(export-secret-in-files! keycloak-client
realm-name
client-id
{:keys [name-without-extension export-dir path]
:as secret-file})
take the vendor value to dispatch the call to proper function, other value are specific to vault implementation:
:hashicorp
: in infra-context, [:vault :path] is a string with placeholders as: %1$s is the environment, %2$s is the color, %3$s is the base-domains, %4$s is the client-id (client-id depends of your realm-config.clj code):gcp-sm
: the vault entry of infra-contect must contains project-id and secret-id, also the GOOGLE_APPLICATION_CREDENTIALS must be properly defined and available at runtimetake the vendor value to dispatch the call to proper function, other value are specific to vault implementation: - `:hashicorp`: in infra-context, [:vault :path] is a string with placeholders as: %1$s is the environment, %2$s is the color, %3$s is the base-domains, %4$s is the client-id (client-id depends of your realm-config.clj code) - `:gcp-sm`: the vault entry of infra-contect must contains project-id and secret-id, also the GOOGLE_APPLICATION_CREDENTIALS must be properly defined and available at runtime
(init! admin-client data)
(init! admin-client data infra-context)
Create a structure of keycloak objects (realm, clients, roles) and fill it with groups and users
Create a structure of keycloak objects (realm, clients, roles) and fill it with groups and users
(init-groups-and-gen-users! admin-client realm-name {:keys [groups] :as data})
(init-realm! admin-client
{:keys [name themes login tokens smtp user-admin] :as realm-data})
cljdoc is a website building & hosting documentation for Clojure/Script libraries
× close