Skip to content

Commit a4de316

Browse files
authored
122 minify keycloak realm json so kubernetes clusters have easier way to load it (#123)
* deleting too much * delete more * rename the minified keycloak setting * add back original configuration
1 parent d85c54f commit a4de316

File tree

4 files changed

+256
-2
lines changed

4 files changed

+256
-2
lines changed

scripts/keycloak/clowder-realm-dev.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1870,4 +1870,4 @@
18701870
"clientPolicies": {
18711871
"policies": []
18721872
}
1873-
}
1873+
}

scripts/keycloak/clowder-realm-prod.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2174,4 +2174,4 @@
21742174
"clientPolicies": {
21752175
"policies": []
21762176
}
2177-
}
2177+
}
Lines changed: 126 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,126 @@
1+
{
2+
"realm": "clowder",
3+
"accessTokenLifespan": 300,
4+
"enabled": true,
5+
"registrationAllowed": true,
6+
"registrationEmailAsUsername": true,
7+
"clients": [
8+
{
9+
"clientId": "clowder2-backend",
10+
"rootUrl": "http://localhost:8000",
11+
"surrogateAuthRequired": false,
12+
"enabled": true,
13+
"alwaysDisplayInConsole": false,
14+
"clientAuthenticatorType": "client-secret",
15+
"redirectUris": [
16+
"http://localhost:8000/api/v2/auth"
17+
],
18+
"webOrigins": [
19+
"http://localhost:8000"
20+
],
21+
"notBefore": 0,
22+
"bearerOnly": false,
23+
"consentRequired": false,
24+
"standardFlowEnabled": true,
25+
"implicitFlowEnabled": false,
26+
"directAccessGrantsEnabled": true,
27+
"serviceAccountsEnabled": false,
28+
"publicClient": true,
29+
"frontchannelLogout": false,
30+
"protocol": "openid-connect",
31+
"attributes": {
32+
"saml.multivalued.roles": "false",
33+
"saml.force.post.binding": "false",
34+
"oauth2.device.authorization.grant.enabled": "false",
35+
"backchannel.logout.revoke.offline.tokens": "false",
36+
"saml.server.signature.keyinfo.ext": "false",
37+
"use.refresh.tokens": "true",
38+
"oidc.ciba.grant.enabled": "false",
39+
"backchannel.logout.session.required": "false",
40+
"client_credentials.use_refresh_token": "false",
41+
"saml.client.signature": "false",
42+
"require.pushed.authorization.requests": "false",
43+
"saml.assertion.signature": "false",
44+
"id.token.as.detached.signature": "false",
45+
"saml.encrypt": "false",
46+
"saml.server.signature": "false",
47+
"exclude.session.state.from.auth.response": "false",
48+
"saml.artifact.binding": "false",
49+
"saml_force_name_id_format": "false",
50+
"tls.client.certificate.bound.access.tokens": "false",
51+
"acr.loa.map": "{}",
52+
"saml.authnstatement": "false",
53+
"display.on.consent.screen": "false",
54+
"token.response.type.bearer.lower-case": "false",
55+
"saml.onetimeuse.condition": "false"
56+
},
57+
"authenticationFlowBindingOverrides": {},
58+
"fullScopeAllowed": true,
59+
"nodeReRegistrationTimeout": -1,
60+
"defaultClientScopes": [
61+
"web-origins",
62+
"roles",
63+
"profile",
64+
"email"
65+
],
66+
"optionalClientScopes": [
67+
"address",
68+
"phone",
69+
"offline_access",
70+
"microprofile-jwt"
71+
]
72+
}
73+
],
74+
"loginTheme": "clowder-theme",
75+
"identityProviders": [
76+
{
77+
"alias": "cilogon",
78+
"displayName": "CILogon",
79+
"internalId": "165a05f4-f6d7-44ae-a906-285cba64bae7",
80+
"providerId": "oidc",
81+
"enabled": true,
82+
"updateProfileFirstLoginMode": "on",
83+
"trustEmail": false,
84+
"storeToken": true,
85+
"addReadTokenRoleOnCreate": true,
86+
"authenticateByDefault": false,
87+
"linkOnly": false,
88+
"firstBrokerLoginFlowAlias": "first broker login",
89+
"config": {
90+
"userInfoUrl": "https://cilogon.org/oauth2/userinfo",
91+
"clientId": "cilogon:/client_id/165f54b200b7bc4bf77635fe56237902",
92+
"tokenUrl": "https://cilogon.org/oauth2/token",
93+
"authorizationUrl": "https://cilogon.org/authorize",
94+
"clientAuthMethod": "client_secret_post",
95+
"syncMode": "IMPORT",
96+
"clientSecret": "**********",
97+
"defaultScope": "openid profile org.cilogon.userinfo email",
98+
"useJwksUrl": "true"
99+
}
100+
},
101+
{
102+
"alias": "globus",
103+
"displayName": "Globus",
104+
"internalId": "1f4df120-221f-4ed9-ab4a-f40bfeedafbb",
105+
"providerId": "oidc",
106+
"enabled": true,
107+
"updateProfileFirstLoginMode": "on",
108+
"trustEmail": false,
109+
"storeToken": true,
110+
"addReadTokenRoleOnCreate": true,
111+
"authenticateByDefault": false,
112+
"linkOnly": false,
113+
"firstBrokerLoginFlowAlias": "first broker login",
114+
"config": {
115+
"clientId": "fa3320ff-4730-4395-a4ec-fc7fe23ec8a7",
116+
