Commit c0c311f
Main (#173)
* fix: separate SSL certificates (#101)
* fix: Set environment variables via .env file. (#99)
* Set environment variables via .env file.
* Missing change
* Change how hostnames and secret are set.
* changes for env template
* add env variable resolver on sso redirect value
* fix: add env_file to codetogether-intel (#105)
* fix: missing CT_HQ_BASE_URL env var (#107)
* feat: nginx auto config (#109)
* fix: add step for sso provider (#110)
* fix: add client_max_body_size to intel (#112)
* fix: tweak name of dhparam.pem env var (#113)
* tweak name of dhparam.pem env var
* fix env var name in nginx template
* fix pam to pem
* fix: missing env file on collab (#114)
* fix: handle nil ai.openai.api_key to prevent template er… (#116)
* fix(intel-chart): handle nil ai.openai.api_key to prevent template errors
Adjusted the Helm chart template for ai-secrets to avoid referencing ai.openai.api_key and
ai.external.api_key when undefined.
This fixes a fatal error during `helm template` when AI mode is set to `bundled`
and no OpenAI config is present. Ensures compatibility with bundled-only deployments.
* Changes to fix workflow issues
* fix: cleanup for sso tenants (#117)
* feat(intel): add option to disable AI integration entirely (#120)
Previously, the Helm chart required either 'bundled' or 'external' AI mode to be configured, making it
mandatory to include AI integration. This commit introduces a new flag `ai.enabled` to allow disabling
AI features entirely, enabling Intel to be deployed without any AI-related containers or resources.
* Change gen ai image name on values file (#122)
* fix: bump up version number (#123)
* docs: remove outdated metrics section from README (#130)
- Removed the section referring to metrics(prometeus), etc from the README
Co-authored-by: engineering <engineering@codetogether.com>
* fix: add note to env-template file (#127)
* fix: update LLM image URL to hub.edge (#132)
* docs: add deprecation notice to old Live chart (#131)
* 126 automatically configure ollama integration when llm is enabled (#128)
* Make sidecar AI container resource block optional in deployment
- Updated deployment.yaml to include the `resources` block for the `codetogether-llm` sidecar only if values are defined in values.yaml.
- Ensures the bundled AI container can run without specifying resource limits/requests by default.
- Improved overall Helm template flexibility for embedded AI mode.
- Validated that runs with AI Container embeeded.
* Enable support for external AI provider
- Updated deployment.yaml to support both bundled and external AI modes, allowing selection via .Values.ai.mode.
- Added manifests for external AI integration:
- ai-config ConfigMap: defines external provider and URL.
- ai-external-secret Secret: stores the external API key.
- Verified that external AI mode works by routing requests through the configured external service.
* feat: automate creation of external AI ConfigMap and Secret from values.yaml
- Added Helm templates to generate ai-config ConfigMap and ai-external-secret Secret automatically when AI external mode is enabled.
- ConfigMap values (ai_provider, ai_url) and Secret value (api-key) are now configurable via values.yaml.
- Ensured resources are only created when ai.enabled=true and ai.mode=external.
* feat: allow use of existing or Helm-managed ai-external-secret in deployment
- Updated deployment.yaml to support referencing a user-provided Secret for AI external API key, with fallback to Helm-managed creation.
- Added ai-external-secret.yaml template to optionally create the secret from values if not provided.
* Fixing helm template validations
* Adding values configuration
---------
Co-authored-by: engineering <engineering@codetogether.com>
* Gen AI Changes (#124)
* Change resources of ai
* Include gen ai on docker compose.
* undo changes
* Fix collab helm chart to allow usage of locator. (#134)
* fix: invalid values in AI values section (#137)
* fix: support automatic configuration of the LLM integration if AI is enabled (#138)
* Fixes after Testing (#139)
* Fixes after Testing
- Refactored deployment.yaml to reference ai.externalSecret.name when create: false
- Corrected CT_HQ_OLLAMA_AI_API_KEY key to apiKey to match Secret’s stringData
- Updated ai-external-secret.yaml to generate a Secret only when create: true
* Bump intel chart version to 1.2.5
* Fix to user http://codetogether-llm:8000/ always
---------
Co-authored-by: engineering <engineering@codetogether.com>
* Changes to use localhost always to avoid dns issues (#142)
Co-authored-by: engineering <engineering@codetogether.com>
* feat: support for optional keycloak deployment (#145)
* initial config
* Docker compose example to run keycloak
---------
Co-authored-by: Ignacio Moreno <nmorenor@gmail.com>
* 144 keycloak (#146)
* initial config
* Docker compose example to run keycloak
* Undo properties file change
* fixes on properties file
---------
Co-authored-by: Wojciech Galanciak <wojtek@codetogether.com>
* 144 keycloak (#147)
* initial config
* Docker compose example to run keycloak
* Undo properties file change
* fixes on properties file
---------
Co-authored-by: Wojciech Galanciak <wojtek@codetogether.com>
* 144 keycloak (#149)
* fixes on properties file
* Prepare examples for deployment with keycloak.
