From 13820992a0f9e2fe040327ddbdc61d00a6280681 Mon Sep 17 00:00:00 2001
From: OZGCloud <ozgcloud@mgm-tp.com>
Date: Fri, 21 Jul 2023 15:03:04 +0200
Subject: [PATCH] OZG-3961 OZG-4082 encode string

---
 .../operator/keycloak/user/KeycloakUserRemoteService.java | 8 +++++++-
 1 file changed, 7 insertions(+), 1 deletion(-)

diff --git a/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java b/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java
index 8c2917a..7585525 100644
--- a/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java
+++ b/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java
@@ -24,6 +24,7 @@
 package de.ozgcloud.operator.keycloak.user;
 
 import java.util.Arrays;
+import java.util.Base64;
 import java.util.Map;
 import java.util.Objects;
 import java.util.Optional;
@@ -122,7 +123,9 @@ class KeycloakUserRemoteService {
 		var secret = getSecret(secretName, namespace);
 		if (Objects.isNull(secret.get())) {
 			log.log(Level.INFO, "...secret does not exist, create one...");
+
 			kubernetesClient.secrets().inNamespace(namespace).create(buildSecret());
+
 			log.log(Level.INFO, "...secret created in " + namespace + " for user " + userSpec.getKeycloakUser().getUsername());
 			log.log(Level.INFO, "...load created secret...");
 			var createdSecret = getSecret(secretName, namespace);
@@ -140,7 +143,10 @@ class KeycloakUserRemoteService {
 	}
 
 	private Secret buildSecret() {
-		return new SecretBuilder().withData(Map.of(SECRET_PASSWORD_FIELD, "Y9nk43yrQ_zzIPpfFU-I")).build();
+		return new SecretBuilder()
+				.withType("Opaque")
+				.withData(Map.of(SECRET_PASSWORD_FIELD, Base64.getEncoder().encodeToString("Y9nk43yrQ_zzIPpfFU-I".getBytes())))
+				.build();
 	}
 
 	private String getPassword(Resource<Secret> secret) {
-- 
GitLab