have been resolved without affecting our services.
Updated the `Chart.yaml` file for the Keycloak Helm chart. The
dependencies section was modified to use a more structured format
for listing dependencies. The condition for the PostgreSQL chart
was updated to improve clarity. Additionally, the chart version
was bumped from `24.9.1` to `24.9.2`, reflecting the latest
changes and improvements in the chart.
The description was reformatted to enhance readability and provide
clarity on what Keycloak offers. Minor adjustments were also made
to the keywords and maintainers sections for consistency and
accuracy. No breaking changes or impacts on existing deployments
are expected from this update.
This commit updates the Keycloak Helm chart dependencies to
include the latest version of PostgreSQL (16.7.24) and adds the
common chart (version 2.31.3) as new files. The updates were
necessary to ensure compatibility with the latest features
and security patches provided by both dependencies.
The `Chart.lock` file was modified to reflect the version
increment for PostgreSQL and includes a new digest and
generated timestamp. The addition of the `.tgz` files for
both charts ensures that they are packaged and available for
deployment without fetching directly from the remote
repository.
There are no breaking changes introduced with these updates;
the changes primarily enhance the stability and security of
the Keycloak deployment.
This commit introduces a complete Helm chart for deploying Keycloak on
Kubernetes. The chart includes a variety of configurations such as
service and ingress definitions, metrics exposure, resource limits, and
autoscaling options.
Key features include:
- Full support for PostgreSQL as a database, configurable through chart
values.
- Ingress resources for external access, including support for TLS and
admin interfaces.
- Options to use custom configurations and initialization scripts via
ConfigMaps.
- Metrics service for Prometheus integration, alongside ServiceMonitor
configurations for Kubernetes monitoring.
- Enhanced environment variables management, including secret handling
for sensitive data like passwords.
These changes provide a robust foundation for deploying Keycloak in
both development and production environments. Users should be aware
that this initial setup gives flexibility for customization, but care
should be taken when altering default configurations to ensure
compatibility with existing deployments.