* move files
* feat(charts, compose): add CT_TRUST_ALL_CERTS support (#158)
* feat(charts, compose): add CT_TRUST_ALL_CERTS support
Fixes: #157
- values.yaml: introduce `java.trustAllCerts` (default false) to toggle CT_TRUST_ALL_CERTS
- deployment.yaml: inject `CT_TRUST_ALL_CERTS=true` into container env when `trustAllCerts` is enabled
- .env-template: add `CT_TRUST_ALL_CERTS` entry for Docker Compose
- compose.yml: reference `${CT_TRUST_ALL_CERTS}` in codetogether‑intel service
* refactor(charts): move trustAllCerts under codetogether section
- values.yaml: remove java.trustAllCerts; add codetogether.trustAllCerts (default false)
- deployment.yaml: guard CT_TRUST_ALL_CERTS injection on .Values.codetogether.trustAllCerts
* fix(compose): remove redundant CT_TRUST_ALL_CERTS env entry
- Drop explicit `CT_TRUST_ALL_CERTS` from the `environment` section in the `codetogether-intel` service
- Rely on `env_file: .env` to inject the variable
---------
Co-authored-by: engineering <engineering@codetogether.com>
* feat(chart): guard `ai-secrets` template behind `ai.enabled` (#161)
Fixes: #160
Wrap the `ai-secrets` Secret manifest with a `.Values.ai.enabled` conditional
so it is not rendered when AI is disabled. This prevents clashes with
pre-existing `ai-secrets` owned by other releases and keeps templates clean.
* fix: improve keycloak compose health check (#162)
* fix(helm/intel): scope AI resources per-release to avoid cross-release Secret conflicts (#164)
Fixes: #163
Problem
- Deploying multiple `codetogether-intel` releases in the same namespace caused
a collision on statically named resources (e.g., `ai-secrets` / `ai-config`),
producing Helm ownership errors.
What changed
- templates/ai-config.yaml
- Create ConfigMap only when `ai.enabled=true` and `ai.mode=external`.
- Name is now release-scoped: `{{ .Release.Name }}-ai-config`.
- templates/ai-external-secret.yaml
- Respect `ai.externalSecret.create` and `ai.externalSecret.name`.
- Default Secret name is release-scoped:
`{{ include "codetogether.fullname" . }}-ai-external-secret`.
- Store API key under `stringData.apiKey`.
- templates/deployment.yaml
- Read `AI_PROVIDER` / `AI_EXTERNAL_URL` from `{{ .Release.Name }}-ai-config`.
- Read `AI_EXTERNAL_API_KEY` from the default or user-specified Secret:
`{{ default (printf "%s-ai-external-secret" (include "codetogether.fullname" .)) .Values.ai.externalSecret.name }}`.
- Bundled mode unchanged; external resources are not created in bundled mode.
Why
- Ensures two or more releases (e.g., `qa-intel` and `demo-staging-intel`)
can coexist in the same namespace without Helm ownership clashes.
How to test
- External (chart-managed Secret):
`helm template demo-staging-intel ./charts/intel -n default \
--set ai.enabled=true --set ai.mode=external \
--set ai.provider=openai --set ai.url=https://api.openai.com \
--set ai.externalSecret.create=true --set ai.externalSecret.apiKey=TESTKEY`
→ renders `demo-staging-intel-ai-config` and `demo-staging-intel-ai-external-secret`.
- External (existing Secret):
`kubectl create secret generic my-custom-ai-secret -n default \
--from-literal=apiKey=TESTKEY`
`helm template qa-intel ./charts/intel -n default \
--set ai.enabled=true --set ai.mode=external \
--set ai.provider=openai --set ai.url=https://api.openai.com \
--set ai.externalSecret.create=false --set ai.externalSecret.name=my-custom-ai-secret`
→ renders only the release-scoped ConfigMap; Deployment references the existing Secret.
