Giter Club home page Giter Club logo

keycloak-containers's Introduction

Keycloak

GitHub Release OpenSSF Best Practices GitHub Repo stars GitHub commit activity

Open Source Identity and Access Management

Add authentication to applications and secure services with minimum effort. No need to deal with storing users or authenticating users.

Keycloak provides user federation, strong authentication, user management, fine-grained authorization, and more.

Help and Documentation

Reporting Security Vulnerabilities

If you have found a security vulnerability, please look at the instructions on how to properly report it.

Reporting an issue

If you believe you have discovered a defect in Keycloak, please open an issue. Please remember to provide a good summary, description as well as steps to reproduce the issue.

Getting started

To run Keycloak, download the distribution from our website. Unzip and run:

bin/kc.[sh|bat] start-dev

Alternatively, you can use the Docker image by running:

docker run quay.io/keycloak/keycloak start-dev

For more details refer to the Keycloak Documentation.

Building from Source

To build from source, refer to the building and working with the code base guide.

Testing

To run tests, refer to the running tests guide.

Writing Tests

To write tests, refer to the writing tests guide.

Contributing

Before contributing to Keycloak, please read our contributing guidelines. Participation in the Keycloak project is governed by the CNCF Code of Conduct.

Other Keycloak Projects

License

keycloak-containers's People

Contributors

andreatp avatar aszc avatar cartmanume avatar cmoulliard avatar davidfestal avatar douglaspalmer avatar drichtarik avatar ernsheong avatar goldmann avatar jpkrohling avatar keycloak-bot avatar mstruk avatar npetrovski-axway avatar pedroigor avatar pskopek avatar radudd avatar rbriois avatar rhusar avatar ruromero avatar s01ipsist avatar secondsun avatar slaskawi avatar sschu avatar stianst avatar supersandro2000 avatar toilal avatar trim avatar vmuzikar avatar vramik avatar wouterh-dev avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

keycloak-containers's Issues

Remove user/password from JDBC connection string when not provided

Describe the bug

Azure SQL DB can be configured to use Azure AD for authentication. Various azure services can use azure managed identity as a way to get tokens for Azure SQL automatically, the JDBC driver includes this logic when authentication=ActiveDirectoryMSI is included in the JDBC connection string.

This works great using a standalone(-ha).xml file, but when using the container it seems it's building a connection string that includes user or password.

Using this config:

DB_ADDR=<azsqlinstance>.database.windows.net
DB_VENDOR=mssql
DB_DATABASE=keycloakdb
JDBC_PARAMS=authentication=ActiveDirectoryMSI

The error at runtime is:

Cannot use "Authentication=ActiveDirectoryMSI" with "User", "UserName" or "Password" connection string keywords.

Version

16.1.0

Expected behavior

The connection string doesn't include user, username or password keywords if not provided.

Actual behavior

User, password are included with empty values.

How to Reproduce?

  • Create an Azure App Service for containers
  • Turn on Managed identity
  • Create an Azure AD SQL DB with AAD authentication turned on
  • Create empty DB in Azure SQL
  • Add managed identity as a db contained user (ADD USER [web-app-name] FROM EXTERNAL PROVIDER)
  • Run container

Anything else?

The connection string doesn't include user, username or password keywords if not provided. Alternatively, the entire connection string can be provided as a variable.

GitHub Action to publish containers

Description

Add a GitHub Action to publish containers to replace auto-builds in Quay

Discussion

AS

Issues

No response

Motivation

No response

jboss/keycloak-mongo Failed to connect to database

Trying to use https://github.com/jboss-dockerfiles/keycloak/tree/master/server-mongo , it just gives me error:

21:35:42,014 ERROR [org.jboss.msc.service.fail] (ServerService Thread Pool -- 63) MSC000001: Failed to start service jboss.undertow.deployment.default-server.default-host./auth: org.jboss.msc.service.StartException in service jboss.undertow.deployment.default-server.default-host./auth: java.lang.RuntimeException: Failed to construct public org.keycloak.services.resources.KeycloakApplication(javax.servlet.ServletContext,org.jboss.resteasy.core.Dispatcher)
    at org.wildfly.extension.undertow.deployment.UndertowDeploymentService$1.run(UndertowDeploymentService.java:85)
    at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:471)
    at java.util.concurrent.FutureTask.run(FutureTask.java:262)
    at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
    at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)
    at java.lang.Thread.run(Thread.java:745)
    at org.jboss.threads.JBossThread.run(JBossThread.java:320)
Caused by: java.lang.RuntimeException: Failed to construct public org.keycloak.services.resources.KeycloakApplication(javax.servlet.ServletContext,org.jboss.resteasy.core.Dispatcher)
    at org.jboss.resteasy.core.ConstructorInjectorImpl.construct(ConstructorInjectorImpl.java:160)
    at org.jboss.resteasy.spi.ResteasyProviderFactory.createProviderInstance(ResteasyProviderFactory.java:2211)
    at org.jboss.resteasy.spi.ResteasyDeployment.createApplication(ResteasyDeployment.java:295)
    at org.jboss.resteasy.spi.ResteasyDeployment.start(ResteasyDeployment.java:236)
    at org.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.init(ServletContainerDispatcher.java:112)
    at org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.init(HttpServletDispatcher.java:36)
    at io.undertow.servlet.core.LifecyleInterceptorInvocation.proceed(LifecyleInterceptorInvocation.java:117)
    at org.wildfly.extension.undertow.security.RunAsLifecycleInterceptor.init(RunAsLifecycleInterceptor.java:78)
    at io.undertow.servlet.core.LifecyleInterceptorInvocation.proceed(LifecyleInterceptorInvocation.java:103)
    at io.undertow.servlet.core.ManagedServlet$DefaultInstanceStrategy.start(ManagedServlet.java:230)
    at io.undertow.servlet.core.ManagedServlet.createServlet(ManagedServlet.java:131)
    at io.undertow.servlet.core.DeploymentManagerImpl.start(DeploymentManagerImpl.java:511)
    at org.wildfly.extension.undertow.deployment.UndertowDeploymentService.startContext(UndertowDeploymentService.java:101)
    at org.wildfly.extension.undertow.deployment.UndertowDeploymentService$1.run(UndertowDeploymentService.java:82)
    ... 6 more
Caused by: java.lang.RuntimeException: Failed to connect to database
    at org.keycloak.connections.jpa.DefaultJpaConnectionProviderFactory.getConnection(DefaultJpaConnectionProviderFactory.java:207)
    at org.keycloak.connections.jpa.DefaultJpaConnectionProviderFactory.lazyInit(DefaultJpaConnectionProviderFactory.java:128)
    at org.keycloak.connections.jpa.DefaultJpaConnectionProviderFactory.create(DefaultJpaConnectionProviderFactory.java:40)
    at org.keycloak.connections.jpa.DefaultJpaConnectionProviderFactory.create(DefaultJpaConnectionProviderFactory.java:28)
    at org.keycloak.services.DefaultKeycloakSession.getProvider(DefaultKeycloakSession.java:103)
    at org.keycloak.models.jpa.session.JpaUserSessionPersisterProviderFactory.create(JpaUserSessionPersisterProviderFactory.java:21)
    at org.keycloak.models.jpa.session.JpaUserSessionPersisterProviderFactory.create(JpaUserSessionPersisterProviderFactory.java:15)
    at org.keycloak.services.DefaultKeycloakSession.getProvider(DefaultKeycloakSession.java:103)
    at org.keycloak.models.sessions.infinispan.initializer.OfflineUserSessionLoader.init(OfflineUserSessionLoader.java:20)
    at org.keycloak.models.sessions.infinispan.initializer.InfinispanUserSessionInitializer$1.run(InfinispanUserSessionInitializer.java:100)
    at org.keycloak.models.utils.KeycloakModelUtils.runJobInTransaction(KeycloakModelUtils.java:244)
    at org.keycloak.models.sessions.infinispan.initializer.InfinispanUserSessionInitializer.getOrCreateInitializerState(InfinispanUserSessionInitializer.java:97)
    at org.keycloak.models.sessions.infinispan.initializer.InfinispanUserSessionInitializer.startLoading(InfinispanUserSessionInitializer.java:148)
    at org.keycloak.models.sessions.infinispan.initializer.InfinispanUserSessionInitializer.loadPersistentSessions(InfinispanUserSessionInitializer.java:78)
    at org.keycloak.models.sessions.infinispan.InfinispanUserSessionProviderFactory$3.run(InfinispanUserSessionProviderFactory.java:111)
    at org.keycloak.models.utils.KeycloakModelUtils.runJobInTransaction(KeycloakModelUtils.java:244)
    at org.keycloak.models.sessions.infinispan.InfinispanUserSessionProviderFactory.loadPersistentSessions(InfinispanUserSessionProviderFactory.java:102)
    at org.keycloak.models.sessions.infinispan.InfinispanUserSessionProviderFactory$2.onEvent(InfinispanUserSessionProviderFactory.java:86)
    at org.keycloak.services.DefaultKeycloakSessionFactory.publish(DefaultKeycloakSessionFactory.java:47)
    at org.keycloak.services.resources.KeycloakApplication.<init>(KeycloakApplication.java:87)
    at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
    at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:57)
    at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45)
    at java.lang.reflect.Constructor.newInstance(Constructor.java:526)
    at org.jboss.resteasy.core.ConstructorInjectorImpl.construct(ConstructorInjectorImpl.java:148)
    ... 19 more
Caused by: java.lang.NullPointerException
    at java.lang.Class.forName0(Native Method)
    at java.lang.Class.forName(Class.java:195)
    at org.keycloak.connections.jpa.DefaultJpaConnectionProviderFactory.getConnection(DefaultJpaConnectionProviderFactory.java:203)
    ... 43 more

21:35:42,020 ERROR [org.jboss.as.controller.management-operation] (Controller Boot Thread) WFLYCTL0013: Operation ("add") failed - address: ([("deployment" => "keycloak-server.war")]) - failure description: {"WFLYCTL0080: Failed services" => {"jboss.undertow.deployment.default-server.default-host./auth" => "org.jboss.msc.service.StartException in service jboss.undertow.deployment.default-server.default-host./auth: java.lang.RuntimeException: Failed to construct public org.keycloak.services.resources.KeycloakApplication(javax.servlet.ServletContext,org.jboss.resteasy.core.Dispatcher)
    Caused by: java.lang.RuntimeException: Failed to construct public org.keycloak.services.resources.KeycloakApplication(javax.servlet.ServletContext,org.jboss.resteasy.core.Dispatcher)
    Caused by: java.lang.RuntimeException: Failed to connect to database
    Caused by: java.lang.NullPointerException"}}
21:35:42,057 INFO  [org.jboss.as.server] (ServerService Thread Pool -- 57) WFLYSRV0010: Deployed "keycloak-server.war" (runtime-name : "keycloak-server.war")
21:35:42,059 INFO  [org.jboss.as.controller] (Controller Boot Thread) WFLYCTL0183: Service status report
WFLYCTL0186:   Services which failed to start:      service jboss.undertow.deployment.default-server.default-host./auth: org.jboss.msc.service.StartException in service jboss.undertow.deployment.default-server.default-host./auth: java.lang.RuntimeException: Failed to construct public org.keycloak.services.resources.KeycloakApplication(javax.servlet.ServletContext,org.jboss.resteasy.core.Dispatcher)

21:35:42,227 INFO  [org.jboss.as] (Controller Boot Thread) WFLYSRV0060: Http management interface listening on http://127.0.0.1:9990/management
21:35:42,227 INFO  [org.jboss.as] (Controller Boot Thread) WFLYSRV0051: Admin console listening on http://127.0.0.1:9990
21:35:42,227 ERROR [org.jboss.as] (Controller Boot Thread) WFLYSRV0026: Keycloak 1.6.1.Final (WildFly Core 1.0.1.Final) started (with errors) in 3017ms - Started 305 of 527 services (2 services failed or missing dependencies, 274 services are lazy, passive or on-demand)

I entered the container and can see following environment variables:

MONGO_1_PORT_27017_TCP_ADDR=172.17.0.11
MONGO_ENV_MONGO_MAJOR=3.0
HOSTNAME=42c87ce29c70
MONGO_1_ENV_MONGO_VERSION=3.0.7
MONGO_1_PORT_27017_TCP=tcp://172.17.0.11:27017
MONGO_1_PORT=tcp://172.17.0.11:27017
KEYCLOAK_MONGO_1_ENV_MONGO_VERSION=3.0.7
MONGO_1_ENV_MONGO_MAJOR=3.0
MONGO_1_PORT_27017_TCP_PROTO=tcp
LAUNCH_JBOSS_IN_BACKGROUND=1
KEYCLOAK_MONGO_1_PORT_27017_TCP_ADDR=172.17.0.11
KEYCLOAK_MONGO_1_PORT_27017_TCP_PROTO=tcp
MONGO_PORT=tcp://172.17.0.11:27017
KEYCLOAK_MONGO_1_NAME=/keycloak_keycloak_1/keycloak_mongo_1
JBOSS_HOME=/opt/jboss/keycloak
MONGO_ENV_MONGO_VERSION=3.0.7
MONGO_PORT_27017_TCP=tcp://172.17.0.11:27017
MONGO_1_ENV_MONGODB_DBNAME=keycloak
LS_COLORS=
KEYCLOAK_MONGO_1_ENV_MONGO_MAJOR=3.0
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
MONGO_1_PORT_27017_TCP_PORT=27017
KEYCLOAK_MONGO_1_PORT_27017_TCP=tcp://172.17.0.11:27017
KEYCLOAK_MONGO_1_PORT=tcp://172.17.0.11:27017
PWD=/opt/jboss
JAVA_HOME=/usr/lib/jvm/java
MONGO_PORT_27017_TCP_PROTO=tcp
KEYCLOAK_VERSION=1.6.1.Final
SHLVL=1
HOME=/opt/jboss
MONGO_ENV_MONGODB_DBNAME=keycloak
MONGO_1_NAME=/keycloak_keycloak_1/mongo_1
MONGO_PORT_27017_TCP_ADDR=172.17.0.11
affinity:container==d304843896d19664f2a9ce1ad75b05408a7f2dfcf17d373499bf3b3cfcd4cbb6
MONGODB_DBNAME=keycloak
LESSOPEN=||/usr/bin/lesspipe.sh %s
KEYCLOAK_MONGO_1_ENV_MONGODB_DBNAME=keycloak
KEYCLOAK_MONGO_1_PORT_27017_TCP_PORT=27017
MONGO_NAME=/keycloak_keycloak_1/mongo
MONGO_PORT_27017_TCP_PORT=27017

This looks good to me. However, I could not get jboss/keycloak-mongo working by following the readme. I however can see keycloak db being created with the following collections (which again is as expected):

clients
databaseChangeLog
migrationModel
realms
roles
system.indexes
userConsents
users

Failure in HA upgrading from 15.1.1 to 16.0.1

Describe the bug

When upgrading from 15.1.1 to 16.0.1 the new container hungs during infinispan sincronization with following error:

Update: similar problem going from 17.0.1 to 18.0.2 (see #377 (comment))

sso-keycloak-1 keycloak 00:22:54,023 ERROR [org.jboss.msc.service.fail] (ServerService Thread Pool -- 58) MSC000001: Failed to start service org.wildfly.clustering.infinispan.cache.ejb.http-remoting-connector: org.jboss.msc.service.StartException in service org.wildfly.clustering.infinispan.cache.ejb.http-remoting-connector: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager

Version

16.1.1

Expected behavior

Expected behavior is a clean upgrade.

Actual behavior

No response

How to Reproduce?

Keycloak on Kubernetes clustered with:

extraEnv: |
  - name: JGROUPS_DISCOVERY_PROTOCOL
    value: kubernetes.KUBE_PING
  - name: JGROUPS_DISCOVERY_PROPERTIES
    value: dump_requests=false useNotReadyAddresses=false
  - name: KUBERNETES_NAMESPACE
    valueFrom:
      fieldRef:
        apiVersion: v1
        fieldPath: metadata.namespace
  - name: CACHE_OWNERS_COUNT
    value: "2"
  - name: CACHE_OWNERS_AUTH_SESSIONS_COUNT
    value: "2"

Anything else?

Upgrade from 15.1.1 directly to 16.1.1 suffers from the same.

The full log:

