9f69386a53
- Adds the elytron-cs-keystore provider that reads secrets from a keystore-backed elytron credential store - Introduces an abstract provider and factory that unifies code that is common to the existing implementations - Introduces a VaultKeyResolver interface to allow the creation of different algorithms to combine the realm and key names when constructing the vault entry id - Introduces a keyResolvers property to the existing implementation via superclass that allows for the configuration of one or more VaultKeyResolvers, creating a fallback mechanism in which different key formats are tried in the order they were declared when retrieving a secret from the vault - Adds more tests for the files-plaintext provider using the new key resolvers - Adds a VaultTestExecutionDecider to skip the elytron-cs-keystore tests when running in Undertow. This is needed because the new provider is available only as a Wildfly extension |
||
---|---|---|
.. | ||
jboss | ||
services | ||
undertow | ||
pom.xml | ||
README.md |
Keycloak Arquillian Integration TestSuite - Test Servers - Auth Server
- Keycloak Arquillian Integration TestSuite
- Keycloak Arquillian Integration TestSuite - Test Servers
- Keycloak Arquillian Integration TestSuite - Test Servers - Auth Server
- Keycloak Arquillian Integration TestSuite - Test Servers - App Servers
Auth Server - JBoss
Common configurations of Keycloak server on JBoss-based container (Wildfly/EAP).
Submodules
wildfly
Wildfly latest
- Builds keycloak server on top of latest Wildfly.
- Activated by
-Pauth-server-wildfly
eap
EAP 7
- Builds keycloak server on top of latest EAP.
- Activated by
-Pauth-server-eap
- Requires access to product repo.
- Requires additional properties:
product.version
product.unpacked.folder.name
(optional; the default value is based on the POM versions)product
to activate the product profile; NOT required ifproduct.unpacked.folder.name
is specified
Server dist vs overlay
By default keycloak-server-dist
artifact is used for the build.
By setting -Dserver-overlay=true
you can switch to server overlay instead. See profile server-overlay
.
JPA
Configures Keycloak JDBC datasource in standalone.xml
. See profile jpa
.
Cluster
Configures in standalone-ha.xml
:
- h2 datasource over TCP (if not executed together with jpa)
- parameters of Keycloak Infinispan caches
See profile auth-server-cluster
.
Auth Server - Undertow
Arquillian extension for running Keycloak server in embedded Undertow.