@@ -438,13 +438,14 @@ EOF`;
438438 ...( ! this . cfg . compose . includeTraefik && { ports : [ `${ this . getPort ( this . cfg . keycloak . publicUrl ) } :8080` ] } ) ,
439439 healthcheck : {
440440 test : [ 'CMD' , 'curl' , '-f' , `http://localhost:9000${ this . getPathname ( HubSetup . urlWithTrailingSlash ( this . cfg . keycloak . publicUrl ) ) } health/live` ] ,
441- interval : '60s' ,
441+ start_period : '60s' ,
442+ interval : '10s' ,
442443 timeout : '3s' ,
443444 } ,
444445 restart : 'unless-stopped' ,
445446 environment : {
446- KEYCLOAK_ADMIN : this . cfg . keycloak . adminUser ,
447- KEYCLOAK_ADMIN_PASSWORD : this . cfg . keycloak . adminPw ,
447+ KC_BOOTSTRAP_ADMIN_USERNAME : this . cfg . keycloak . adminUser ,
448+ KC_BOOTSTRAP_ADMIN_PASSWORD : this . cfg . keycloak . adminPw ,
448449 KC_DB : 'postgres' ,
449450 KC_DB_URL : 'jdbc:postgresql://postgres:5432/keycloak' ,
450451 KC_DB_USERNAME : 'keycloak' ,
@@ -762,8 +763,8 @@ class KubernetesConfigBuilder extends ConfigBuilder {
762763 startCmd = [ '/opt/keycloak/bin/kc.sh' , 'start' , '--import-realm' ] ; // prod mode without build time optimizations (requires a proper TLS termination proxy)
763764 }
764765 let env = [
765- { name : 'KEYCLOAK_ADMIN ' , valueFrom : { secretKeyRef : { name : 'hub-secrets' , key : 'kc_admin_user' } } } ,
766- { name : 'KEYCLOAK_ADMIN_PASSWORD ' , valueFrom : { secretKeyRef : { name : 'hub-secrets' , key : 'kc_admin_pass' } } } ,
766+ { name : 'KC_BOOTSTRAP_ADMIN_USERNAME ' , valueFrom : { secretKeyRef : { name : 'hub-secrets' , key : 'kc_admin_user' } } } ,
767+ { name : 'KC_BOOTSTRAP_ADMIN_PASSWORD ' , valueFrom : { secretKeyRef : { name : 'hub-secrets' , key : 'kc_admin_pass' } } } ,
767768 { name : 'KC_DB' , value : 'postgres' } ,
768769 { name : 'KC_DB_URL' , value : 'jdbc:postgresql://postgres-svc:5432/keycloak' } ,
769770 { name : 'KC_DB_USERNAME' , value : 'keycloak' } ,
0 commit comments