
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
@pepr/keycloak-authsvc
Advanced tools
This capability is designed to automate the manual steps required to integrate new applications into Big Bang.
This is a Pepr Module intended to be imported into your own Pepr Module. Pepr is a Kubernetes transformation system written in Typescript.
These capability working together are designed to automate the manual steps required to integrate new applications into the Big Bang IdAM Solution. If you wish to use this capability with the open source charts/images for this, there will be some changes that will need to be made:
npm i @pepr/keycloak-authsvc
.import { PeprModule } from "pepr";
import { Keycloak } from "@pepr/keycloak-authsvc";
import { AuthService } from "@pepr/keycloak-authsvc";
import cfg from "./package.json";
new PeprModule(cfg, [Keycloak, AuthService]);
https://keycloak.${domain}
from within and outside of the cluster.keycloak
, object keycloak-env
istio-system
namespace, configmap istio
)The realm should be created by the bigbang package, but if not, the Keycloak capability provides this. The best way to do this:
realmJson
kubectl create configmap configrealm -n keycloak --from-file=realmJson --from-literal=domain=bigbang.dev
kubectl label configmap configrealm -n keycloak pepr.dev/keycloak=createrealm
NOTE: Multiple realms have not been tested!
The modifications to the deployment will look like this:
spec:
template:
metadata:
labels:
protect: keycloak
Here's a command that will perform that patch on an example application (podinfo in namespace podinfo)
kubectl patch deployment podinfo -n podinfo -p '{"spec":{"template":{"metadata":{"labels":{"protect":"keycloak"}}}}}'
kubectl create secret generic configclient -n podinfo \
--from-literal=realm=baby-yoda \
--from-literal=id=podinfo \
--from-literal=name=podinfo \
--from-literal=domain=bigbang.dev \
--dry-run=client -o yaml | kubectl label --local -f - pepr.dev/keycloak=createclient -o yaml | kubectl apply -f -
This performs the same action:
kubectl create secret generic configclient -n podinfo --from-literal=realm=baby-yoda --from-literal=id=podinfo --from-literal=name=podinfo --from-literal=domain=bigbang.dev
kubectl label secret configclient -n podinfo pepr.dev/keycloak=createclient
Did it work? If this command:
kubectl get secret podinfo-client -n podinfo -o yaml
returns the following, then the Keycloak capability functioned properly. (NOTE: the clientSecret will be generated by keycloak so will not look the same)
apiVersion: v1
kind: Secret
type: Opaque
metadata:
labels:
pepr.dev/keycloak: oidcconfig
name: podinfo-client
namespace: podinfo
data:
clientSecret: WlJUWjNDcW9MMEpHaHRKZVdqcVNHdGoxVVEwbHBwZEY=
domain: YmlnYmFuZy5kZXY=
id: ZGV2XzAwZWI4OTA0LTViODgtNGM2OC1hZDY3LWNlYzBkMmUwN2FhNl9wb2RpbmZv
name: cG9kaW5mbw==
realm: YmFieS15b2Rh
redirectUri: aHR0cHM6Ly9wb2RpbmZvLmJpZ2JhbmcuZGV2L2xvZ2lu
If the following is in the secret, then the AuthService capability also ran correctly.
annotations:
e4a35052-c138-55e4-94a7-bb942b1cddc7.pepr.dev/AuthService: succeeded
If you got to step 4 above and the authentication flow is not properly working, here are things to test:
FAQs
This capability is designed to automate the manual steps required to integrate new applications into Big Bang.
The npm package @pepr/keycloak-authsvc receives a total of 9 weekly downloads. As such, @pepr/keycloak-authsvc popularity was classified as not popular.
We found that @pepr/keycloak-authsvc demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.