sso-keycloak-1 keycloak Added 'admin' to '/opt/jboss/keycloak/standalone/configuration/keycloak-add-user.json', restart server to load user
sso-keycloak-1 keycloak -b 0.0.0.0
sso-keycloak-1 keycloak =========================================================================
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak   Using PostgreSQL database
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak =========================================================================
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak 00:13:58,978 INFO  [org.jboss.modules] (CLI command executor) JBoss Modules version 2.0.0.Final
sso-keycloak-1 keycloak 00:13:59,099 INFO  [org.jboss.msc] (CLI command executor) JBoss MSC version 1.4.13.Final
sso-keycloak-1 keycloak 00:13:59,110 INFO  [org.jboss.threads] (CLI command executor) JBoss Threads version 2.4.0.Final
sso-keycloak-1 keycloak 00:13:59,397 INFO  [org.jboss.as] (MSC service thread 1-2) WFLYSRV0049: Keycloak 16.1.1 (WildFly Core 18.0.4.Final) starting
sso-keycloak-1 keycloak 00:13:59,604 INFO  [org.jboss.vfs] (MSC service thread 1-2) VFS000002: Failed to clean existing content for temp file provider of type temp. Enable DEBUG level log to find what caused this
sso-keycloak-1 keycloak WARNING: An illegal reflective access operation has occurred
sso-keycloak-1 keycloak WARNING: Illegal reflective access by org.wildfly.extension.elytron.SSLDefinitions (jar:file:/opt/jboss/keycloak/modules/system/layers/base/org/wildfly/extension/elytron/main/wildfly-elytron-integration-18.0.4.Final.jar!/) to method com.sun.net.ssl.internal.ssl.Provider.isFIPS()
sso-keycloak-1 keycloak WARNING: Please consider reporting this to the maintainers of org.wildfly.extension.elytron.SSLDefinitions
sso-keycloak-1 keycloak WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
sso-keycloak-1 keycloak WARNING: All illegal access operations will be denied in a future release
sso-keycloak-1 keycloak 00:14:01,786 INFO  [org.wildfly.security] (ServerService Thread Pool -- 19) ELY00001: WildFly Elytron version 1.18.3.Final
sso-keycloak-1 keycloak 00:14:04,404 WARN  [org.wildfly.extension.elytron] (MSC service thread 1-2) WFLYELY00023: KeyStore file '/opt/jboss/keycloak/standalone/configuration/application.keystore' does not exist. Used blank.
sso-keycloak-1 keycloak 00:14:04,491 WARN  [org.wildfly.extension.elytron] (MSC service thread 1-1) WFLYELY01084: KeyStore /opt/jboss/keycloak/standalone/configuration/application.keystore not found, it will be auto generated on first use with a self-signed certificate for host localhost
sso-keycloak-1 keycloak 00:14:04,581 INFO  [org.jboss.as.patching] (MSC service thread 1-2) WFLYPAT0050: Keycloak cumulative patch ID is: base, one-off patches include: none
sso-keycloak-1 keycloak 00:14:04,915 INFO  [org.jboss.as.server] (Controller Boot Thread) WFLYSRV0212: Resuming server
sso-keycloak-1 keycloak 00:14:04,979 INFO  [org.jboss.as] (Controller Boot Thread) WFLYSRV0025: Keycloak 16.1.1 (WildFly Core 18.0.4.Final) started in 5992ms - Started 49 of 72 services (24 services are lazy, passive or on-demand)
sso-keycloak-1 keycloak The batch executed successfully
sso-keycloak-1 keycloak 00:14:05,389 INFO  [org.jboss.as] (MSC service thread 1-1) WFLYSRV0050: Keycloak 16.1.1 (WildFly Core 18.0.4.Final) stopped in 78ms
sso-keycloak-1 keycloak 00:14:08,717 INFO  [org.jboss.modules] (CLI command executor) JBoss Modules version 2.0.0.Final
sso-keycloak-1 keycloak 00:14:08,893 INFO  [org.jboss.msc] (CLI command executor) JBoss MSC version 1.4.13.Final
sso-keycloak-1 keycloak 00:14:08,903 INFO  [org.jboss.threads] (CLI command executor) JBoss Threads version 2.4.0.Final
sso-keycloak-1 keycloak 00:14:09,199 INFO  [org.jboss.as] (MSC service thread 1-2) WFLYSRV0049: Keycloak 16.1.1 (WildFly Core 18.0.4.Final) starting
sso-keycloak-1 keycloak 00:14:09,396 INFO  [org.jboss.vfs] (MSC service thread 1-1) VFS000002: Failed to clean existing content for temp file provider of type temp. Enable DEBUG level log to find what caused this
sso-keycloak-1 keycloak WARNING: An illegal reflective access operation has occurred
sso-keycloak-1 keycloak WARNING: Illegal reflective access by org.wildfly.extension.elytron.SSLDefinitions (jar:file:/opt/jboss/keycloak/modules/system/layers/base/org/wildfly/extension/elytron/main/wildfly-elytron-integration-18.0.4.Final.jar!/) to method com.sun.net.ssl.internal.ssl.Provider.isFIPS()
sso-keycloak-1 keycloak WARNING: Please consider reporting this to the maintainers of org.wildfly.extension.elytron.SSLDefinitions
sso-keycloak-1 keycloak WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
sso-keycloak-1 keycloak WARNING: All illegal access operations will be denied in a future release
sso-keycloak-1 keycloak 00:14:11,479 INFO  [org.wildfly.security] (ServerService Thread Pool -- 20) ELY00001: WildFly Elytron version 1.18.3.Final
sso-keycloak-1 keycloak 00:14:14,508 WARN  [org.wildfly.extension.elytron] (MSC service thread 1-1) WFLYELY00023: KeyStore file '/opt/jboss/keycloak/standalone/configuration/application.keystore' does not exist. Used blank.
sso-keycloak-1 keycloak 00:14:14,587 WARN  [org.wildfly.extension.elytron] (MSC service thread 1-1) WFLYELY01084: KeyStore /opt/jboss/keycloak/standalone/configuration/application.keystore not found, it will be auto generated on first use with a self-signed certificate for host localhost
sso-keycloak-1 keycloak 00:14:14,602 INFO  [org.jboss.as.patching] (MSC service thread 1-2) WFLYPAT0050: Keycloak cumulative patch ID is: base, one-off patches include: none
sso-keycloak-1 keycloak 00:14:15,005 INFO  [org.jboss.as.server] (Controller Boot Thread) WFLYSRV0212: Resuming server
sso-keycloak-1 keycloak 00:14:15,010 INFO  [org.jboss.as] (Controller Boot Thread) WFLYSRV0025: Keycloak 16.1.1 (WildFly Core 18.0.4.Final) started in 6225ms - Started 49 of 79 services (31 services are lazy, passive or on-demand)
sso-keycloak-1 keycloak The batch executed successfully
sso-keycloak-1 keycloak 00:14:15,485 INFO  [org.jboss.as] (MSC service thread 1-1) WFLYSRV0050: Keycloak 16.1.1 (WildFly Core 18.0.4.Final) stopped in 80ms
sso-keycloak-1 keycloak Setting JGroups discovery to kubernetes.KUBE_PING with properties {dump_requests=>false useNotReadyAddresses=>false}
sso-keycloak-1 keycloak Setting cache owners to 2 replicas
sso-keycloak-1 keycloak Enabling replication of AuthenticationSessions with 2 replicas
sso-keycloak-1 keycloak Executing cli script: /opt/jboss/startup-scripts/keycloak.cli
sso-keycloak-1 keycloak 00:14:39,802 INFO  [org.jboss.modules] (CLI command executor) JBoss Modules version 2.0.0.Final
sso-keycloak-1 keycloak 00:14:39,990 INFO  [org.jboss.msc] (CLI command executor) JBoss MSC version 1.4.13.Final
sso-keycloak-1 keycloak 00:14:39,999 INFO  [org.jboss.threads] (CLI command executor) JBoss Threads version 2.4.0.Final
sso-keycloak-1 keycloak 00:14:40,292 INFO  [org.jboss.as] (MSC service thread 1-1) WFLYSRV0049: Keycloak 16.1.1 (WildFly Core 18.0.4.Final) starting
sso-keycloak-1 keycloak 00:14:40,507 INFO  [org.jboss.vfs] (MSC service thread 1-2) VFS000002: Failed to clean existing content for temp file provider of type temp. Enable DEBUG level log to find what caused this
sso-keycloak-1 keycloak WARNING: An illegal reflective access operation has occurred
sso-keycloak-1 keycloak WARNING: Illegal reflective access by org.wildfly.extension.elytron.SSLDefinitions (jar:file:/opt/jboss/keycloak/modules/system/layers/base/org/wildfly/extension/elytron/main/wildfly-elytron-integration-18.0.4.Final.jar!/) to method com.sun.net.ssl.internal.ssl.Provider.isFIPS()
sso-keycloak-1 keycloak WARNING: Please consider reporting this to the maintainers of org.wildfly.extension.elytron.SSLDefinitions
sso-keycloak-1 keycloak WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
sso-keycloak-1 keycloak WARNING: All illegal access operations will be denied in a future release
sso-keycloak-1 keycloak 00:14:42,782 INFO  [org.wildfly.security] (ServerService Thread Pool -- 21) ELY00001: WildFly Elytron version 1.18.3.Final
sso-keycloak-1 keycloak 00:14:45,909 WARN  [org.wildfly.extension.elytron] (MSC service thread 1-1) WFLYELY00023: KeyStore file '/opt/jboss/keycloak/standalone/configuration/application.keystore' does not exist. Used blank.
sso-keycloak-1 keycloak 00:14:45,980 WARN  [org.wildfly.extension.elytron] (MSC service thread 1-1) WFLYELY01084: KeyStore /opt/jboss/keycloak/standalone/configuration/application.keystore not found, it will be auto generated on first use with a self-signed certificate for host localhost
sso-keycloak-1 keycloak 00:14:46,085 INFO  [org.jboss.as.patching] (MSC service thread 1-2) WFLYPAT0050: Keycloak cumulative patch ID is: base, one-off patches include: none
sso-keycloak-1 keycloak 00:14:46,405 INFO  [org.jboss.as.server] (Controller Boot Thread) WFLYSRV0212: Resuming server
sso-keycloak-1 keycloak 00:14:46,407 INFO  [org.jboss.as] (Controller Boot Thread) WFLYSRV0025: Keycloak 16.1.1 (WildFly Core 18.0.4.Final) started in 6599ms - Started 49 of 79 services (31 services are lazy, passive or on-demand)
sso-keycloak-1 keycloak Configuring node identifier
sso-keycloak-1 keycloak Finished configuring node identifier
sso-keycloak-1 keycloak The batch executed successfully
sso-keycloak-1 keycloak 00:14:46,884 INFO  [org.jboss.as] (MSC service thread 1-1) WFLYSRV0050: Keycloak 16.1.1 (WildFly Core 18.0.4.Final) stopped in 88ms
sso-keycloak-1 keycloak =========================================================================
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak   JBoss Bootstrap Environment
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak   JBOSS_HOME: /opt/jboss/keycloak
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak   JAVA: java
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak   JAVA_OPTS:  -server -Xms64m -Xmx512m -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Djava.net.preferIPv4Stack=true -Djboss.modules.system.pkgs=org.jboss.byteman -Djava.awt.headless=true   --add-exports=java.desktop/sun.awt=ALL-UNNAMED --add-exports=java.naming/com.sun.jndi.ldap=ALL-UNNAMED --add-opens=java.base/java.lang=ALL-UNNAMED --add-opens=java.base/java.lang.invoke=ALL-UNNAMED --add-opens=java.base/java.lang.reflect=ALL-UNNAMED --add-opens=java.base/java.io=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.management/javax.management=ALL-UNNAMED --add-opens=java.naming/javax.naming=ALL-UNNAMED
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak =========================================================================
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak 00:14:48,299 INFO  [org.jboss.modules] (main) JBoss Modules version 2.0.0.Final
sso-keycloak-1 keycloak 00:14:49,814 INFO  [org.jboss.msc] (main) JBoss MSC version 1.4.13.Final
sso-keycloak-1 keycloak 00:14:49,828 INFO  [org.jboss.threads] (main) JBoss Threads version 2.4.0.Final
sso-keycloak-1 keycloak 00:14:50,101 INFO  [org.jboss.as] (MSC service thread 1-2) WFLYSRV0049: Keycloak 16.1.1 (WildFly Core 18.0.4.Final) starting
sso-keycloak-1 keycloak 00:14:50,388 INFO  [org.jboss.vfs] (MSC service thread 1-1) VFS000002: Failed to clean existing content for temp file provider of type temp. Enable DEBUG level log to find what caused this
sso-keycloak-1 keycloak WARNING: An illegal reflective access operation has occurred
sso-keycloak-1 keycloak WARNING: Illegal reflective access by org.wildfly.extension.elytron.SSLDefinitions (jar:file:/opt/jboss/keycloak/modules/system/layers/base/org/wildfly/extension/elytron/main/wildfly-elytron-integration-18.0.4.Final.jar!/) to method com.sun.net.ssl.internal.ssl.Provider.isFIPS()
sso-keycloak-1 keycloak WARNING: Please consider reporting this to the maintainers of org.wildfly.extension.elytron.SSLDefinitions
sso-keycloak-1 keycloak WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
sso-keycloak-1 keycloak WARNING: All illegal access operations will be denied in a future release
sso-keycloak-1 keycloak 00:14:52,699 INFO  [org.wildfly.security] (ServerService Thread Pool -- 20) ELY00001: WildFly Elytron version 1.18.3.Final
sso-keycloak-1 keycloak 00:14:55,800 INFO  [org.jboss.as.server] (Controller Boot Thread) WFLYSRV0039: Creating http management service using socket-binding (management-http)
sso-keycloak-1 keycloak 00:14:55,885 INFO  [org.xnio] (MSC service thread 1-1) XNIO version 3.8.5.Final
sso-keycloak-1 keycloak 00:14:55,900 INFO  [org.xnio.nio] (MSC service thread 1-1) XNIO NIO Implementation Version 3.8.5.Final
sso-keycloak-1 keycloak 00:14:56,106 INFO  [org.jboss.remoting] (MSC service thread 1-2) JBoss Remoting version 5.0.23.Final
sso-keycloak-1 keycloak 00:14:56,186 INFO  [org.jboss.as.naming] (ServerService Thread Pool -- 49) WFLYNAM0001: Activating Naming Subsystem
sso-keycloak-1 keycloak 00:14:56,194 INFO  [org.jboss.as.clustering.infinispan] (ServerService Thread Pool -- 38) WFLYCLINF0001: Activating Infinispan subsystem.
sso-keycloak-1 keycloak 00:14:56,198 INFO  [org.wildfly.extension.io] (ServerService Thread Pool -- 39) WFLYIO001: Worker 'default' has auto-configured to 2 IO threads with 16 max task threads based on your 1 available processors
sso-keycloak-1 keycloak 00:14:56,204 INFO  [org.jboss.as.jaxrs] (ServerService Thread Pool -- 40) WFLYRS0016: RESTEasy version 4.7.4.Final
sso-keycloak-1 keycloak 00:14:56,290 INFO  [org.jboss.as.clustering.jgroups] (ServerService Thread Pool -- 42) WFLYCLJG0001: Activating JGroups subsystem. JGroups version 4.2.11
sso-keycloak-1 keycloak 00:14:56,377 INFO  [org.wildfly.extension.health] (ServerService Thread Pool -- 37) WFLYHEALTH0001: Activating Base Health Subsystem
sso-keycloak-1 keycloak 00:14:56,600 INFO  [org.wildfly.extension.metrics] (ServerService Thread Pool -- 47) WFLYMETRICS0001: Activating Base Metrics Subsystem
sso-keycloak-1 keycloak 00:14:56,699 INFO  [org.jboss.as.connector.subsystems.datasources] (ServerService Thread Pool -- 32) WFLYJCA0004: Deploying JDBC-compliant driver class org.h2.Driver (version 1.4)
sso-keycloak-1 keycloak 00:14:56,890 INFO  [org.jboss.as.connector] (MSC service thread 1-2) WFLYJCA0009: Starting Jakarta Connectors Subsystem (WildFly/IronJacamar 1.5.3.Final)
sso-keycloak-1 keycloak 00:14:57,008 INFO  [org.jboss.as.connector.subsystems.datasources] (ServerService Thread Pool -- 32) WFLYJCA0005: Deploying non-JDBC-compliant driver class org.postgresql.Driver (version 42.2)
sso-keycloak-1 keycloak 00:14:57,288 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-2) WFLYUT0003: Undertow 2.2.14.Final starting
sso-keycloak-1 keycloak 00:14:57,296 INFO  [org.jboss.as.connector.deployers.jdbc] (MSC service thread 1-2) WFLYJCA0018: Started Driver service with driver-name = h2
sso-keycloak-1 keycloak 00:14:57,299 INFO  [org.jboss.as.connector.deployers.jdbc] (MSC service thread 1-2) WFLYJCA0018: Started Driver service with driver-name = postgresql
sso-keycloak-1 keycloak 00:14:57,391 WARN  [org.wildfly.clustering.web.undertow] (ServerService Thread Pool -- 54) WFLYCLWEBUT0007: No routing provider found for default-server; using legacy provider based on static configuration
sso-keycloak-1 keycloak 00:14:57,486 INFO  [org.jboss.as.naming] (MSC service thread 1-2) WFLYNAM0003: Starting Naming Service
sso-keycloak-1 keycloak 00:14:57,702 INFO  [org.wildfly.extension.undertow] (ServerService Thread Pool -- 54) WFLYUT0014: Creating file handler for path '/opt/jboss/keycloak/welcome-content' with options [directory-listing: 'false', follow-symlink: 'false', case-sensitive: 'true', safe-symlink-paths: '[]']
sso-keycloak-1 keycloak 00:14:57,789 INFO  [org.jboss.as.ejb3] (MSC service thread 1-2) WFLYEJB0481: Strict pool slsb-strict-max-pool is using a max instance size of 16 (per class), which is derived from thread worker pool sizing.
sso-keycloak-1 keycloak 00:14:57,791 INFO  [org.jboss.as.ejb3] (MSC service thread 1-1) WFLYEJB0482: Strict pool mdb-strict-max-pool is using a max instance size of 4 (per class), which is derived from the number of CPUs on this host.
sso-keycloak-1 keycloak 00:14:57,801 INFO  [org.jboss.as.mail.extension] (MSC service thread 1-1) WFLYMAIL0001: Bound mail session [java:jboss/mail/Default]
sso-keycloak-1 keycloak 00:14:58,397 WARN  [org.wildfly.extension.elytron] (MSC service thread 1-1) WFLYELY00023: KeyStore file '/opt/jboss/keycloak/standalone/configuration/application.keystore' does not exist. Used blank.
sso-keycloak-1 keycloak 00:14:58,583 WARN  [org.wildfly.extension.elytron] (MSC service thread 1-1) WFLYELY01084: KeyStore /opt/jboss/keycloak/standalone/configuration/application.keystore not found, it will be auto generated on first use with a self-signed certificate for host localhost
sso-keycloak-1 keycloak 00:14:59,190 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-1) WFLYUT0012: Started server default-server.
sso-keycloak-1 keycloak 00:14:59,206 INFO  [org.jboss.as.patching] (MSC service thread 1-1) WFLYPAT0050: Keycloak cumulative patch ID is: base, one-off patches include: none
sso-keycloak-1 keycloak 00:14:59,296 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-1) Queuing requests.
sso-keycloak-1 keycloak 00:14:59,307 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-1) WFLYUT0018: Host default-host starting
sso-keycloak-1 keycloak 00:14:59,399 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-2) WFLYUT0006: Undertow HTTP listener default listening on 0.0.0.0:8080
sso-keycloak-1 keycloak 00:14:59,400 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-1) WFLYUT0006: Undertow AJP listener ajp listening on 0.0.0.0:8009
sso-keycloak-1 keycloak 00:14:59,491 INFO  [org.jboss.as.ejb3] (MSC service thread 1-1) WFLYEJB0493: Jakarta Enterprise Beans subsystem suspension complete
sso-keycloak-1 keycloak 00:14:59,503 INFO  [org.jboss.as.server.deployment.scanner] (MSC service thread 1-1) WFLYDS0013: Started FileSystemDeploymentService for directory /opt/jboss/keycloak/standalone/deployments
sso-keycloak-1 keycloak 00:14:59,576 INFO  [org.jboss.modcluster] (ServerService Thread Pool -- 56) MODCLUSTER000001: Initializing mod_cluster version 1.4.4.Final
sso-keycloak-1 keycloak 00:14:59,587 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-1) WFLYSRV0027: Starting deployment of "keycloak-server.war" (runtime-name: "keycloak-server.war")
sso-keycloak-1 keycloak 00:14:59,591 INFO  [org.jboss.modcluster] (ServerService Thread Pool -- 56) MODCLUSTER000032: Listening to proxy advertisements on /224.0.1.105:23364
sso-keycloak-1 keycloak 00:14:59,593 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-2) WFLYUT0006: Undertow HTTPS listener https listening on 0.0.0.0:8443
sso-keycloak-1 keycloak 00:14:59,984 INFO  [org.jboss.as.connector.subsystems.datasources] (MSC service thread 1-2) WFLYJCA0001: Bound data source [java:jboss/datasources/ExampleDS]
sso-keycloak-1 keycloak 00:14:59,985 INFO  [org.jboss.as.connector.subsystems.datasources] (MSC service thread 1-2) WFLYJCA0001: Bound data source [java:jboss/datasources/KeycloakDS]
sso-keycloak-1 keycloak 00:15:01,183 INFO  [org.jgroups.protocols.kubernetes.KUBE_PING] (ServerService Thread Pool -- 56) namespace sso-homologacao set; clustering enabled
sso-keycloak-0 keycloak 00:15:01,982 INFO  [org.infinispan.CLUSTER] (thread-25,ejb,sso-keycloak-0) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|17] (2) [sso-keycloak-0, sso-keycloak-1]
sso-keycloak-0 keycloak 00:15:01,983 INFO  [org.infinispan.CLUSTER] (thread-25,ejb,sso-keycloak-0) ISPN100000: Node sso-keycloak-1 joined the cluster
sso-keycloak-0 keycloak 00:15:01,984 INFO  [org.infinispan.CLUSTER] (thread-25,ejb,sso-keycloak-0) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|17] (2) [sso-keycloak-0, sso-keycloak-1]
sso-keycloak-0 keycloak 00:15:01,984 INFO  [org.infinispan.CLUSTER] (thread-25,ejb,sso-keycloak-0) ISPN100000: Node sso-keycloak-1 joined the cluster
sso-keycloak-0 keycloak 00:15:01,985 INFO  [org.infinispan.CLUSTER] (thread-25,ejb,sso-keycloak-0) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|17] (2) [sso-keycloak-0, sso-keycloak-1]
sso-keycloak-0 keycloak 00:15:01,986 INFO  [org.infinispan.CLUSTER] (thread-25,ejb,sso-keycloak-0) ISPN100000: Node sso-keycloak-1 joined the cluster
sso-keycloak-0 keycloak 00:15:01,986 INFO  [org.infinispan.CLUSTER] (thread-25,ejb,sso-keycloak-0) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|17] (2) [sso-keycloak-0, sso-keycloak-1]
sso-keycloak-0 keycloak 00:15:01,986 INFO  [org.infinispan.CLUSTER] (thread-25,ejb,sso-keycloak-0) ISPN100000: Node sso-keycloak-1 joined the cluster
sso-keycloak-0 keycloak 00:15:01,986 INFO  [org.infinispan.CLUSTER] (thread-25,ejb,sso-keycloak-0) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|17] (2) [sso-keycloak-0, sso-keycloak-1]
sso-keycloak-0 keycloak 00:15:01,987 INFO  [org.infinispan.CLUSTER] (thread-25,ejb,sso-keycloak-0) ISPN100000: Node sso-keycloak-1 joined the cluster
sso-keycloak-1 keycloak 00:15:03,995 INFO  [org.infinispan.CONTAINER] (ServerService Thread Pool -- 58) ISPN000128: Infinispan version: Infinispan 'Taedonggang' 12.1.7.Final
sso-keycloak-1 keycloak 00:15:03,996 INFO  [org.infinispan.CONTAINER] (ServerService Thread Pool -- 58) ISPN000556: Starting user marshaller 'org.wildfly.clustering.infinispan.spi.marshalling.InfinispanProtoStreamMarshaller'
sso-keycloak-1 keycloak 00:15:03,999 INFO  [org.infinispan.CONTAINER] (ServerService Thread Pool -- 60) ISPN000556: Starting user marshaller 'org.wildfly.clustering.infinispan.spi.marshalling.InfinispanProtoStreamMarshaller'
sso-keycloak-1 keycloak 00:15:03,998 INFO  [org.infinispan.CONTAINER] (ServerService Thread Pool -- 59) ISPN000556: Starting user marshaller 'org.wildfly.clustering.infinispan.spi.marshalling.InfinispanProtoStreamMarshaller'
sso-keycloak-1 keycloak 00:15:04,009 INFO  [org.infinispan.CONTAINER] (ServerService Thread Pool -- 56) ISPN000556: Starting user marshaller 'org.wildfly.clustering.infinispan.marshalling.jboss.JBossMarshaller'
sso-keycloak-1 keycloak 00:15:04,288 INFO  [org.infinispan.CONTAINER] (ServerService Thread Pool -- 57) ISPN000556: Starting user marshaller 'org.wildfly.clustering.infinispan.marshalling.jboss.JBossMarshaller'
sso-keycloak-1 keycloak 00:15:04,799 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 59) ISPN000078: Starting JGroups channel ejb
sso-keycloak-1 keycloak 00:15:04,798 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 56) ISPN000078: Starting JGroups channel ejb
sso-keycloak-1 keycloak 00:15:04,799 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 60) ISPN000078: Starting JGroups channel ejb
sso-keycloak-1 keycloak 00:15:04,798 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 58) ISPN000078: Starting JGroups channel ejb
sso-keycloak-1 keycloak 00:15:04,800 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 57) ISPN000078: Starting JGroups channel ejb
sso-keycloak-1 keycloak 00:15:04,806 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 59) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|17] (2) [sso-keycloak-0, sso-keycloak-1]
sso-keycloak-1 keycloak 00:15:04,806 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 57) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|17] (2) [sso-keycloak-0, sso-keycloak-1]
sso-keycloak-1 keycloak 00:15:04,806 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 60) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|17] (2) [sso-keycloak-0, sso-keycloak-1]
sso-keycloak-1 keycloak 00:15:04,807 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 58) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|17] (2) [sso-keycloak-0, sso-keycloak-1]
sso-keycloak-1 keycloak 00:15:04,808 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 56) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|17] (2) [sso-keycloak-0, sso-keycloak-1]
sso-keycloak-1 keycloak 00:15:04,883 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 57) ISPN000079: Channel ejb local address is sso-keycloak-1, physical addresses are [172.16.8.71:7600]
sso-keycloak-1 keycloak 00:15:04,883 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 56) ISPN000079: Channel ejb local address is sso-keycloak-1, physical addresses are [172.16.8.71:7600]
sso-keycloak-1 keycloak 00:15:04,883 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 58) ISPN000079: Channel ejb local address is sso-keycloak-1, physical addresses are [172.16.8.71:7600]
sso-keycloak-1 keycloak 00:15:04,893 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 60) ISPN000079: Channel ejb local address is sso-keycloak-1, physical addresses are [172.16.8.71:7600]
sso-keycloak-1 keycloak 00:15:04,897 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 59) ISPN000079: Channel ejb local address is sso-keycloak-1, physical addresses are [172.16.8.71:7600]
sso-keycloak-1 keycloak 00:15:05,091 INFO  [org.infinispan.CONFIG] (MSC service thread 1-1) ISPN000152: Passivation configured without an eviction policy being selected. Only manually evicted entities will be passivated.
sso-keycloak-1 keycloak 00:15:05,097 INFO  [org.infinispan.CONFIG] (MSC service thread 1-1) ISPN000152: Passivation configured without an eviction policy being selected. Only manually evicted entities will be passivated.
