Keycloak
We've disabled keycloak at this time because we don't have the time to maintain it and it's harder to use than zitadel.
If you still want to use it though, it would be something like this:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37 | apps:
keycloak:
enabled: false
description: |
keycloak is an IAM provider that you can use with ArgoCD for user/group management and oauth2
smol-k8s-lab initializes keycloak by creating an initial user & clients for ArgoCD and vouch this will also prompt you for input for creating an admin user. Switch to initialization to false if you want to use your own argo repo that does not not use the appset_secret_plugin or setup an initial user/clients
init:
enabled: true
values:
# first human user to setup
username: ""
first_name: ""
last_name: ""
argo:
# secrets keys to make available to Argo CD ApplicationSets
secret_keys:
hostname: ""
mail_hostname: ""
default_realm: "default"
# git repo to install the Argo CD app from
repo: "https://github.com/small-hack/argocd-apps"
# path in the argo repo to point to. Trailing slash very important!
path: "demo/keycloak/"
# either the branch or tag to point at in the argo repo above
revision: "main"
# kubernetes cluster to install the k8s app into, defaults to Argo CD default
cluster: https://kubernetes.default.svc
# namespace to install the k8s app in
namespace: "keycloak"
# source repos for Argo CD App Project (in addition to argo.repo)
project:
name: keycloak
source_repos:
- "registry-1.docker.io"
destination:
namespaces:
- argocd
|