chore(keycloak): suppress dotenvx print
This commit is contained in:
@@ -121,7 +121,7 @@ create-realm create-client-for-k8s='true' access_token_lifespan='3600' refresh_t
|
||||
export REFRESH_TOKEN_LIFESPAN={{ refresh_token_lifespan }}
|
||||
export SSO_SESSION_MAX_LIFESPAN={{ refresh_token_lifespan }}
|
||||
export SSO_SESSION_IDLE_TIMEOUT={{ sso_session_idle_timeout }}
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/create-realm.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/create-realm.ts
|
||||
if [ "{{ create-client-for-k8s }}" = "true" ]; then
|
||||
just create-k8s-client
|
||||
fi
|
||||
@@ -152,7 +152,7 @@ delete-realm realm:
|
||||
export KEYCLOAK_ADMIN_USER=$(just admin-username)
|
||||
export KEYCLOAK_ADMIN_PASSWORD=$(just admin-password)
|
||||
export KEYCLOAK_REALM_TO_DELETE={{ realm }}
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/delete-realm.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/delete-realm.ts
|
||||
|
||||
# Create Keycloak client
|
||||
create-client realm client_id redirect_url client_secret='':
|
||||
@@ -164,7 +164,7 @@ create-client realm client_id redirect_url client_secret='':
|
||||
export KEYCLOAK_CLIENT_ID={{ client_id }}
|
||||
export KEYCLOAK_CLIENT_SECRET={{ client_secret }}
|
||||
export KEYCLOAK_REDIRECT_URL={{ redirect_url }}
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/create-client.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/create-client.ts
|
||||
|
||||
# Delete Keycloak client
|
||||
delete-client realm client_id:
|
||||
@@ -174,7 +174,7 @@ delete-client realm client_id:
|
||||
export KEYCLOAK_ADMIN_PASSWORD=$(just admin-password)
|
||||
export KEYCLOAK_REALM={{ realm }}
|
||||
export KEYCLOAK_CLIENT_ID={{ client_id }}
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/delete-client.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/delete-client.ts
|
||||
|
||||
# Add Keycloak client audience mapper
|
||||
add-audience-mapper client_id:
|
||||
@@ -184,7 +184,7 @@ add-audience-mapper client_id:
|
||||
export KEYCLOAK_ADMIN_PASSWORD=$(just admin-password)
|
||||
export KEYCLOAK_REALM=${KEYCLOAK_REALM}
|
||||
export KEYCLOAK_CLIENT_ID={{ client_id }}
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/add-audience-mapper.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/add-audience-mapper.ts
|
||||
|
||||
# Add attribute mapper for Keycloak client
|
||||
add-attribute-mapper client_id attribute_name display_name='' claim_name='' options='' default_value='' mapper_name='' view_perms='admin,user' edit_perms='admin':
|
||||
@@ -202,7 +202,7 @@ add-attribute-mapper client_id attribute_name display_name='' claim_name='' opti
|
||||
export MAPPER_NAME="{{ mapper_name }}"
|
||||
export ATTRIBUTE_VIEW_PERMISSIONS="{{ view_perms }}"
|
||||
export ATTRIBUTE_EDIT_PERMISSIONS="{{ edit_perms }}"
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/add-attribute-mapper.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/add-attribute-mapper.ts
|
||||
|
||||
# Add Keycloak client groups mapper
|
||||
add-groups-mapper client_id:
|
||||
@@ -212,7 +212,7 @@ add-groups-mapper client_id:
|
||||
export KEYCLOAK_ADMIN_PASSWORD=$(just admin-password)
|
||||
export KEYCLOAK_REALM=${KEYCLOAK_REALM}
|
||||
export KEYCLOAK_CLIENT_ID={{ client_id }}
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/add-groups-mapper.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/add-groups-mapper.ts
|
||||
|
||||
# Create Keycloak group
|
||||
create-group group_name parent_group='' description='':
|
||||
@@ -223,7 +223,7 @@ create-group group_name parent_group='' description='':
|
||||
export GROUP_NAME="{{ group_name }}"
|
||||
export PARENT_GROUP_NAME="{{ parent_group }}"
|
||||
export GROUP_DESCRIPTION="{{ description }}"
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/create-group.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/create-group.ts
|
||||
|
||||
# Create Keycloak user
|
||||
create-user username='' password='' email='' first_name='' last_name='' vault_admin='false':
