Skip to content

Instantly share code, notes, and snippets.

@dlangille
Created December 18, 2019 13:50
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save dlangille/b7d3fc2f2a36f0053e0acdc988756c65 to your computer and use it in GitHub Desktop.
Save dlangille/b7d3fc2f2a36f0053e0acdc988756c65 to your computer and use it in GitHub Desktop.
keycloak on FreeBSD
[dan@keycloak:/usr/local/share/java/keycloak] $ find .
.
./modules
./modules/system
./modules/system/layers
./modules/system/layers/keycloak
./modules/system/layers/keycloak/org
./modules/system/layers/keycloak/org/postgresql
./standalone.xml
./standalone
./standalone/tmp
./standalone/tmp/vfs
./standalone/tmp/vfs/temp
./standalone/data
./standalone/data/kernel
./standalone/data/kernel/process-uuid
./standalone/data/timer-service-data
./standalone/data/tx-object-store
./standalone/data/tx-object-store/ShadowNoFileLockStore
./standalone/data/tx-object-store/ShadowNoFileLockStore/defaultStore
./standalone/data/tx-object-store/ShadowNoFileLockStore/defaultStore/EISNAME
./standalone/data/tx-object-store/ShadowNoFileLockStore/defaultStore/EISNAME/0_ffff0a370017_27c4b20b_5df6babe_1b
./standalone/data/content
./standalone/data/keycloak.trace.db
./standalone/data/keycloak.mv.db
./standalone/log
./standalone/log/audit.log
./standalone/log/server.log
./standalone/log/server.log.2019-12-16
./standalone/log/server.log.2019-12-15
./standalone/configuration
./standalone/configuration/standalone_xml_history
./standalone/configuration/standalone_xml_history/snapshot
./standalone/configuration/standalone_xml_history/standalone.last.xml
./standalone/configuration/standalone_xml_history/standalone.initial.xml
./standalone/configuration/standalone_xml_history/standalone.boot.xml
./standalone/configuration/standalone_xml_history/current
./standalone/configuration/application.keystore
@dlangille
Copy link
Author

The issue: An application should not modify installed files. Those files should be in /var/db or somewhere outside the code.

Tracking down these situations is vital to ensuring proper system administration.

Otherwise, you don't know if an application has been altered maliciously or if it's just data.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment