This is an automated email from the ASF dual-hosted git repository.
tiagobento pushed a commit to branch main
in repository
https://gitbox.apache.org/repos/asf/incubator-kie-kogito-examples.git
The following commit(s) were added to refs/heads/main by this push:
new a3792d47e NO-ISSUE: Remove Management Console from examples (#2047)
a3792d47e is described below
commit a3792d47e7d2c64e9747d7f5392124a1e527100f
Author: Luiz João Motta <[email protected]>
AuthorDate: Thu Jan 16 12:44:26 2025 -0300
NO-ISSUE: Remove Management Console from examples (#2047)
* Remove management console
* fix module name
---
.../extended/docker-compose/README.md | 2 -
.../extended/docker-compose/docker-compose.yml | 15 -
.../extended/travels/README.md | 3 -
.../kogito-travel-agency/extended/visas/README.md | 1 -
kogito-quarkus-examples/ocp-tryout/README.md | 4 -
.../ocp-tryout/installer.properties | 1 -
kogito-quarkus-examples/ocp-tryout/installer.sh | 5 +-
.../ocp-tryout/keycloak/keycloak.sh | 4 +-
.../deployment-patch.yaml | 49 -
.../kogito-management-console.sh | 47 -
.../ocp-tryout/kogito-shared/README.md | 2 -
kogito-quarkus-examples/ocp-tryout/uninstaller.sh | 3 +-
kogito-quarkus-examples/pom.xml | 2 +-
.../process-instance-migration-quarkus/README.md | 3 -
.../docker-compose/keycloak/kogito-realm.json | 2241 --------------------
.../docs/images/Job_details.png | Bin 98137 -> 0 bytes
.../docs/images/JobsPanel.png | Bin 128636 -> 0 bytes
.../docs/images/MC_details_1_new_hiring.png | Bin 126873 -> 0 bytes
.../docs/images/MC_details_2_IT_executed_job.png | Bin 132306 -> 0 bytes
.../docs/images/MC_list.png | Bin 65374 -> 0 bytes
.../README.md | 64 +-
.../docker-compose/.gitignore | 0
.../docker-compose/README.md | 4 -
.../docker-compose/docker-compose-infinispan.yml | 36 -
.../docker-compose/docker-compose-postgresql.yml | 46 -
.../docker-compose/infinispan/infinispan.xml | 0
.../docker-compose/pgadmin/pgpass | 0
.../docker-compose/pgadmin/servers.json | 0
.../docker-compose/sql/init.sql | 0
.../docker-compose/startServices.sh | 0
.../docs/images/Process-with-job.png | Bin
.../docs/images/services.png | Bin
.../pom.xml | 0
.../src/main/java/org/kie/kogito/hr/Candidate.java | 0
.../main/resources/META-INF/processSVG/hiring.svg | 0
.../main/resources/META-INF/resources/index.html | 0
.../src/main/resources/application.properties | 0
.../src/main/resources/hiring.bpmn | 0
.../java/org/kie/kogito/hr/HiringProcessIT.java | 0
.../src/test/resources/application.properties | 0
40 files changed, 7 insertions(+), 2525 deletions(-)
diff --git
a/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/README.md
b/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/README.md
index caeaad2fe..5d313a01f 100644
---
a/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/README.md
+++
b/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/README.md
@@ -7,7 +7,6 @@ To allow a quick setup of all services required to run this
demo, we provide a d
- Grafana
- Keycloak
- Kogito Data Index
-- Kogito Management Console
This setup ensures that all services are connected using the default
configuration as well as provisioning the Travel Agency dashboard to Grafana.
@@ -39,7 +38,6 @@ In order to use it, please ensure you have Docker Compose
installed on your mach
- Grafana: 3000
- Keycloak: 8480
- Data Index: 8180
- - Management Console: 8280
To access the Grafana dashboard, simply navigate to http://localhost:3000 and
login using the default username 'admin' and password 'admin'.
Prometheus will also be available on http://localhost:9090, no authentication
is required.
diff --git
a/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/docker-compose.yml
b/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/docker-compose.yml
index 5118e4a03..66b58e8be 100644
---
a/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/docker-compose.yml
+++
b/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/docker-compose.yml
@@ -126,18 +126,3 @@ services:
QUARKUS_HTTP_CORS_ORIGINS: "/.*/"
KAFKA_BOOTSTRAP_SERVERS: kafka:29092
KOGITO_DATA_INDEX_PROPS:
-Dkogito.protobuf.folder=/home/kogito/data/protobufs/
-
- management-console:
- container_name: management-console
- image: quay.io/kiegroup/kogito-management-console:${KOGITO_VERSION}
- ports:
- - 8280:8080
- depends_on:
- data-index:
- condition: service_started
- volumes:
- - ./svg/:/home/kogito/data/svg/
- environment:
- KOGITO_DATAINDEX_HTTP_URL:
http://${DOCKER_GATEWAY_HOST:-host.docker.internal}:8180/graphql
- KOGITO_MANAGEMENT_CONSOLE_PROPS:
-Dkogito.consoles.keycloak.config.url=http://localhost:8480/auth
-Dkogito.consoles.keycloak.config.health-check-url=http://localhost:8480/auth/realms/kogito/.well-known/openid-configuration
-Dkogito.svg.folder.path=/home/kogito/data/svg
- QUARKUS_HTTP_CORS_ORIGINS: "/.*/"
diff --git
a/kogito-quarkus-examples/kogito-travel-agency/extended/travels/README.md
b/kogito-quarkus-examples/kogito-travel-agency/extended/travels/README.md
index e5f32f64c..8f7e92e19 100644
--- a/kogito-quarkus-examples/kogito-travel-agency/extended/travels/README.md
+++ b/kogito-quarkus-examples/kogito-travel-agency/extended/travels/README.md
@@ -34,8 +34,6 @@ the response with the visa processing outcome - approved or
rejected.
* Create or import UI components using **Kogito Data Index Service**
* Add metrics support for processes and decisions
* Create dashboard based on metrics
-* Connect the **Kogito Management Console** to the **Kogito Data Index
Service**
-
## Data model
@@ -151,7 +149,6 @@ Once all services bootstrap, the following ports will be
assigned on your local
- Kafka: 9092
- Data Index: 8180
- Keycloak server: 8480
-- Management Console: 8280
> **_NOTE:_** This step requires the project to be compiled, please consider
> running a ```mvn clean install``` command on the project root before running
> the ```startServices.sh``` script for the first time or any time you modify
> the project.
diff --git
a/kogito-quarkus-examples/kogito-travel-agency/extended/visas/README.md
b/kogito-quarkus-examples/kogito-travel-agency/extended/visas/README.md
index 7fe2f1ae9..114e04cdc 100644
--- a/kogito-quarkus-examples/kogito-travel-agency/extended/visas/README.md
+++ b/kogito-quarkus-examples/kogito-travel-agency/extended/visas/README.md
@@ -95,7 +95,6 @@ Once all services bootstrap, the following ports will be
assigned on your local
- Kafka: 9092
- Data Index: 8180
- Keycloak server: 8480
-- Management Console: 8280
> **_NOTE:_** This step requires the project to be compiled, please consider
> running a ```mvn clean install``` command on the project root before running
> the ```startServices.sh``` script for the first time or any time you modify
> the project.
