diff --git a/bitnami/keycloak/Chart.yaml b/bitnami/keycloak/Chart.yaml index 019ae3ce8f..d9fbc12915 100644 --- a/bitnami/keycloak/Chart.yaml +++ b/bitnami/keycloak/Chart.yaml @@ -26,4 +26,4 @@ name: keycloak sources: - https://github.com/bitnami/bitnami-docker-keycloak - https://github.com/keycloak/keycloak -version: 9.3.0 +version: 9.3.1 diff --git a/bitnami/keycloak/values.yaml b/bitnami/keycloak/values.yaml index 7b931922b0..e2f64e28ff 100644 --- a/bitnami/keycloak/values.yaml +++ b/bitnami/keycloak/values.yaml @@ -111,7 +111,7 @@ auth: ## admin-password: myPasswordKey ## management-password: myManagementPasswordKey ## tls-keystore-password: myTlsKeystorePasswordKey - ## tls-truestore-password: myTlsTruestorePasswordKey + ## tls-truststore-password: myTlsTruststorePasswordKey ## existingSecret: "" ## @param auth.existingSecretPerPassword Override `existingSecret` and other secret values @@ -147,7 +147,7 @@ auth: autoGenerated: false ## @param auth.tls.existingSecret Existing secret containing the TLS certificates per Keycloak replica ## Create this secret following the steps below: - ## 1) Generate your trustore and keystore files (more info at https://www.keycloak.org/docs/latest/server_installation/#_setting_up_ssl) + ## 1) Generate your truststore and keystore files (more info at https://www.keycloak.org/docs/latest/server_installation/#_setting_up_ssl) ## 2) Rename your truststore to `keycloak.truststore.jks`. ## 3) Rename your keystores to `keycloak-X.keystore.jks` where X is the ID of each Keycloak replica ## 4) Run the command below where SECRET_NAME is the name of the secret you want to create: @@ -160,11 +160,11 @@ auth: ## usePem: false ## @param auth.tls.truststoreFilename Truststore specific filename inside the existing secret - ## Note: Setting up this value, you will use the same trustore file in all the replicas + ## Note: Setting up this value, you will use the same truststore file in all the replicas ## truststoreFilename: "" ## @param auth.tls.keystoreFilename Keystore specific filename inside the existing secret - ## Note: Setting up this value, you will use the same trustore file in all the replicas + ## Note: Setting up this value, you will use the same truststore file in all the replicas ## keystoreFilename: "" ## @param auth.tls.jksSecret DEPRECATED. Use `auth.tls.existingSecret` instead