- Bundled:
`helm template demo ./charts/intel -n default --set ai.enabled=true --set ai.mode=bundled`
→ no AI ConfigMap/Secret rendered; sidecar included.
* chore(keycloak): switch to KC_BOOTSTRAP_* admin vars and update compose/templates (#166)
Fixes: #165
- Replace deprecated KEYCLOAK_ADMIN / KEYCLOAK_ADMIN_PASSWORD with
KC_BOOTSTRAP_ADMIN_USERNAME / KC_BOOTSTRAP_ADMIN_PASSWORD.
- Update compose files to pass new env vars to the Keycloak container.
- Refresh .env templates to reflect the new names.
- Remove references to deprecated vars.
Touched:
- compose/.env-with-keycloak-template
- compose/keycloak/.env-template
- compose/keycloak/compose-keycloak.yaml
- compose/keycloak/compose-keycloak-no-nginx.yaml
Why: eliminates KC-SERVICES0110 warnings and ensures deterministic, persistent admin on first bootstrap.
BREAKING CHANGE: set KC_BOOTSTRAP_ADMIN_USERNAME and KC_BOOTSTRAP_ADMIN_PASSWORD instead of KEYCLOAK_ADMIN*.
* feat(helm): add RO rootfs support for Intel and Collab (#169)
* feat(helm): add RO rootfs support for Intel and Collab
Fixes: #168
- tmpfs emptyDir for /run and /tmp
- RW runtime at /run/volatile, reuse for /var/log/nginx and /var/cache/nginx
- Intel: initContainer to create subpaths
- enable via securityContext (readOnlyRootFileSystem, runAsUser=0)
* Typo fixes
* Typo fixes
* Fixing typo
* Changes to defauts
* Fixes
* feat(helm-collab): Support optional existing secret for Intel connection (#171)
Fixes: #170
- add values: intelsecret.enabled/ref
- conditionally render templates/secret-intel.yaml
- deployment envs read from external secret when enabled(fail if ref missing)
- default unchanged (chart still creates "release"-intel)
---------
Co-authored-by: Wojciech Galanciak <wojtek@codetogether.com>
Co-authored-by: Ignacio Moreno <ignacio@codetogether.com>
Co-authored-by: engineering <engineering@codetogether.com>
Co-authored-by: Ignacio Moreno <nmorenor@gmail.com>1 parent 0f4189f commit c0c311f
File tree
12 files changed
+119
-31
lines changed- charts
- collab
- templates
- intel
- templates
- compose
- keycloak
12 files changed
+119
-31
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
13 | 13 | | |
14 | 14 | | |
15 | 15 | | |
16 | | - | |
| 16 | + | |
17 | 17 | | |
18 | 18 | | |
19 | 19 | | |
| |||
139 | 139 | | |
140 | 140 | | |
141 | 141 | | |
| 142 | + | |
| 143 | + | |
| 144 | + | |
| 145 | + | |
142 | 146 | | |
143 | 147 | | |
144 | 148 | | |
145 | | - | |
| 149 | + | |
| 150 | + | |
| 151 | + | |
| 152 | + | |
| 153 | + | |
146 | 154 | | |
147 | 155 | | |
148 | 156 | | |
149 | 157 | | |
150 | | - | |
| 158 | + | |
| 159 | + | |
| 160 | + | |
| 161 | + | |
| 162 | + | |
151 | 163 | | |
152 | 164 | | |
153 | 165 | | |
| |||
182 | 194 | | |
183 | 195 | | |
184 | 196 | | |
| 197 | + | |
| 198 | + | |
| 199 | + | |
| 200 | + | |
185 | 201 | | |
186 | 202 | | |
187 | 203 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
| 1 | + | |
1 | 2 | | |
2 | 3 | | |
3 | 4 | | |
| |||
8 | 9 | | |
9 | 10 | | |
10 | 11 | | |
| 12 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
37 | 37 | | |
38 | 38 | | |
39 | 39 | | |
| 40 | + | |
| 41 | + | |
| 42 | + | |