diff --git a/kogito-quarkus-examples/ocp-tryout/README.md
b/kogito-quarkus-examples/ocp-tryout/README.md
index 9a40ccb36..138778173 100644
--- a/kogito-quarkus-examples/ocp-tryout/README.md
+++ b/kogito-quarkus-examples/ocp-tryout/README.md
@@ -24,7 +24,6 @@ Make sure you meet the [prerequisites](#prerequisites) and
then start [here](#in
### Available Kogito services
Installation from pre-build images
- [Data
Index](https://docs.jboss.org/kogito/release/1.15.0/html_single/#con-data-index-service_kogito-configuring)
-- [Management
console](https://docs.jboss.org/kogito/release/1.15.0/html_single/#con-management-console_kogito-developing-process-services)
- [Jobs
service](https://docs.jboss.org/kogito/release/latest/html_single/#con-jobs-service_kogito-configuring)
## Architecture
@@ -83,8 +82,6 @@ All configuration required to make those connections as well
as initializations
- `kogito.dataindex.httpurl` - the dataindex url, protocol: http
- `kogito.dataindex.httpurl.with.graphql` - the dataindex graphql url
- `kogito.dataindex.wsurl` - the dataindex url, protocol: ws
-### Kogito Management Console Configurations
-- `kogito.managementconsole.props` - command line properties for the
management console
### Kogito Job Service Configurations
- `kogito.jobsservice.props` - command line properties for the job service
@@ -99,7 +96,6 @@ if marked `-` then namespace defaults are applied
|**namespace default per deployment/statefulSet**|10m|64Mi|1|750Mi|
|keycloak|-|-|-|-|
|kogito-data-index-infinispan|-|-|-|500Mi|
-|kogito-management-console|-|-|-|500Mi|
|kogito-jobs-service|-|-|-|500Mi|
|kogito-travel-agency-travels-jvm|-|-|-|500Mi|
|kogito-travel-agency-visas-jvm|-|-|-|500Mi|
diff --git a/kogito-quarkus-examples/ocp-tryout/installer.properties
b/kogito-quarkus-examples/ocp-tryout/installer.properties
index 685f1ee56..3f1dc40e4 100644
--- a/kogito-quarkus-examples/ocp-tryout/installer.properties
+++ b/kogito-quarkus-examples/ocp-tryout/installer.properties
@@ -31,7 +31,6 @@ INFINISPAN=N
KAFKA=N
KEYCLOAK=N
KOGITO_DATA_INDEX=N
-KOGITO_MANAGEMENT_CONSOLE=N
KOGITO_JOBS_SERVICE=N
TEST_APP=N
diff --git a/kogito-quarkus-examples/ocp-tryout/installer.sh
b/kogito-quarkus-examples/ocp-tryout/installer.sh
index 7e4db9676..9575493d2 100755
--- a/kogito-quarkus-examples/ocp-tryout/installer.sh
+++ b/kogito-quarkus-examples/ocp-tryout/installer.sh
@@ -20,7 +20,7 @@
# firstly, any Kogito unrelated infrastructure like infinispan, kafka, etc. is
installed
-# secondly, any Kogito services like data-index, management console, etc. is
installed
+# secondly, any Kogito services like data-index, etc. is installed
# thirdly, the application to try out is installed
source installer.properties
@@ -29,7 +29,7 @@ source common-functions.sh
action=install
components=(SHARED_CONFIG INFINISPAN KAFKA KEYCLOAK \
- KOGITO_DATA_INDEX KOGITO_MANAGEMENT_CONSOLE KOGITO_JOBS_SERVICE \
+ KOGITO_DATA_INDEX KOGITO_JOBS_SERVICE \
TEST_APP)
# override the installer properties configuration if needed
function overrideEnvVariables(){
@@ -110,7 +110,6 @@ function install(){
dbType="infinispan"
componentAction "${KOGITO_DATA_INDEX}" "kogito-data-index" "${dbType}"
- componentAction "${KOGITO_MANAGEMENT_CONSOLE}" "kogito-management-console"
componentAction "${KOGITO_JOBS_SERVICE}" "kogito-jobs-service" "${dbType}"
componentAction "${TEST_APP}" "testapp"
diff --git a/kogito-quarkus-examples/ocp-tryout/keycloak/keycloak.sh
b/kogito-quarkus-examples/ocp-tryout/keycloak/keycloak.sh
index d393eb799..a8db93c1d 100755
--- a/kogito-quarkus-examples/ocp-tryout/keycloak/keycloak.sh
+++ b/kogito-quarkus-examples/ocp-tryout/keycloak/keycloak.sh
@@ -23,9 +23,7 @@ action=$1
# NOTE: if need to update kogito_realm.json, edit content of
kogito-realm-orig.json here
function updateClientRedirectUrls(){
-
mngConsole=\"http://kogito-management-console-$(getProjectName).$(getClusterAppsHostname)/*\"
- additionalRedirectUris=["${mngConsole}"]
- (jq '(.clients[] | select(.clientId=="kogito-console-quarkus") |
.redirectUris) |= . + '${additionalRedirectUris} kogito-realm-orig.json) >
kogito-realm.json
+ (jq '(.clients[] | select(.clientId=="kogito-console-quarkus") |
.redirectUris) |= . + ' kogito-realm-orig.json) > kogito-realm.json
}
updateClientRedirectUrls
diff --git
a/kogito-quarkus-examples/ocp-tryout/kogito-management-console/deployment-patch.yaml
b/kogito-quarkus-examples/ocp-tryout/kogito-management-console/deployment-patch.yaml
deleted file mode 100644
index 170a469c2..000000000
---
a/kogito-quarkus-examples/ocp-tryout/kogito-management-console/deployment-patch.yaml
+++ /dev/null
@@ -1,49 +0,0 @@
-#
-# Licensed to the Apache Software Foundation (ASF) under one
-# or more contributor license agreements. See the NOTICE file
-# distributed with this work for additional information
-# regarding copyright ownership. The ASF licenses this file
-# to you under the Apache License, Version 2.0 (the
-# "License"); you may not use this file except in compliance
-# with the License. You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing,
-# software distributed under the License is distributed on an
-# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
-# KIND, either express or implied. See the License for the
-# specific language governing permissions and limitations
-# under the License.
-#
-
-spec:
- template:
- spec:
- volumes:
- - name: app-pvc
- configMap:
- name: kogito-management-config
- containers:
- - name: kogito-management-console
- volumeMounts:
- - name: app-pvc
- mountPath: /home/kogito/data/svg
- env:
- - name: KOGITO_DATAINDEX_HTTP_URL
- valueFrom:
- configMapKeyRef:
- name: kogito-configs
- key: kogito.dataindex.httpurl.with.graphql
- - name: KOGITO_MANAGEMENT_CONSOLE_PROPS
- valueFrom:
- configMapKeyRef:
- name: kogito-configs
- key: kogito.managementconsole.props
- resources:
- limits:
- cpu: '1'
- memory: 500Mi
- requests:
- cpu: 10m
- memory: 64Mi
\ No newline at end of file
diff --git
a/kogito-quarkus-examples/ocp-tryout/kogito-management-console/kogito-management-console.sh
b/kogito-quarkus-examples/ocp-tryout/kogito-management-console/kogito-management-console.sh
deleted file mode 100755
index 22c1469c0..000000000
---
a/kogito-quarkus-examples/ocp-tryout/kogito-management-console/kogito-management-console.sh
+++ /dev/null
@@ -1,47 +0,0 @@
-#!/bin/bash
-#
-# Licensed to the Apache Software Foundation (ASF) under one
-# or more contributor license agreements. See the NOTICE file
-# distributed with this work for additional information
-# regarding copyright ownership. The ASF licenses this file
-# to you under the Apache License, Version 2.0 (the
-# "License"); you may not use this file except in compliance
-# with the License. You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing,
-# software distributed under the License is distributed on an
-# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
-# KIND, either express or implied. See the License for the
-# specific language governing permissions and limitations
-# under the License.
-#
-
-
-action=$1
-
-if [ "${action}" == "uninstall" ]; then
- echo "*** uninstalling management console"
- oc delete all,configmap --selector app=kogito-management-console -n
$(getProjectName)
-
-elif [ "${action}" == "install" ]; then
- echo "*** installing management console"
- # at least empty svg folder needs to exist
- if [ ! -d ../testapp/svg ]; then
- mkdir ../testapp/svg
- fi
- # cannot add a label directly to a config map create command => workaround:
- # create a configmap yaml locally -> update label on that locally => pipe
into server "create cm from yaml" command
- oc create configmap kogito-management-config --from-file=../testapp/svg -o
yaml --dry-run=client | \
- oc label -f- --dry-run=client -o yaml --local=true
app=kogito-management-console | \
- oc apply -f- -n $(getProjectName) $(dryRun)
- oc new-app quay.io/kiegroup/kogito-management-console:"${KOGITO_VERSION}" -n
$(getProjectName) $(dryRun "NewApp")
- waitForPod kogito-management-console
- oc patch deployment kogito-management-console --patch "$(cat
deployment-patch.yaml)" -n $(getProjectName) $(dryRun)
- waitForPod kogito-management-console
- oc expose service/kogito-management-console -n $(getProjectName) $(dryRun)
-
-else
- echo "*** no such action: $action"
-fi
\ No newline at end of file
diff --git a/kogito-quarkus-examples/ocp-tryout/kogito-shared/README.md
b/kogito-quarkus-examples/ocp-tryout/kogito-shared/README.md
index 6c2726e31..b1392decb 100644
--- a/kogito-quarkus-examples/ocp-tryout/kogito-shared/README.md
+++ b/kogito-quarkus-examples/ocp-tryout/kogito-shared/README.md
@@ -21,7 +21,5 @@ There is one config map per infrastructure component.