sso-keycloak-0 keycloak 00:15:05,685 INFO  [org.infinispan.CLUSTER] (thread-20,ejb,sso-keycloak-0) [Context=http-remoting-connector] ISPN100002: Starting rebalance with members [sso-keycloak-0, sso-keycloak-1], phase READ_OLD_WRITE_ALL, topology id 45
sso-keycloak-0 keycloak 00:15:05,686 INFO  [org.infinispan.CLUSTER] (thread-25,ejb,sso-keycloak-0) [Context=org.infinispan.CONFIG] ISPN100002: Starting rebalance with members [sso-keycloak-0, sso-keycloak-1], phase READ_OLD_WRITE_ALL, topology id 45
sso-keycloak-1 keycloak 00:15:05,689 ERROR [org.infinispan.CLUSTER] (thread-11,ejb,sso-keycloak-1) ISPN000475: Error processing response for request 2 from sso-keycloak-0: java.lang.ClassCastException: class [I cannot be cast to class java.util.Map ([I and java.util.Map are in module java.base of loader 'bootstrap')
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.distribution.ch.impl.ReplicatedConsistentHash$Externalizer.doReadObject(ReplicatedConsistentHash.java:415)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.distribution.ch.impl.ReplicatedConsistentHash$Externalizer.doReadObject(ReplicatedConsistentHash.java:400)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.commons.marshall.InstanceReusingAdvancedExternalizer.readObject(InstanceReusingAdvancedExternalizer.java:102)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readWithExternalizer(GlobalMarshaller.java:727)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNonNullableObject(GlobalMarshaller.java:708)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNullableObject(GlobalMarshaller.java:357)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.BytesObjectInput.readObject(BytesObjectInput.java:32)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.topology.CacheTopology$Externalizer.doReadObject(CacheTopology.java:252)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.topology.CacheTopology$Externalizer.doReadObject(CacheTopology.java:235)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.commons.marshall.InstanceReusingAdvancedExternalizer.readObject(InstanceReusingAdvancedExternalizer.java:102)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readWithExternalizer(GlobalMarshaller.java:727)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNonNullableObject(GlobalMarshaller.java:708)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNullableObject(GlobalMarshaller.java:357)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.BytesObjectInput.readObject(BytesObjectInput.java:32)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.topology.CacheStatusResponse$Externalizer.readObject(CacheStatusResponse.java:72)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.topology.CacheStatusResponse$Externalizer.readObject(CacheStatusResponse.java:60)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readWithExternalizer(GlobalMarshaller.java:727)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNonNullableObject(GlobalMarshaller.java:708)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNullableObject(GlobalMarshaller.java:357)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.BytesObjectInput.readObject(BytesObjectInput.java:32)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.responses.SuccessfulResponse$Externalizer.readObject(SuccessfulResponse.java:71)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.responses.SuccessfulResponse$Externalizer.readObject(SuccessfulResponse.java:63)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readWithExternalizer(GlobalMarshaller.java:727)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNonNullableObject(GlobalMarshaller.java:708)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNullableObject(GlobalMarshaller.java:357)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.objectFromObjectInput(GlobalMarshaller.java:191)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.objectFromByteBuffer(GlobalMarshaller.java:220)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport.processResponse(JGroupsTransport.java:1407)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport.processMessage(JGroupsTransport.java:1317)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport.access$300(JGroupsTransport.java:133)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport$ChannelCallbacks.up(JGroupsTransport.java:1458)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.JChannel.up(JChannel.java:784)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.fork.ForkProtocolStack.up(ForkProtocolStack.java:135)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.stack.Protocol.up(Protocol.java:309)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FORK.up(FORK.java:142)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FRAG3.up(FRAG3.java:165)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FlowControl.up(FlowControl.java:347)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.GMS.up(GMS.java:876)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.STABLE.up(STABLE.java:254)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.UNICAST3.deliverMessage(UNICAST3.java:1048)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.UNICAST3.addMessage(UNICAST3.java:771)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.UNICAST3.handleDataReceived(UNICAST3.java:752)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.UNICAST3.up(UNICAST3.java:405)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.NAKACK2.up(NAKACK2.java:592)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.VERIFY_SUSPECT.up(VERIFY_SUSPECT.java:132)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FailureDetection.up(FailureDetection.java:186)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FD_SOCK.up(FD_SOCK.java:254)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.MERGE3.up(MERGE3.java:281)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.Discovery.up(Discovery.java:300)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.TP.passMessageUp(TP.java:1400)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.util.SubmitToThreadPool$SingleMessageHandler.run(SubmitToThreadPool.java:98)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.as.clustering.context.ContextReferenceExecutor.execute(ContextReferenceExecutor.java:49)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.as.clustering.context.ContextualExecutor$1.run(ContextualExecutor.java:70)
sso-keycloak-1 keycloak 	at java.base/java.lang.Thread.run(Thread.java:829)
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak 00:15:05,691 ERROR [org.infinispan.CLUSTER] (thread-4,null,sso-keycloak-1) ISPN000475: Error processing response for request 2 from sso-keycloak-0: java.lang.ClassCastException: class [I cannot be cast to class java.util.Map ([I and java.util.Map are in module java.base of loader 'bootstrap')
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.distribution.ch.impl.ReplicatedConsistentHash$Externalizer.doReadObject(ReplicatedConsistentHash.java:415)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.distribution.ch.impl.ReplicatedConsistentHash$Externalizer.doReadObject(ReplicatedConsistentHash.java:400)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.commons.marshall.InstanceReusingAdvancedExternalizer.readObject(InstanceReusingAdvancedExternalizer.java:102)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readWithExternalizer(GlobalMarshaller.java:727)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNonNullableObject(GlobalMarshaller.java:708)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNullableObject(GlobalMarshaller.java:357)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.BytesObjectInput.readObject(BytesObjectInput.java:32)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.topology.CacheTopology$Externalizer.doReadObject(CacheTopology.java:252)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.topology.CacheTopology$Externalizer.doReadObject(CacheTopology.java:235)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.commons.marshall.InstanceReusingAdvancedExternalizer.readObject(InstanceReusingAdvancedExternalizer.java:102)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readWithExternalizer(GlobalMarshaller.java:727)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNonNullableObject(GlobalMarshaller.java:708)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNullableObject(GlobalMarshaller.java:357)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.BytesObjectInput.readObject(BytesObjectInput.java:32)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.topology.CacheStatusResponse$Externalizer.readObject(CacheStatusResponse.java:72)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.topology.CacheStatusResponse$Externalizer.readObject(CacheStatusResponse.java:60)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readWithExternalizer(GlobalMarshaller.java:727)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNonNullableObject(GlobalMarshaller.java:708)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNullableObject(GlobalMarshaller.java:357)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.BytesObjectInput.readObject(BytesObjectInput.java:32)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.responses.SuccessfulResponse$Externalizer.readObject(SuccessfulResponse.java:71)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.responses.SuccessfulResponse$Externalizer.readObject(SuccessfulResponse.java:63)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readWithExternalizer(GlobalMarshaller.java:727)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNonNullableObject(GlobalMarshaller.java:708)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNullableObject(GlobalMarshaller.java:357)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.objectFromObjectInput(GlobalMarshaller.java:191)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.objectFromByteBuffer(GlobalMarshaller.java:220)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport.processResponse(JGroupsTransport.java:1407)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport.processMessage(JGroupsTransport.java:1317)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport.access$300(JGroupsTransport.java:133)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport$ChannelCallbacks.up(JGroupsTransport.java:1458)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.JChannel.up(JChannel.java:784)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.fork.ForkProtocolStack.up(ForkProtocolStack.java:135)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.stack.Protocol.up(Protocol.java:309)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FORK.up(FORK.java:142)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FRAG3.up(FRAG3.java:165)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FlowControl.up(FlowControl.java:347)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.GMS.up(GMS.java:876)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.STABLE.up(STABLE.java:254)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.UNICAST3.deliverMessage(UNICAST3.java:1048)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.UNICAST3.addMessage(UNICAST3.java:771)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.UNICAST3.handleDataReceived(UNICAST3.java:752)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.UNICAST3.up(UNICAST3.java:405)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.NAKACK2.up(NAKACK2.java:592)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.VERIFY_SUSPECT.up(VERIFY_SUSPECT.java:132)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FailureDetection.up(FailureDetection.java:186)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FD_SOCK.up(FD_SOCK.java:254)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.MERGE3.up(MERGE3.java:281)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.Discovery.up(Discovery.java:300)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.TP.passMessageUp(TP.java:1400)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.util.SubmitToThreadPool$SingleMessageHandler.run(SubmitToThreadPool.java:98)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.as.clustering.context.ContextReferenceExecutor.execute(ContextReferenceExecutor.java:49)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.as.clustering.context.ContextualExecutor$1.run(ContextualExecutor.java:70)
sso-keycloak-1 keycloak 	at java.base/java.lang.Thread.run(Thread.java:829)
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak 00:15:05,689 ERROR [org.infinispan.CLUSTER] (thread-10,ejb,sso-keycloak-1) ISPN000474: Error processing request 0@sso-keycloak-0: java.lang.ClassCastException: class [I cannot be cast to class java.util.Map ([I and java.util.Map are in module java.base of loader 'bootstrap')
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.distribution.ch.impl.ReplicatedConsistentHash$Externalizer.doReadObject(ReplicatedConsistentHash.java:415)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.distribution.ch.impl.ReplicatedConsistentHash$Externalizer.doReadObject(ReplicatedConsistentHash.java:400)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.commons.marshall.InstanceReusingAdvancedExternalizer.readObject(InstanceReusingAdvancedExternalizer.java:102)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readWithExternalizer(GlobalMarshaller.java:727)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNonNullableObject(GlobalMarshaller.java:708)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNullableObject(GlobalMarshaller.java:357)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.BytesObjectInput.readObject(BytesObjectInput.java:32)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.commands.topology.RebalanceStartCommand.readFrom(RebalanceStartCommand.java:98)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.exts.ReplicableCommandExternalizer.readCommandParameters(ReplicableCommandExternalizer.java:117)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.exts.ReplicableCommandExternalizer.readObject(ReplicableCommandExternalizer.java:106)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.exts.ReplicableCommandExternalizer.readObject(ReplicableCommandExternalizer.java:68)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readWithExternalizer(GlobalMarshaller.java:727)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNonNullableObject(GlobalMarshaller.java:708)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNullableObject(GlobalMarshaller.java:357)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.objectFromObjectInput(GlobalMarshaller.java:191)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.objectFromByteBuffer(GlobalMarshaller.java:220)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport.processRequest(JGroupsTransport.java:1374)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport.processMessage(JGroupsTransport.java:1314)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport.access$300(JGroupsTransport.java:133)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport$ChannelCallbacks.up(JGroupsTransport.java:1458)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.JChannel.up(JChannel.java:784)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.fork.ForkProtocolStack.up(ForkProtocolStack.java:135)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.stack.Protocol.up(Protocol.java:309)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FORK.up(FORK.java:142)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FRAG3.up(FRAG3.java:165)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FlowControl.up(FlowControl.java:363)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.GMS.up(GMS.java:876)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.STABLE.up(STABLE.java:254)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.UNICAST3.up(UNICAST3.java:392)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.NAKACK2.deliver(NAKACK2.java:926)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.NAKACK2.handleMessage(NAKACK2.java:818)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.NAKACK2.up(NAKACK2.java:602)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.VERIFY_SUSPECT.up(VERIFY_SUSPECT.java:132)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FailureDetection.up(FailureDetection.java:186)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FD_SOCK.up(FD_SOCK.java:254)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.MERGE3.up(MERGE3.java:281)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.Discovery.up(Discovery.java:300)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.TP.passMessageUp(TP.java:1400)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.util.SubmitToThreadPool$SingleMessageHandler.run(SubmitToThreadPool.java:98)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.as.clustering.context.ContextReferenceExecutor.execute(ContextReferenceExecutor.java:49)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.as.clustering.context.ContextualExecutor$1.run(ContextualExecutor.java:70)
sso-keycloak-1 keycloak 	at java.base/java.lang.Thread.run(Thread.java:829)
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak 00:15:05,689 ERROR [org.infinispan.CLUSTER] (thread-5,null,sso-keycloak-1) ISPN000474: Error processing request 0@sso-keycloak-0: java.lang.ClassCastException: class [I cannot be cast to class java.util.Map ([I and java.util.Map are in module java.base of loader 'bootstrap')
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.distribution.ch.impl.ReplicatedConsistentHash$Externalizer.doReadObject(ReplicatedConsistentHash.java:415)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.distribution.ch.impl.ReplicatedConsistentHash$Externalizer.doReadObject(ReplicatedConsistentHash.java:400)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.commons.marshall.InstanceReusingAdvancedExternalizer.readObject(InstanceReusingAdvancedExternalizer.java:102)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readWithExternalizer(GlobalMarshaller.java:727)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNonNullableObject(GlobalMarshaller.java:708)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNullableObject(GlobalMarshaller.java:357)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.BytesObjectInput.readObject(BytesObjectInput.java:32)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.commands.topology.RebalanceStartCommand.readFrom(RebalanceStartCommand.java:98)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.exts.ReplicableCommandExternalizer.readCommandParameters(ReplicableCommandExternalizer.java:117)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.exts.ReplicableCommandExternalizer.readObject(ReplicableCommandExternalizer.java:106)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.exts.ReplicableCommandExternalizer.readObject(ReplicableCommandExternalizer.java:68)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readWithExternalizer(GlobalMarshaller.java:727)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNonNullableObject(GlobalMarshaller.java:708)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.readNullableObject(GlobalMarshaller.java:357)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.objectFromObjectInput(GlobalMarshaller.java:191)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.marshall.core.GlobalMarshaller.objectFromByteBuffer(GlobalMarshaller.java:220)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport.processRequest(JGroupsTransport.java:1374)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport.processMessage(JGroupsTransport.java:1314)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport.access$300(JGroupsTransport.java:133)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.jgroups.JGroupsTransport$ChannelCallbacks.up(JGroupsTransport.java:1458)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.JChannel.up(JChannel.java:784)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.fork.ForkProtocolStack.up(ForkProtocolStack.java:135)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.stack.Protocol.up(Protocol.java:309)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FORK.up(FORK.java:142)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FRAG3.up(FRAG3.java:165)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FlowControl.up(FlowControl.java:363)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.GMS.up(GMS.java:876)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.STABLE.up(STABLE.java:254)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.UNICAST3.up(UNICAST3.java:392)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.NAKACK2.deliver(NAKACK2.java:926)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.NAKACK2.handleMessage(NAKACK2.java:818)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.pbcast.NAKACK2.up(NAKACK2.java:602)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.VERIFY_SUSPECT.up(VERIFY_SUSPECT.java:132)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FailureDetection.up(FailureDetection.java:186)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.FD_SOCK.up(FD_SOCK.java:254)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.MERGE3.up(MERGE3.java:281)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.Discovery.up(Discovery.java:300)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.protocols.TP.passMessageUp(TP.java:1400)
sso-keycloak-1 keycloak 	at [email protected]//org.jgroups.util.SubmitToThreadPool$SingleMessageHandler.run(SubmitToThreadPool.java:98)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.as.clustering.context.ContextReferenceExecutor.execute(ContextReferenceExecutor.java:49)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.as.clustering.context.ContextualExecutor$1.run(ContextualExecutor.java:70)
sso-keycloak-1 keycloak 	at java.base/java.lang.Thread.run(Thread.java:829)
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak 00:22:54,022 INFO  [org.jboss.as.clustering.infinispan] (ServerService Thread Pool -- 58) WFLYCLINF0003: Stopped http-remoting-connector cache from ejb container
sso-keycloak-1 keycloak 00:22:54,023 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 56) ISPN000080: Disconnecting JGroups channel ejb
sso-keycloak-1 keycloak 00:22:54,023 ERROR [org.jboss.msc.service.fail] (ServerService Thread Pool -- 58) MSC000001: Failed to start service org.wildfly.clustering.infinispan.cache.ejb.http-remoting-connector: org.jboss.msc.service.StartException in service org.wildfly.clustering.infinispan.cache.ejb.http-remoting-connector: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak 	at [email protected]//org.wildfly.clustering.service.FunctionalService.start(FunctionalService.java:66)
sso-keycloak-1 keycloak 	at [email protected]//org.wildfly.clustering.service.AsyncServiceConfigurator$AsyncService.lambda$start$0(AsyncServiceConfigurator.java:117)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:1990)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1486)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1377)
sso-keycloak-1 keycloak 	at java.base/java.lang.Thread.run(Thread.java:829)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.threads.JBossThread.run(JBossThread.java:513)
sso-keycloak-1 keycloak Caused by: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl.startWrapper(BasicComponentRegistryImpl.java:572)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl.access$700(BasicComponentRegistryImpl.java:30)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl$ComponentWrapper.running(BasicComponentRegistryImpl.java:787)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.AbstractComponentRegistry.internalStart(AbstractComponentRegistry.java:354)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.AbstractComponentRegistry.start(AbstractComponentRegistry.java:250)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.ComponentRegistry.start(ComponentRegistry.java:213)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.cache.impl.CacheImpl.start(CacheImpl.java:1015)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.cache.impl.AbstractDelegatingCache.start(AbstractDelegatingCache.java:512)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.manager.DefaultCacheManager.wireAndStartCache(DefaultCacheManager.java:698)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.manager.DefaultCacheManager.createCache(DefaultCacheManager.java:644)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.manager.DefaultCacheManager.internalGetCache(DefaultCacheManager.java:533)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.manager.DefaultCacheManager.getCache(DefaultCacheManager.java:511)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.as.clustering.infinispan.DefaultCacheContainer.getCache(DefaultCacheContainer.java:85)
sso-keycloak-1 keycloak 	at [email protected]//org.wildfly.clustering.infinispan.spi.service.CacheServiceConfigurator.get(CacheServiceConfigurator.java:77)
sso-keycloak-1 keycloak 	at [email protected]//org.wildfly.clustering.infinispan.spi.service.CacheServiceConfigurator.get(CacheServiceConfigurator.java:55)
sso-keycloak-1 keycloak 	at [email protected]//org.wildfly.clustering.service.FunctionalService.start(FunctionalService.java:63)
