Keycloak

We've disabled keycloak at this time because we don't have the time to maintain it and it's harder to use than zitadel.

If you still want to use it though, it would be something like this:

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
apps:
  keycloak:
    enabled: false
    description: |
      keycloak is an IAM provider that you can use with ArgoCD for user/group management and oauth2
      smol-k8s-lab initializes keycloak by creating an initial user & clients for ArgoCD and vouch this will also prompt you for input for creating an admin user. Switch to initialization to false if you want to use your own argo repo that does not not use the appset_secret_plugin or setup an initial user/clients
    init:
      enabled: true
      values:
        # first human user to setup
        username: ""
        first_name: ""
        last_name: ""
    argo:
      # secrets keys to make available to Argo CD ApplicationSets
      secret_keys:
        hostname: ""
        mail_hostname: ""
        default_realm: "default"
      # git repo to install the Argo CD app from
      repo: "https://github.com/small-hack/argocd-apps"
      # path in the argo repo to point to. Trailing slash very important!
      path: "demo/keycloak/"
      # either the branch or tag to point at in the argo repo above
      revision: "main"
      # kubernetes cluster to install the k8s app into, defaults to Argo CD default
      cluster: https://kubernetes.default.svc
      # namespace to install the k8s app in
      namespace: "keycloak"
      # source repos for Argo CD App Project (in addition to argo.repo)
      project:
        name: keycloak
        source_repos:
          - "registry-1.docker.io"
        destination:
          namespaces:
            - argocd