- `kogito.dataindex.httpurl` - the dataindex url, protocol: http
- `kogito.dataindex.httpurl.with.graphql` - the dataindex graphql url
- `kogito.dataindex.wsurl` - the dataindex url, protocol: ws
-#### Kogito Management Console Config
-- `kogito.managementconsole.props` - command line properties for the
management console
#### Kogito Job Service Config
- `kogito.jobsservice.props` - command line properties for the job service
\ No newline at end of file
diff --git a/kogito-quarkus-examples/ocp-tryout/uninstaller.sh
b/kogito-quarkus-examples/ocp-tryout/uninstaller.sh
index 7e7b8532c..93061c9ea 100755
--- a/kogito-quarkus-examples/ocp-tryout/uninstaller.sh
+++ b/kogito-quarkus-examples/ocp-tryout/uninstaller.sh
@@ -25,7 +25,7 @@ source common-functions.sh
action=uninstall
components=(SHARED_CONFIG INFINISPAN KAFKA KEYCLOAK \
- KOGITO_DATA_INDEX KOGITO_MANAGEMENT_CONSOLE KOGITO_JOBS_SERVICE \
+ KOGITO_DATA_INDEX KOGITO_JOBS_SERVICE \
TEST_APP)
# override the installer properties configuration if needed
function overrideEnvVariables(){
@@ -73,7 +73,6 @@ function uninstall(){
fi
componentAction "${KOGITO_DATA_INDEX}" "kogito-data-index" "${dbType}"
- componentAction "${KOGITO_MANAGEMENT_CONSOLE}" "kogito-management-console"
componentAction "${KOGITO_JOBS_SERVICE}" "kogito-jobs-service" "${dbType}"
componentAction "${INFINISPAN}" "infinispan"
diff --git a/kogito-quarkus-examples/pom.xml b/kogito-quarkus-examples/pom.xml
index acacf1a03..63e1eb28e 100644
--- a/kogito-quarkus-examples/pom.xml
+++ b/kogito-quarkus-examples/pom.xml
@@ -97,7 +97,7 @@
<module>process-timer-quarkus</module>
<module>process-usertasks-custom-lifecycle-quarkus</module>
<module>process-usertasks-quarkus</module>
- <module>process-usertasks-timer-quarkus-with-console</module>
+ <module>process-usertasks-timer-quarkus</module>
<module>process-usertasks-with-security-oidc-quarkus</module>
<module>process-usertasks-with-security-quarkus</module>
<module>rules-incubation-api-quarkus</module>
diff --git
a/kogito-quarkus-examples/process-instance-migration-quarkus/README.md
b/kogito-quarkus-examples/process-instance-migration-quarkus/README.md
index c42e04438..08d12d38d 100644
--- a/kogito-quarkus-examples/process-instance-migration-quarkus/README.md
+++ b/kogito-quarkus-examples/process-instance-migration-quarkus/README.md
@@ -95,9 +95,6 @@ mvn clean package quarkus:dev -Pdevelopment
The Development Mode will embed all the needed Infrastructure Services
(PostgreSQL, Data-Index & Jobs Service) and won't
require any extra step.
-The `development` profile includes the **Runtime Tools Quarkus Extension**
that exposes a new section in the **Quarkus Dev-UI**
-with the **Management Console** functionalities. **Quarkus Dev-UI** is
available at http://localhost:8080/q/dev
-
> **_NOTE:_** For more information about how to work with Kogito Runtime
> Tools Quarkus Extension, please refer to the [Kogito
> Documentation](https://docs.kogito.kie.org/latest/html_single/#con-runtime-tools-dev-ui_kogito-developing-process-services)
> page.
### Executing an instance of the Simple Process
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/keycloak/kogito-realm.json
b/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/keycloak/kogito-realm.json
deleted file mode 100644
index 80e06bd07..000000000
---
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/keycloak/kogito-realm.json
+++ /dev/null
@@ -1,2241 +0,0 @@
-{
- "realm": "kogito",
- "notBefore": 0,
- "revokeRefreshToken": false,
- "refreshTokenMaxReuse": 0,
- "accessTokenLifespan": 300,
- "accessTokenLifespanForImplicitFlow": 900,
- "ssoSessionIdleTimeout": 1800,
- "ssoSessionMaxLifespan": 36000,
- "ssoSessionIdleTimeoutRememberMe": 0,
- "ssoSessionMaxLifespanRememberMe": 0,
- "offlineSessionIdleTimeout": 2592000,
- "offlineSessionMaxLifespanEnabled": false,
- "offlineSessionMaxLifespan": 5184000,
- "accessCodeLifespan": 60,
- "accessCodeLifespanUserAction": 300,
- "accessCodeLifespanLogin": 1800,
- "actionTokenGeneratedByAdminLifespan": 43200,
- "actionTokenGeneratedByUserLifespan": 300,
- "enabled": true,
- "sslRequired": "external",
- "registrationAllowed": false,
- "registrationEmailAsUsername": false,
- "rememberMe": false,
- "verifyEmail": false,
- "loginWithEmailAllowed": true,
- "duplicateEmailsAllowed": false,
- "resetPasswordAllowed": false,
- "editUsernameAllowed": false,
- "bruteForceProtected": false,
- "permanentLockout": false,
- "maxFailureWaitSeconds": 900,
- "minimumQuickLoginWaitSeconds": 60,
- "waitIncrementSeconds": 60,
- "quickLoginCheckMilliSeconds": 1000,
- "maxDeltaTimeSeconds": 43200,
- "failureFactor": 30,
- "roles": {
- "realm": [
- {
- "name": "managers",
- "composite": false,
- "clientRole": false,
- "containerId": "11d78bf6-6d10-4484-baba-a1388379d68b",
- "attributes": {}
- },
- {
- "name": "uma_authorization",
- "description": "${role_uma_authorization}",
- "composite": false,
- "clientRole": false,
- "containerId": "11d78bf6-6d10-4484-baba-a1388379d68b",
- "attributes": {}
- },
- {
- "name": "admin",
- "composite": false,
- "clientRole": false,
- "containerId": "11d78bf6-6d10-4484-baba-a1388379d68b",
- "attributes": {}
- },
- {
- "name": "user",
- "composite": false,
- "clientRole": false,
- "containerId": "11d78bf6-6d10-4484-baba-a1388379d68b",
- "attributes": {}
- },
- {
- "name": "HR",
- "composite": false,
- "clientRole": false,
- "containerId": "11d78bf6-6d10-4484-baba-a1388379d68b",
- "attributes": {}
- },
- {
- "name": "IT",
- "composite": false,
- "clientRole": false,
- "containerId": "11d78bf6-6d10-4484-baba-a1388379d68b",
- "attributes": {}
- },
- {
- "name": "offline_access",
- "description": "${role_offline-access}",
- "composite": false,
- "clientRole": false,
- "containerId": "11d78bf6-6d10-4484-baba-a1388379d68b",
- "attributes": {}
- }
- ],
- "client": {
- "realm-management": [
- {
- "name": "manage-identity-providers",
- "description": "${role_manage-identity-providers}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "impersonation",
- "description": "${role_impersonation}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "view-identity-providers",
- "description": "${role_view-identity-providers}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "view-realm",
- "description": "${role_view-realm}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "query-users",
- "description": "${role_query-users}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "manage-clients",
- "description": "${role_manage-clients}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "manage-events",
- "description": "${role_manage-events}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "realm-admin",
- "description": "${role_realm-admin}",
- "composite": true,
- "composites": {
- "client": {
- "realm-management": [
- "impersonation",
- "manage-identity-providers",
- "view-identity-providers",
- "view-realm",
- "query-users",
- "manage-clients",
- "manage-events",
- "manage-realm",
- "view-authorization",
- "manage-authorization",
- "view-users",
- "create-client",
- "query-clients",
- "query-groups",
- "manage-users",
- "view-clients",
- "view-events",
- "query-realms"
- ]
- }
- },
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "manage-realm",
- "description": "${role_manage-realm}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "view-authorization",
- "description": "${role_view-authorization}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "manage-authorization",
- "description": "${role_manage-authorization}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "create-client",
- "description": "${role_create-client}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "view-users",
- "description": "${role_view-users}",
- "composite": true,
- "composites": {
- "client": {
- "realm-management": [
- "query-groups",
- "query-users"
- ]
- }
- },
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "query-clients",