sso-keycloak-1 keycloak 	... 7 more
sso-keycloak-1 keycloak Caused by: java.util.concurrent.CompletionException: java.lang.NullPointerException
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.util.concurrent.CompletionStages.join(CompletionStages.java:81)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.statetransfer.StateTransferManagerImpl.start(StateTransferManagerImpl.java:134)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.statetransfer.CorePackageImpl$2.start(CorePackageImpl.java:104)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.statetransfer.CorePackageImpl$2.start(CorePackageImpl.java:83)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl.invokeStart(BasicComponentRegistryImpl.java:604)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl.doStartWrapper(BasicComponentRegistryImpl.java:595)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl.startWrapper(BasicComponentRegistryImpl.java:564)
sso-keycloak-1 keycloak 	... 22 more
sso-keycloak-1 keycloak Caused by: java.lang.NullPointerException
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.topology.LocalTopologyManagerImpl.lambda$sendJoinRequest$3(LocalTopologyManagerImpl.java:191)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.CompletableFuture.uniHandle(CompletableFuture.java:930)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.CompletableFuture$UniHandle.tryFire(CompletableFuture.java:907)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.CompletableFuture.postComplete(CompletableFuture.java:506)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.CompletableFuture.completeExceptionally(CompletableFuture.java:2088)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.AbstractRequest.completeExceptionally(AbstractRequest.java:74)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.impl.SingleTargetRequest.onTimeout(SingleTargetRequest.java:85)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.AbstractRequest.call(AbstractRequest.java:87)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.AbstractRequest.call(AbstractRequest.java:22)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
sso-keycloak-1 keycloak 	at java.base/java.lang.Thread.run(Thread.java:829)
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak 00:22:54,033 ERROR [org.jboss.msc.service.fail] (ServerService Thread Pool -- 56) MSC000001: Failed to start service org.wildfly.clustering.infinispan.cache-container.keycloak: org.jboss.msc.service.StartException in service org.wildfly.clustering.infinispan.cache-container.keycloak: org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak 	at [email protected]//org.wildfly.clustering.service.FunctionalService.start(FunctionalService.java:66)
sso-keycloak-1 keycloak 	at [email protected]//org.wildfly.clustering.service.AsyncServiceConfigurator$AsyncService.lambda$start$0(AsyncServiceConfigurator.java:117)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:1990)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1486)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1377)
sso-keycloak-1 keycloak 	at java.base/java.lang.Thread.run(Thread.java:829)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.threads.JBossThread.run(JBossThread.java:513)
sso-keycloak-1 keycloak Caused by: org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.manager.DefaultCacheManager.internalStart(DefaultCacheManager.java:755)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.manager.DefaultCacheManager.start(DefaultCacheManager.java:718)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.as.clustering.infinispan.subsystem.CacheContainerServiceConfigurator.get(CacheContainerServiceConfigurator.java:121)
sso-keycloak-1 keycloak 	at [email protected]//org.jboss.as.clustering.infinispan.subsystem.CacheContainerServiceConfigurator.get(CacheContainerServiceConfigurator.java:80)
sso-keycloak-1 keycloak 	at [email protected]//org.wildfly.clustering.service.FunctionalService.start(FunctionalService.java:63)
sso-keycloak-1 keycloak 	... 7 more
sso-keycloak-1 keycloak Caused by: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl.startWrapper(BasicComponentRegistryImpl.java:572)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl.access$700(BasicComponentRegistryImpl.java:30)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl$ComponentWrapper.running(BasicComponentRegistryImpl.java:787)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.AbstractComponentRegistry.internalStart(AbstractComponentRegistry.java:354)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.AbstractComponentRegistry.start(AbstractComponentRegistry.java:250)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.ComponentRegistry.start(ComponentRegistry.java:213)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.cache.impl.CacheImpl.start(CacheImpl.java:1015)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.cache.impl.AbstractDelegatingCache.start(AbstractDelegatingCache.java:512)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.cache.impl.AbstractDelegatingCache.start(AbstractDelegatingCache.java:512)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.cache.impl.AbstractDelegatingCache.start(AbstractDelegatingCache.java:512)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.manager.DefaultCacheManager.wireAndStartCache(DefaultCacheManager.java:698)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.manager.DefaultCacheManager.createCache(DefaultCacheManager.java:644)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.manager.DefaultCacheManager.internalGetCache(DefaultCacheManager.java:533)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.manager.DefaultCacheManager.getCache(DefaultCacheManager.java:511)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.security.actions.GetCacheAction.run(GetCacheAction.java:26)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.security.actions.GetCacheAction.run(GetCacheAction.java:14)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.security.Security.doPrivileged(Security.java:56)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.globalstate.impl.SecurityActions.doPrivileged(SecurityActions.java:30)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.globalstate.impl.SecurityActions.getCache(SecurityActions.java:39)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.globalstate.impl.GlobalConfigurationManagerImpl.start(GlobalConfigurationManagerImpl.java:94)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.globalstate.impl.CorePackageImpl$2.start(CorePackageImpl.java:59)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.globalstate.impl.CorePackageImpl$2.start(CorePackageImpl.java:48)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl.invokeStart(BasicComponentRegistryImpl.java:604)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl.doStartWrapper(BasicComponentRegistryImpl.java:595)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl.startWrapper(BasicComponentRegistryImpl.java:564)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl.access$700(BasicComponentRegistryImpl.java:30)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl$ComponentWrapper.running(BasicComponentRegistryImpl.java:787)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.AbstractComponentRegistry.internalStart(AbstractComponentRegistry.java:354)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.AbstractComponentRegistry.start(AbstractComponentRegistry.java:250)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.manager.DefaultCacheManager.internalStart(DefaultCacheManager.java:750)
sso-keycloak-1 keycloak 	... 11 more
sso-keycloak-1 keycloak Caused by: java.util.concurrent.CompletionException: java.lang.NullPointerException
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.util.concurrent.CompletionStages.join(CompletionStages.java:81)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.statetransfer.StateTransferManagerImpl.start(StateTransferManagerImpl.java:134)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.statetransfer.CorePackageImpl$2.start(CorePackageImpl.java:104)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.statetransfer.CorePackageImpl$2.start(CorePackageImpl.java:83)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl.invokeStart(BasicComponentRegistryImpl.java:604)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl.doStartWrapper(BasicComponentRegistryImpl.java:595)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.factories.impl.BasicComponentRegistryImpl.startWrapper(BasicComponentRegistryImpl.java:564)
sso-keycloak-1 keycloak 	... 40 more
sso-keycloak-1 keycloak Caused by: java.lang.NullPointerException
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.topology.LocalTopologyManagerImpl.lambda$sendJoinRequest$3(LocalTopologyManagerImpl.java:191)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.CompletableFuture.uniHandle(CompletableFuture.java:930)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.CompletableFuture$UniHandle.tryFire(CompletableFuture.java:907)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.CompletableFuture.postComplete(CompletableFuture.java:506)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.CompletableFuture.completeExceptionally(CompletableFuture.java:2088)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.AbstractRequest.completeExceptionally(AbstractRequest.java:74)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.impl.SingleTargetRequest.onTimeout(SingleTargetRequest.java:85)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.AbstractRequest.call(AbstractRequest.java:87)
sso-keycloak-1 keycloak 	at [email protected]//org.infinispan.remoting.transport.AbstractRequest.call(AbstractRequest.java:22)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
sso-keycloak-1 keycloak 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
sso-keycloak-1 keycloak 	at java.base/java.lang.Thread.run(Thread.java:829)
sso-keycloak-1 keycloak 
sso-keycloak-1 keycloak 00:22:54,202 ERROR [org.jboss.as.controller.management-operation] (Controller Boot Thread) WFLYCTL0013: Operation ("add") failed - address: ([
sso-keycloak-1 keycloak     ("subsystem" => "ejb3"),
sso-keycloak-1 keycloak     ("service" => "remote")
sso-keycloak-1 keycloak ]) - failure description: {"WFLYCTL0080: Failed services" => {"org.wildfly.clustering.infinispan.cache.ejb.http-remoting-connector" => "org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: java.util.concurrent.CompletionException: java.lang.NullPointerException
sso-keycloak-1 keycloak     Caused by: java.lang.NullPointerException"}}
sso-keycloak-1 keycloak 00:22:54,209 ERROR [org.jboss.as.controller.management-operation] (Controller Boot Thread) WFLYCTL0013: Operation ("add") failed - address: ([
sso-keycloak-1 keycloak     ("subsystem" => "infinispan"),
sso-keycloak-1 keycloak     ("cache-container" => "keycloak")
sso-keycloak-1 keycloak ]) - failure description: {"WFLYCTL0080: Failed services" => {"org.wildfly.clustering.infinispan.cache-container.keycloak" => "org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: java.util.concurrent.CompletionException: java.lang.NullPointerException
sso-keycloak-1 keycloak     Caused by: java.lang.NullPointerException"}}
sso-keycloak-1 keycloak 00:22:54,211 ERROR [org.jboss.as.controller.management-operation] (Controller Boot Thread) WFLYCTL0013: Operation ("add") failed - address: ([
sso-keycloak-1 keycloak     ("subsystem" => "infinispan"),
sso-keycloak-1 keycloak     ("cache-container" => "keycloak"),
sso-keycloak-1 keycloak     ("thread-pool" => "async-operations")
sso-keycloak-1 keycloak ]) - failure description: {"WFLYCTL0080: Failed services" => {"org.wildfly.clustering.infinispan.cache-container.keycloak" => "org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: java.util.concurrent.CompletionException: java.lang.NullPointerException
sso-keycloak-1 keycloak     Caused by: java.lang.NullPointerException"}}
sso-keycloak-1 keycloak 00:22:54,212 ERROR [org.jboss.as.controller.management-operation] (Controller Boot Thread) WFLYCTL0013: Operation ("add") failed - address: ([
sso-keycloak-1 keycloak     ("subsystem" => "infinispan"),
sso-keycloak-1 keycloak     ("cache-container" => "keycloak"),
sso-keycloak-1 keycloak     ("thread-pool" => "blocking")
sso-keycloak-1 keycloak ]) - failure description: {"WFLYCTL0080: Failed services" => {"org.wildfly.clustering.infinispan.cache-container.keycloak" => "org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: java.util.concurrent.CompletionException: java.lang.NullPointerException
sso-keycloak-1 keycloak     Caused by: java.lang.NullPointerException"}}
sso-keycloak-1 keycloak 00:22:54,213 ERROR [org.jboss.as.controller.management-operation] (Controller Boot Thread) WFLYCTL0013: Operation ("add") failed - address: ([
sso-keycloak-1 keycloak     ("subsystem" => "infinispan"),
sso-keycloak-1 keycloak     ("cache-container" => "keycloak"),
sso-keycloak-1 keycloak     ("thread-pool" => "expiration")
sso-keycloak-1 keycloak ]) - failure description: {"WFLYCTL0080: Failed services" => {"org.wildfly.clustering.infinispan.cache-container.keycloak" => "org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: java.util.concurrent.CompletionException: java.lang.NullPointerException
sso-keycloak-1 keycloak     Caused by: java.lang.NullPointerException"}}
sso-keycloak-1 keycloak 00:22:54,213 ERROR [org.jboss.as.controller.management-operation] (Controller Boot Thread) WFLYCTL0013: Operation ("add") failed - address: ([
sso-keycloak-1 keycloak     ("subsystem" => "infinispan"),
sso-keycloak-1 keycloak     ("cache-container" => "keycloak"),
sso-keycloak-1 keycloak     ("thread-pool" => "listener")
sso-keycloak-1 keycloak ]) - failure description: {"WFLYCTL0080: Failed services" => {"org.wildfly.clustering.infinispan.cache-container.keycloak" => "org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: java.util.concurrent.CompletionException: java.lang.NullPointerException
sso-keycloak-1 keycloak     Caused by: java.lang.NullPointerException"}}
sso-keycloak-1 keycloak 00:22:54,214 ERROR [org.jboss.as.controller.management-operation] (Controller Boot Thread) WFLYCTL0013: Operation ("add") failed - address: ([
sso-keycloak-1 keycloak     ("subsystem" => "infinispan"),
sso-keycloak-1 keycloak     ("cache-container" => "keycloak"),
sso-keycloak-1 keycloak     ("thread-pool" => "non-blocking")
sso-keycloak-1 keycloak ]) - failure description: {"WFLYCTL0080: Failed services" => {"org.wildfly.clustering.infinispan.cache-container.keycloak" => "org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: java.util.concurrent.CompletionException: java.lang.NullPointerException
sso-keycloak-1 keycloak     Caused by: java.lang.NullPointerException"}}
sso-keycloak-1 keycloak 00:22:54,214 ERROR [org.jboss.as.controller.management-operation] (Controller Boot Thread) WFLYCTL0013: Operation ("add") failed - address: ([
sso-keycloak-1 keycloak     ("subsystem" => "infinispan"),
sso-keycloak-1 keycloak     ("cache-container" => "keycloak"),
sso-keycloak-1 keycloak     ("thread-pool" => "persistence")
sso-keycloak-1 keycloak ]) - failure description: {"WFLYCTL0080: Failed services" => {"org.wildfly.clustering.infinispan.cache-container.keycloak" => "org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: java.util.concurrent.CompletionException: java.lang.NullPointerException
sso-keycloak-1 keycloak     Caused by: java.lang.NullPointerException"}}
sso-keycloak-1 keycloak 00:22:54,215 ERROR [org.jboss.as.controller.management-operation] (Controller Boot Thread) WFLYCTL0013: Operation ("add") failed - address: ([
sso-keycloak-1 keycloak     ("subsystem" => "infinispan"),
sso-keycloak-1 keycloak     ("cache-container" => "keycloak"),
sso-keycloak-1 keycloak     ("thread-pool" => "remote-command")
sso-keycloak-1 keycloak ]) - failure description: {"WFLYCTL0080: Failed services" => {"org.wildfly.clustering.infinispan.cache-container.keycloak" => "org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: java.util.concurrent.CompletionException: java.lang.NullPointerException
sso-keycloak-1 keycloak     Caused by: java.lang.NullPointerException"}}
sso-keycloak-1 keycloak 00:22:54,215 ERROR [org.jboss.as.controller.management-operation] (Controller Boot Thread) WFLYCTL0013: Operation ("add") failed - address: ([
sso-keycloak-1 keycloak     ("subsystem" => "infinispan"),
sso-keycloak-1 keycloak     ("cache-container" => "keycloak"),
sso-keycloak-1 keycloak     ("thread-pool" => "state-transfer")
sso-keycloak-1 keycloak ]) - failure description: {"WFLYCTL0080: Failed services" => {"org.wildfly.clustering.infinispan.cache-container.keycloak" => "org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: java.util.concurrent.CompletionException: java.lang.NullPointerException
sso-keycloak-1 keycloak     Caused by: java.lang.NullPointerException"}}
sso-keycloak-1 keycloak 00:22:54,216 ERROR [org.jboss.as.controller.management-operation] (Controller Boot Thread) WFLYCTL0013: Operation ("add") failed - address: ([
sso-keycloak-1 keycloak     ("subsystem" => "infinispan"),
sso-keycloak-1 keycloak     ("cache-container" => "keycloak"),
sso-keycloak-1 keycloak     ("thread-pool" => "transport")
sso-keycloak-1 keycloak ]) - failure description: {"WFLYCTL0080: Failed services" => {"org.wildfly.clustering.infinispan.cache-container.keycloak" => "org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak     Caused by: java.util.concurrent.CompletionException: java.lang.NullPointerException
sso-keycloak-1 keycloak     Caused by: java.lang.NullPointerException"}}
sso-keycloak-1 keycloak 00:22:54,284 INFO  [org.jboss.as.server] (ServerService Thread Pool -- 45) WFLYSRV0010: Deployed "keycloak-server.war" (runtime-name : "keycloak-server.war")
sso-keycloak-1 keycloak 00:22:54,288 INFO  [org.jboss.as.controller] (Controller Boot Thread) WFLYCTL0183: Service status report
sso-keycloak-1 keycloak WFLYCTL0186:   Services which failed to start:      service org.wildfly.clustering.infinispan.cache.ejb.http-remoting-connector: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak       service org.wildfly.clustering.infinispan.cache-container.keycloak: org.infinispan.manager.EmbeddedCacheManagerStartupException: org.infinispan.commons.CacheConfigurationException: Error starting component org.infinispan.statetransfer.StateTransferManager
sso-keycloak-1 keycloak WFLYCTL0448: 32 additional services are down due to their dependencies being missing or failed
sso-keycloak-1 keycloak 00:22:54,489 INFO  [org.jboss.as.server] (Controller Boot Thread) WFLYSRV0212: Resuming server
sso-keycloak-1 keycloak 00:22:54,493 ERROR [org.jboss.as] (Controller Boot Thread) WFLYSRV0026: Keycloak 16.1.0 (WildFly Core 18.0.0.Final) started (with errors) in 257971ms - Started 544 of 930 services (44 services failed or missing dependencies, 694 services are lazy, passive or on-demand)
sso-keycloak-1 keycloak 00:22:54,496 INFO  [org.jboss.as] (Controller Boot Thread) WFLYSRV0060: Http management interface listening on http://127.0.0.1:9990/management
sso-keycloak-1 keycloak 00:22:54,496 INFO  [org.jboss.as] (Controller Boot Thread) WFLYSRV0051: Admin console listening on http://127.0.0.1:9990
sso-keycloak-1 keycloak 00:23:19,831 INFO  [org.jboss.as.server] (Thread-1) WFLYSRV0272: Suspending server
sso-keycloak-1 keycloak *** JBossAS process (591) received TERM signal ***
sso-keycloak-1 keycloak 00:23:19,834 INFO  [org.jboss.as.ejb3] (Thread-1) WFLYEJB0493: Jakarta Enterprise Beans subsystem suspension complete
sso-keycloak-1 keycloak 00:23:19,839 INFO  [org.jboss.as.server] (Thread-1) WFLYSRV0220: Server shutdown has been requested via an OS signal
sso-keycloak-1 keycloak 00:23:19,853 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-2) WFLYUT0008: Undertow AJP listener ajp suspending
sso-keycloak-1 keycloak 00:23:19,848 INFO  [org.infinispan.manager.DefaultCacheManager] (ServerService Thread Pool -- 63) Stopping cache manager null on sso-keycloak-1
sso-keycloak-1 keycloak 00:23:19,856 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-2) WFLYUT0007: Undertow AJP listener ajp stopped, was bound to 0.0.0.0:8009
sso-keycloak-1 keycloak 00:23:19,857 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 63) ISPN000080: Disconnecting JGroups channel ejb
sso-keycloak-1 keycloak 00:23:19,886 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-1) WFLYUT0008: Undertow HTTPS listener https suspending
sso-keycloak-1 keycloak 00:23:19,888 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-1) WFLYUT0007: Undertow HTTPS listener https stopped, was bound to 0.0.0.0:8443
sso-keycloak-1 keycloak 00:23:19,889 INFO  [org.jboss.as.connector.subsystems.datasources] (MSC service thread 1-1) WFLYJCA0010: Unbound data source [java:jboss/datasources/KeycloakDS]
sso-keycloak-1 keycloak 00:23:19,892 INFO  [org.jboss.as.mail.extension] (MSC service thread 1-1) WFLYMAIL0002: Unbound mail session [java:jboss/mail/Default]
sso-keycloak-1 keycloak 00:23:19,891 INFO  [org.infinispan.manager.DefaultCacheManager] (ServerService Thread Pool -- 63) Stopping cache manager null on sso-keycloak-1
sso-keycloak-1 keycloak 00:23:19,893 INFO  [org.jboss.modcluster] (ServerService Thread Pool -- 58) MODCLUSTER000002: Initiating mod_cluster shutdown
sso-keycloak-1 keycloak 00:23:19,903 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 63) ISPN000080: Disconnecting JGroups channel ejb
sso-keycloak-1 keycloak 00:23:19,898 INFO  [org.infinispan.manager.DefaultCacheManager] (ServerService Thread Pool -- 64) Stopping cache manager null on sso-keycloak-1
sso-keycloak-1 keycloak 00:23:19,905 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 64) ISPN000080: Disconnecting JGroups channel ejb
sso-keycloak-1 keycloak 00:23:19,907 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-2) WFLYUT0019: Host default-host stopping
sso-keycloak-1 keycloak 00:23:19,911 INFO  [org.jboss.as.connector.subsystems.datasources] (MSC service thread 1-1) WFLYJCA0010: Unbound data source [java:jboss/datasources/ExampleDS]
sso-keycloak-1 keycloak 00:23:19,918 INFO  [org.infinispan.manager.DefaultCacheManager] (ServerService Thread Pool -- 58) Stopping cache manager null on sso-keycloak-1
sso-keycloak-1 keycloak 00:23:19,919 INFO  [org.infinispan.CLUSTER] (ServerService Thread Pool -- 58) ISPN000080: Disconnecting JGroups channel ejb
sso-keycloak-1 keycloak 00:23:19,981 INFO  [org.jboss.as.connector.deployers.jdbc] (MSC service thread 1-1) WFLYJCA0019: Stopped Driver service with driver-name = postgresql
sso-keycloak-1 keycloak 00:23:19,981 INFO  [org.jboss.as.connector.deployers.jdbc] (MSC service thread 1-1) WFLYJCA0019: Stopped Driver service with driver-name = h2
sso-keycloak-1 keycloak 00:23:19,978 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-2) WFLYUT0008: Undertow HTTP listener default suspending
sso-keycloak-1 keycloak 00:23:19,983 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-2) WFLYUT0007: Undertow HTTP listener default stopped, was bound to 0.0.0.0:8080
sso-keycloak-1 keycloak 00:23:19,990 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-1) WFLYUT0004: Undertow 2.2.14.Final stopping
sso-keycloak-0 keycloak 00:23:20,000 INFO  [org.infinispan.CLUSTER] (thread-20,ejb,sso-keycloak-0) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|20] (1) [sso-keycloak-0]
sso-keycloak-0 keycloak 00:23:20,000 INFO  [org.infinispan.CLUSTER] (thread-20,ejb,sso-keycloak-0) ISPN100001: Node sso-keycloak-1 left the cluster
sso-keycloak-1 keycloak 00:23:20,001 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-2) WFLYSRV0028: Stopped deployment keycloak-server.war (runtime-name: keycloak-server.war) in 151ms
sso-keycloak-0 keycloak 00:23:20,001 INFO  [org.infinispan.CLUSTER] (thread-20,ejb,sso-keycloak-0) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|20] (1) [sso-keycloak-0]
sso-keycloak-0 keycloak 00:23:20,001 INFO  [org.infinispan.CLUSTER] (thread-20,ejb,sso-keycloak-0) ISPN100001: Node sso-keycloak-1 left the cluster
sso-keycloak-0 keycloak 00:23:20,002 INFO  [org.infinispan.CLUSTER] (thread-20,ejb,sso-keycloak-0) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|20] (1) [sso-keycloak-0]
sso-keycloak-0 keycloak 00:23:20,002 INFO  [org.infinispan.CLUSTER] (thread-20,ejb,sso-keycloak-0) ISPN100001: Node sso-keycloak-1 left the cluster
sso-keycloak-0 keycloak 00:23:20,002 INFO  [org.infinispan.CLUSTER] (thread-20,ejb,sso-keycloak-0) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|20] (1) [sso-keycloak-0]
sso-keycloak-0 keycloak 00:23:20,002 INFO  [org.infinispan.CLUSTER] (thread-20,ejb,sso-keycloak-0) ISPN100001: Node sso-keycloak-1 left the cluster
sso-keycloak-0 keycloak 00:23:20,003 INFO  [org.infinispan.CLUSTER] (thread-20,ejb,sso-keycloak-0) ISPN000094: Received new cluster view for channel ejb: [sso-keycloak-0|20] (1) [sso-keycloak-0]
sso-keycloak-0 keycloak 00:23:20,003 INFO  [org.infinispan.CLUSTER] (thread-20,ejb,sso-keycloak-0) ISPN100001: Node sso-keycloak-1 left the cluster
sso-keycloak-1 keycloak 00:23:20,081 INFO  [org.jboss.as] (MSC service thread 1-2) WFLYSRV0050: Keycloak 16.1.0 (WildFly Core 18.0.0.Final) stopped in 231ms
sso-keycloak-1 keycloak *** JBossAS process (591) received TERM signal ***
sso-keycloak-1 keycloak 

