chore: remove keycloak-23
Some checks failed
/ ansible-semaphore (push) Failing after 41s
/ atlasswprobe (push) Successful in 7m51s
/ daliserver (push) Failing after 24s
/ forgejo (push) Failing after 26s
/ forgejo-runner (push) Successful in 1m43s
/ http-mqtt-bridge (push) Successful in 4m23s
/ keycloak-24 (push) Failing after 44s
/ linux-diversion-ath-regd-optional (push) Successful in 16m0s
/ lottieconverter (push) Failing after 40s
/ matterbridge (push) Failing after 41s
/ matrix-element-web (push) Failing after 45s
/ matrix-hydrogen (push) Successful in 50s
/ matrix.to (push) Failing after 4m58s
/ maubot (push) Failing after 5m11s
/ maubot-plugin-spaceapi (push) Successful in 2m14s
/ maubot-plugin-ultimaker (push) Successful in 2m18s
/ mautrix-signal (push) Successful in 46s
/ mautrix-telegram (push) Failing after 33s
/ mediawiki-extension-auth-remoteuser (push) Successful in 40s
/ mediawiki-extension-nativesvghandler (push) Successful in 59s
/ mediawiki-extension-openidconnect (push) Successful in 46s
/ mediawiki-extension-pluggableauth (push) Successful in 1m7s
/ mqtt2prometheus (push) Failing after 1m45s
/ prometheus-ipmi-exporter (push) Failing after 38s
/ prometheus-dnsbl-exporter (push) Successful in 52s
/ prometheus2influxdb (push) Successful in 50s
/ python3-mautrix (push) Failing after 37s
/ python3-telethon (push) Successful in 1m14s
/ repo.s3lph.me-apt-source (push) Successful in 52s
/ republik-feeder (push) Successful in 46s
/ woodpecker-agent (push) Failing after 30s
/ woodpecker-cli (push) Failing after 32s
Some checks failed
/ ansible-semaphore (push) Failing after 41s
/ atlasswprobe (push) Successful in 7m51s
/ daliserver (push) Failing after 24s
/ forgejo (push) Failing after 26s
/ forgejo-runner (push) Successful in 1m43s
/ http-mqtt-bridge (push) Successful in 4m23s
/ keycloak-24 (push) Failing after 44s
/ linux-diversion-ath-regd-optional (push) Successful in 16m0s
/ lottieconverter (push) Failing after 40s
/ matterbridge (push) Failing after 41s
/ matrix-element-web (push) Failing after 45s
/ matrix-hydrogen (push) Successful in 50s
/ matrix.to (push) Failing after 4m58s
/ maubot (push) Failing after 5m11s
/ maubot-plugin-spaceapi (push) Successful in 2m14s
/ maubot-plugin-ultimaker (push) Successful in 2m18s
/ mautrix-signal (push) Successful in 46s
/ mautrix-telegram (push) Failing after 33s
/ mediawiki-extension-auth-remoteuser (push) Successful in 40s
/ mediawiki-extension-nativesvghandler (push) Successful in 59s
/ mediawiki-extension-openidconnect (push) Successful in 46s
/ mediawiki-extension-pluggableauth (push) Successful in 1m7s
/ mqtt2prometheus (push) Failing after 1m45s
/ prometheus-ipmi-exporter (push) Failing after 38s
/ prometheus-dnsbl-exporter (push) Successful in 52s
/ prometheus2influxdb (push) Successful in 50s
/ python3-mautrix (push) Failing after 37s
/ python3-telethon (push) Successful in 1m14s
/ repo.s3lph.me-apt-source (push) Successful in 52s
/ republik-feeder (push) Successful in 46s
/ woodpecker-agent (push) Failing after 30s
/ woodpecker-cli (push) Failing after 32s
This commit is contained in:
parent
df34515ef1
commit
85156fa87b
9 changed files with 0 additions and 170 deletions
|
@ -39,7 +39,6 @@ jobs:
|
||||||
forgejo: *job
|
forgejo: *job
|
||||||
forgejo-runner: *job
|
forgejo-runner: *job
|
||||||
http-mqtt-bridge: *job
|
http-mqtt-bridge: *job
|
||||||
keycloak-23: *job
|
|
||||||
keycloak-24: *job
|
keycloak-24: *job
|
||||||
linux-diversion-ath-regd-optional: *job
|
linux-diversion-ath-regd-optional: *job
|
||||||
lottieconverter: *job
|
lottieconverter: *job
|
||||||
|
|
|
@ -15,7 +15,6 @@ information, please see [https://repo.s3lph.me/](https://repo.s3lph.me/).
