-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make Keycloak DevService work with @QuarkusIntegrationTest and container launches #21995
Conversation
Hi @geoand thanks very much for looking into it. Re the Let me also check what Keycloak logs, may be it is possible to avoid using |
Thanks! Let me try that out |
Re the logs, WildFly based one logs:
I think |
Keycloak-X reports: So the common pattern is:
So checking the container log for |
Thanks for checking @sberyozkin! Yeah, I'll try that, it's a much better idea |
Keep in mind however that some of the other hacks in this PR will remain |
Thanks, sure, having a few hacks will be not bad :-) |
The fewer the better :) |
…ner launches Fixes: quarkusio#21995
Closing in favor of #21999 |
…ner launches Fixes: quarkusio#21995
…ner launches Fixes: quarkusio#21995
…ner launches Fixes: quarkusio#21995
This is a WIP to fix #21935.
@sberyozkin unfortunately this does not yet work, (I think) because the token received from the
KeycloakTestClient
hasiss
ofhttp://localhost:49267/auth/realms/quarkus
(which is the URL the test can access Keycloak from - i.e. a URL accessible on the host machine), but the Quarkus application under test accesses the application using something likehttp://keycloak-uX81K:8080/auth/realms/quarkus
- i.e. the URL that is usable in the container network.What can we do to address this issue? Can we "patch" the token somehow?
P.S. This contains a lot of hacks, but for most of them, I don't see a way around them for this use case.