Keycloak-mysql-server setup

Hello

I have setup a Keycloak-mysql server with a external mysql DB.

I would like to initialize the Keycloak DB with the execution of  "curl" command for Keycloak Admin Rest API. do you have some example about this?

I am trying something similar to this:
curl -vXi POST http://admin:admin@localhost:8081/auth/admin/realms/ -d @keycloak.json --header "Content-Type: application/json" but I have different issues related to auth token.

Thanks in advance
Regards

ubi8 over ubi8-minimal for SSSD

Description

The container from jboss serves 95% of our needs. The other 5% is we want to implement SSSD but the only way to do that is to install through yum (or dnf I suppose) some packages which also require that systemd be running as well.

Looking through the documentation you mention it is built upon ubi8-minimal but ubi8 would provide what we need. Is there a way to either on our end somehow build keycloak on top of that or to provide a tag for building with ubi8 over ubi8-minimal?

Discussion

keycloak/keycloak#9379

Motivation

It allows us to take full advantage of all of keycloak's features.

Details

I don't fully understand this well but it looks like the only change needed is in the Dockerfile from ubi8-minimal to ubi8

keycloak-adapter-wildfly:1.3.1.Final fails to start

Here is the log:

$ docker run jboss/keycloak-adapter-wildfly:1.3.1.Final
=========================================================================

  JBoss Bootstrap Environment

  JBOSS_HOME: /opt/jboss/wildfly

  JAVA: /usr/lib/jvm/java/bin/java

  JAVA_OPTS:  -server -XX:+UseCompressedOops  -server -XX:+UseCompressedOops -Xms64m -Xmx512m -XX:MaxPermSize=256m -Djava.net.preferIPv4Stack=true -Djboss.modules.system.pkgs=org.jboss.byteman -Djava.awt.headless=true

=========================================================================

OpenJDK 64-Bit Server VM warning: ignoring option MaxPermSize=256m; support was removed in 8.0
13:39:54,725 INFO  [org.jboss.modules] (main) JBoss Modules version 1.4.3.Final
13:39:55,283 INFO  [org.jboss.msc] (main) JBoss MSC version 1.2.6.Final
13:39:55,391 INFO  [org.jboss.as] (MSC service thread 1-1) WFLYSRV0049: WildFly Full 9.0.0.Final (WildFly Core 1.0.0.Final) starting
13:39:56,104 ERROR [org.jboss.as.server] (Controller Boot Thread) WFLYSRV0055: Caught exception during boot: org.jboss.as.controller.persistence.ConfigurationPersistenceException: WFLYCTL0085: Failed to parse configuration
    at org.jboss.as.controller.persistence.XmlConfigurationPersister.load(XmlConfigurationPersister.java:131) [wildfly-controller-1.0.0.Final.jar:1.0.0.Final]
    at org.jboss.as.server.ServerService.boot(ServerService.java:350) [wildfly-server-1.0.0.Final.jar:1.0.0.Final]
    at org.jboss.as.controller.AbstractControllerService$1.run(AbstractControllerService.java:271) [wildfly-controller-1.0.0.Final.jar:1.0.0.Final]
    at java.lang.Thread.run(Thread.java:745) [rt.jar:1.8.0_45]
Caused by: javax.xml.stream.XMLStreamException: WFLYCTL0083: Failed to load module org.keycloak.keycloak-subsystem
    at org.jboss.as.controller.parsing.ExtensionXml.parseExtensions(ExtensionXml.java:155) [wildfly-controller-1.0.0.Final.jar:1.0.0.Final]
    at org.jboss.as.server.parsing.StandaloneXml.readServerElement_1_4(StandaloneXml.java:433) [wildfly-server-1.0.0.Final.jar:1.0.0.Final]
    at org.jboss.as.server.parsing.StandaloneXml.readElement(StandaloneXml.java:144) [wildfly-server-1.0.0.Final.jar:1.0.0.Final]
    at org.jboss.as.server.parsing.StandaloneXml.readElement(StandaloneXml.java:106) [wildfly-server-1.0.0.Final.jar:1.0.0.Final]
    at org.jboss.staxmapper.XMLMapperImpl.processNested(XMLMapperImpl.java:110) [staxmapper-1.2.0.Final.jar:1.2.0.Final]
    at org.jboss.staxmapper.XMLMapperImpl.parseDocument(XMLMapperImpl.java:69) [staxmapper-1.2.0.Final.jar:1.2.0.Final]
    at org.jboss.as.controller.persistence.XmlConfigurationPersister.load(XmlConfigurationPersister.java:123) [wildfly-controller-1.0.0.Final.jar:1.0.0.Final]
    ... 3 more
Caused by: java.util.concurrent.ExecutionException: javax.xml.stream.XMLStreamException: WFLYCTL0083: Failed to load module
    at java.util.concurrent.FutureTask.report(FutureTask.java:122) [rt.jar:1.8.0_45]
    at java.util.concurrent.FutureTask.get(FutureTask.java:192) [rt.jar:1.8.0_45]
    at org.jboss.as.controller.parsing.ExtensionXml.parseExtensions(ExtensionXml.java:147) [wildfly-controller-1.0.0.Final.jar:1.0.0.Final]
    ... 9 more
Caused by: javax.xml.stream.XMLStreamException: WFLYCTL0083: Failed to load module
    at org.jboss.as.controller.parsing.ExtensionXml.loadModule(ExtensionXml.java:196) [wildfly-controller-1.0.0.Final.jar:1.0.0.Final]
    at org.jboss.as.controller.parsing.ExtensionXml.access$000(ExtensionXml.java:69) [wildfly-controller-1.0.0.Final.jar:1.0.0.Final]
    at org.jboss.as.controller.parsing.ExtensionXml$1.call(ExtensionXml.java:127) [wildfly-controller-1.0.0.Final.jar:1.0.0.Final]
    at org.jboss.as.controller.parsing.ExtensionXml$1.call(ExtensionXml.java:124) [wildfly-controller-1.0.0.Final.jar:1.0.0.Final]
    at java.util.concurrent.FutureTask.run(FutureTask.java:266) [rt.jar:1.8.0_45]
    at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) [rt.jar:1.8.0_45]
    at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) [rt.jar:1.8.0_45]
    at java.lang.Thread.run(Thread.java:745) [rt.jar:1.8.0_45]
    at org.jboss.threads.JBossThread.run(JBossThread.java:320) [jboss-threads-2.2.0.Final.jar:2.2.0.Final]
Caused by: org.jboss.modules.ModuleNotFoundException: org.keycloak.keycloak-subsystem:main
    at org.jboss.modules.ModuleLoader.loadModule(ModuleLoader.java:236) [jboss-modules.jar:1.4.3.Final]
    at org.jboss.as.controller.parsing.ExtensionXml.loadModule(ExtensionXml.java:178) [wildfly-controller-1.0.0.Final.jar:1.0.0.Final]
    ... 8 more

13:39:56,221 FATAL [org.jboss.as.server] (Controller Boot Thread) WFLYSRV0056: Server boot has failed in an unrecoverable manner; exiting. See previous messages for details.
13:39:56,321 INFO  [org.jboss.as.server] (Thread-2) WFLYSRV0220: Server shutdown has been requested.
13:39:56,507 INFO  [org.jboss.as] (MSC service thread 1-1) WFLYSRV0050: WildFly Full 9.0.0.Final (WildFly Core 1.0.0.Final) stopped in 102ms

Permissions Error on exporting realm from docker container instance via standalone.sh

Describe the bug

I am trying to export a realm to a JSON file from the latest jboss/keycloak docker container but I am running into permissions errors. I suspect I am doing something wrong but I haven't been able to figure it out and I was hoping you might know or be able to redirect me

Version

jboss/keycloak:16.1.1

Expected behavior

I expected the export command to produce the json file in the bound directory with either an empty array of users or just the admin user

Actual behavior

I ran into a permissions error (see below)

