keycloak-memoizeit
Details
diff --git a/examples/as7-eap-dev/server/src/main/webapp/WEB-INF/jboss-web.xml b/examples/as7-eap-dev/server/src/main/webapp/WEB-INF/jboss-web.xml
new file mode 100755
index 0000000..e0d6679
--- /dev/null
+++ b/examples/as7-eap-dev/server/src/main/webapp/WEB-INF/jboss-web.xml
@@ -0,0 +1,3 @@
+<jboss-web>
+ <symbolic-linking-enabled>true</symbolic-linking-enabled>
+</jboss-web>
\ No newline at end of file
model/jpa/pom.xml 2(+1 -1)
diff --git a/model/jpa/pom.xml b/model/jpa/pom.xml
index 8f6edf9..243e438 100755
--- a/model/jpa/pom.xml
+++ b/model/jpa/pom.xml
@@ -4,7 +4,7 @@
<artifactId>keycloak-parent</artifactId>
<groupId>org.keycloak</groupId>
<version>1.0-alpha-1</version>
- <relativePath>../pom.xml</relativePath>
+ <relativePath>../../pom.xml</relativePath>
</parent>
<modelVersion>4.0.0</modelVersion>
model/picketlink/pom.xml 2(+1 -1)
diff --git a/model/picketlink/pom.xml b/model/picketlink/pom.xml
index a035b19..b42cd80 100755
--- a/model/picketlink/pom.xml
+++ b/model/picketlink/pom.xml
@@ -4,7 +4,7 @@
<artifactId>keycloak-parent</artifactId>
<groupId>org.keycloak</groupId>
<version>1.0-alpha-1</version>
- <relativePath>../pom.xml</relativePath>
+ <relativePath>../../pom.xml</relativePath>
</parent>
<modelVersion>4.0.0</modelVersion>
diff --git a/services/src/main/java/org/keycloak/services/managers/ApplianceBootstrap.java b/services/src/main/java/org/keycloak/services/managers/ApplianceBootstrap.java
new file mode 100755
index 0000000..216339b
--- /dev/null
+++ b/services/src/main/java/org/keycloak/services/managers/ApplianceBootstrap.java
@@ -0,0 +1,63 @@
+package org.keycloak.services.managers;
+
+import org.keycloak.models.*;
+import org.keycloak.representations.idm.CredentialRepresentation;
+import org.keycloak.services.resources.SaasService;
+
+import java.util.UUID;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public class ApplianceBootstrap {
+
+
+ public static final String ADMIN_REALM = "Keycloak Adminstration";
+ public static final String ADMIN_CONSOLE = "Admin Console";
+
+ public void initKeycloakAdminRealm(RealmModel realm) {
+
+ }
+
+ public void bootstrap(KeycloakSession session) {
+ RealmManager manager = new RealmManager(session);
+ RealmModel realm = manager.createRealm(ADMIN_REALM, "Keycloak Adminstration");
+ realm.setName("Keycloak Adminstration");
+ realm.setEnabled(true);
+ realm.addRequiredCredential(CredentialRepresentation.PASSWORD);
+ realm.addRequiredOAuthClientCredential(CredentialRepresentation.PASSWORD);
+ realm.addRequiredResourceCredential(CredentialRepresentation.PASSWORD);
+ realm.setTokenLifespan(300);
+ realm.setAccessCodeLifespan(60);
+ realm.setSslNotRequired(true);
+ realm.setCookieLoginAllowed(true);
+ realm.setRegistrationAllowed(false);
+ manager.generateRealmKeys(realm);
+ initKeycloakAdminRealm(realm);
+
+ ApplicationModel adminConsole = realm.addApplication(ADMIN_CONSOLE);
+ adminConsole.setEnabled(true);
+ UserCredentialModel adminConsolePassword = new UserCredentialModel();
+ adminConsolePassword.setType(UserCredentialModel.PASSWORD);
+ adminConsolePassword.setValue(UUID.randomUUID().toString()); // just a random password as we'll never access it
+ realm.updateCredential(adminConsole.getApplicationUser(), adminConsolePassword);
+
+ RoleModel applicationRole = realm.getRole(RealmManager.APPLICATION_ROLE);
+ realm.grantRole(adminConsole.getApplicationUser(), applicationRole);
+ RoleModel adminRole = adminConsole.addRole("admin");
+
+ UserModel adminUser = realm.addUser("admin");
+ adminUser.setEnabled(true);
+ UserCredentialModel password = new UserCredentialModel();
+ password.setType(UserCredentialModel.PASSWORD);
+ password.setValue("admin");
+ realm.updateCredential(adminUser, password);
+ adminUser.addRequiredAction(UserModel.RequiredAction.UPDATE_PASSWORD);
+
+ adminConsole.grantRole(adminUser, adminRole);
+
+
+
+ }
+}