diff options
author | Alyssa Ross <hi@alyssa.is> | 2024-02-13 12:25:07 +0100 |
---|---|---|
committer | Alyssa Ross <hi@alyssa.is> | 2024-02-13 12:25:07 +0100 |
commit | a5e1520e4538e29ecfbd4b168306f890566d7bfd (patch) | |
tree | 28099c268b5d4b1e33c2b29f0714c45f0b961382 /nixpkgs/pkgs/servers/keycloak | |
parent | 822f7c15c04567fbdc27020e862ea2b70cfbf8eb (diff) | |
parent | 3560d1c8269d0091b9aae10731b5e85274b7bbc1 (diff) | |
download | nixlib-a5e1520e4538e29ecfbd4b168306f890566d7bfd.tar nixlib-a5e1520e4538e29ecfbd4b168306f890566d7bfd.tar.gz nixlib-a5e1520e4538e29ecfbd4b168306f890566d7bfd.tar.bz2 nixlib-a5e1520e4538e29ecfbd4b168306f890566d7bfd.tar.lz nixlib-a5e1520e4538e29ecfbd4b168306f890566d7bfd.tar.xz nixlib-a5e1520e4538e29ecfbd4b168306f890566d7bfd.tar.zst nixlib-a5e1520e4538e29ecfbd4b168306f890566d7bfd.zip |
Merge branch 'nixos-unstable-small' of https://github.com/NixOS/nixpkgs
Conflicts: nixpkgs/nixos/modules/services/mail/rss2email.nix nixpkgs/pkgs/build-support/go/module.nix
Diffstat (limited to 'nixpkgs/pkgs/servers/keycloak')
-rw-r--r-- | nixpkgs/pkgs/servers/keycloak/all-plugins.nix | 1 | ||||
-rw-r--r-- | nixpkgs/pkgs/servers/keycloak/default.nix | 4 | ||||
-rw-r--r-- | nixpkgs/pkgs/servers/keycloak/keycloak-restrict-client-auth/default.nix | 28 |
3 files changed, 31 insertions, 2 deletions
diff --git a/nixpkgs/pkgs/servers/keycloak/all-plugins.nix b/nixpkgs/pkgs/servers/keycloak/all-plugins.nix index f1e08dd46df9..f2f1117f2d84 100644 --- a/nixpkgs/pkgs/servers/keycloak/all-plugins.nix +++ b/nixpkgs/pkgs/servers/keycloak/all-plugins.nix @@ -5,4 +5,5 @@ scim-keycloak-user-storage-spi = callPackage ./scim-keycloak-user-storage-spi {}; keycloak-discord = callPackage ./keycloak-discord {}; keycloak-metrics-spi = callPackage ./keycloak-metrics-spi {}; + keycloak-restrict-client-auth = callPackage ./keycloak-restrict-client-auth {}; } diff --git a/nixpkgs/pkgs/servers/keycloak/default.nix b/nixpkgs/pkgs/servers/keycloak/default.nix index 646d2d83ed1c..16e08aa82962 100644 --- a/nixpkgs/pkgs/servers/keycloak/default.nix +++ b/nixpkgs/pkgs/servers/keycloak/default.nix @@ -18,11 +18,11 @@ let ''; in stdenv.mkDerivation rec { pname = "keycloak"; - version = "23.0.4"; + version = "23.0.6"; src = fetchzip { url = "https://github.com/keycloak/keycloak/releases/download/${version}/keycloak-${version}.zip"; - hash = "sha256-qvgYH/e+V++Tk39sgELTiUqyoEbBuUoCRNaCiM8ZuoA="; + hash = "sha256-Sw+6UloKSvYjkm7qYROmsZxKk/sky4DKvgupo+S61Q8="; }; nativeBuildInputs = [ makeWrapper jre ]; diff --git a/nixpkgs/pkgs/servers/keycloak/keycloak-restrict-client-auth/default.nix b/nixpkgs/pkgs/servers/keycloak/keycloak-restrict-client-auth/default.nix new file mode 100644 index 000000000000..bf5d38bca013 --- /dev/null +++ b/nixpkgs/pkgs/servers/keycloak/keycloak-restrict-client-auth/default.nix @@ -0,0 +1,28 @@ +{ maven, lib, fetchFromGitHub }: + +maven.buildMavenPackage rec { + pname = "keycloak-restrict-client-auth"; + version = "23.0.0"; + + src = fetchFromGitHub { + owner = "sventorben"; + repo = "keycloak-restrict-client-auth"; + rev = "v${version}"; + hash = "sha256-JA3DvLdBKyn2VE1pYSCcRV9Cl7ZAWsRG5MAp548Rl+g="; + }; + + mvnHash = "sha256-W1YvX1P/mshGYoTUO5XMlOcpu2KiujwLludaC3miak4="; + + installPhase = '' + runHook preInstall + install -Dm444 -t "$out" target/keycloak-restrict-client-auth.jar + runHook postInstall + ''; + + meta = with lib; { + homepage = "https://github.com/sventorben/keycloak-restrict-client-auth"; + description = "A Keycloak authenticator to restrict authorization on clients"; + license = licenses.mit; + maintainers = with maintainers; [ leona ]; + }; +} |