Merge branch 'develop' into 'master'
Develop to Master See merge request isard/isard-sso!30
commit
fae1558342
|
@ -184,7 +184,7 @@ class Admin():
|
|||
try:
|
||||
log.warning('KEYCLOAK: Adding user ddadmin and adding to group and role admin')
|
||||
## Assign group admin to this dduser for nextcloud
|
||||
uid=self.keycloak.add_user(dduser,'DD','Admin',ddmail,ddpassword,group='admin')
|
||||
uid=self.keycloak.add_user(dduser,'DD','Admin',ddmail,ddpassword,group='admin',temporary=False)
|
||||
## Assign role admin to this user for keycloak, moodle and wordpress
|
||||
self.keycloak.assign_realm_roles(uid,'admin')
|
||||
log.warning('KEYCLOAK: OK')
|
||||
|
@ -194,11 +194,11 @@ class Admin():
|
|||
|
||||
try:
|
||||
log.warning('KEYCLOAK: Adding default users system_teacher, system_manager and system_student users')
|
||||
uid=self.keycloak.add_user('system_manager','Manager','System','fakemanager@fake.com','m@n@g3r',group='manager')
|
||||
uid=self.keycloak.add_user('system_manager','Manager','System','fakemanager@fake.com','m@n@g3r',group='manager',temporary=False)
|
||||
self.keycloak.assign_realm_roles(uid,'manager')
|
||||
uid=self.keycloak.add_user('system_teacher','Teacher','System','faketeacher@fake.com','t3@ch3r',group='teacher')
|
||||
uid=self.keycloak.add_user('system_teacher','Teacher','System','faketeacher@fake.com','t3@ch3r',group='teacher',temporary=False)
|
||||
self.keycloak.assign_realm_roles(uid,'teacher')
|
||||
uid=self.keycloak.add_user('system_student','Student','System','fakestudent@fake.com','stud3nt',group='student')
|
||||
uid=self.keycloak.add_user('system_student','Student','System','fakestudent@fake.com','stud3nt',group='student',temporary=False)
|
||||
self.keycloak.assign_realm_roles(uid,'student')
|
||||
log.warning('KEYCLOAK: OK')
|
||||
except:
|
||||
|
|
|
@ -13,12 +13,12 @@ server {
|
|||
|
||||
add_header Access-Control-Allow-Origin *;
|
||||
|
||||
# location /header/json {
|
||||
# proxy_pass http://127.0.0.1:7039/header/json;
|
||||
# expires max;
|
||||
# log_not_found off;
|
||||
# access_log off;
|
||||
# }
|
||||
location /avatar {
|
||||
proxy_pass http://127.0.0.1:7039/avatar;
|
||||
expires max;
|
||||
log_not_found off;
|
||||
access_log off;
|
||||
}
|
||||
|
||||
location /json {
|
||||
alias /api/api/static/templates/header.json;
|
||||
|
|
|
@ -9,21 +9,33 @@ import logging
|
|||
import traceback
|
||||
import yaml, json
|
||||
|
||||
from jinja2 import Environment, FileSystemLoader
|
||||
|
||||
import os
|
||||
from keycloak import KeycloakAdmin
|
||||
|
||||
|
||||
|
||||
class Avatars():
|
||||
def __init__(self):
|
||||
self.keycloak_admin = KeycloakAdmin(server_url="http://isard-sso-keycloak:8080/auth/",
|
||||
username='admin',
|
||||
password='keycloakkeycloak',
|
||||
realm_name="master",
|
||||
verify=True)
|
||||
def __init__(self,
|
||||
url="http://isard-sso-keycloak:8080/auth/",
|
||||
username=os.environ['KEYCLOAK_USER'],
|
||||
password=os.environ['KEYCLOAK_PASSWORD'],
|
||||
realm='master',
|
||||
verify=True):
|
||||
self.url=url
|
||||
self.username=username
|
||||
self.password=password
|
||||
self.realm=realm
|
||||
self.verify=verify
|
||||
|
||||
def connect(self):
|
||||
self.keycloak_admin = KeycloakAdmin(server_url=self.url,
|
||||
username=self.username,
|
||||
password=self.password,
|
||||
realm_name=self.realm,
|
||||
verify=self.verify)
|
||||
|
||||
def get_user_avatar(self,username):
|
||||
self.connect()
|
||||
return self.keycloak_admin.get_user_id(username)
|
||||
|
||||
|
||||
|
|
|
@ -18,3 +18,8 @@
|
|||
|
||||
|
||||
# get-roles --cclientid test-client --rolename operations
|
||||
|
||||
docker exec -ti isard-sso-keycloak sh -c "
|
||||
/opt/jboss/keycloak/bin/kcadm.sh config credentials --server http://localhost:8080/auth --realm master --user admin --password keycloakkeycloak \
|
||||
&& /opt/jboss/keycloak/bin/kcadm.sh get clients/bef873f0-2079-4876-8657-067de27d01b7 -r master"""
|
||||
|
||||
|
|
Loading…
Reference in New Issue