|
||||||
- [forgejo](https://codeberg.org/forgejo/forgejo)
|
- [forgejo](https://codeberg.org/forgejo/forgejo)
|
||||||
- [forgejo-runner](https://code.forgejo.org/forgejo/runner)
|
- [forgejo-runner](https://code.forgejo.org/forgejo/runner)
|
||||||
- [http-mqtt-bridge](https://github.com/subzerobo/http-mqtt-bridge)
|
- [http-mqtt-bridge](https://github.com/subzerobo/http-mqtt-bridge)
|
||||||
- [keycloak-23](https://github.com/keycloak/keycloak)
|
|
||||||
- [keycloak-24](https://github.com/keycloak/keycloak)
|
- [keycloak-24](https://github.com/keycloak/keycloak)
|
||||||
- [linux-diversion-ath-regd-optional](https://github.com/twisteroidambassador/arch-linux-ath-user-regd/issues/1)
|
- [linux-diversion-ath-regd-optional](https://github.com/twisteroidambassador/arch-linux-ath-user-regd/issues/1)
|
||||||
- [lottieconverter](https://github.com/sot-tech/LottieConverter)
|
- [lottieconverter](https://github.com/sot-tech/LottieConverter)
|
||||||
|
|
|
@ -1,68 +0,0 @@
|
||||||
#!/bin/bash
|
|
||||||
|
|
||||||
set -exo pipefail
|
|
||||||
|
|
||||||
. ../.skel/helpers.sh
|
|
||||||
|
|
||||||
MAJOR_VERSION=23
|
|
||||||
export PKGNAME="keycloak-${MAJOR_VERSION}"
|
|
||||||
|
|
||||||
API_URL="https://api.github.com/repos/keycloak/keycloak/releases"
|
|
||||||
JQ_EXPR='.[] | select( .prerelease==false and .draft==false and .target_commitish=="main" ) | "\(.name) \(.published_at) \(.assets[] | select( .name|test("keycloak-'${MAJOR_VERSION}'.*.tar.gz$") ).browser_download_url)"'
|
|
||||||
|
|
||||||
ROOT=$(pwd)
|
|
||||||
|
|
||||||
function fetch() {
|
|
||||||
cd "${SRCDIR}"
|
|
||||||
wget "${URL}" --output-document "keycloak-${VERSION}.tar.gz"
|
|
||||||
tar -xf "keycloak-${VERSION}.tar.gz"
|
|
||||||
}
|
|
||||||
|
|
||||||
function prepare() {
|
|
||||||
mkdir -p \
|
|
||||||
"${PKGDIR}/DEBIAN" \
|
|
||||||
"${PKGDIR}/opt/" \
|
|
||||||
"${PKGDIR}/lib/systemd/system" \
|
|
||||||
"${PKGDIR}/etc/apache2/sites-available" \
|
|
||||||
"${PKGDIR}/usr/share/doc/${PKGNAME}"
|
|
||||||
cp -r "${SRCDIR}/keycloak-${VERSION}" "${PKGDIR}/opt/keycloak/"
|
|
||||||
mv "${PKGDIR}/opt/keycloak/conf" "${PKGDIR}/etc/keycloak/"
|
|
||||||
ln -s /etc/keycloak "${PKGDIR}/opt/keycloak/conf"
|
|
||||||
mkdir -p \
|
|
||||||
"${PKGDIR}/opt/keycloak/data" \
|
|
||||||
"${PKGDIR}/opt/keycloak/ObjectStore"
|
|
||||||
rm "${PKGDIR}/opt/keycloak/bin/kc.bat" \
|
|