- "description": "${role_query-clients}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "query-groups",
- "description": "${role_query-groups}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "manage-users",
- "description": "${role_manage-users}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "view-clients",
- "description": "${role_view-clients}",
- "composite": true,
- "composites": {
- "client": {
- "realm-management": [
- "query-clients"
- ]
- }
- },
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "view-events",
- "description": "${role_view-events}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- },
- {
- "name": "query-realms",
- "description": "${role_query-realms}",
- "composite": false,
- "clientRole": true,
- "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
- "attributes": {}
- }
- ],
- "security-admin-console": [],
- "admin-cli": [],
- "kogito-service": [
- {
- "name": "uma_protection",
- "composite": false,
- "clientRole": true,
- "containerId": "0ac5df91-e044-4051-bd03-106a3a5fb9cc",
- "attributes": {}
- }
- ],
- "broker": [
- {
- "name": "read-token",
- "description": "${role_read-token}",
- "composite": false,
- "clientRole": true,
- "containerId": "53d4fe53-a039-471e-886a-28eddc950e95",
- "attributes": {}
- }
- ],
- "account": [
- {
- "name": "view-profile",
- "description": "${role_view-profile}",
- "composite": false,
- "clientRole": true,
- "containerId": "e55e1234-38fa-432d-8d90-39f5e024688d",
- "attributes": {}
- },
- {
- "name": "manage-account",
- "description": "${role_manage-account}",
- "composite": true,
- "composites": {
- "client": {
- "account": [
- "manage-account-links"
- ]
- }
- },
- "clientRole": true,
- "containerId": "e55e1234-38fa-432d-8d90-39f5e024688d",
- "attributes": {}
- },
- {
- "name": "manage-account-links",
- "description": "${role_manage-account-links}",
- "composite": false,
- "clientRole": true,
- "containerId": "e55e1234-38fa-432d-8d90-39f5e024688d",
- "attributes": {}
- }
- ]
- }
- },
- "groups": [],
- "defaultRoles": [
- "uma_authorization",
- "offline_access"
- ],
- "requiredCredentials": [
- "password"
- ],
- "otpPolicyType": "totp",
- "otpPolicyAlgorithm": "HmacSHA1",
- "otpPolicyInitialCounter": 0,
- "otpPolicyDigits": 6,
- "otpPolicyLookAheadWindow": 1,
- "otpPolicyPeriod": 30,
- "otpSupportedApplications": [
- "FreeOTP",
- "Google Authenticator"
- ],
- "scopeMappings": [
- {
- "clientScope": "offline_access",
- "roles": [
- "offline_access"
- ]
- }
- ],
- "clients": [
- {
- "clientId": "account",
- "name": "${client_account}",
- "baseUrl": "/auth/realms/kogito/account",
- "surrogateAuthRequired": false,
- "enabled": true,
- "clientAuthenticatorType": "client-secret",
- "secret": "0136c3ef-0dfd-4b13-a6d0-2c8b6358edec",
- "defaultRoles": [
- "view-profile",
- "manage-account"
- ],
- "redirectUris": [
- "/auth/realms/kogito/account/*"
- ],
- "webOrigins": [],
- "notBefore": 0,
- "bearerOnly": false,
- "consentRequired": false,
- "standardFlowEnabled": true,
- "implicitFlowEnabled": false,
- "directAccessGrantsEnabled": false,
- "serviceAccountsEnabled": false,
- "publicClient": false,
- "frontchannelLogout": false,
- "protocol": "openid-connect",
- "attributes": {},
- "authenticationFlowBindingOverrides": {},
- "fullScopeAllowed": false,
- "nodeReRegistrationTimeout": 0,
- "defaultClientScopes": [
- "web-origins",
- "role_list",
- "profile",
- "roles",
- "email"
- ],
- "optionalClientScopes": [
- "address",
- "phone",
- "offline_access",
- "microprofile-jwt"
- ]
- },
- {
- "clientId": "admin-cli",
- "name": "${client_admin-cli}",
- "surrogateAuthRequired": false,
- "enabled": true,
- "clientAuthenticatorType": "client-secret",
- "secret": "a951803a-79c7-46a6-8197-e32835286971",
- "redirectUris": [],
- "webOrigins": [],
- "notBefore": 0,
- "bearerOnly": false,
- "consentRequired": false,
- "standardFlowEnabled": false,
- "implicitFlowEnabled": false,
- "directAccessGrantsEnabled": true,
- "serviceAccountsEnabled": false,
- "publicClient": true,
- "frontchannelLogout": false,
- "protocol": "openid-connect",
- "attributes": {},
- "authenticationFlowBindingOverrides": {},
- "fullScopeAllowed": false,
- "nodeReRegistrationTimeout": 0,
- "defaultClientScopes": [
- "web-origins",
- "role_list",
- "profile",
- "roles",
- "email"
- ],
- "optionalClientScopes": [
- "address",
- "phone",
- "offline_access",
- "microprofile-jwt"
- ]
- },
- {
- "clientId": "broker",
- "name": "${client_broker}",
- "surrogateAuthRequired": false,
- "enabled": true,
- "clientAuthenticatorType": "client-secret",
- "secret": "e1f7edd7-e15c-43b4-8736-ff8204d16836",
- "redirectUris": [],
- "webOrigins": [],
- "notBefore": 0,
- "bearerOnly": false,
- "consentRequired": false,
- "standardFlowEnabled": true,
- "implicitFlowEnabled": false,
- "directAccessGrantsEnabled": false,
- "serviceAccountsEnabled": false,
- "publicClient": false,
- "frontchannelLogout": false,
- "protocol": "openid-connect",
- "attributes": {},
- "authenticationFlowBindingOverrides": {},
- "fullScopeAllowed": false,
- "nodeReRegistrationTimeout": 0,
- "defaultClientScopes": [
- "web-origins",
- "role_list",
- "profile",
- "roles",
- "email"
- ],
- "optionalClientScopes": [
- "address",
- "phone",
- "offline_access",
- "microprofile-jwt"
- ]
- },
- {
- "clientId": "kogito-frontend",
- "rootUrl": "http://localhost:8082",
- "adminUrl": "http://localhost:8082",
- "surrogateAuthRequired": false,
- "enabled": true,
- "clientAuthenticatorType": "client-secret",
- "secret": "secret",
- "redirectUris": [
- "http://localhost:8082/*"
- ],
- "webOrigins": [
- "http://localhost:8082"
- ],
- "notBefore": 0,
- "bearerOnly": false,
- "consentRequired": false,
- "standardFlowEnabled": true,
- "implicitFlowEnabled": false,
- "directAccessGrantsEnabled": true,
- "serviceAccountsEnabled": false,
- "publicClient": false,
- "frontchannelLogout": false,
- "protocol": "openid-connect",
- "attributes": {
- "saml.assertion.signature": "false",
- "saml.force.post.binding": "false",
- "saml.multivalued.roles": "false",
- "saml.encrypt": "false",
- "saml.server.signature": "false",
- "saml.server.signature.keyinfo.ext": "false",
- "exclude.session.state.from.auth.response": "false",
- "saml_force_name_id_format": "false",
- "saml.client.signature": "false",
- "tls.client.certificate.bound.access.tokens": "false",
- "saml.authnstatement": "false",
- "display.on.consent.screen": "false",
- "saml.onetimeuse.condition": "false"
- },
- "authenticationFlowBindingOverrides": {},
- "fullScopeAllowed": true,
- "nodeReRegistrationTimeout": -1,
- "defaultClientScopes": [
- "web-origins",
- "role_list",
- "profile",
- "roles",
- "email"
- ],
- "optionalClientScopes": [
- "address",
- "phone",
- "offline_access",
- "microprofile-jwt"
- ],
- "access": {
- "view": true,
- "configure": true,
- "manage": true
- }
- },
- {
- "clientId": "kogito-app",
- "rootUrl": "http://localhost:8080",
- "adminUrl": "http://localhost:8080",
- "surrogateAuthRequired": false,
- "enabled": true,
- "clientAuthenticatorType": "client-secret",
- "secret": "secret",
- "redirectUris": [
- "http://localhost:8080/*"
- ],
- "webOrigins": [
- "*"
- ],
- "notBefore": 0,
- "bearerOnly": false,
- "consentRequired": false,
- "standardFlowEnabled": true,
- "implicitFlowEnabled": false,
- "directAccessGrantsEnabled": true,
- "serviceAccountsEnabled": false,
- "publicClient": false,
- "frontchannelLogout": false,
- "protocol": "openid-connect",
- "attributes": {
- "saml.assertion.signature": "false",
- "saml.force.post.binding": "false",
- "saml.multivalued.roles": "false",
- "saml.encrypt": "false",
- "saml.server.signature": "false",
- "saml.server.signature.keyinfo.ext": "false",
- "exclude.session.state.from.auth.response": "false",
- "saml_force_name_id_format": "false",
- "saml.client.signature": "false",
- "tls.client.certificate.bound.access.tokens": "false",
- "saml.authnstatement": "false",
- "display.on.consent.screen": "false",
- "saml.onetimeuse.condition": "false"
- },
