Mircea Talu c315762883
Allow host:port syntax for --debug in kc.sh (#39924)
* Allow host:port syntax for --debug in kc.sh

Loosen the --debug argument parsing in kc.sh to accept full host:port
addresses (e.g. 0.0.0.0:8787 or *:8787) in addition to plain port
numbers. This enables JDWP to bind to all container interfaces when
running Keycloak in Docker, without requiring manual JAVA_OPTS overrides
or script edits.

Closes #38924

Signed-off-by: mircea.talu <talumircea13@gmail.com>

* Handle IPv6 address in --debug parameter in kc.sh

Signed-off-by: mircea.talu <talumircea13@gmail.com>

* Handle both bare and bracketed IPv6 addresses in kc.sh --debug parameter

Signed-off-by: mircea.talu <talumircea13@gmail.com>

* Handle corner cases in kc.sh --debug parameter IPv6 address handling

Signed-off-by: mircea.talu <talumircea13@gmail.com>

* Simplify kc.sh --debug parameter parsing, assume bracketed IPv6 addresses

Signed-off-by: mircea.talu <talumircea13@gmail.com>

* Remove final else case to avoid consuming following parameters

Signed-off-by: mircea.talu <talumircea13@gmail.com>

* Standardize indentation in kc.bat script

Signed-off-by: mircea.talu <talumircea13@gmail.com>

* Allow host:port syntax for --debug in kc.bat

Signed-off-by: mircea.talu <talumircea13@gmail.com>

* Add documentation for host:port usage in --debug parameter

Signed-off-by: mircea.talu <talumircea13@gmail.com>

---------

Signed-off-by: mircea.talu <talumircea13@gmail.com>
Co-authored-by: Martin Bartoš <mabartos@redhat.com>
2025-07-03 12:34:17 -04:00
2023-09-18 12:39:16 +02:00
2025-06-30 19:32:32 +02:00
2019-11-08 12:43:10 +01:00
2024-08-12 11:54:53 +02:00
2025-07-02 17:53:10 +02:00
2023-01-30 13:05:45 +01:00
2025-02-20 12:31:58 -03:00

Keycloak

GitHub Release OpenSSF Best Practices CLOMonitor OpenSSF Scorecard Artifact Hub GitHub Repo stars GitHub commit activity Translation status

Open Source Identity and Access Management

Add authentication to applications and secure services with minimum effort. No need to deal with storing users or authenticating users.

Keycloak provides user federation, strong authentication, user management, fine-grained authorization, and more.

Help and Documentation

Reporting Security Vulnerabilities

If you have found a security vulnerability, please look at the instructions on how to properly report it.

Reporting an issue

If you believe you have discovered a defect in Keycloak, please open an issue. Please remember to provide a good summary, description as well as steps to reproduce the issue.

Getting started

To run Keycloak, download the distribution from our website. Unzip and run:

bin/kc.[sh|bat] start-dev

Alternatively, you can use the Docker image by running:

docker run quay.io/keycloak/keycloak start-dev

For more details refer to the Keycloak Documentation.

Building from Source

To build from source, refer to the building and working with the code base guide.

Testing

To run tests, refer to the running tests guide.

Writing Tests

To write tests, refer to the writing tests guide.

Contributing

Before contributing to Keycloak, please read our contributing guidelines. Participation in the Keycloak project is governed by the CNCF Code of Conduct.

Joining a community meeting is a great way to get involved and help shape the future of Keycloak.

Other Keycloak Projects

License

Description
Open Source Identity and Access Management For Modern Applications and Services
Readme 794 MiB
Languages
Java 91.4%
TypeScript 7.4%
Fluent 0.5%
FreeMarker 0.2%
JavaScript 0.1%
Other 0.1%