[undertow-dev] awesome

Bill Burke bburke at redhat.com
Fri Nov 21 08:36:55 EST 2014


just code.  It's functional, but still a work in progress.  All i did 
was set up a handler chain that re-used our existing Undertow auth 
mechanism, with the last handler being a SimpleProxyClientProvider.  I 
also forked your servlet constraint matching logic so that I could 
define role mappings in the proxy layer.

https://github.com/keycloak/keycloak/tree/master/proxy/proxy-server
https://github.com/keycloak/keycloak/tree/master/testsuite/proxy

BTW, do you know any standard headers I could use to forward security 
information?

On 11/21/2014 7:00 AM, Stuart Douglas wrote:
> Also do you have any details posted somewhere about how you did it?
>
> Stuart
>
> ----- Original Message -----
>> From: "Stuart Douglas" <sdouglas at redhat.com>
>> To: "Bill Burke" <bburke at redhat.com>
>> Cc: undertow-dev at lists.jboss.org
>> Sent: Friday, 21 November, 2014 7:06:43 PM
>> Subject: Re: [undertow-dev] awesome
>>
>>
>>
>> ----- Original Message -----
>>> From: "Bill Burke" <bburke at redhat.com>
>>> To: undertow-dev at lists.jboss.org
>>> Sent: Friday, 21 November, 2014 2:13:03 PM
>>> Subject: [undertow-dev] awesome
>>>
>>> I couldn't believe how easy it was to create an http security proxy for
>>> Keycloak using undertow.  Undertow was insanely modular and easy to
>>> piece together how I wanted.  Great work guys.
>>
>> Awesome :-)
>>
>> Stuart
>>
>>>
>>> Thanks
>>>
>>> --
>>> Bill Burke
>>> JBoss, a division of Red Hat
>>> http://bill.burkecentral.com
>>> _______________________________________________
>>> undertow-dev mailing list
>>> undertow-dev at lists.jboss.org
>>> https://lists.jboss.org/mailman/listinfo/undertow-dev
>>>
>>

-- 
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com


More information about the undertow-dev mailing list