Commit 3d33755 1 parent 2851657 commit 3d33755 Copy full SHA for 3d33755
File tree 2 files changed +3
-6
lines changed
java/io/hyperfoil/tools/horreum/server
2 files changed +3
-6
lines changed Original file line number Diff line number Diff line change 9
9
import io .hyperfoil .tools .horreum .svc .Roles ;
10
10
import io .hyperfoil .tools .horreum .svc .user .UserBackEnd ;
11
11
import io .quarkus .logging .Log ;
12
+ import io .quarkus .runtime .LaunchMode ;
12
13
import io .quarkus .runtime .StartupEvent ;
13
14
import jakarta .enterprise .context .ApplicationScoped ;
14
15
import jakarta .enterprise .event .Observes ;
25
26
import java .util .Map ;
26
27
import java .util .Optional ;
27
28
28
- import static io .quarkus .runtime .configuration .ProfileManager .getLaunchMode ;
29
-
30
29
@ ApplicationScoped public class SecurityBootstrap {
31
30
32
31
@ ConfigProperty (name = "quarkus.keycloak.admin-client.server-url" ) Optional <String > keycloakURL ;
@@ -121,7 +120,7 @@ public void checkBootstrapAccount() {
121
120
if (administrators .isEmpty ()) {
122
121
UserService .NewUser user = new UserService .NewUser ();
123
122
user .
user =
new UserService .
UserData (
"" ,
BOOTSTRAP_ACCOUNT ,
"Bootstrap" ,
"Acount" ,
"[email protected] " );
124
- user .password = providedBootstrapPassword .orElseGet (() -> getLaunchMode ().isDevOrTest () ? "secret" : generateRandomPassword (RANDOM_PASSWORD_DEFAULT_LENGTH ));
123
+ user .password = providedBootstrapPassword .orElseGet (() -> LaunchMode . current ().isDevOrTest () ? "secret" : generateRandomPassword (RANDOM_PASSWORD_DEFAULT_LENGTH ));
125
124
126
125
// create bootstrap acconut with admin role
127
126
backend .get ().createUser (user );
Original file line number Diff line number Diff line change @@ -100,6 +100,7 @@ quarkus.oidc.client-id=horreum
100
100
101
101
# # Do not un comment the line below, there appears to be a bug in Quarkus 3.4.1 where dev services do not overwrite the config property
102
102
quarkus.oidc.credentials.secret =overridden-in-file-dot-env
103
+ %dev.quarkus.oidc.credentials.secret =**********
103
104
104
105
# This option lets HorreumAuthorizationFilter transform app keys sent as tokens
105
106
quarkus.http.auth.proactive =false
@@ -113,9 +114,6 @@ quarkus.keycloak.admin-client.client-id=horreum
113
114
quarkus.keycloak.admin-client.client-secret =${quarkus.oidc.credentials.secret}
114
115
quarkus.keycloak.admin-client.realm =${horreum.keycloak.realm}
115
116
quarkus.keycloak.admin-client.grant-type =CLIENT_CREDENTIALS
116
- %dev.quarkus.keycloak.admin-client.client-id =admin-cli
117
- %dev.quarkus.keycloak.admin-client.realm =master
118
- %dev.quarkus.keycloak.admin-client.grant-type =PASSWORD
119
117
120
118
# Secret used to sign database rows
121
119
horreum.db.secret =secret
You can’t perform that action at this time.
0 commit comments