|
||||
@@ -261,7 +261,7 @@ create-user username='' password='' email='' first_name='' last_name='' vault_ad
|
||||
fi
|
||||
|
||||
# Create user
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/create-user.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/create-user.ts
|
||||
|
||||
# Set up Kubernetes RBAC
|
||||
kubectl delete clusterrolebinding oidc-${USERNAME} --ignore-not-found
|
||||
@@ -288,7 +288,7 @@ add-user-to-group username group_name:
|
||||
export KEYCLOAK_ADMIN_PASSWORD=$(just admin-password)
|
||||
export USERNAME="{{ username }}"
|
||||
export GROUP_NAME="{{ group_name }}"
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/add-user-to-group.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/add-user-to-group.ts
|
||||
|
||||
# Remove user from group
|
||||
remove-user-from-group username group_name:
|
||||
@@ -298,7 +298,7 @@ remove-user-from-group username group_name:
|
||||
export KEYCLOAK_ADMIN_PASSWORD=$(just admin-password)
|
||||
export USERNAME="{{ username }}"
|
||||
export GROUP_NAME="{{ group_name }}"
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/delete-user-from-group.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/delete-user-from-group.ts
|
||||
|
||||
# Delete Keycloak group
|
||||
delete-group group_name:
|
||||
@@ -326,7 +326,7 @@ delete-group group_name:
|
||||
export KEYCLOAK_ADMIN_USER=$(just admin-username)
|
||||
export KEYCLOAK_ADMIN_PASSWORD=$(just admin-password)
|
||||
export GROUP_NAME="{{ group_name }}"
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/delete-group.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/delete-group.ts
|
||||
|
||||
# Delete a user
|
||||
delete-user username='':
|
||||
@@ -338,7 +338,7 @@ delete-user username='':
|
||||
while [ -z "${USERNAME}" ]; do
|
||||
USERNAME=$(gum input --prompt="Username: " --width=100)
|
||||
done
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/delete-user.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/delete-user.ts
|
||||
|
||||
# Put admin credentials to Vault
|
||||
put-admin-credentials-to-vault username password:
|
||||
@@ -367,7 +367,7 @@ create-system-user username='' password='':
|
||||
export EMAIL=""
|
||||
export FIRST_NAME=""
|
||||
export LAST_NAME=""
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/create-user.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/create-user.ts
|
||||
kubectl delete clusterrolebinding oidc-${USERNAME} --ignore-not-found
|
||||
kubectl create clusterrolebinding oidc-${USERNAME} --clusterrole=cluster-admin \
|
||||
--user="https://${KEYCLOAK_HOST}/realms/${KEYCLOAK_REALM}#${USERNAME}"
|
||||
@@ -383,7 +383,7 @@ user-exists username='':
|
||||
while [ -z "${USERNAME}" ]; do
|
||||
USERNAME=$(gum input --prompt="Username: " --width=100)
|
||||
done
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/user-exists.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/user-exists.ts
|
||||
|
||||
# Print Keycloak admin username
|
||||
admin-username:
|
||||
@@ -422,7 +422,7 @@ show-realm-token-settings realm:
|
||||
#!/bin/bash
|
||||
set -euo pipefail
|
||||
export KEYCLOAK_REALM={{ realm }}
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/show-realm-token-settings.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/show-realm-token-settings.ts
|
||||
|
||||
# Update realm token settings (access token lifespan, refresh token lifespan, etc.)
|
||||
update-realm-token-settings realm access_token_lifespan='3600' refresh_token_lifespan='1800':
|
||||
@@ -431,4 +431,4 @@ update-realm-token-settings realm access_token_lifespan='3600' refresh_token_lif
|
||||
export KEYCLOAK_REALM={{ realm }}
|
||||
export ACCESS_TOKEN_LIFESPAN={{ access_token_lifespan }}
|
||||
export REFRESH_TOKEN_LIFESPAN={{ refresh_token_lifespan }}
|
||||
dotenvx run -f ../.env.local -- tsx ./scripts/update-realm-token-settings.ts
|
||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/update-realm-token-settings.ts
|
||||
|
||||
Reference in New Issue
Block a user