From b5d81cd32ea8c4bf03bd5a81726e09848232e734 Mon Sep 17 00:00:00 2001 From: Chris Lovering Date: Sun, 9 Feb 2025 17:27:50 +0000 Subject: Bump keycloak to latest version This included moving the feature to build time, see https://github.com/owl-corp/pydis-keycloak-theme/commit/e0b1e8a6ec93bda3df4f56a04e8dab7d7d5c2730 --- kubernetes/namespaces/tooling/keycloak/configmap.yaml | 1 - kubernetes/namespaces/tooling/keycloak/deployment.yaml | 2 +- 2 files changed, 1 insertion(+), 2 deletions(-) diff --git a/kubernetes/namespaces/tooling/keycloak/configmap.yaml b/kubernetes/namespaces/tooling/keycloak/configmap.yaml index ca02049..9389c80 100644 --- a/kubernetes/namespaces/tooling/keycloak/configmap.yaml +++ b/kubernetes/namespaces/tooling/keycloak/configmap.yaml @@ -7,7 +7,6 @@ data: # Set the hostname for outbound traffic and enable the feature to read that # environment variable KC_HOSTNAME: "id.pydis.wtf" - KC_FEATURES: "hostname:v2,passkeys" # Set the location of the TLS certificates generated by Vault KC_HTTPS_CERTIFICATE_FILE: "/vault/secrets/server.crt" diff --git a/kubernetes/namespaces/tooling/keycloak/deployment.yaml b/kubernetes/namespaces/tooling/keycloak/deployment.yaml index a68ac57..d6546d9 100644 --- a/kubernetes/namespaces/tooling/keycloak/deployment.yaml +++ b/kubernetes/namespaces/tooling/keycloak/deployment.yaml @@ -32,7 +32,7 @@ spec: serviceAccountName: internal-tls-issuer containers: - name: keycloak - image: ghcr.io/owl-corp/keycloak:25.0.4 + image: ghcr.io/owl-corp/keycloak:26.1.1 imagePullPolicy: Always envFrom: - secretRef: -- cgit v1.2.3