-
Notifications
You must be signed in to change notification settings - Fork 173
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
local OIDC provider for testing #2608
Conversation
️✅ There are no secrets present in this pull request anymore.If these secrets were true positive and are still valid, we highly recommend you to revoke them. 🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request. |
|
@iainsproat Alessandro's PR is incomplete, this does the full setup And I just fixed the 2nd point (altho I think these scripts only run on DB init, so all of us still need to run it manually) |
@fabis94 - does this PR cover the Identity Provider part of the problem? #2598 (comment) |
@alemagio I didn't have to do any identity provider stuff, I just created a new realm w/ default clients, adjusted some client settings and created a couple of test users. Then I exported that realm and made sure its imported on keycloak init. I was able to both register and log into Speckle with that, without having to mess around with any identity providers |
Should work automatically for new local instances, but existing ones (w/ existing DB) will need to run the SQL init file manually before starting up keycloak.
LOCAL SETUP
setup/db/11-docker_postgres_keycloack_init.sql
in your DB client manually (as the speckle user). New docker compose deployments can skip this step.server
)