| 43 | + | |
| 44 | + | |
40 | 45 | | |
41 | 46 | | |
42 | 47 | | |
| |||
206 | 211 | | |
207 | 212 | | |
208 | 213 | | |
209 | | - | |
| 214 | + | |
210 | 215 | | |
211 | 216 | | |
212 | 217 | | |
213 | | - | |
214 | 218 | | |
215 | | - | |
| 219 | + | |
| 220 | + | |
216 | 221 | | |
217 | 222 | | |
218 | 223 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
2 | 2 | | |
3 | 3 | | |
4 | 4 | | |
5 | | - | |
| 5 | + | |
6 | 6 | | |
| 7 | + | |
| 8 | + | |
7 | 9 | | |
8 | 10 | | |
9 | 11 | | |
10 | | - | |
11 | | - | |
| 12 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
26 | 26 | | |
27 | 27 | | |
28 | 28 | | |
| 29 | + | |
| 30 | + | |
| 31 | + | |
| 32 | + | |
| 33 | + | |
| 34 | + | |
| 35 | + | |
| 36 | + | |
| 37 | + | |
| 38 | + | |
| 39 | + | |
29 | 40 | | |
30 | 41 | | |
31 | 42 | | |
| |||
44 | 55 | | |
45 | 56 | | |
46 | 57 | | |
47 | | - | |
| 58 | + | |
48 | 59 | | |
49 | 60 | | |
50 | 61 | | |
51 | 62 | | |
52 | | - | |
| 63 | + | |
53 | 64 | | |
54 | 65 | | |
55 | 66 | | |
| |||
76 | 87 | | |
77 | 88 | | |
78 | 89 | | |
| 90 | + | |
| 91 | + | |
| 92 | + | |
| 93 | + | |
79 | 94 | | |
80 | 95 | | |
81 | 96 | | |
| |||
104 | 119 | | |
105 | 120 | | |
106 | 121 | | |
| 122 | + | |
| 123 | + | |
| 124 | + | |
| 125 | + | |
| 126 | + | |
| 127 | + | |
| 128 | + | |
| 129 | + | |
| 130 | + | |
| 131 | + | |
| 132 | + | |
| 133 | + | |
| 134 | + | |
| 135 | + | |
107 | 136 | | |
108 | 137 | | |
109 | 138 | | |
| |||
152 | 181 | | |
153 | 182 | | |
154 | 183 | | |
| 184 | + | |
| 185 | + | |
| 186 | + | |
| 187 | + | |
| 188 | + | |
| 189 | + | |
| 190 | + | |
| 191 | + | |
| 192 | + | |
| 193 | + | |
155 | 194 | | |
156 | 195 | | |
157 | 196 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
| 1 | + | |
1 | 2 | | |
2 | 3 | | |
3 | 4 | | |
| |||
14 | 15 | | |
15 | 16 | | |
16 | 17 | | |
| 18 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
32 | 32 | | |
33 | 33 | | |
34 | 34 | | |
35 | | - | |
| 35 | + | |
36 | 36 | | |
37 | 37 | | |
38 | 38 | | |
39 | 39 | | |
40 | 40 | | |
| 41 | + | |
| 42 | + | |
41 | 43 | | |
42 | 44 | | |
43 | 45 | | |
| |||
130 | 132 | | |
131 | 133 | | |
132 | 134 | | |
133 | | - | |
| 135 | + | |
| 136 | + | |
134 | 137 | | |
135 | 138 | | |
136 | 139 | | |
137 | | - | |
| 140 | + | |
| 141 | + | |
138 | 142 | | |
139 | 143 | | |
140 | 144 | | |
141 | 145 | | |
142 | 146 | | |
143 | 147 | | |
144 | | - | |
145 | | - | |
146 | | - | |
| 148 | + | |
| 149 | + | |
| 150 | + | |
| 151 | + | |
| 152 | + | |
| 153 | + | |
| 154 | + | |
147 | 155 | | |
148 | 156 | | |
149 | 157 | | |
| |||
173 | 181 | | |
174 | 182 | | |
175 | 183 | | |
| 184 | + | |
| 185 | + | |
| 186 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
51 | 51 | | |
52 | 52 | | |
53 | 53 | | |
| 54 | + | |
| 55 | + | |
| 56 | + | |
| 57 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
55 | 55 | | |
56 | 56 | | |
57 | 57 | | |
58 | | - | |
59 | | - | |
| 58 | + | |
| 59 | + | |
60 | 60 | | |
61 | 61 | | |
62 | 62 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
5 | 5 | | |
6 | 6 | | |
7 | 7 | | |
8 | | - | |
9 | | - | |
| 8 | + | |
| 9 | + | |
0 commit comments