||||||
"${PKGDIR}/etc/keycloak/README.md"
|
|
||||||
cp "${ROOT}/debian.control" "${PKGDIR}/DEBIAN/control"
|
|
||||||
cp "${ROOT}/debian.conffiles" "${PKGDIR}/DEBIAN/conffiles"
|
|
||||||
cp "${ROOT}/debian.postinst" "${PKGDIR}/DEBIAN/postinst"
|
|
||||||
cp "${ROOT}/keycloak.service" "${PKGDIR}/lib/systemd/system/"
|
|
||||||
cp "${ROOT}/keycloak.site.conf" "${PKGDIR}/etc/apache2/sites-available/"
|
|
||||||
sed -re "s/__VERSION__/${VERSION}/g" -i "${PKGDIR}/DEBIAN/control"
|
|
||||||
sed -re "s/__MAINTAINER__/${MAINTAINER}/g" -i "${PKGDIR}/DEBIAN/control"
|
|
||||||
cp "${ROOT}/debian.copyright" "${PKGDIR}/usr/share/doc/${PKGNAME}/copyright"
|
|
||||||
github_changelog keycloak/keycloak
|
|
||||||
find "${PKGDIR}" -exec touch -m --reference "${SRCDIR}/keycloak-${VERSION}/version.txt" {} \;
|
|
||||||
}
|
|
||||||
|
|
||||||
function package() {
|
|
||||||
cd "${BUILDDIR}"
|
|
||||||
dpkg-deb --build "${PKGDIR}" "${BUILDDIR}"
|
|
||||||
}
|
|
||||||
|
|
||||||
function build() {
|
|
||||||
read VERSION ISODATE URL <<<$(curl "${API_URL}" | jq -r "${JQ_EXPR}" | head -1)
|
|
||||||
export VERSION
|
|
||||||
export ISODATE
|
|
||||||
export URL
|
|
||||||
export BUILDDIR=${ROOT}/build
|
|
||||||
export SRCDIR=${ROOT}/build/srcdir
|
|
||||||
export PKGDIR=${ROOT}/build/pkgdir
|
|
||||||
mkdir -p ${SRCDIR} ${PKGDIR}
|
|
||||||
fetch
|
|
||||||
prepare
|
|
||||||
package
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
build
|
|
|
@ -1,3 +0,0 @@
|
||||||
/etc/apache2/sites-available/keycloak.site.conf
|
|
||||||
/etc/keycloak/cache-ispn.xml
|
|
||||||
/etc/keycloak/keycloak.conf
|
|
|
@ -1,16 +0,0 @@
|
||||||
Package: keycloak-23
|
|
||||||
Version: __VERSION__
|
|
||||||
Maintainer: __MAINTAINER__
|
|
||||||
Section: web
|
|
||||||
Priority: optional
|
|
||||||
Architecture: all
|
|
||||||
Depends: default-jdk-headless (>=2:1.17), default-jdk-headless (<<2:1.22)
|
|
||||||
Suggests: apache2, postgresql
|
|
||||||
Provides: keycloak
|
|
||||||
Conflicts: keycloak
|
|
||||||
Replaces: keycloak
|
|
||||||
Description: Open Source Identity and Access Management
|
|
||||||
Add authentication to applications and secure services with minimum
|
|
||||||
effort. No need to deal with storing users or authenticating users.
|
|
||||||
Keycloak provides user federation, strong authentication, user
|
|
||||||
management, fine-grained authorization, and more.
