From 13820992a0f9e2fe040327ddbdc61d00a6280681 Mon Sep 17 00:00:00 2001 From: OZGCloud <ozgcloud@mgm-tp.com> Date: Fri, 21 Jul 2023 15:03:04 +0200 Subject: [PATCH] OZG-3961 OZG-4082 encode string --- .../operator/keycloak/user/KeycloakUserRemoteService.java | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java b/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java index 8c2917a..7585525 100644 --- a/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java +++ b/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java @@ -24,6 +24,7 @@ package de.ozgcloud.operator.keycloak.user; import java.util.Arrays; +import java.util.Base64; import java.util.Map; import java.util.Objects; import java.util.Optional; @@ -122,7 +123,9 @@ class KeycloakUserRemoteService { var secret = getSecret(secretName, namespace); if (Objects.isNull(secret.get())) { log.log(Level.INFO, "...secret does not exist, create one..."); + kubernetesClient.secrets().inNamespace(namespace).create(buildSecret()); + log.log(Level.INFO, "...secret created in " + namespace + " for user " + userSpec.getKeycloakUser().getUsername()); log.log(Level.INFO, "...load created secret..."); var createdSecret = getSecret(secretName, namespace); @@ -140,7 +143,10 @@ class KeycloakUserRemoteService { } private Secret buildSecret() { - return new SecretBuilder().withData(Map.of(SECRET_PASSWORD_FIELD, "Y9nk43yrQ_zzIPpfFU-I")).build(); + return new SecretBuilder() + .withType("Opaque") + .withData(Map.of(SECRET_PASSWORD_FIELD, Base64.getEncoder().encodeToString("Y9nk43yrQ_zzIPpfFU-I".getBytes()))) + .build(); } private String getPassword(Resource<Secret> secret) { -- GitLab