feat: add keycloak and postgres
This commit is contained in:
70
keycloak/scripts/add-audience-mapper.ts
Normal file
70
keycloak/scripts/add-audience-mapper.ts
Normal file
@@ -0,0 +1,70 @@
|
||||
import KcAdminClient from "@keycloak/keycloak-admin-client";
|
||||
import invariant from "tiny-invariant";
|
||||
|
||||
const main = async () => {
|
||||
const keycloakHost = process.env.KEYCLOAK_HOST;
|
||||
invariant(keycloakHost, "KEYCLOAK_HOST environment variable is required.");
|
||||
|
||||
const adminUsername = process.env.KEYCLOAK_ADMIN_USER;
|
||||
invariant(adminUsername, "KEYCLOAK_ADMIN_USER environment variable is required.");
|
||||
|
||||
const adminPassword = process.env.KEYCLOAK_ADMIN_PASSWORD;
|
||||
invariant(adminPassword, "KEYCLOAK_ADMIN_PASSWORD environment variable is required");
|
||||
|
||||
const realmName = process.env.KEYCLOAK_REALM;
|
||||
invariant(realmName, "KEYCLOAK_REALM environment variable is required");
|
||||
|
||||
const clientId = process.env.KEYCLOAK_CLIENT_ID;
|
||||
invariant(clientId, "KEYCLOAK_CLIENT_ID environment variable is required");
|
||||
|
||||
const kcAdminClient = new KcAdminClient({
|
||||
baseUrl: `https://${keycloakHost}`,
|
||||
realmName: "master",
|
||||
});
|
||||
|
||||
try {
|
||||
await kcAdminClient.auth({
|
||||
username: adminUsername,
|
||||
password: adminPassword,
|
||||
grantType: "password",
|
||||
clientId: "admin-cli",
|
||||
});
|
||||
console.log("Authentication successful.");
|
||||
|
||||
kcAdminClient.setConfig({ realmName });
|
||||
|
||||
const clients = await kcAdminClient.clients.find({ clientId });
|
||||
if (clients.length === 0) {
|
||||
throw new Error(`Client '${clientId}' not found.`);
|
||||
}
|
||||
const client = clients[0];
|
||||
invariant(client.id, "Client ID is not set");
|
||||
|
||||
const mapperName = `aud-mapper-${clientId}`;
|
||||
const audienceMapper = {
|
||||
name: mapperName,
|
||||
protocol: "openid-connect",
|
||||
protocolMapper: "oidc-audience-mapper",
|
||||
config: {
|
||||
"included.client.audience": clientId,
|
||||
"id.token.claim": "true",
|
||||
"access.token.claim": "true",
|
||||
},
|
||||
};
|
||||
|
||||
const existingMappers = await kcAdminClient.clients.listProtocolMappers({ id: client.id });
|
||||
|
||||
if (existingMappers.some((mapper) => mapper.name === mapperName)) {
|
||||
console.warn(`Audience Mapper '${mapperName}' already exists for the client.`);
|
||||
} else {
|
||||
await kcAdminClient.clients.addProtocolMapper({ id: client.id }, audienceMapper);
|
||||
console.log(`Audience Mapper '${mapperName}' added directly to the client.`);
|
||||
}
|
||||
} catch (error) {
|
||||
console.error("An error occurred:", error);
|
||||
// eslint-disable-next-line unicorn/no-process-exit
|
||||
process.exit(1);
|
||||
}
|
||||
};
|
||||
|
||||
main();
|
||||
Reference in New Issue
Block a user