|
|
|
@ -1,6 +0,0 @@
|
||||||
Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
|
|
||||||
Source: https://github.com/keycloak/keycloak
|
|
||||||
|
|
||||||
Files: *
|
|
||||||
License: Apache-2.0
|
|
||||||
|
|
|
@ -1,22 +0,0 @@
|
||||||
#!/bin/bash
|
|
||||||
|
|
||||||
set -e
|
|
||||||
|
|
||||||
if [[ "$1" == "configure" ]]; then
|
|
||||||
|
|
||||||
if ! getent group keycloak >/dev/null; then
|
|
||||||
groupadd --system keycloak
|
|
||||||
fi
|
|
||||||
|
|
||||||
if ! getent passwd keycloak >/dev/null; then
|
|
||||||
useradd --system --gid keycloak --home-dir /opt/keycloak --shell /bin/false keycloak
|
|
||||||
fi
|
|
||||||
|
|
||||||
chown root:keycloak /opt/keycloak /etc/keycloak
|
|
||||||
chown keycloak:keycloak -R /opt/keycloak/lib/quarkus /opt/keycloak/data /opt/keycloak/ObjectStore
|
|
||||||
chmod 0750 /etc/keycloak
|
|
||||||
|
|
||||||
deb-systemd-helper enable keycloak.service
|
|
||||||
deb-systemd-invoke restart keycloak.service
|
|
||||||
|
|
||||||
fi
|
|
|
@ -1,22 +0,0 @@
|
||||||
[Unit]
|
|
||||||
Description=Keycloak
|
|
||||||
#Requires=mysql.service
|
|
||||||
#Requires=mariadb.service
|
|
||||||
#Requires=postgresql.service
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
ExecStart=/opt/keycloak/bin/kc.sh start
|
|
||||||
Restart=always
|
|
||||||
User=keycloak
|
|
||||||
Group=keycloak
|
|
||||||
WorkingDirectory=/opt/keycloak
|
|
||||||
CapabilityBoundingSet=
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=multi-user.target
|
|
||||||
|
|
||||||
|
|
||||||
## To clear the theme cache (use systemctl edit keycloak.service, then paste this at the top)
|
|
||||||
#[Service]
|
|
||||||
#ExecStart=
|
|
||||||
#ExecStart=/opt/keycloak/bin/kc.sh start --spi-theme-static-max-age=-1 --spi-theme-cache-themes=false --spi-theme-cache-templates=false
|
|
|
@ -1,31 +0,0 @@
|
||||||
<VirtualHost *:80>
|
|
||||||
|
|
||||||
ServerName keycloak.example.org
|
|
||||||
|
|
||||||
DocumentRoot /var/www/html
|
|
||||||
|
|
||||||
ProxyPass /js/ http://localhost:8080/js/
|
|
||||||
ProxyPassReverse /js/ http://localhost:8080/js/
|
|
||||||
ProxyPass /realms/ http://localhost:8080/realms/
|
|
||||||
ProxyPassReverse /realms/ http://localhost:8080/realms/
|
|
||||||
ProxyPass /resources/ http://localhost:8080/resources/
|
|
||||||
ProxyPassReverse /resources/ http://localhost:8080/resources/
|
|
||||||
|
|
||||||
# Redirect root to user account management
|
|
||||||
RewriteEngine on
|
|
||||||
RewriteRule ^/?$ /realms/EXAMPLE/account [L,R]
|
|
||||||
|
|
||||||
## Test client that dumps the id_token
|
|
||||||
#OIDCProviderMetadataURL https://keycloak.example.org/realms/EXAMPLE/.well-known/openid-configuration
|
|
||||||
#OIDCClientID foo
|
|
||||||
#OIDCClientSecret bar
|
|
||||||
#OIDCRedirectURI https://keycloak.example.org/test-client/redirect
|
|
||||||
#OIDCCryptoPassphrase supersecurepassword
|
|
||||||
#OIDCInfoHook id_token
|
|
||||||
#<Location /test-client>
|
|
||||||
# AuthType openid-connect
|
|
||||||
# Require valid-user
|
|
||||||
# RewriteRule .* /test-client/redirect?info=html
|
|
||||||
#</Location>
|
|
||||||
|
|
||||||
</VirtualHost>
|
|
Loading…
Reference in a new issue