- "authenticationFlowBindingOverrides": {},
- "fullScopeAllowed": true,
- "nodeReRegistrationTimeout": -1,
- "defaultClientScopes": [
- "web-origins",
- "role_list",
- "profile",
- "roles",
- "email"
- ],
- "optionalClientScopes": [
- "address",
- "phone",
- "offline_access",
- "microprofile-jwt"
- ],
- "access": {
- "view": true,
- "configure": true,
- "manage": true
- }
- },
- {
- "clientId": "kogito-service",
- "rootUrl": "",
- "surrogateAuthRequired": false,
- "enabled": true,
- "clientAuthenticatorType": "client-secret",
- "secret": "secret",
- "redirectUris": [
- "*"
- ],
- "webOrigins": [
- "*"
- ],
- "notBefore": 0,
- "bearerOnly": false,
- "consentRequired": false,
- "standardFlowEnabled": true,
- "implicitFlowEnabled": false,
- "directAccessGrantsEnabled": true,
- "serviceAccountsEnabled": true,
- "authorizationServicesEnabled": true,
- "publicClient": false,
- "frontchannelLogout": false,
- "protocol": "openid-connect",
- "attributes": {},
- "authenticationFlowBindingOverrides": {},
- "fullScopeAllowed": true,
- "nodeReRegistrationTimeout": -1,
- "protocolMappers": [
- {
- "name": "Client ID",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usersessionmodel-note-mapper",
- "consentRequired": false,
- "config": {
- "user.session.note": "clientId",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "clientId",
- "jsonType.label": "String"
- }
- },
- {
- "name": "Client IP Address",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usersessionmodel-note-mapper",
- "consentRequired": false,
- "config": {
- "user.session.note": "clientAddress",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "clientAddress",
- "jsonType.label": "String"
- }
- },
- {
- "name": "Client Host",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usersessionmodel-note-mapper",
- "consentRequired": false,
- "config": {
- "user.session.note": "clientHost",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "clientHost",
- "jsonType.label": "String"
- }
- }
- ],
- "defaultClientScopes": [
- "web-origins",
- "role_list",
- "profile",
- "roles",
- "email"
- ],
- "optionalClientScopes": [
- "address",
- "phone",
- "offline_access",
- "microprofile-jwt"
- ],
- "authorizationSettings": {
- "allowRemoteResourceManagement": true,
- "policyEnforcementMode": "ENFORCING",
- "resources": [
- {
- "name": "User Resource",
- "ownerManagedAccess": false,
- "attributes": {},
- "_id": "df1b74a9-3f10-499d-a581-368de48e512b",
- "uris": [
- "/api/users/*"
- ]
- },
- {
- "name": "Administration Resource",
- "ownerManagedAccess": false,
- "attributes": {},
- "_id": "7124e2f1-e6dc-44b4-87ab-24b010090b97",
- "uris": [
- "/api/admin/*"
- ]
- }
- ],
- "policies": [
- {
- "name": "Any User Policy",
- "description": "Any user granted with the user role can access
something",
- "type": "role",
- "logic": "POSITIVE",
- "decisionStrategy": "UNANIMOUS",
- "config": {
- "roles": "[{\"id\":\"user\",\"required\":false}]"
- }
- },
- {
- "name": "Only Administrators",
- "description": "Only administrators can access",
- "type": "role",
- "logic": "POSITIVE",
- "decisionStrategy": "UNANIMOUS",
- "config": {
- "roles": "[{\"id\":\"admin\",\"required\":false}]"
- }
- },
- {
- "name": "User Resource Permission",
- "type": "resource",
- "logic": "POSITIVE",
- "decisionStrategy": "UNANIMOUS",
- "config": {
- "resources": "[\"User Resource\"]",
- "applyPolicies": "[\"Any User Policy\"]"
- }
- },
- {
- "name": "Administration Resource Permission",
- "type": "resource",
- "logic": "POSITIVE",
- "decisionStrategy": "UNANIMOUS",
- "config": {
- "resources": "[\"Administration Resource\"]",
- "applyPolicies": "[\"Only Administrators\"]"
- }
- }
- ],
- "scopes": [],
- "decisionStrategy": "UNANIMOUS"
- }
- },
- {
- "clientId": "kogito-console-react",
- "rootUrl": "http://localhost:9000",
- "adminUrl": "http://localhost:9000/",
- "baseUrl": "http://localhost:9000/",
- "surrogateAuthRequired": false,
- "enabled": true,
- "clientAuthenticatorType": "client-secret",
- "secret": "**********",
- "redirectUris": [
- "http://localhost:9000/*"
- ],
- "webOrigins": [
- "*"
- ],
- "notBefore": 0,
- "bearerOnly": false,
- "consentRequired": false,
- "standardFlowEnabled": true,
- "implicitFlowEnabled": false,
- "directAccessGrantsEnabled": false,
- "serviceAccountsEnabled": false,
- "publicClient": true,
- "frontchannelLogout": false,
- "protocol": "openid-connect",
- "attributes": {
- "saml.assertion.signature": "false",
- "saml.force.post.binding": "false",
- "saml.multivalued.roles": "false",
- "saml.encrypt": "false",
- "saml.server.signature": "false",
- "saml.server.signature.keyinfo.ext": "false",
- "exclude.session.state.from.auth.response": "false",
- "saml_force_name_id_format": "false",
- "saml.client.signature": "false",
- "tls.client.certificate.bound.access.tokens": "false",
- "saml.authnstatement": "false",
- "display.on.consent.screen": "false",
- "saml.onetimeuse.condition": "false"
- },
- "authenticationFlowBindingOverrides": {},
- "fullScopeAllowed": true,
- "nodeReRegistrationTimeout": -1,
- "defaultClientScopes": [
- "web-origins",
- "role_list",
- "profile",
- "roles",
- "email"
- ],
- "optionalClientScopes": [
- "address",
- "phone",
- "offline_access",
- "microprofile-jwt"
- ]
- },
- {
- "clientId": "kogito-console-quarkus",
- "rootUrl": "http://localhost:8280",
- "adminUrl": "http://localhost:8280/",
- "baseUrl": "http://localhost:8280/",
- "surrogateAuthRequired": false,
- "enabled": true,
- "clientAuthenticatorType": "client-secret",
- "secret": "**********",
- "redirectUris": [
- "http://localhost:8280/*"
- ],
- "webOrigins": [
- "*"
- ],
- "notBefore": 0,
- "bearerOnly": false,
- "consentRequired": false,
- "standardFlowEnabled": true,
- "implicitFlowEnabled": false,
- "directAccessGrantsEnabled": false,
- "serviceAccountsEnabled": false,
- "publicClient": true,
- "frontchannelLogout": false,
- "protocol": "openid-connect",
- "attributes": {
- "saml.assertion.signature": "false",
- "saml.force.post.binding": "false",
- "saml.multivalued.roles": "false",
- "saml.encrypt": "false",
- "saml.server.signature": "false",
- "saml.server.signature.keyinfo.ext": "false",
- "exclude.session.state.from.auth.response": "false",
- "saml_force_name_id_format": "false",
- "saml.client.signature": "false",
- "tls.client.certificate.bound.access.tokens": "false",
- "saml.authnstatement": "false",
- "display.on.consent.screen": "false",
- "saml.onetimeuse.condition": "false"
- },
- "authenticationFlowBindingOverrides": {},
- "fullScopeAllowed": true,
- "nodeReRegistrationTimeout": -1,
- "protocolMappers": [
- {
- "name": "groups",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-realm-role-mapper",
- "consentRequired": false,
- "config": {
- "multivalued": "true",
- "user.attribute": "foo",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "groups",
- "jsonType.label": "String"
- }
- }
- ],
- "defaultClientScopes": [
- "web-origins",
- "role_list",
- "profile",
- "roles",
- "email"
- ],
- "optionalClientScopes": [
- "address",
- "phone",
- "offline_access",
- "microprofile-jwt"
- ]
- },
- {
- "clientId": "kogito-jobs-service",
- "rootUrl": "http://localhost:8080",
- "adminUrl": "http://localhost:8080",
- "surrogateAuthRequired": false,
- "enabled": true,
- "clientAuthenticatorType": "client-secret",
- "secret": "secret",
- "redirectUris": [
- "http://localhost:8080/*"
- ],
- "webOrigins": [
- "http://localhost:8080"
- ],
- "notBefore": 0,
- "bearerOnly": false,
- "consentRequired": false,
- "standardFlowEnabled": true,
- "implicitFlowEnabled": false,
- "directAccessGrantsEnabled": true,
- "serviceAccountsEnabled": false,
- "publicClient": false,
- "frontchannelLogout": false,
- "protocol": "openid-connect",
- "attributes": {
- "saml.assertion.signature": "false",
- "saml.force.post.binding": "false",
- "saml.multivalued.roles": "false",
- "saml.encrypt": "false",
- "saml.server.signature": "false",
- "saml.server.signature.keyinfo.ext": "false",
