-
Notifications
You must be signed in to change notification settings - Fork 40
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reuse existing sessions created by kcadm-wrapper.sh? #327
Comments
I really like the idea of fewer API calls, as I've also noticed that catalog apply time is quite long. However I'm worried about just checking the exit code. One solution that I might give a shot is updating the Puppet code to run the config command in Ruby and check the expiration here:
It should be possible for the Ruby code to check the |
Checkout #328. I haven't tested it but if it actually works the acceptance tests should pass. |
This works, except for this edge case:
The code assumes a valid session and Puppet fails. A workaround is to delete Maybe it is not too relevant as this resolves itself and there is a reasonable error message in Keycloak's log:
|
* Reuse session when running kcadm commands Fixes #327 * Move to using kcadm-wrapper config file so that script is just a script and not a template * Fix conditional * Remove kcmadm login session when Keycloak service restarts unless using persistent sessions
The current implementation of
kcadm-wrapper.sh
uses--no-config
and performs a full login for each request to the admin REST API. This has a few drawbacks:With this PoC-patch we got some improvements in our environment:
There might be way better ways to implement this, for example by providing the ability to overwrite the
kcadm-wrapper.sh
.The text was updated successfully, but these errors were encountered: