Skip to content
You're viewing docs for v1.3.Go to the latest

UDS Core 1.3

UDS Core 1.3 introduces opt-in support for public Keycloak clients (PKCE-enforced flows beyond device flow), automatic gateway pod cycling when Istio gatewayTopology.proxyProtocol changes, and an Identity Config workflow for disabling inactive non-admin users. This release also picks up the Prometheus 3.11.2 stored XSS fix (CVE-2026-40179) and rolls in routine dependency updates for Istio, Pepr, and the kube-prometheus-stack chart.

  • Opt-in public Keycloak clients: adds an ALLOW_PUBLIC_CLIENTS operator config flag (default false) that gates admission of UDS Package SSO clients with publicClient: true for flows beyond device flow. Public clients still require PKCE S256, and the package validator now enforces it. See ADR 0010 and #2598
  • Gateway cycling on proxyProtocol changes: the Pepr operator now restarts gateway pods when meshConfig.defaultConfig.gatewayTopology.proxyProtocol is toggled. proxyProtocol is read at pod startup and is not pushed via xDS, so toggling it via a bundle override previously left gateway pods with stale configuration (#2595)
  • Optional disabling of inactive users: UDS Identity Config 0.26.0 adds the disable-inactive-users Keycloak workflow for automatically disabling non-admin accounts after a configurable inactivity window. The workflow is disabled by default and only activates when ACCOUNT_INACTIVITY_DAYS is set during initial realm import. See Configure automatic account inactivity disable for configuration and verification steps.
PackagePreviousUpdated
Istio1.29.11.29.2
Pepr1.1.51.1.7
Prometheusv3.10.0v3.11.2
Alertmanagerv0.31.1v0.32.0
Node Exporterv1.10.2v1.11.1
UDS Identity Config0.25.00.26.1
kube-prometheus-stack Helm chart82.15.084.0.0
Velero Helm chart12.0.012.0.1

UDS Core 1.3 includes UDS Identity Config 0.26.1, which was also included in the 1.2.2 patch release. No breaking changes or manual realm steps are required.