- "exclude.session.state.from.auth.response": "false",
- "saml_force_name_id_format": "false",
- "saml.client.signature": "false",
- "tls.client.certificate.bound.access.tokens": "false",
- "saml.authnstatement": "false",
- "display.on.consent.screen": "false",
- "saml.onetimeuse.condition": "false"
- },
- "authenticationFlowBindingOverrides": {},
- "fullScopeAllowed": true,
- "nodeReRegistrationTimeout": -1,
- "defaultClientScopes": [
- "web-origins",
- "role_list",
- "profile",
- "roles",
- "email"
- ],
- "optionalClientScopes": [
- "address",
- "phone",
- "offline_access",
- "microprofile-jwt"
- ],
- "access": {
- "view": true,
- "configure": true,
- "manage": true
- }
- },
- {
- "clientId": "realm-management",
- "name": "${client_realm-management}",
- "surrogateAuthRequired": false,
- "enabled": true,
- "clientAuthenticatorType": "client-secret",
- "secret": "c41b709a-a012-4c69-89d7-4f926dba0619",
- "redirectUris": [],
- "webOrigins": [],
- "notBefore": 0,
- "bearerOnly": true,
- "consentRequired": false,
- "standardFlowEnabled": true,
- "implicitFlowEnabled": false,
- "directAccessGrantsEnabled": false,
- "serviceAccountsEnabled": false,
- "publicClient": false,
- "frontchannelLogout": false,
- "protocol": "openid-connect",
- "attributes": {},
- "authenticationFlowBindingOverrides": {},
- "fullScopeAllowed": false,
- "nodeReRegistrationTimeout": 0,
- "defaultClientScopes": [
- "web-origins",
- "role_list",
- "profile",
- "roles",
- "email"
- ],
- "optionalClientScopes": [
- "address",
- "phone",
- "offline_access",
- "microprofile-jwt"
- ]
- },
- {
- "clientId": "security-admin-console",
- "name": "${client_security-admin-console}",
- "baseUrl": "/auth/admin/kogito/console/index.html",
- "surrogateAuthRequired": false,
- "enabled": true,
- "clientAuthenticatorType": "client-secret",
- "secret": "e571b211-2550-475d-b87f-116ff54091ee",
- "redirectUris": [
- "/auth/admin/kogito/console/*"
- ],
- "webOrigins": [],
- "notBefore": 0,
- "bearerOnly": false,
- "consentRequired": false,
- "standardFlowEnabled": true,
- "implicitFlowEnabled": false,
- "directAccessGrantsEnabled": false,
- "serviceAccountsEnabled": false,
- "publicClient": true,
- "frontchannelLogout": false,
- "protocol": "openid-connect",
- "attributes": {},
- "authenticationFlowBindingOverrides": {},
- "fullScopeAllowed": false,
- "nodeReRegistrationTimeout": 0,
- "protocolMappers": [
- {
- "name": "locale",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-attribute-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "locale",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "locale",
- "jsonType.label": "String"
- }
- }
- ],
- "defaultClientScopes": [
- "web-origins",
- "role_list",
- "profile",
- "roles",
- "email"
- ],
- "optionalClientScopes": [
- "address",
- "phone",
- "offline_access",
- "microprofile-jwt"
- ]
- }
- ],
- "clientScopes": [
- {
- "name": "address",
- "description": "OpenID Connect built-in scope: address",
- "protocol": "openid-connect",
- "attributes": {
- "include.in.token.scope": "true",
- "display.on.consent.screen": "true",
- "consent.screen.text": "${addressScopeConsentText}"
- },
- "protocolMappers": [
- {
- "name": "address",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-address-mapper",
- "consentRequired": false,
- "config": {
- "user.attribute.formatted": "formatted",
- "user.attribute.country": "country",
- "user.attribute.postal_code": "postal_code",
- "userinfo.token.claim": "true",
- "user.attribute.street": "street",
- "id.token.claim": "true",
- "user.attribute.region": "region",
- "access.token.claim": "true",
- "user.attribute.locality": "locality"
- }
- }
- ]
- },
- {
- "name": "email",
- "description": "OpenID Connect built-in scope: email",
- "protocol": "openid-connect",
- "attributes": {
- "include.in.token.scope": "true",
- "display.on.consent.screen": "true",
- "consent.screen.text": "${emailScopeConsentText}"
- },
- "protocolMappers": [
- {
- "name": "email",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-property-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "email",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "email",
- "jsonType.label": "String"
- }
- },
- {
- "name": "email verified",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-property-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "emailVerified",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "email_verified",
- "jsonType.label": "boolean"
- }
- }
- ]
- },
- {
- "name": "microprofile-jwt",
- "description": "Microprofile - JWT built-in scope",
- "protocol": "openid-connect",
- "attributes": {
- "include.in.token.scope": "true",
- "display.on.consent.screen": "false"
- },
- "protocolMappers": [
- {
- "name": "upn",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-property-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "username",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "upn",
- "jsonType.label": "String"
- }
- },
- {
- "name": "groups",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-realm-role-mapper",
- "consentRequired": false,
- "config": {
- "multivalued": "true",
- "user.attribute": "foo",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "groups",
- "jsonType.label": "String"
- }
- }
- ]
- },
- {
- "name": "offline_access",
- "description": "OpenID Connect built-in scope: offline_access",
- "protocol": "openid-connect",
- "attributes": {
- "consent.screen.text": "${offlineAccessScopeConsentText}",
- "display.on.consent.screen": "true"
- }
- },
- {
- "name": "phone",
- "description": "OpenID Connect built-in scope: phone",
- "protocol": "openid-connect",
- "attributes": {
- "include.in.token.scope": "true",
- "display.on.consent.screen": "true",
- "consent.screen.text": "${phoneScopeConsentText}"
- },
- "protocolMappers": [
- {
- "name": "phone number verified",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-attribute-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "phoneNumberVerified",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "phone_number_verified",
- "jsonType.label": "boolean"
- }
- },
- {
- "name": "phone number",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-attribute-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "phoneNumber",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "phone_number",
- "jsonType.label": "String"
- }
- }
- ]
- },
- {
- "name": "profile",
- "description": "OpenID Connect built-in scope: profile",
- "protocol": "openid-connect",
- "attributes": {
- "include.in.token.scope": "true",
- "display.on.consent.screen": "true",
- "consent.screen.text": "${profileScopeConsentText}"
- },
- "protocolMappers": [
- {
- "name": "nickname",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-attribute-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "nickname",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "nickname",
- "jsonType.label": "String"
- }
- },
- {
- "name": "zoneinfo",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-attribute-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "zoneinfo",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "zoneinfo",
- "jsonType.label": "String"
- }
- },
- {
- "name": "updated at",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-attribute-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "updatedAt",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "updated_at",
- "jsonType.label": "String"
- }
- },
- {
- "name": "birthdate",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-attribute-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "birthdate",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "birthdate",
- "jsonType.label": "String"
- }
- },
- {
- "name": "given name",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-property-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "firstName",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "given_name",
- "jsonType.label": "String"
- }