 INFO  [org.keycloak.services] (ServerService Thread Pool -- 52) KC-SERVICES0034: Export of realm 'PORI' requested.
 INFO  [org.keycloak.exportimport.singlefile.SingleFileExportProvider] (ServerService Thread Pool -- 52) Exporting realm 'PORI' into file /tmp/realm_export_PORI.json
๏ฟฝ[0m๏ฟฝ[31m21:37:42,598 FATAL [org.keycloak.services] (ServerService Thread Pool -- 52) Error during startup: java.lang.RuntimeException: Error during export/import: /tmp/realm_export_PORI.json (Permission denied)
	at [email protected]//org.keycloak.exportimport.util.ExportImportSessionTask.run(ExportImportSessionTask.java:37)
	at [email protected]//org.keycloak.models.utils.KeycloakModelUtils.runJobInTransaction(KeycloakModelUtils.java:239)
	at [email protected]//org.keycloak.exportimport.singlefile.SingleFileExportProvider.exportRealm(SingleFileExportProvider.java:74)
	at [email protected]//org.keycloak.exportimport.ExportImportManager.runExport(ExportImportManager.java:105)
	at [email protected]//org.keycloak.services.resources.KeycloakApplication.startup(KeycloakApplication.java:144)
	at [email protected]//org.keycloak.provider.wildfly.WildflyPlatform.onStartup(WildflyPlatform.java:36)
	at [email protected]//org.keycloak.services.resources.KeycloakApplication.<init>(KeycloakApplication.java:114)
	at java.base/jdk.internal.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
	at java.base/jdk.internal.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45)
	at java.base/java.lang.reflect.Constructor.newInstance(Constructor.java:490)
	at [email protected]//org.jboss.resteasy.core.ConstructorInjectorImpl.constructOutsideRequest(ConstructorInjectorImpl.java:225)
	at [email protected]//org.jboss.resteasy.core.ConstructorInjectorImpl.construct(ConstructorInjectorImpl.java:209)
	at [email protected]//org.jboss.resteasy.core.providerfactory.Utils.createProviderInstance(Utils.java:102)
	at [email protected]//org.jboss.resteasy.core.providerfactory.ResteasyProviderFactoryImpl.createProviderInstance(ResteasyProviderFactoryImpl.java:1385)
	at [email protected]//org.jboss.resteasy.core.ResteasyDeploymentImpl.createApplication(ResteasyDeploymentImpl.java:418)
	at [email protected]//org.jboss.resteasy.core.ResteasyDeploymentImpl.initializeObjects(ResteasyDeploymentImpl.java:265)
	at [email protected]//org.jboss.resteasy.core.ResteasyDeploymentImpl.startInternal(ResteasyDeploymentImpl.java:137)
	at [email protected]//org.jboss.resteasy.core.ResteasyDeploymentImpl.start(ResteasyDeploymentImpl.java:121)
	at [email protected]//org.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.init(ServletContainerDispatcher.java:144)
	at [email protected]//org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.init(HttpServletDispatcher.java:42)
	at [email protected]//io.undertow.servlet.core.LifecyleInterceptorInvocation.proceed(LifecyleInterceptorInvocation.java:117)
	at org.wildfly.security.elytron-web.undertow-server-servlet@1.10.1.Final//org.wildfly.elytron.web.undertow.server.servlet.RunAsLifecycleInterceptor.doIt(RunAsLifecycleInterceptor.java:70)
	at org.wildfly.security.elytron-web.undertow-server-servlet@1.10.1.Final//org.wildfly.elytron.web.undertow.server.servlet.RunAsLifecycleInterceptor.init(RunAsLifecycleInterceptor.java:76)
	at [email protected]//io.undertow.servlet.core.LifecyleInterceptorInvocation.proceed(LifecyleInterceptorInvocation.java:103)
	at [email protected]//io.undertow.servlet.core.ManagedServlet$DefaultInstanceStrategy.start(ManagedServlet.java:309)
	at [email protected]//io.undertow.servlet.core.ManagedServlet.createServlet(ManagedServlet.java:145)
	at [email protected]//io.undertow.servlet.core.DeploymentManagerImpl$2.call(DeploymentManagerImpl.java:588)
	at [email protected]//io.undertow.servlet.core.DeploymentManagerImpl$2.call(DeploymentManagerImpl.java:559)
	at [email protected]//io.undertow.servlet.core.ServletRequestContextThreadSetupAction$1.call(ServletRequestContextThreadSetupAction.java:42)
	at [email protected]//io.undertow.servlet.core.ContextClassLoaderSetupAction$1.call(ContextClassLoaderSetupAction.java:43)
	at [email protected]//org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1544)
	at [email protected]//org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1544)
	at [email protected]//org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1544)
	at [email protected]//org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1544)
	at [email protected]//io.undertow.servlet.core.DeploymentManagerImpl.start(DeploymentManagerImpl.java:601)
	at [email protected]//org.wildfly.extension.undertow.deployment.UndertowDeploymentService.startContext(UndertowDeploymentService.java:106)
	at [email protected]//org.wildfly.extension.undertow.deployment.UndertowDeploymentService$1.run(UndertowDeploymentService.java:87)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at [email protected]//org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35)
	at [email protected]//org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:1990)
	at [email protected]//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1486)
	at [email protected]//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1377)
	at java.base/java.lang.Thread.run(Thread.java:829)
	at [email protected]//org.jboss.threads.JBossThread.run(JBossThread.java:513)
Caused by: java.io.FileNotFoundException: /tmp/realm_export_PORI.json (Permission denied)
	at java.base/java.io.FileOutputStream.open0(Native Method)
	at java.base/java.io.FileOutputStream.open(FileOutputStream.java:298)
	at java.base/java.io.FileOutputStream.<init>(FileOutputStream.java:237)
	at java.base/java.io.FileOutputStream.<init>(FileOutputStream.java:187)
	at [email protected]//org.keycloak.exportimport.singlefile.SingleFileExportProvider.writeToFile(SingleFileExportProvider.java:98)
	at [email protected]//org.keycloak.exportimport.singlefile.SingleFileExportProvider.access$000(SingleFileExportProvider.java:41)
	at [email protected]//org.keycloak.exportimport.singlefile.SingleFileExportProvider$2.runExportImportTask(SingleFileExportProvider.java:80)
	at [email protected]//org.keycloak.exportimport.util.ExportImportSessionTask.run(ExportImportSessionTask.java:35)
	... 45 more

 INFO  [org.jboss.as.server] (Thread-1) WFLYSRV0220: Server shutdown has been requested via an OS signal

How to Reproduce?

I started the container with the following command, importing a previous realm export (does not contain any users). That export file is here: https://github.com/bcgsc/pori/blob/master/demo/kc_realm_export.json

export KEYCLOAK_USER=admin
export KEYCLOAK_PASSWORD=admin
export KEYCLOAK_IMPORT=/realm_data/demo_export.json
CWD=$(pwd)

docker run \
    -e KEYCLOAK_USER=$KEYCLOAK_USER \
    -e KEYCLOAK_PASSWORD=$KEYCLOAK_PASSWORD \
    -e KEYCLOAK_IMPORT=$KEYCLOAK_IMPORT \
    --mount "type=bind,src=$CWD/tmp/container_output,dst=/tmp" \
    -p 8443:8334 \
    -p 8888:8080 \
    --mount "type=bind,src=/path/to/demo/kc_realm_export.json,dst=${KEYCLOAK_IMPORT},readonly" \
    -d \
    jboss/keycloak:16.1.1

Then I ran the export command like so (using the CONTAINER_ID from the newly spun up jboss/keycloak image in the previous command)

REALM_NAME=PORI
REALM_FILE=/tmp/realm_export_${REALM_NAME}.json

docker exec -it CONTAINER_ID /opt/jboss/keycloak/bin/standalone.sh \
    -Djboss.socket.binding.port-offset=100 \
    -Dkeycloak.migration.action=export \
    -Dkeycloak.migration.provider=singleFile \
    -Dkeycloak.migration.realmName=$REALM_NAME \
    -Dkeycloak.migration.usersExportStrategy=REALM_FILE \
    -Dkeycloak.migration.file=$REALM_FILE

Anything else?

The reason I am trying to do this is so that I can have a realm import that includes some default users. This will be helpful when setting up keycloak as part of docker-compose on a development stack where you just need some users for testing

Docker version 18.09.6, build 481bc77156

Repeated permission in standalone*.xml

Describe the bug

The line <permission class-name="org.jboss.ejb.client.RemoteEJBPermission" module="org.jboss.ejb-client"/> seems to be repeated under the default-permissions permission-set section of the standalone XML files.

Version

15.1.0

Expected behavior

A single line, instead of a duplicated line.

Actual behavior

Duplicated line.

How to Reproduce?

docker run -p 8080:8080 jboss/keycloak:15.1.0

exec into container

cat /opt/jboss/keycloak/standalone/configuration/standalone-ha.xml | grep ejb-client

Anything else?

Thanks for all your work on this project.

Export action parameters are ignored

Using ./standalone.sh -Dkeycloak.migration.action=export -Dkeycloak.migration.provider=dir -Dkeycloak.migration.dir=/tmp as indicated in docs results in a normal startup, but the export action arguments seem to be completely ignored.

expose ingress path configuration i.e. web-context using environment variable

Description

default subsystem context is / i.e. container runs fine if path = / in ingress. To change ingress path to something else like /auth changes are required as mentioned at https://www.keycloak.org/docs/latest/server_installation/#managing-the-subsystem-configuration
<web-context>auth</web-context>

Discussion

No response

Motivation

normally every frequently used configuration should be exposed via environment variables to make container easy to use without requiring any change in application config files inside container.

Details

No response

Proper readiness and liveness probes for Dist.X

Description

The new Keycloak.X expose some basic health endpoints, we should investigate and model on top of those proper default readiness and liveness probes for the Keycloak deployment.

Discussion

No response

Motivation

No response

Details

No response

Can't get Docker container running in multi-node cluster in AWS

Describe the bug

I have three EC2 instances:
instance A - docker with nginx container - private IP address 1.2.3.4
instance B and C - docker with keycloak containers - private IP address 1.2.3.5 and 1.2.3.6
RDS instance running MySQL 8 - host foo.us-east-1.rds.amazonaws.com

All in the same VPC. Instance B and C are in different subnets (different availability zones), but can communicate with each other via port 80 and 7600.

The docker instances launch without issue with the following command:

  docker run \
  --name test-node-1 \
  -e DB_PORT=3306 \
  -e PROXY_ADDRESS_FORWARDING=true \
  -e DB_VENDOR=mysql \
  -e DB_DATABASE=keycloak \
  -e DB_ADDR=foo.us-east-1.rds.amazonaws.com \
  -e KEYCLOAK_STATISTICS=all \
  -e DB_USER=keycloak \
  -e KEYCLOAK_USER=kcuser \
  -e DB_PASSWORD=... \
  -e KEYCLOAK_PASSWORD=... \
  -p 80:8080 \
  -p 7600:7600 \
  jboss/keycloak:16.1.0

Both containers launch fine, but they aren't talking to each other.

Adding the following three environment variables:

  -e JGROUPS_DISCOVERY_EXTERNAL_IP=1.2.3.5 \
  -e JGROUPS_DISCOVERY_PROTOCOL=TCPPING \
  -e JGROUPS_DISCOVERY_PROPERTIES='1.2.3.5[7600],1.2.3.6[7600]' \

Causes Keycloak to crash on startup:

=========================================================================

  Using MySQL database

=========================================================================

17:01:35,028 INFO  [org.jboss.modules] (CLI command executor) JBoss Modules version 2.0.0.Final
17:01:35,124 INFO  [org.jboss.msc] (CLI command executor) JBoss MSC version 1.4.13.Final
17:01:35,134 INFO  [org.jboss.threads] (CLI command executor) JBoss Threads version 2.4.0.Final
17:01:35,267 INFO  [org.jboss.as] (MSC service thread 1-2) WFLYSRV0049: Keycloak 16.1.0 (WildFly Core 18.0.0.Final) starting
...
17:01:43,320 INFO  [org.jboss.as.server] (Controller Boot Thread) WFLYSRV0212: Resuming server
17:01:43,322 INFO  [org.jboss.as] (Controller Boot Thread) WFLYSRV0025: Keycloak 16.1.0 (WildFly Core 18.0.0.Final) started in 3261ms - Started 49 of 79 services (31 services are lazy, passive or on-demand)
The batch executed successfully
17:01:43,560 INFO  [org.jboss.as] (MSC service thread 1-1) WFLYSRV0050: Keycloak 16.1.0 (WildFly Core 18.0.0.Final) stopped in 21ms
Setting JGroups discovery to TCPPING with properties {1.2.3.5[7600],1.2.3.6[7600]}

That last log line hangs for a few seconds, and then the process crashes.

Version

16.1.0

Expected behavior

Both keycloak containers start up, and negotiate cluster operations with each other.

Actual behavior

The first instance crashes on startup (I never get to the second server).

How to Reproduce?

Launch a stock container from https://hub.docker.com/layers/jboss/keycloak/16.1.0/images/sha256-6ecb9492224c6cfbb55d43f64a5ab634145d8cc1eba14eae8c37e3afde89546e?context=explore with the following environment variables:

  -e JGROUPS_DISCOVERY_EXTERNAL_IP=(instance 1 IP) \
  -e JGROUPS_DISCOVERY_PROTOCOL=TCPPING \
  -e JGROUPS_DISCOVERY_PROPERTIES='(instance 1 IP)[7600],(instance 2 IP)[7600]' \

Anything else?

No response

Built in support for SQL Server Integrated Authentication

Description

I have SQL Server Integrated Authentication working with Kerberos and Active Directory inside a rootless keycloak container running on podman. This is the preferred way to connect to SQL Server in production and uses a kerberos user with no username or password property on the JDBC connect string. Currently my solution wraps and ignores variables in docker-entrypoint.sh and Dockerfile. I would prefer to modify it directly and can open a PR if this would be erncouraged. The main issue is that it requires a kinit statement inside the container prior to JVM launch and requires the krb5-workstation dependency.

The steps outlined below do not work with wildfly so extra work is needed to map the JAAS config into standalone*.xml

(Assumes host is setup for kerberos logins already. This makes krb5.conf setup and other testing easier)

  1. Include krb-workstation in the image (This is also needed for other kerberos use cases also)
  2. Map /etc/krb5.conf from the host to the container
  3. Set JAVA_OPTS (or tell user to use this) -Djava.security.auth.login.config=/tmp/keytabs/jaas.conf -Djava.security.krb5.conf=/etc/krb5.conf
  4. Set JDBC_PARAMS to include integratedSecurity=true;authenticationScheme=JavaKerberos
  5. Obtain a keytab file for the SQL Server user principal from an AD admin and reference this from the jaas config
  6. This is the kludgy part without enhancement... before starting keycloak, but inside the container, run kinit to initialize and cache the principal so it will be available when the JVM starts. Today I do this with a custom entryPoint which calls kinit and then invokes docker-entrypoint.sh but would be better to modify the real version of docker-entrypoint.sh to fork on this option. Also, when using integratedSecurity its not necessary to pass JDBC user and pass to connection string.

Discussion

No response

Motivation

No response

Details

No response

Tag 17.0.0 points to wrong commit with broken Dockerfile

Describe the bug

The server/Dockerfile of the commit tagged with 17.0.0 is broken since it does not contain the -legacy suffix in the artifact name.

I was about to create a PR to fix it, but realized that this has already been fixed with 455131d5ed24238a6e0e90cd25ffe44f307f140f9.

Based on this there is another commit that sets the version to 17.0.0.
Looks like this is the commit that should have the tag 17.0.0.

Version

17.0.0

Expected behavior

Tag 17.0.0 points to a commit in the main branch, probably 4d7d01e0bb18e4f2b2593150955453d05bb0ede9 is the right one.

Actual behavior

Tag 17.0.0 points to a commit that is in no branch in the repo.

The warning "This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository." is shown.

The server/Dockerfile does not contain the new artifcat name, therefore the file is not usable.

How to Reproduce?

git checkout 17.0.0; 
cat server/Dockerfile

Anything else?

No response

NOT support mutil-instances

Describe the bug

NOT support mutil-instances in kubernetes.

The docker image shows that the keycloak runs in the standalone clustered mode by default. Technically, keycloak has many instances will be running smoothly in kubernetes cluster meanwhile I am doing that, it does not work, however.

Details

docker_image_version: quay.io/keycloak/keycloak:16.1.0
kubernetes_version: 1.21.5
keycloak_manifest:

mysql_manifest:

Expected behavior

Running three keycloak instances, I can login its website.

Actual behavior

Running three keycloak instances, I cannot login its website. The browser error infomation

Send output of jgroups discovery scripts to stderr/stdout

Description

If JGROUPS_DISCOVERY_PROTOCOL is set, the container (from jgroups.sh) will look for a discovery script and run it. Even if it doesn't exist, a default CLI script will be run.

Currently the output from this script is always sent to /dev/null. However it seems reasonable people would want to debug the output of the scripts as they run - whether for typos in the script, syntax errors, or configuration/execution problems.

Rather than turn it on for everyone, proposal is to use an environment variable to turn the output on on demand.

Discussion

No response

Motivation

Scripts that enable different discovery protocols (e.g. TCPPING) are not trivial or even well documented. As such, it is normal to iterate on and debug them, but that currently isn't possible if the output is swallowed by the calling jgroups.sh script. Removing the redirect to /dev/null will allow the output to go to stdout/stderr, and show in the docker logs.

Details

Proposal is to allow a JGROUPS_DISCOVERY_CLI_LOGGING environment variable. If this is set to true, the script output will not be redirected, and will instead go to stdout/stderr as normal.

If the environment variable is not set, or set to anything other than true, operation will continue as normal (output will be directed to /dev/null).

CVE-2022-21724 vulnerability related to postgresql dependency

Describe the bug

AWS Inspector has found a vulnerability related to the postgresql driver dependency.
The details of said vulnerability can be found here and can be sorted out if that dependency is not between this versions 42.3.0 and 42.3.2 or before 42.2.25.

Version

1.6.1

Expected behavior

No response

Actual behavior

No response

How to Reproduce?

No response

Anything else?

No response

DB Vendor Oracle connection error

Describe the bug

There is an error while connecting to Oracle DB using environment variables, in which the error received states taht the SID is not available. I fixed this issue by editing "/opt/jboss/tools/cli/databases/oracle/change-database.cli", and replacing in line 2 the connection url:
OLD VALUE:
connection-url=jdbc:oracle:thin:@${env.DB_ADDR:oracle}:${env.DB_PORT:1521}:${env.DB_DATABASE:XE}${env.JDBC_PARAMS:}
NEW VALUE:
connection-url=jdbc:oracle:thin:@${env.DB_ADDR:oracle}:${env.DB_PORT:1521}/${env.DB_DATABASE:XE}${env.JDBC_PARAMS:}
CHANGE:
Replace ":" with "/" between DB_PORT and DB_DATABASE.

Version

16.1.1

Expected behavior

Connection to Oracle DB successful - SID identified

Actual behavior

Connection to Oracle DB not successful - SID not identified

How to Reproduce?

Setup environment variables for DB_VENDOR oracle. The Oracle DB version tested on is ORACLE 19c.

Anything else?

No response

TLSv1.3 support

Describe the bug

Vulnerable to Logjam attack with TLSv1.2

Run the conatiner.
Go to homepage of keycloak running on protocol https
Go to Developer tools, then Securuty tab
By default its TLSv1.2
How to configute it to run with TLSv1.3?

Version

all

Expected behavior

No response

Actual behavior

No response

How to Reproduce?

version: "2"
services:
postgresql:
image: "docker.io/bitnami/postgresql:11"
environment:
- ALLOW_EMPTY_PASSWORD=yes
- POSTGRESQL_USERNAME=bn_keycloak
- POSTGRESQL_DATABASE=bitnami_keycloak
volumes:
- "postgresql_data:/bitnami/postgresql"
keycloak-1:
image: docker.io/bitnami/keycloak:latest
ports:
- "80:8080"
- "8443:8443"
environment:
- KEYCLOAK_CREATE_ADMIN_USER=true
- KEYCLOAK_JGROUPS_DISCOVERY_PROTOCOL=JDBC_PING
- 'KEYCLOAK_JGROUPS_DISCOVERY_PROPERTIES=datasource_jndi_name=>java:jboss/datasources/KeycloakDS, initialize_sql=>"CREATE TABLE IF NOT EXISTS JGROUPSPING ( own_addr varchar(200) NOT NULL, cluster_name varchar(200) NOT NULL, created timestamp default current_timestamp, ping_data BYTEA, constraint PK_JGROUPSPING PRIMARY KEY (own_addr, cluster_name))"'
- KEYCLOAK_CACHE_OWNERS_COUNT=3
- KEYCLOAK_AUTH_CACHE_OWNERS_COUNT=3
depends_on:
- postgresql
volumes:
postgresql_data:
driver: local``

Anything else?

https://github.com/bitnami/bitnami-docker-keycloak/issues/51

Update default container to Quarkus

Description

  • Rename server to server-legacy
  • Rename server-x to server

Keycloak Quarkus distribution will be published to:

  • quay.io/keycloak/keycloak:latest
  • quay.io/keycloak/keycloak:<VERSION>

Keycloak legacy WildFly distribution will be published to:

  • quay.io/keycloak/keycloak:<VERSION>-legacy
  • quay.io/keycloak/keycloak:legacy
  • docker.io/jboss/keycloak:<VERSION>-legacy
  • docker.io/jboss/keycloak:legacy

Unable to build with Javascript Authentication Provider

Describe the bug

After adding Javascript Provider jar to the providers folder, calling kc.sh build results in an error.

