New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
nixos/keycloak: Init #99906
nixos/keycloak: Init #99906
Conversation
@bbigras I did indeed. Thanks! |
I might be recalling incorrectly, but I thought @Mic92 had some comments about relying on ACLs in our modules. |
@aanderse Aha, well, I don't think the |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have left some discussion points I hope aren't entirely useless.
b3a594f
to
47250fb
Compare
No worries, @talyz - this is far beyond what I was slowly working on! |
5fc29eb
to
0390767
Compare
- Add support for using MySQL as an option to PostgreSQL. - Enable connecting to external DBs with SSL - Add a database port config option
I've added support for |
Motivation for this change
Add a module for Keycloak, an open source identity and access management server.
I just found out about #91734 - my intention was not to step on your toes, @ngerstle; I started work on this module in early 2019 and have had it deployed at work since then, but just now had time to update and polish it for upstreaming.
The module features explicit configuration options for common settings put into the
standalone.xml
configuration file (address, port, tls, etc) and allows for arbitrary settings through anextraConfig
option. The settings are applied on top of the shipped default configuration via the jboss-cli.Fixes #87673.
Todo
Things done
sandbox
innix.conf
on non-NixOS linux)nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
./result/bin/
)nix path-info -S
before and after)