- },
- {
- "name": "full name",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-full-name-mapper",
- "consentRequired": false,
- "config": {
- "id.token.claim": "true",
- "access.token.claim": "true",
- "userinfo.token.claim": "true"
- }
- },
- {
- "name": "middle name",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-attribute-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "middleName",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "middle_name",
- "jsonType.label": "String"
- }
- },
- {
- "name": "username",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-property-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "username",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "preferred_username",
- "jsonType.label": "String"
- }
- },
- {
- "name": "family name",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-property-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "lastName",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "family_name",
- "jsonType.label": "String"
- }
- },
- {
- "name": "gender",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-attribute-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "gender",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "gender",
- "jsonType.label": "String"
- }
- },
- {
- "name": "picture",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-attribute-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "picture",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "picture",
- "jsonType.label": "String"
- }
- },
- {
- "name": "locale",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-attribute-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "locale",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "locale",
- "jsonType.label": "String"
- }
- },
- {
- "name": "profile",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-attribute-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "profile",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "profile",
- "jsonType.label": "String"
- }
- },
- {
- "name": "website",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-attribute-mapper",
- "consentRequired": false,
- "config": {
- "userinfo.token.claim": "true",
- "user.attribute": "website",
- "id.token.claim": "true",
- "access.token.claim": "true",
- "claim.name": "website",
- "jsonType.label": "String"
- }
- }
- ]
- },
- {
- "name": "role_list",
- "description": "SAML role list",
- "protocol": "saml",
- "attributes": {
- "consent.screen.text": "${samlRoleListScopeConsentText}",
- "display.on.consent.screen": "true"
- },
- "protocolMappers": [
- {
- "name": "role list",
- "protocol": "saml",
- "protocolMapper": "saml-role-list-mapper",
- "consentRequired": false,
- "config": {
- "single": "false",
- "attribute.nameformat": "Basic",
- "attribute.name": "Role"
- }
- }
- ]
- },
- {
- "name": "roles",
- "description": "OpenID Connect scope for add user roles to the access
token",
- "protocol": "openid-connect",
- "attributes": {
- "include.in.token.scope": "false",
- "display.on.consent.screen": "true",
- "consent.screen.text": "${rolesScopeConsentText}"
- },
- "protocolMappers": [
- {
- "name": "realm roles",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-realm-role-mapper",
- "consentRequired": false,
- "config": {
- "user.attribute": "foo",
- "access.token.claim": "true",
- "claim.name": "realm_access.roles",
- "jsonType.label": "String",
- "multivalued": "true"
- }
- },
- {
- "name": "audience resolve",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-audience-resolve-mapper",
- "consentRequired": false,
- "config": {}
- },
- {
- "name": "client roles",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-usermodel-client-role-mapper",
- "consentRequired": false,
- "config": {
- "user.attribute": "foo",
- "access.token.claim": "true",
- "claim.name": "resource_access.${client_id}.roles",
- "jsonType.label": "String",
- "multivalued": "true"
- }
- }
- ]
- },
- {
- "name": "web-origins",
- "description": "OpenID Connect scope for add allowed web origins to the
access token",
- "protocol": "openid-connect",
- "attributes": {
- "include.in.token.scope": "false",
- "display.on.consent.screen": "false",
- "consent.screen.text": ""
- },
- "protocolMappers": [
- {
- "name": "allowed web origins",
- "protocol": "openid-connect",
- "protocolMapper": "oidc-allowed-origins-mapper",
- "consentRequired": false,
- "config": {}
- }
- ]
- }
- ],
- "defaultDefaultClientScopes": [
- "role_list",
- "profile",
- "email",
- "roles",
- "web-origins"
- ],
- "defaultOptionalClientScopes": [
- "offline_access",
- "address",
- "phone",
- "microprofile-jwt"
- ],
- "browserSecurityHeaders": {
- "contentSecurityPolicyReportOnly": "",
- "xContentTypeOptions": "nosniff",
- "xRobotsTag": "none",
- "xFrameOptions": "SAMEORIGIN",
- "xXSSProtection": "1; mode=block",
- "contentSecurityPolicy": "frame-src 'self'; frame-ancestors 'self';
object-src 'none';",
- "strictTransportSecurity": "max-age=31536000; includeSubDomains"
- },
- "smtpServer": {},
- "eventsEnabled": false,
- "eventsListeners": [
- "jboss-logging"
- ],
- "enabledEventTypes": [],
- "adminEventsEnabled": false,
- "adminEventsDetailsEnabled": false,
- "components": {
-
"org.keycloak.services.clientregistration.policy.ClientRegistrationPolicy": [
- {
- "name": "Allowed Protocol Mapper Types",
- "providerId": "allowed-protocol-mappers",
- "subType": "anonymous",
- "subComponents": {},
- "config": {
- "allowed-protocol-mapper-types": [
- "oidc-full-name-mapper",
- "saml-user-attribute-mapper",
- "saml-user-property-mapper",
- "oidc-address-mapper",
- "saml-role-list-mapper",
- "oidc-sha256-pairwise-sub-mapper",
- "oidc-usermodel-attribute-mapper",
- "oidc-usermodel-property-mapper"
- ]
- }
- },
- {
- "name": "Allowed Client Scopes",
- "providerId": "allowed-client-templates",
- "subType": "authenticated",
- "subComponents": {},
- "config": {
- "allow-default-scopes": [
- "true"
- ]
- }
- },
- {
- "name": "Allowed Client Scopes",
- "providerId": "allowed-client-templates",
- "subType": "anonymous",
- "subComponents": {},
- "config": {
- "allow-default-scopes": [
- "true"
- ]
- }
- },
- {
- "name": "Trusted Hosts",
- "providerId": "trusted-hosts",
- "subType": "anonymous",
- "subComponents": {},
- "config": {
- "host-sending-registration-request-must-match": [
- "true"
- ],
- "client-uris-must-match": [
- "true"
- ]
- }
- },
- {
- "name": "Full Scope Disabled",
- "providerId": "scope",
- "subType": "anonymous",
- "subComponents": {},
- "config": {}
- },
- {
- "name": "Max Clients Limit",
- "providerId": "max-clients",
- "subType": "anonymous",
- "subComponents": {},
- "config": {
- "max-clients": [
- "200"
- ]
- }
- },
- {
- "name": "Consent Required",
- "providerId": "consent-required",
- "subType": "anonymous",
- "subComponents": {},
- "config": {}
- },
- {
- "name": "Allowed Protocol Mapper Types",
- "providerId": "allowed-protocol-mappers",
- "subType": "authenticated",
- "subComponents": {},
- "config": {
- "allowed-protocol-mapper-types": [
- "saml-user-attribute-mapper",
- "oidc-full-name-mapper",
- "saml-role-list-mapper",
- "saml-user-property-mapper",
- "oidc-usermodel-attribute-mapper",
- "oidc-address-mapper",
- "oidc-usermodel-property-mapper",
- "oidc-sha256-pairwise-sub-mapper"
- ]
- }
- }
- ],
- "org.keycloak.keys.KeyProvider": [
- {
- "name": "rsa-generated",
- "providerId": "rsa-generated",
- "subComponents": {},
- "config": {
- "privateKey": [
-
"MIIEowIBAAKCAQEAn5T13suF8mlS+pJXp0U1bto41nW55wpcs+Rps8ZVCRyJKWqzwSCYnI7lm0rB2wBpAAO4OPoj1zlmVoFmBPsDU9Xf7rjsJb5LIzIQDCZY44aSDZt6RR+gakPiQvlzHyW/RozYpngDJF7TsTD7rdRF1xQ4RprfBF8fwK/xsU7pxbeom5xDHZhz3fiw8s+7UdbmnazDHfAjU58aUrLGgVRfUsuoHjtsptYlOIXEifaeMetXZE+HhqLYRHQPDap5fbBJl773Trosn7N9nmzN4x1xxGj9So21WC5UboQs9sAIVgizc4omjZ5Y4RN9HLH7G4YwJctNntzmnJhDui9zAO+zSQIDAQABAoIBADi+F7rTtVoft0Cfnok8o6Y58/HVxHdxiMryUd95iy0FN4RBi48FTx6D9QKFz25Ws/8sU2n3D51srIXf1u24b1N0/f39RQKaqk7mcyxOylaEuBQ
[...]