Version

17.0.0

Expected behavior

Keycloak should build successfully

Actual behavior

kc.sh build results in the following error:
` => ERROR [builder2 4/4] RUN /opt/keycloak/bin/kc.sh build 4.6s

[builder2 4/4] RUN /opt/keycloak/bin/kc.sh build:
#9 1.001 Updating the configuration and installing your custom providers, if any. Please wait.
#9 4.484 ERROR: Failed to run 'build' command.
#9 4.484 ERROR: io.quarkus.builder.BuildException: Build failure: Build failed due to errors
#9 4.484 [error]: Build step org.keycloak.quarkus.deployment.KeycloakProcessor#configureProviders threw an exception: java.lang.NullPointerException: entry
#9 4.484 at java.base/java.util.Objects.requireNonNull(Objects.java:246)
#9 4.484 at java.base/java.util.zip.ZipFile.getInputStream(ZipFile.java:373)
#9 4.484 at java.base/java.util.jar.JarFile.getInputStream(JarFile.java:849)
#9 4.484 at org.keycloak.quarkus.deployment.KeycloakProcessor.createDeployableScriptProvider(KeycloakProcessor.java:535)
#9 4.484 at org.keycloak.quarkus.deployment.KeycloakProcessor.loadDeployedScriptProviders(KeycloakProcessor.java:510)
#9 4.484 at org.keycloak.quarkus.deployment.KeycloakProcessor.loadFactories(KeycloakProcessor.java:457)
#9 4.484 at org.keycloak.quarkus.deployment.KeycloakProcessor.configureProviders(KeycloakProcessor.java:254)
#9 4.484 at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
#9 4.484 at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
#9 4.484 at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
#9 4.484 at java.base/java.lang.reflect.Method.invoke(Method.java:566)
#9 4.484 at io.quarkus.deployment.ExtensionLoader$2.execute(ExtensionLoader.java:882)
#9 4.484 at io.quarkus.builder.BuildContext.run(BuildContext.java:277)
#9 4.484 at org.jboss.threads.ContextHandler$1.runWith(ContextHandler.java:18)
#9 4.484 at org.jboss.threads.EnhancedQueueExecutor$Task.run(EnhancedQueueExecutor.java:2449)
#9 4.484 at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1478)
#9 4.484 at java.base/java.lang.Thread.run(Thread.java:829)
#9 4.484 at org.jboss.threads.JBossThread.run(JBossThread.java:501)
#9 4.484
#9 4.484 ERROR: Build failure: Build failed due to errors
#9 4.484 [error]: Build step org.keycloak.quarkus.deployment.KeycloakProcessor#configureProviders threw an exception: java.lang.NullPointerException: entry
#9 4.484 at java.base/java.util.Objects.requireNonNull(Objects.java:246)
#9 4.484 at java.base/java.util.zip.ZipFile.getInputStream(ZipFile.java:373)
#9 4.484 at java.base/java.util.jar.JarFile.getInputStream(JarFile.java:849)
#9 4.484 at org.keycloak.quarkus.deployment.KeycloakProcessor.createDeployableScriptProvider(KeycloakProcessor.java:535)
#9 4.484 at org.keycloak.quarkus.deployment.KeycloakProcessor.loadDeployedScriptProviders(KeycloakProcessor.java:510)
#9 4.484 at org.keycloak.quarkus.deployment.KeycloakProcessor.loadFactories(KeycloakProcessor.java:457)
#9 4.484 at org.keycloak.quarkus.deployment.KeycloakProcessor.configureProviders(KeycloakProcessor.java:254)
#9 4.484 at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
#9 4.484 at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
#9 4.484 at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
#9 4.484 at java.base/java.lang.reflect.Method.invoke(Method.java:566)
#9 4.484 at io.quarkus.builder.BuildContext.run(BuildContext.java:277)
#9 4.484 at org.jboss.threads.ContextHandler$1.runWith(ContextHandler.java:18)
#9 4.484 at org.jboss.threads.EnhancedQueueExecutor$Task.run(EnhancedQueueExecutor.java:2449)
#9 4.484 at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1478)
#9 4.484 at java.base/java.lang.Thread.run(Thread.java:829)
#9 4.484 at org.jboss.threads.JBossThread.run(JBossThread.java:501)
#9 4.484
#9 4.485 ERROR: entry
#9 4.485 For more details run the same command passing the '--verbose' option. Also you can use '--help' to see the details about the usage of the particular command.


executor failed running [/bin/sh -c /opt/keycloak/bin/kc.sh build]: exit code: 1`

How to Reproduce?

Run this docker script with a Javascript Provider jar (specified as JavascriptAuthenticator here):
`FROM quay.io/keycloak/keycloak:17.0.0 as builder

ENV KC_METRICS_ENABLED=true
ENV KC_FEATURES=token-exchange,scripts
ENV KC_DB=postgres

RUN /opt/keycloak/bin/kc.sh build

FROM quay.io/keycloak/keycloak:17.0.0 as builder2
COPY --from=builder /opt/keycloak/lib/quarkus/ /opt/keycloak/lib/quarkus/
COPY ./authenticator/package/JavascriptAuthenticator.jar /opt/keycloak/providers/

RUN /opt/keycloak/bin/kc.sh build

FROM quay.io/keycloak/keycloak:17.0.0
COPY --from=builder2 /opt/keycloak/lib/quarkus/ /opt/keycloak/lib/quarkus/
COPY --from=builder2 /opt/keycloak/providers /opt/keycloak/providers
WORKDIR /opt/keycloak

RUN keytool -genkeypair -storepass password -storetype PKCS12 -keyalg RSA -keysize 2048 -dname "CN=server" -alias server -ext "SAN:c=DNS:localhost,IP:127.0.0.1" -keystore conf/server.keystore

ENTRYPOINT ["/opt/keycloak/bin/kc.sh", "start"]`

Anything else?

No response

Update MS SQL JDBC driver version to 10.2.0

Description

We would like to update the MS SQL JDBC driver to the latest version 10.2.0.

Discussion

No response

Motivation

The currently used driver (8.2.2) is nearly 2 years old.
The newest driver has improved reconnect behaviour also for idle connection (see https://docs.microsoft.com/en-us/sql/connect/jdbc/release-notes-for-the-jdbc-driver). Since we sometimes see issues around this in Azure SQL, we would like to update to the latest version.

Details

Note that there is a breaking change in using TLS as the new default.

Support for schema?

is there any way pass schema as environment variable. I've a multi-tenant application where each tenant is in different schema. Is it possible to configure keycloak for this?

17.0.0 does not start

Describe the bug

Docker container keycloak:17.0.0 does not start any more.

Executing docker run quay.io/keycloak/keycloak:17.0.0 shows usage output:

Keycloak - Open Source Identity and Access Management

Find more information at: https://www.keycloak.org/docs/latest

Usage:

kc.sh [OPTIONS] [COMMAND]

Use this command-line tool to manage your Keycloak cluster.
Make sure the command is available on your "PATH" or prefix it with "./" (e.g.:
"./kc.sh") to execute from the current folder.
...

Version

17.0.0

Expected behavior

Docker container starts keycloak as it did before (<17.0.0).

Actual behavior

Docker container shows usage info, but does not start.

How to Reproduce?

Simply run docker run quay.io/keycloak/keycloak:17.0.0 as documented.

Anything else?

No response

Problems with setting POD ENV: JGROUPS_DISCOVERY_PROPERTIES with namespace+labels

Describe the bug

Hey!

it's either parsing bug or I'm doing something wrong but can't seem to find a way to pass both namespace and labels to select only subset of k8s PODs to form HA cluster. The following cfg:

        - name: JGROUPS_DISCOVERY_PROPERTIES
          value: 'namespace=test-keycloak,labels=app=test-keycloak-blue'

seem gets wrongly parsed i.e. = changes to => for entire thing, and then it obviously fails the HTTP request as well after URL encoding it:
JGroups discovery to kubernetes.KUBE_PING with properties {namespace=>test-keycloak,labels=>app=>test-keycloak-blue}
(...)
WARN [org.jgroups.protocols.kubernetes.KUBE_PING] (ServerService Thread Pool -- 58) failed getting JSON response from Kubernetes Client[masterUrl=https://10.96.0.1:443/api/v1, headers={Authorization=#MASKED:947#}, connectTimeout=5000, readTimeout=30000, operationAttempts=3, operationSleep=1000, streamProvider=org.jgroups.protocols.kubernetes.stream.TokenStreamProvider@7690a9ce] for cluster [ejb], namespace [test-keycloak], labels [app=>test-keycloak-blue]; encountered [java.lang.Exception: 3 attempt(s) with a 1000ms sleep to execute [OpenStream] failed. Last failure was [java.io.IOException: Server returned HTTP response code: 400 for URL: https://10.96.0.1:443/api/v1/namespaces/test-keycloak/pods?labelSelector=app%3D%3Etest-keycloak-blue]]
`

Version

v15.0.2

Expected behavior

The parsing should result in:
JGroups discovery to kubernetes.KUBE_PING with properties {namespace=>test-keycloak,labels=>app=test-keycloak-blue}

Actual behavior

The parsing results in:
JGroups discovery to kubernetes.KUBE_PING with properties {namespace=>test-keycloak,labels=>app=>test-keycloak-blue}

How to Reproduce?

add ENV var onto the pods with namespace + labels:

        - name: JGROUPS_DISCOVERY_PROPERTIES
          value: 'namespace=test-keycloak,labels=app=test-keycloak-blue'

Anything else?

No response

docker-entrypoint.sh config bootstrap idempotency problems lead to crash loops

Describe the bug

Issue TL;DR

Using docker run -v keycloak_conf:/opt/jboss/keycloak/standalone/configuration causes container to crash on subsequent starts after docker rm because of non-idempotent Wildfly CLI scripts (some of which might be custom injected scripts).

Proposal TL;DR

Use a flag file named /opt/jboss/keycloak/standalone/configuration/.configured rather than /opt/jboss/configured to make docker-entrypoint.sh more capable of accurately enforcing that scripts only run once when configuration volumes are used.

Background

docker-entrypoint.sh tries to run lots of scripts (e.g x509.sh, jgroups.sh, autorun.sh) only once to bootstrap configuration. This is done using a flag file called /opt/jboss/configured.

If a docker volume is used for the /opt/jboss/keycloak/standalone/configuration directory (which could be done to drastically speed up starting a container since certificate imports and some other setup steps take quite significant time) several idempotency problems show up and the container cannot be restarted cleanly with docker kill + docker rm + docker run. Using "docker rm is preferred by Redhat Support over docker stop/start" according to https://stackoverflow.com/a/62563081

Since the /opt/jboss/configured file is on ephemeral storage but the configuration is on a volume all the scripts are invoked again by docker-entrypoint.sh on every start of the container, and now all the underlying scripts need to deal with applying changes to configuration that have already been applied.

There are scripts that are not idempotent and cause either errors in the log or outright crashes that lead to repeated crash loops.

Version

12.0.4, 13.0.1, 16.1.0

Expected behavior

Using a configuration volume should still allow the container to be stopped, removed, and then started again. If underlying scripts cannot run more than once there needs to be a more thorough guard than the flag file on ephemeral container storage.

I think it would be highly preferable to have guard file(s) alongside the configuration file(s) themselves and still try to enforce some "run only once" logic in docker-entrypoint.sh simply because the container has several extension points for Wildfly CLI scripts to be injected (for example injecting a TCPPING.cli for JGroups discovery or custom Wildfly startup scripts) and if any of these scripts aren't idempotent they would cause problems on subsequent starts of the container.

Actual behavior

Various Wildfly CLI scripts (e.g. the default JDBC_PING.cli) perform non-idempotent operations, like "/some/wildfly/path:add(...)" without checking if such a node already exists in the configuration.

How to Reproduce?

The specific problem I have is a bit more complicated but in essence this should be reproducible by injecting a custom Wildfly CLI startup script that adds some node to the configuration or by configuring JDBC_PING. Combine that with a configuration volume. The first startup should work fine. Stopping the docker rm:ing the container and then repeating the docker run command should illustrate the above mentioned idempotency problems. Additional environment variables for database connectivity needs to be provided in accordance with https://hub.docker.com/r/jboss/keycloak/. In my case I was using a separate docker container running Postgresql 13.

Reproduce option 1: non-idempotent custom Wildfly CLI script

cat <<'EOF' > wildfly_startup.cli
embed-server --server-config=standalone-ha.xml
/subsystem=logging/logger=org.keycloak.saml:add(level=TRACE)
stop-embedded-server
EOF
# keycloak_conf is an empty/non-existing volume to begin with
docker run --name keycloak \
    -v keycloak_conf:/opt/jboss/keycloak/standalone/configuration \
    -v wildfly_startup.cli:/opt/jboss/startup-scripts/wildfly_startup.cli \
    -p 8087:8080 -p 8443:8443 \
    -e DB_ADDR=172.17.0.1:5432 -e DB_USER=keycloak -e DB_PASSWORD=secret5432 -e DB_DATABASE=keycloak -e DB_VENDOR=postgres \
    jboss/keycloak:16.1.0

Result on second run: Container crashes with this as the final output of the logs.

16:45:17,573 INFO  [org.jboss.as] (Controller Boot Thread) WFLYSRV0025: Keycloak 16.1.0 (WildFly Core 18.0.0.Final) started in 1329ms - Started 49 of 79 services (31 services are lazy, passive or on-demand)
The batch failed with the following error: : 
WFLYCTL0062: Composite operation failed and was rolled back. Steps that failed:
Step: step-9
Operation: /subsystem=datasources/jdbc-driver=postgresql:add(driver-name=postgresql, driver-module-name=org.postgresql.jdbc, driver-xa-datasource-class-name=org.postgresql.xa.PGXADataSource)
Failure: WFLYCTL0212: Duplicate resource [
    ("subsystem" => "datasources"),
    ("jdbc-driver" => "postgresql")
]

16:45:17,661 INFO  [org.jboss.as] (MSC service thread 1-2) WFLYSRV0050: Keycloak 16.1.0 (WildFly Core 18.0.0.Final) stopped in 10ms
Executing cli script: /opt/jboss/startup-scripts/startup_wildfly.cli
WARNING: An illegal reflective access operation has occurred
WARNING: Illegal reflective access by org.wildfly.extension.elytron.SSLDefinitions (jar:file:/opt/jboss/keycloak/modules/system/layers/base/org/wildfly/extension/elytron/main/wildfly-elytron-integration-18.0.0.Final.jar!/) to method com.sun.net.ssl.internal.ssl.Provider.isFIPS()
WARNING: Please consider reporting this to the maintainers of org.wildfly.extension.elytron.SSLDefinitions
WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
WARNING: All illegal access operations will be denied in a future release
{
    "outcome" => "failed",
    "failure-description" => "WFLYCTL0212: Duplicate resource [
    (\"subsystem\" => \"logging\"),
    (\"logger\" => \"org.keycloak.saml\")
]",
    "rolled-back" => true
}

Reproduce option 2: JDBC_PING.cli is not idempotent and neither are TCPPING etc. examples

Note that this is not a "100% correct" setup of JDBC_PING clustering but it does exhibit the non-idempotent behavior of JDBC_PING.cli causing the container to crash.

docker run --name keycloak \
    -v keycloak_conf:/opt/jboss/keycloak/standalone/configuration \
    -e JGROUPS_DISCOVERY_PROTOCOL=JDBC_PING \
    -e JGROUPS_DISCOVERY_PROPERTIES=datasource_jndi_name=java:jboss/datasources/KeycloakDS \
    -p 8087:8080 -p 8443:8443 \
    -e DB_ADDR=172.17.0.1:5432 -e DB_USER=keycloak -e DB_PASSWORD=secret5432 -e DB_DATABASE=keycloak -e DB_VENDOR=postgres \
    jboss/keycloak:16.1.0

Result on second run: Container crashes when running JDBC_PING.cli a second time with the following log output at the end:

17:08:05,889 INFO  [org.jboss.as] (Controller Boot Thread) WFLYSRV0025: Keycloak 16.1.0 (WildFly Core 18.0.0.Final) started in 1212ms - Started 49 of 79 services (31 services are lazy, passive or on-demand)
The batch failed with the following error: : 
WFLYCTL0062: Composite operation failed and was rolled back. Steps that failed:
Step: step-9
Operation: /subsystem=datasources/jdbc-driver=postgresql:add(driver-name=postgresql, driver-module-name=org.postgresql.jdbc, driver-xa-datasource-class-name=org.postgresql.xa.PGXADataSource)
Failure: WFLYCTL0212: Duplicate resource [
    ("subsystem" => "datasources"),
    ("jdbc-driver" => "postgresql")
]

17:08:05,979 INFO  [org.jboss.as] (MSC service thread 1-1) WFLYSRV0050: Keycloak 16.1.0 (WildFly Core 18.0.0.Final) stopped in 10ms
Setting JGroups discovery to JDBC_PING with properties {datasource_jndi_name=>java:jboss/datasources/KeycloakDS}

Anything else?

