Upgrade to Infinispan 14.0.26.Final
Closes #27871 Signed-off-by: Ryan Emerson <remerson@redhat.com> Signed-off-by: Alexander Schwartz <aschwart@redhat.com> Co-authored-by: Alexander Schwartz <aschwart@redhat.com>
This commit is contained in:
parent
3989cb5e90
commit
a32808e8eb
5 changed files with 8 additions and 19 deletions
|
@ -23,10 +23,9 @@ This topic describes advanced {jdgserver_name} configurations for {project_name}
|
||||||
include::examples/src/kcb-infinispan-cache-remote-store-config.xml[tag=keycloak-ispn-remotestore]
|
include::examples/src/kcb-infinispan-cache-remote-store-config.xml[tag=keycloak-ispn-remotestore]
|
||||||
----
|
----
|
||||||
<1> New tag `<persistence />` to connect it to the remote store.
|
<1> New tag `<persistence />` to connect it to the remote store.
|
||||||
<2> This is a workaround for issue https://github.com/keycloak/keycloak/issues/27117[keycloak#27117] and will be removed in the following versions.
|
<2> For the address to the remote store, reference two environment variables for host name and port number.
|
||||||
<3> For the address to the remote store, reference two environment variables for host name and port number.
|
<3> For authentication, reference two environment variables for username and password.
|
||||||
<4> For authentication, reference two environment variables for username and password.
|
<4> To secure the remote store connection, use the Kubernetes mechanisms of the pre-configured truststore.
|
||||||
<5> To secure the remote store connection, use the Kubernetes mechanisms of the pre-configured truststore.
|
|
||||||
|
|
||||||
.. Prepare an {jdgserver_name} Cache configuration XML from the file `cache-ispn.xml`, which is part of the {project_name} distribution.
|
.. Prepare an {jdgserver_name} Cache configuration XML from the file `cache-ispn.xml`, which is part of the {project_name} distribution.
|
||||||
For each `replicated-cache` entry, add the tag `<persistence />` as shown below.
|
For each `replicated-cache` entry, add the tag `<persistence />` as shown below.
|
||||||
|
|
|
@ -111,9 +111,6 @@ data:
|
||||||
raw-values="true"
|
raw-values="true"
|
||||||
shared="true"
|
shared="true"
|
||||||
segmented="false">
|
segmented="false">
|
||||||
<!-- This is a workaround for the following issue https://github.com/keycloak/keycloak/issues/27117 and should be removed when the issue is fixed -->
|
|
||||||
<write-behind modification-queue-size="1024"/>
|
|
||||||
<!-- End of the workaround -->
|
|
||||||
<remote-server host="${env.KC_REMOTE_STORE_HOST}"
|
<remote-server host="${env.KC_REMOTE_STORE_HOST}"
|
||||||
port="${env.KC_REMOTE_STORE_PORT}"/> <!--2-->
|
port="${env.KC_REMOTE_STORE_PORT}"/> <!--2-->
|
||||||
<connection-pool max-active="16"
|
<connection-pool max-active="16"
|
||||||
|
|
|
@ -53,23 +53,20 @@
|
||||||
raw-values="true"
|
raw-values="true"
|
||||||
shared="true"
|
shared="true"
|
||||||
segmented="false">
|
segmented="false">
|
||||||
<!-- This is a workaround for the following issue https://github.com/keycloak/keycloak/issues/27117 and should be removed when the issue is fixed -->
|
|
||||||
<write-behind modification-queue-size="1024"/> <!--2-->
|
|
||||||
<!-- End of the workaround -->
|
|
||||||
<remote-server host="${env.KC_REMOTE_STORE_HOST}"
|
<remote-server host="${env.KC_REMOTE_STORE_HOST}"
|
||||||
port="${env.KC_REMOTE_STORE_PORT}"/> <!--3-->
|
port="${env.KC_REMOTE_STORE_PORT}"/> <!--2-->
|
||||||
<connection-pool max-active="16"
|
<connection-pool max-active="16"
|
||||||
exhausted-action="CREATE_NEW"/>
|
exhausted-action="CREATE_NEW"/>
|
||||||
<security>
|
<security>
|
||||||
<authentication server-name="infinispan">
|
<authentication server-name="infinispan">
|
||||||
<digest username="${env.KC_REMOTE_STORE_USERNAME}"
|
<digest username="${env.KC_REMOTE_STORE_USERNAME}"
|
||||||
password="${env.KC_REMOTE_STORE_PASSWORD}"
|
password="${env.KC_REMOTE_STORE_PASSWORD}"
|
||||||
realm="default"/> <!--4-->
|
realm="default"/> <!--3-->
|
||||||
</authentication>
|
</authentication>
|
||||||
<encryption protocol="TLSv1.3"
|
<encryption protocol="TLSv1.3"
|
||||||
sni-hostname="${env.KC_REMOTE_STORE_HOST}">
|
sni-hostname="${env.KC_REMOTE_STORE_HOST}">
|
||||||
<truststore filename="/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt"
|
<truststore filename="/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt"
|
||||||
type="pem"/> <!--5-->
|
type="pem"/> <!--4-->
|
||||||
</encryption>
|
</encryption>
|
||||||
</security>
|
</security>
|
||||||
</remote-store>
|
</remote-store>
|
||||||
|
|
2
pom.xml
2
pom.xml
|
@ -97,7 +97,7 @@
|
||||||
<h2.version>2.2.224</h2.version>
|
<h2.version>2.2.224</h2.version>
|
||||||
<hibernate-orm.plugin.version>6.2.13.Final</hibernate-orm.plugin.version>
|
<hibernate-orm.plugin.version>6.2.13.Final</hibernate-orm.plugin.version>
|
||||||
<hibernate.c3p0.version>6.2.13.Final</hibernate.c3p0.version>
|
<hibernate.c3p0.version>6.2.13.Final</hibernate.c3p0.version>
|
||||||
<infinispan.version>14.0.25.Final</infinispan.version>
|
<infinispan.version>14.0.26.Final</infinispan.version>
|
||||||
|
|
||||||
<!--JAKARTA-->
|
<!--JAKARTA-->
|
||||||
<jakarta.mail.version>2.1.1</jakarta.mail.version>
|
<jakarta.mail.version>2.1.1</jakarta.mail.version>
|
||||||
|
|
|
@ -244,11 +244,7 @@ public class CacheManagerFactory {
|
||||||
.saslMechanism(SCRAM_SHA_512)
|
.saslMechanism(SCRAM_SHA_512)
|
||||||
.addServer()
|
.addServer()
|
||||||
.host(cacheRemoteHost)
|
.host(cacheRemoteHost)
|
||||||
.port(cacheRemotePort)
|
.port(cacheRemotePort);
|
||||||
// This is a workaround for the following issue https://github.com/keycloak/keycloak/issues/27117 and should be removed when the issue is fixed
|
|
||||||
.async().enable().modificationQueueSize(1024)
|
|
||||||
// end of workaround
|
|
||||||
;
|
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue