Skip to content

Commit 3d33755

Browse files
committed
Fix keycloak deployment in dev profile
1 parent 2851657 commit 3d33755

File tree

2 files changed

+3
-6
lines changed

2 files changed

+3
-6
lines changed

horreum-backend/src/main/java/io/hyperfoil/tools/horreum/server/SecurityBootstrap.java

+2-3
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
import io.hyperfoil.tools.horreum.svc.Roles;
1010
import io.hyperfoil.tools.horreum.svc.user.UserBackEnd;
1111
import io.quarkus.logging.Log;
12+
import io.quarkus.runtime.LaunchMode;
1213
import io.quarkus.runtime.StartupEvent;
1314
import jakarta.enterprise.context.ApplicationScoped;
1415
import jakarta.enterprise.event.Observes;
@@ -25,8 +26,6 @@
2526
import java.util.Map;
2627
import java.util.Optional;
2728

28-
import static io.quarkus.runtime.configuration.ProfileManager.getLaunchMode;
29-
3029
@ApplicationScoped public class SecurityBootstrap {
3130

3231
@ConfigProperty(name = "quarkus.keycloak.admin-client.server-url") Optional<String> keycloakURL;
@@ -121,7 +120,7 @@ public void checkBootstrapAccount() {
121120
if (administrators.isEmpty()) {
122121
UserService.NewUser user = new UserService.NewUser();
123122
user.user = new UserService.UserData("", BOOTSTRAP_ACCOUNT, "Bootstrap", "Acount", "[email protected]");
124-
user.password = providedBootstrapPassword.orElseGet(() -> getLaunchMode().isDevOrTest() ? "secret" : generateRandomPassword(RANDOM_PASSWORD_DEFAULT_LENGTH));
123+
user.password = providedBootstrapPassword.orElseGet(() -> LaunchMode.current().isDevOrTest() ? "secret" : generateRandomPassword(RANDOM_PASSWORD_DEFAULT_LENGTH));
125124

126125
// create bootstrap acconut with admin role
127126
backend.get().createUser(user);

horreum-backend/src/main/resources/application.properties

+1-3
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,7 @@ quarkus.oidc.client-id=horreum
100100

101101
## Do not un comment the line below, there appears to be a bug in Quarkus 3.4.1 where dev services do not overwrite the config property
102102
quarkus.oidc.credentials.secret=overridden-in-file-dot-env
103+
%dev.quarkus.oidc.credentials.secret=**********
103104

104105
# This option lets HorreumAuthorizationFilter transform app keys sent as tokens
105106
quarkus.http.auth.proactive=false
@@ -113,9 +114,6 @@ quarkus.keycloak.admin-client.client-id=horreum
113114
quarkus.keycloak.admin-client.client-secret=${quarkus.oidc.credentials.secret}
114115
quarkus.keycloak.admin-client.realm=${horreum.keycloak.realm}
115116
quarkus.keycloak.admin-client.grant-type=CLIENT_CREDENTIALS
116-
%dev.quarkus.keycloak.admin-client.client-id=admin-cli
117-
%dev.quarkus.keycloak.admin-client.realm=master
118-
%dev.quarkus.keycloak.admin-client.grant-type=PASSWORD
119117

120118
# Secret used to sign database rows
121119
horreum.db.secret=secret

0 commit comments

Comments
 (0)