Workaround

Build a customer version of the image with a revised docker-entrypoint.sh:

--- ../../git/keycloak-containers/server/tools/docker-entrypoint.sh	2021-04-15 16:43:58.438152389 +0200
+++ docker-entrypoint.sh	2022-01-13 18:22:21.836870053 +0100
@@ -233,14 +233,12 @@
 echo "========================================================================="
 echo ""
 
-configured_file="/opt/jboss/configured"
+configured_file="/opt/jboss/keycloak/standalone/configuration/.configured"
 if [ ! -e "$configured_file" ]; then
-    touch "$configured_file"
-
+    touch "$configured_file" || echo "FAILED TO WRITE .configured FLAG!"
     if [ "$DB_NAME" != "Embedded H2" ]; then
       /bin/sh /opt/jboss/tools/databases/change-database.sh $DB_VENDOR
     fi
-	
     /opt/jboss/tools/x509.sh
     /opt/jboss/tools/jgroups.sh
     /opt/jboss/tools/infinispan.sh

Dockerfile

FROM jboss/keycloak:16.1.0
COPY docker-entrypoint.sh /opt/jboss/tools/

Web server don't respond on port 8080

When I try to use keycloak + examples, the Wildfly server is well started but I can't access it from the browser:

docker run -p 127.0.0.1:8080:8080 jboss/keycloak-examples
=========================================================================

  JBoss Bootstrap Environment

  JBOSS_HOME: /opt/jboss/keycloak-demo/keycloak

  JAVA: /usr/lib/jvm/java/bin/java

  JAVA_OPTS:  -server -Xms64m -Xmx512m -XX:MaxPermSize=256m -Djava.net.preferIPv4Stack=true -Djboss.modules.system.pkgs=org.jboss.byteman -Djava.awt.headless=true

=========================================================================

12:52:17,524 INFO  [org.jboss.modules] (main) JBoss Modules version 1.3.3.Final
12:52:17,799 INFO  [org.jboss.msc] (main) JBoss MSC version 1.2.2.Final
12:52:17,887 INFO  [org.jboss.as] (MSC service thread 1-6) JBAS015899: WildFly 8.2.0.Final "Tweek" starting
12:52:18,905 INFO  [org.jboss.as.repository] (ServerService Thread Pool -- 26) JBAS014900: Content added at location /opt/jboss/keycloak-demo/keycloak/standalone/data/content/a0/7ee70acc5d226bc2cec4b13e56d0a8cdbdba81/content
12:52:18,956 INFO  [org.jboss.as.server] (Controller Boot Thread) JBAS015888: Creating http management service using socket-binding (management-http)
12:52:18,978 INFO  [org.xnio] (MSC service thread 1-8) XNIO version 3.3.0.Final
12:52:18,988 INFO  [org.xnio.nio] (MSC service thread 1-8) XNIO NIO Implementation Version 3.3.0.Final
12:52:19,015 INFO  [org.wildfly.extension.io] (ServerService Thread Pool -- 32) WFLYIO001: Worker 'default' has auto-configured to 16 core threads with 128 task threads based on your 8 available processors
12:52:19,021 INFO  [org.jboss.as.clustering.infinispan] (ServerService Thread Pool -- 33) JBAS010280: Activating Infinispan subsystem.
12:52:19,036 WARN  [org.jboss.as.txn] (ServerService Thread Pool -- 47) JBAS010153: Node identifier property is set to the default value. Please make sure it is unique.
12:52:19,037 INFO  [org.jboss.as.security] (ServerService Thread Pool -- 46) JBAS013171: Activating Security Subsystem
12:52:19,038 INFO  [org.jboss.as.naming] (ServerService Thread Pool -- 41) JBAS011800: Activating Naming Subsystem
12:52:19,050 INFO  [org.jboss.as.jsf] (ServerService Thread Pool -- 39) JBAS012615: Activated the following JSF Implementations: [main]
12:52:19,051 INFO  [org.jboss.as.webservices] (ServerService Thread Pool -- 49) JBAS015537: Activating WebServices Extension
12:52:19,058 INFO  [org.jboss.as.security] (MSC service thread 1-13) JBAS013170: Current PicketBox version=4.0.21.Final
12:52:19,089 INFO  [org.jboss.as.connector.logging] (MSC service thread 1-6) JBAS010408: Starting JCA Subsystem (IronJacamar 1.1.9.Final)
12:52:19,129 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-1) JBAS017502: Undertow 1.1.0.Final starting
12:52:19,130 INFO  [org.wildfly.extension.undertow] (ServerService Thread Pool -- 48) JBAS017502: Undertow 1.1.0.Final starting
12:52:19,149 INFO  [org.jboss.as.connector.subsystems.datasources] (ServerService Thread Pool -- 28) JBAS010403: Deploying JDBC-compliant driver class org.h2.Driver (version 1.3)
12:52:19,302 INFO  [org.jboss.as.connector.deployers.jdbc] (MSC service thread 1-15) JBAS010417: Started Driver service with driver-name = h2
12:52:19,303 INFO  [org.jboss.remoting] (MSC service thread 1-8) JBoss Remoting version 4.0.6.Final
12:52:19,314 INFO  [org.jboss.as.naming] (MSC service thread 1-2) JBAS011802: Starting Naming Service
12:52:19,318 INFO  [org.jboss.as.mail.extension] (MSC service thread 1-14) JBAS015400: Bound mail session [java:jboss/mail/Default]
12:52:19,480 INFO  [org.wildfly.extension.undertow] (ServerService Thread Pool -- 48) JBAS017527: Creating file handler for path /opt/jboss/keycloak-demo/keycloak/welcome-content
12:52:19,487 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-13) JBAS017525: Started server default-server.
12:52:19,522 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-5) JBAS017531: Host default-host starting
12:52:19,576 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-3) JBAS017519: Undertow HTTP listener default listening on /0.0.0.0:8080
12:52:19,706 INFO  [org.jboss.as.connector.subsystems.datasources] (MSC service thread 1-4) JBAS010400: Bound data source [java:jboss/datasources/KeycloakDS]
12:52:19,708 INFO  [org.jboss.as.connector.subsystems.datasources] (MSC service thread 1-4) JBAS010400: Bound data source [java:jboss/datasources/ExampleDS]
12:52:19,734 INFO  [org.jboss.as.server.deployment.scanner] (MSC service thread 1-12) JBAS015012: Started FileSystemDeploymentService for directory /opt/jboss/keycloak-demo/keycloak/standalone/deployments
12:52:19,738 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-2) JBAS015876: Starting deployment of "oauth-client-cdi.war" (runtime-name: "oauth-client-cdi.war")
12:52:19,738 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-1) JBAS015876: Starting deployment of "main-auth-server.war" (runtime-name: "main-auth-server.war")
12:52:19,738 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-13) JBAS015876: Starting deployment of "customer-portal.war" (runtime-name: "customer-portal.war")
12:52:19,739 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-7) JBAS015876: Starting deployment of "database.war" (runtime-name: "database.war")
12:52:19,741 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-15) JBAS015876: Starting deployment of "customer-portal-js.war" (runtime-name: "customer-portal-js.war")
12:52:19,742 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-14) JBAS015876: Starting deployment of "product-portal.war" (runtime-name: "product-portal.war")
12:52:19,741 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-4) JBAS015876: Starting deployment of "angular-product.war" (runtime-name: "angular-product.war")
12:52:19,742 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-5) JBAS015876: Starting deployment of "admin-access.war" (runtime-name: "admin-access.war")
12:52:19,741 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-8) JBAS015876: Starting deployment of "oauth-client.war" (runtime-name: "oauth-client.war")
12:52:20,212 INFO  [org.jboss.ws.common.management] (MSC service thread 1-3) JBWS022052: Starting JBoss Web Services - Stack CXF Server 4.3.2.Final
12:52:20,284 INFO  [org.jboss.weld.deployer] (MSC service thread 1-4) JBAS016002: Processing weld deployment oauth-client-cdi.war
12:52:20,352 INFO  [org.hibernate.validator.internal.util.Version] (MSC service thread 1-4) HV000001: Hibernate Validator 5.1.3.Final
12:52:20,515 INFO  [org.jboss.weld.deployer] (MSC service thread 1-12) JBAS016005: Starting Services for CDI deployment: oauth-client-cdi.war
12:52:20,540 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-15) JBAS017534: Registered web context: /customer-portal-js
12:52:20,540 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-16) JBAS017534: Registered web context: /angular-product
12:52:20,540 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-10) JBAS017534: Registered web context: /admin-access
12:52:20,563 INFO  [org.jboss.weld.Version] (MSC service thread 1-12) WELD-000900: 2.2.6 (Final)
12:52:20,574 INFO  [org.jboss.weld.deployer] (MSC service thread 1-13) JBAS016008: Starting weld service for deployment oauth-client-cdi.war
12:52:20,838 INFO  [org.jboss.resteasy.spi.ResteasyDeployment] (MSC service thread 1-9) Deploying javax.ws.rs.core.Application: class org.keycloak.example.oauth.DataApplication
12:52:20,855 INFO  [org.keycloak.services.resources.KeycloakApplication] (MSC service thread 1-11) Load config from /opt/jboss/keycloak-demo/keycloak/standalone/configuration/keycloak-server.json
12:52:20,901 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-14) JBAS017534: Registered web context: /product-portal
12:52:20,906 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-2) JBAS017534: Registered web context: /customer-portal
12:52:20,909 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-3) JBAS017534: Registered web context: /oauth-client
12:52:20,913 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-9) JBAS017534: Registered web context: /database
12:52:21,617 INFO  [org.keycloak.example.oauth.AppContextListener] (MSC service thread 1-14) OAuth client configured and started
12:52:21,622 INFO  [javax.enterprise.resource.webcontainer.jsf.config] (MSC service thread 1-14) Initializing Mojarra 2.2.8-jbossorg-1 20140822-1131 for context '/oauth-client-cdi'
12:52:22,262 INFO  [org.wildfly.extension.undertow] (MSC service thread 1-14) JBAS017534: Registered web context: /oauth-client-cdi
12:52:23,099 INFO  [org.keycloak.connections.jpa.updater.liquibase.LiquibaseJpaUpdaterProvider] (MSC service thread 1-11) Initializing database schema
12:52:24,036 INFO  [org.hibernate.jpa.internal.util.LogHelper] (MSC service thread 1-11) HHH000204: Processing PersistenceUnitInfo [
    name: keycloak-default
    ...]
12:52:24,103 INFO  [org.hibernate.Version] (MSC service thread 1-11) HHH000412: Hibernate Core {4.3.7.Final}
12:52:24,106 INFO  [org.hibernate.cfg.Environment] (MSC service thread 1-11) HHH000206: hibernate.properties not found
12:52:24,108 INFO  [org.hibernate.cfg.Environment] (MSC service thread 1-11) HHH000021: Bytecode provider name : javassist
12:52:24,280 INFO  [org.hibernate.annotations.common.Version] (MSC service thread 1-11) HCANN000001: Hibernate Commons Annotations {4.0.4.Final}
12:52:24,341 INFO  [org.hibernate.dialect.Dialect] (MSC service thread 1-11) HHH000400: Using dialect: org.hibernate.dialect.H2Dialect
12:52:24,349 WARN  [org.hibernate.dialect.H2Dialect] (MSC service thread 1-11) HHH000431: Unable to determine H2 database version, certain features may not work
12:52:24,653 INFO  [org.hibernate.hql.internal.ast.ASTQueryTranslatorFactory] (MSC service thread 1-11) HHH000397: Using ASTQueryTranslatorFactory
12:52:26,035 INFO  [org.keycloak.services.managers.ApplianceBootstrap] (MSC service thread 1-11) Initializing master realm

I'm using Docker 1.7.0 & Boot2Docker-cli version: v1.7.0

Support for read only file systems

Description

I'm trying to get the Keycloak image to work in an environment that requires the use of read only root file systems, such as via the "--read-only" flag when running Docker directly, or the "readOnlyRootFilesystem" in the context of k8s.

Currently, the startup scripts in the image do some various forms of file manipulation, such as "sed -i" and "touch", and probably others I just haven't bumped into yet. When running the Keycloak image with the Docker locally using the "--read-only" flag, it immediately fails with:

sed: couldn't open temporary file /opt/jboss/keycloak/bin/sedwhvBHR: Read-only file system

because of: https://github.com/keycloak/keycloak-containers/blob/main/server/tools/docker-entrypoint.sh#L108

but there are seemingly other places that try to do file I/O as well.

Discussion

No response

Motivation

Running on a read only root file system is becoming more commonly enforced and is also recommended by the NSA: https://www.cisa.gov/uscert/ncas/current-activity/2021/08/02/cisa-and-nsa-release-kubernetes-hardening-guidance

Details

No response

.cli script in /opt/jboss/startup-scripts do not work and cause the start up to fail

Describe the bug

I would like to create a script that disables templates caching, so I created a file named disable-template-caching.cli with the following content:

/subsystem=keycloak-server/theme=defaults:write-attribute(name=cacheThemes,value=false)
/subsystem=keycloak-server/theme=defaults:write-attribute(name=cacheTemplates,value=false)

and mounted it in /opt/jboss/startup-scripts/

on start up, I see the following message:

keycloak_1  | Executing cli script: /opt/jboss/startup-scripts/disable-template-caching.cli
keycloak_1  | No connection to the controller.

and the container stops.

Version

15.0.2

Expected behavior

the script should execute, and keycloak should continue its bootstrap and start.

Actual behavior

the script fails, and keycloak stops the start up.

How to Reproduce?

create a script with the following content:

/subsystem=keycloak-server/theme=defaults:write-attribute(name=cacheThemes,value=false)
/subsystem=keycloak-server/theme=defaults:write-attribute(name=cacheTemplates,value=false)

and mount it into /opt/jboss/startup-scripts/

Anything else?

No response

Random generated extension filename contains whitespaces

Description

The extension script downloads extension from a remote resource and sets the filename randomly if it cannot be read from the headers. The command used for this results in a random file name containing whitespaces and especially leading whitespaces.
Possibly this comes from a typo in the tr -d "" command which should be tr -d " ". However, one could also use head -c8 /dev/urandom | xxd -p for that purpose.

There is already a PR ongoing regarding different tweaks on the extension script #316. I will add the suggestions there.

# Try to get the filename from the response headers and return
# a random name if that fails
if ! grep -q -i '^< content-disposition:.*filename=' /tmp/headers ; then
local F="$(od -N8 -tx1 -An -v /dev/urandom | tr -d "").jar"
mv "$FILENAME" "$F"
FILENAME="$F"
fi
echo " --> $FILENAME"

Discussion

No response

Motivation

No response

Details

$  od -N8 -tx1 -An -v /dev/urandom | tr -d ""
 6e d3 0d 52 52 8c d8 4e
$ od -N8 -tx1 -An -v /dev/urandom | tr -d " "
2e1f6c3d514415e6
$ head -c8 /dev/urandom | xxd -p
426b0b2adc9ad3ed

Saxon not importing database settings at 1.3.1.Final

At version 1.3.1, at the second step of the Dockerfile:

RUN java -jar /usr/share/java/saxon.jar -s:/opt/jboss/keycloak/standalone/configuration/standalone.xml -xsl:/opt/jboss/keycloak/changeDatabase.xsl -o:/opt/jboss/keycloak/standalone/configuration/standalone.xml; java -jar /usr/share/java/saxon.jar -s:/opt/jboss/keycloak/standalone/configuration/standalone-ha.xml -xsl:/opt/jboss/keycloak/changeDatabase.xsl -o:/opt/jboss/keycloak/standalone/configuration/standalone-ha.xml; rm /opt/jboss/keycloak/changeDatabase.xsl

saxon is not writing the changeDatabase.xsl data into /opt/jboss/keycloak/standalone/configuration/standalone.xml or standalone-ha.xml.

No error output is given even if I manually run this step inside the container. It act like everything is fine but when I open the standalone.xml, this is the default settings.

I could not figure out yet a solution for this in meaning to provide a PR. Does someone know's how to fix this?

Add more architectures

Description

Running Keycloak on ARM processors (Graviton for example) can reduce hosting costs.

Not to mention Mac M1 and Raspberry Pi.

Discussion

No response

Motivation

Save costs for the long term and allow more agile deployment including in ARM based Kubernetes clusters.

Details

Keycloak is Java based so it should be too complicated to adjust but there are some extra tools such as WildFly that will need some extra care (I'm guessing).

Restarting Keycloak-Container after DB is available again

Describe the bug

This git issue more or less mirrors the redhat issue KEYCLOAK-16747

Our dev environment is undergoing a restart every weekend. For our docker containers this means docker restart is executed.
The Keycloak container can't handle this very well. It crashes with the following error

User with username 'admin' already added to '/opt/jboss/keycloak/standalone/configuration/keycloak-add-user.json'

We subsequently have to redeploy the Keycloak container.

Apparently, this behaviour is connected to the keycloak database not being available right away due to restarting also.
This means that the keycloak-add-user.json created by add-user-keycloak.sh (or subsequently by AddUser.java) will not be removed.

Upon restart the user is already written into the keycloak-add-user.json which then results in the mentioned exception.

Version

15.0.2

Expected behavior

The Keycloak docker container can restart, as soon as the database is available.

Actual behavior

The database not being available once prevents the keycloak container from restarting, since an unused keycloak-add-user.json floats around, resulting in the error

User with username 'admin' already added to '/opt/jboss/keycloak/standalone/configuration/keycloak-add-user.json'

How to Reproduce?

Copied directly from the redhat issue:

  • Create a database for keycloak
  • Stop the database
  • Start a Keycloak container in podman with the correct DB_USER, DB_PASSWORD, DB_VENDOR, DB_DATABASE, DB_ADDR, KEYCLOAK_USER, KEYCLOAK_PASSWORD environment variables
  • (Keycloak will not start since it cannot connect to its database)
  • Start the database
  • Restart the Keycloak container

Build image for linux/arm64

Description

It would be nice to have a Keycloak image which works with linux/arm64.

Discussion

No response

Motivation

No response

Details

No response

docker-compose-examples do not work w/ KC 17+

Describe the bug

The examples use old env variables to connect to the remote postgres (as an example):

        DB_VENDOR: POSTGRES
        DB_ADDR: postgres
        DB_DATABASE: keycloak
        DB_USER: keycloak
        DB_SCHEMA: public
        DB_PASSWORD: password
        KEYCLOAK_USER: admin
        KEYCLOAK_PASSWORD: Pa55w0rd

They should be something like:

      KC_DB: postgres
      KC_DB_USERNAME: keycloak
      KC_DB_PASSWORD: password
      KC_HOSTNAME: localhost
      KEYCLOAK_ADMIN: admin
      KEYCLOAK_ADMIN_PASSWORD: Pa55w0rd

Version

17+

Expected behavior

The examples would work with the most recent version of KC

Actual behavior

Currently, the example do not work with KC17+

How to Reproduce?

No response

Anything else?

No response

Build Containers on a nightly basis

Description

Currently the official Images are built once and published via Dockerhub and Quay.io. The scan reports suggest that the images are safe however this only represents the status at the time of publishing the containers. At the time of writing the latest version 15.0.2 passes scan reports but a newer scan report issues several vulnerabilities:
MEDIUM: 30
LOW: 12
HIGH: 1
All are coming from the underlying base OS image. A nighly build will probably fix this. Same approach is implemented for the Bitnami version of Keycloak
Is there any reason that prevents from having a nightly build cycle for Keycloak container?

Discussion

No response

Motivation

No response

Details

No response

Missing Tag on hub.docker.com

Describe the bug

This projects latest release seems to be 15.1.0 (4 days ago). Docker Hub us missing this version. It's latest Version is 15.0.2 (4 months ago). I'm not sure if that is expected behaviour. I'm sorry if thats the case.

Version

15.1.0

Expected behavior

The latest version is available on Docker hub.

Actual behavior

Missing the latest Release on Docker Hub

How to Reproduce?

No response

Anything else?

No response

Usage section in READMEs could include -p 8080:8080 in command and url for console

Obviously there is some assumed Docker knowledge with the instructions but i thought it could be slightly improved so that it is easier for Docker and/or Keycloak newbies.
The port mapping just makes it easier for people so they don't have to go looking up the containers IP or work out how to access it. Binding to the host generally makes it easier.
As for the url, you can just go to http://ip:8080 and you'll get a screen with a link to the admin console but it would be nice to have the exact url upfront. I couldn't see it in Keycloak's start up output either.

So for example for the main Keycloak docker image
https://github.com/jboss-dockerfiles/keycloak/tree/master/server

Before

To boot in standalone mode

docker run jboss/keycloak

Once it boots, you can login to the admin console using admin/admin for the first login.

After

To boot in standalone mode

docker run -p 8080:8080 jboss/keycloak

Once it boots, you can login to the admin console at http://{hostip}:8080/auth/admin/ using admin/admin for the first login.

I'm happy to make the changes if you are ok with the suggestion.

External JAR files in containered mode

Description

Its quite often that administrators want to provide keycloak with some customized implementation of some feature , the most common is 2FA with SMS .
in non-containered environment , we act as how-to-deploy-a-keycloaks-spi-project-using-the-keycloak-deployer-deploy
but I launched my keycloak , using docker-composed mode . are there any solutions to add custom jar files to IS using dockerized version ?

Discussion

No response

Motivation

No response

Details

No response

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.