Merge pull request #195 from InfoSec812/Issue-193_-_add-option-for-hostname-strict-https

Added hostname-strict-https option
This commit is contained in:
Guido Grazioli 2024-04-19 16:05:46 +02:00 committed by GitHub
commit 82498ab3f5
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
2 changed files with 13 additions and 0 deletions

View file

@ -338,6 +338,12 @@ argument_specs:
description: > description: >
If the route should be attached to cookies to reflect the node that owns a particular session. If false, route is not attached to cookies If the route should be attached to cookies to reflect the node that owns a particular session. If false, route is not attached to cookies
and we rely on the session affinity capabilities from reverse proxy and we rely on the session affinity capabilities from reverse proxy
keycloak_quarkus_hostname_strict_https:
type: "bool"
required: false
description: >
By default, Keycloak requires running using TLS/HTTPS. If the service MUST run without TLS/HTTPS, then set
this option to "true"
keycloak_quarkus_ks_vault_enabled: keycloak_quarkus_ks_vault_enabled:
default: false default: false
type: "bool" type: "bool"

View file

@ -10,6 +10,13 @@ db-password={{ keycloak_quarkus_db_pass }}
{% endif %} {% endif %}
{% endif %} {% endif %}
{% if keycloak_quarkus_hostname_strict_https is defined and keycloak_quarkus_hostname_strict_https is sameas true -%}
hostname-strict-https=true
{% endif -%}
{% if keycloak_quarkus_hostname_strict_https is defined and keycloak_quarkus_hostname_strict_https is sameas false -%}
hostname-strict-https=false
{% endif -%}
{% if keycloak.config_key_store_enabled %} {% if keycloak.config_key_store_enabled %}
# Config store # Config store
config-keystore={{ keycloak_quarkus_config_key_store_file }} config-keystore={{ keycloak_quarkus_config_key_store_file }}