"tokenUrl": "https://auth.globus.org/v2/oauth2/token",
117+
"authorizationUrl": "https://auth.globus.org/v2/oauth2/authorize",
118+
"clientAuthMethod": "client_secret_post",
119+
"syncMode": "IMPORT",
120+
"clientSecret": "**********",
121+
"defaultScope": "openid profile email",
122+
"useJwksUrl": "true"
123+
}
124+
}
125+
]
126+
}
Lines changed: 128 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,128 @@
1+
{
2+
"realm": "clowder",
3+
"accessTokenLifespan": 300,
4+
"enabled": true,
5+
"registrationAllowed": true,
6+
"registrationEmailAsUsername": true,
7+
"clients": [
8+
{
9+
"clientId": "clowder2-backend",
10+
"rootUrl": "http://localhost",
11+
"surrogateAuthRequired": false,
12+
"enabled": true,
13+
"alwaysDisplayInConsole": false,
14+
"clientAuthenticatorType": "client-secret",
15+
"redirectUris": [
16+
"http://localhost/api/v2/auth"
17+
],
18+
"webOrigins": [
19+
"http://localhost"
20+
],
21+
"notBefore": 0,
22+
"bearerOnly": false,
23+
"consentRequired": false,
24+
"standardFlowEnabled": true,
25+
"implicitFlowEnabled": false,
26+
"directAccessGrantsEnabled": true,
27+
"serviceAccountsEnabled": false,
28+
"publicClient": true,
29+
"frontchannelLogout": false,
30+
"protocol": "openid-connect",
31+
"attributes": {
32+
"saml.force.post.binding": "false",
33+
"saml.multivalued.roles": "false",
34+
"frontchannel.logout.session.required": "false",
35+
"oauth2.device.authorization.grant.enabled": "false",
36+
"backchannel.logout.revoke.offline.tokens": "false",
37+
"saml.server.signature.keyinfo.ext": "false",
38+
"use.refresh.tokens": "true",
39+
"oidc.ciba.grant.enabled": "false",
40+
"backchannel.logout.session.required": "false",
41+
"client_credentials.use_refresh_token": "false",
42+
"require.pushed.authorization.requests": "false",
43+
"saml.client.signature": "false",
44+
"saml.allow.ecp.flow": "false",
45+
"id.token.as.detached.signature": "false",
46+
"saml.assertion.signature": "false",
47+
"saml.encrypt": "false",
48+
"saml.server.signature": "false",
49+
"exclude.session.state.from.auth.response": "false",
50+
"saml.artifact.binding": "false",
51+
"saml_force_name_id_format": "false",
52+
"acr.loa.map": "{}",
53+
"tls.client.certificate.bound.access.tokens": "false",
54+
"saml.authnstatement": "false",
55+
"display.on.consent.screen": "false",
56+
"token.response.type.bearer.lower-case": "false",
57+
"saml.onetimeuse.condition": "false"
58+
},
59+
"authenticationFlowBindingOverrides": {},
60+
"fullScopeAllowed": true,
61+
"nodeReRegistrationTimeout": -1,
62+
"defaultClientScopes": [
63+
"web-origins",
64+
"roles",
65+
"profile",
66+
"email"
67+
],
68+
"optionalClientScopes": [
69+
"address",
70+
"phone",
71+
"offline_access",
72+
"microprofile-jwt"
73+
]
74+
}
75+
],
76+
"loginTheme": "clowder-theme",
77+
"identityProviders": [
78+
{
79+
"alias": "cilogon",
80+
"displayName": "CILogon",
81+
"internalId": "165a05f4-f6d7-44ae-a906-285cba64bae7",
82+
"providerId": "oidc",
83+
"enabled": true,
84+
"updateProfileFirstLoginMode": "on",
85+
"trustEmail": false,
86+
"storeToken": true,
87+
"addReadTokenRoleOnCreate": true,
88+
"authenticateByDefault": false,
89+
"linkOnly": false,
90+
"firstBrokerLoginFlowAlias": "first broker login",
91+
"config": {
92+
"userInfoUrl": "https://cilogon.org/oauth2/userinfo",
93+
"clientId": "cilogon:/client_id/165f54b200b7bc4bf77635fe56237902",
94+
"tokenUrl": "https://cilogon.org/oauth2/token",
95+
"authorizationUrl": "https://cilogon.org/authorize",
96+
"clientAuthMethod": "client_secret_post",
97+
"syncMode": "IMPORT",
98+
"clientSecret": "**********",
99+
"defaultScope": "openid profile org.cilogon.userinfo email",
100+
"useJwksUrl": "true"
101+
}
102+
},
103+
{
104+
"alias": "globus",
105+
"displayName": "Globus",
106+
"internalId": "1f4df120-221f-4ed9-ab4a-f40bfeedafbb",
107+
"providerId": "oidc",
108+
"enabled": true,
109+
"updateProfileFirstLoginMode": "on",
110+
"trustEmail": false,
111+
"storeToken": true,
112+
"addReadTokenRoleOnCreate": true,
113+
"authenticateByDefault": false,
114+
"linkOnly": false,
115+
"firstBrokerLoginFlowAlias": "first broker login",
116+
"config": {
117+
"clientId": "fa3320ff-4730-4395-a4ec-fc7fe23ec8a7",
118+
"tokenUrl": "https://auth.globus.org/v2/oauth2/token",
119+
"authorizationUrl": "https://auth.globus.org/v2/oauth2/authorize",
120+
"clientAuthMethod": "client_secret_post",
121+
"syncMode": "IMPORT",
122+
"clientSecret": "**********",
123+
"defaultScope": "openid profile email",
124+
"useJwksUrl": "true"
125+
}
126+
}
127+
]
128+
}

0 commit comments

Comments
 (0)