Research
Security News
Malicious npm Package Targets Solana Developers and Hijacks Funds
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
@teravn/keycloak-migration
Advanced tools
Everyone starts out configuring Keycloak using the admin console. However, for maintainability, any changes to Keycloak config should eventually be made via migration scripts (possibly written with keycloak-admin-client) persisted in a Git repo. This extension adds a REST API to Keycloak that allows persisting migration progress.
This Java extension and the JavaScript library keycloak-migration
act as a duo
to enable this use case.
Download the Java extension from Maven, then install as an extension to Keycloak
mvn dependency:get -Dartifact=io.teragroup.keycloak.extension:migration:20.0.3.1
cp ~/.m2/repository/io/teragroup/keycloak/extension/migration/20.0.3.1/migration-20.0.3.1.jar ${KEYCLOAK_HOME_DIR}/providers
${KEYCLOAK_HOME_DIR}/bin/kc.sh build
Install the JavaScript library
npm install @teravn/keycloak-migration axios @keycloak/keycloak-admin-client
In realm master, create a confidential client named "keycloak-migration" with "authorization service" enabled. Note this client's secret.
Create one or more migration scripts:
// migrations/001_create_realm.ts
import KcAdminClient from "@keycloak/keycloak-admin-client";
export default (kcAdminClient: KcAdminClient) => async () => {
await kcAdminClient.realms.create({
realm: "my-realm",
userManagedAccessAllowed: true
});
};
Create the entry point:
// migrate.ts
import querystring from "querystring";
import axios from "axios";
import KcAdminClient from "@keycloak/keycloak-admin-client";
import { Manager } from "@teravn/keycloak-migration";
import apply_001 from "./migrations/001_create_realm";
import apply_002 from "./migrations/002_abc";
import apply_003 from "./migrations/003_xyz";
const keycloakURL = process.env.KEYCLOAK_URL;
// this is the client secret of client "keycloak-migration"
const clientSecret = process.env.CLIENT_SECRET;
// keycloak admin credentials
const adminUsername = process.env.ADMIN_USERNAME;
const adminPassword = process.env.ADMIN_PASSWORD;
// invoke this function to start applying migrations
export default async () => {
// acquire an access token using client credentials
const axiosInst = axios.create();
const discoveryResp = await axiosInst.get(
`${keycloakURL}/realms/${realm}/.well-known/uma2-configuration`
);
const tokenResp = await axiosInst.post(
discoveryResp.data.token_endpoint,
querystring.stringify({
grant_type: "client_credentials",
client_id: "keycloak-migration",
client_secret: clientSecret
})
);
// create the migration manager
const manager = Manager.create(
kcURL,
tokenResp.data.access_token as string
);
// create keycloak admin client
const kcAdminClient = new KcAdminClient({
baseUrl: keycloakURL,
realmName: "master"
});
// authenticate keycloak admin client
await kcAdminClient.auth({
grantType: "password",
username: adminUsername,
password: adminPassword,
clientId: "admin-cli"
});
// apply migrations. Note that migration version is 1-based. If these
// migrations all succeed then the final migration version will be 3.
const results = await manager.apply(
apply_001(kcAdminClient),
apply_002(kcAdminClient),
apply_003(kcAdminClient)
);
};
If one of the migration steps rejects then the migration will be marked as
dirty. Migrations will not proceed automatically in this state. You need to fix
what is wrong with Keycloak and then call manager.forceVersion(newVersion)
manually.
FAQs
Manage Keycloak migration
We found that @teravn/keycloak-migration demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.
Security News
Socket's package search now displays weekly downloads for npm packages, helping developers quickly assess popularity and make more informed decisions.