- ],
- "certificate": [
-
"MIICnTCCAYUCBgFp4EYIrjANBgkqhkiG9w0BAQsFADASMRAwDgYDVQQDDAdwcm90ZWFuMB4XDTE5MDQwMjIyNTYxOVoXDTI5MDQwMjIyNTc1OVowEjEQMA4GA1UEAwwHcHJvdGVhbjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJ+U9d7LhfJpUvqSV6dFNW7aONZ1uecKXLPkabPGVQkciSlqs8EgmJyO5ZtKwdsAaQADuDj6I9c5ZlaBZgT7A1PV3+647CW+SyMyEAwmWOOGkg2bekUfoGpD4kL5cx8lv0aM2KZ4AyRe07Ew+63URdcUOEaa3wRfH8Cv8bFO6cW3qJucQx2Yc934sPLPu1HW5p2swx3wI1OfGlKyxoFUX1LLqB47bKbWJTiFxIn2njHrV2RPh4ai2ER0Dw2qeX2wSZe+9066LJ+zfZ5szeMdccRo/UqNtVguVG6ELPbACFY
[...]
- ],
- "priority": [
- "100"
- ]
- }
- },
- {
- "name": "hmac-generated",
- "providerId": "hmac-generated",
- "subComponents": {},
- "config": {
- "kid": [
- "96afd00e-85cf-4d35-b18e-061d3813d8b2"
- ],
- "secret": [
-
"qBFGKdUGf6xDgKphnRfoFzIzaFHJW4bYnZ9MinPFzN38X5_ctq-2u1q5RdZzeJukXvk2biHB8_s3DxWmmLZFsA"
- ],
- "priority": [
- "100"
- ],
- "algorithm": [
- "HS256"
- ]
- }
- },
- {
- "name": "aes-generated",
- "providerId": "aes-generated",
- "subComponents": {},
- "config": {
- "kid": [
- "b04473d3-8395-4016-b455-19a9e951106b"
- ],
- "secret": [
- "x68mMOVdz3qKWzltzReV0g"
- ],
- "priority": [
- "100"
- ]
- }
- }
- ]
- },
- "internationalizationEnabled": false,
- "supportedLocales": [],
- "authenticationFlows": [
- {
- "alias": "Handle Existing Account",
- "description": "Handle what to do if there is existing account with same
email/username like authenticated identity provider",
- "providerId": "basic-flow",
- "topLevel": false,
- "builtIn": true,
- "authenticationExecutions": [
- {
- "authenticator": "idp-confirm-link",
- "requirement": "REQUIRED",
- "priority": 10,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "idp-email-verification",
- "requirement": "ALTERNATIVE",
- "priority": 20,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "requirement": "ALTERNATIVE",
- "priority": 30,
- "flowAlias": "Verify Existing Account by Re-authentication",
- "userSetupAllowed": false,
- "autheticatorFlow": true
- }
- ]
- },
- {
- "alias": "Verify Existing Account by Re-authentication",
- "description": "Reauthentication of existing account",
- "providerId": "basic-flow",
- "topLevel": false,
- "builtIn": true,
- "authenticationExecutions": [
- {
- "authenticator": "idp-username-password-form",
- "requirement": "REQUIRED",
- "priority": 10,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "auth-otp-form",
- "requirement": "OPTIONAL",
- "priority": 20,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- }
- ]
- },
- {
- "alias": "browser",
- "description": "browser based authentication",
- "providerId": "basic-flow",
- "topLevel": true,
- "builtIn": true,
- "authenticationExecutions": [
- {
- "authenticator": "auth-cookie",
- "requirement": "ALTERNATIVE",
- "priority": 10,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "auth-spnego",
- "requirement": "DISABLED",
- "priority": 20,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "identity-provider-redirector",
- "requirement": "ALTERNATIVE",
- "priority": 25,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "requirement": "ALTERNATIVE",
- "priority": 30,
- "flowAlias": "forms",
- "userSetupAllowed": false,
- "autheticatorFlow": true
- }
- ]
- },
- {
- "alias": "clients",
- "description": "Base authentication for clients",
- "providerId": "client-flow",
- "topLevel": true,
- "builtIn": true,
- "authenticationExecutions": [
- {
- "authenticator": "client-secret",
- "requirement": "ALTERNATIVE",
- "priority": 10,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "client-jwt",
- "requirement": "ALTERNATIVE",
- "priority": 20,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "client-secret-jwt",
- "requirement": "ALTERNATIVE",
- "priority": 30,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "client-x509",
- "requirement": "ALTERNATIVE",
- "priority": 40,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- }
- ]
- },
- {
- "alias": "direct grant",
- "description": "OpenID Connect Resource Owner Grant",
- "providerId": "basic-flow",
- "topLevel": true,
- "builtIn": true,
- "authenticationExecutions": [
- {
- "authenticator": "direct-grant-validate-username",
- "requirement": "REQUIRED",
- "priority": 10,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "direct-grant-validate-password",
- "requirement": "REQUIRED",
- "priority": 20,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "direct-grant-validate-otp",
- "requirement": "OPTIONAL",
- "priority": 30,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- }
- ]
- },
- {
- "alias": "docker auth",
- "description": "Used by Docker clients to authenticate against the IDP",
- "providerId": "basic-flow",
- "topLevel": true,
- "builtIn": true,
- "authenticationExecutions": [
- {
- "authenticator": "docker-http-basic-authenticator",
- "requirement": "REQUIRED",
- "priority": 10,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- }
- ]
- },
- {
- "alias": "first broker login",
- "description": "Actions taken after first broker login with identity
provider account, which is not yet linked to any Keycloak account",
- "providerId": "basic-flow",
- "topLevel": true,
- "builtIn": true,
- "authenticationExecutions": [
- {
- "authenticatorConfig": "review profile config",
- "authenticator": "idp-review-profile",
- "requirement": "REQUIRED",
- "priority": 10,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticatorConfig": "create unique user config",
- "authenticator": "idp-create-user-if-unique",
- "requirement": "ALTERNATIVE",
- "priority": 20,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "requirement": "ALTERNATIVE",
- "priority": 30,
- "flowAlias": "Handle Existing Account",
- "userSetupAllowed": false,
- "autheticatorFlow": true
- }
- ]
- },
- {
- "alias": "forms",
- "description": "Username, password, otp and other auth forms.",
- "providerId": "basic-flow",
- "topLevel": false,
- "builtIn": true,
- "authenticationExecutions": [
- {
- "authenticator": "auth-username-password-form",
- "requirement": "REQUIRED",
- "priority": 10,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "auth-otp-form",
- "requirement": "OPTIONAL",
- "priority": 20,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- }
- ]
- },
- {
- "alias": "http challenge",
- "description": "An authentication flow based on challenge-response HTTP
Authentication Schemes",
- "providerId": "basic-flow",
- "topLevel": true,
- "builtIn": true,
- "authenticationExecutions": [
- {
- "authenticator": "no-cookie-redirect",
- "requirement": "REQUIRED",
- "priority": 10,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "basic-auth",
- "requirement": "REQUIRED",
- "priority": 20,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "basic-auth-otp",
- "requirement": "DISABLED",
- "priority": 30,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "auth-spnego",
- "requirement": "DISABLED",
- "priority": 40,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- }
- ]
- },
- {
- "alias": "registration",
- "description": "registration flow",
- "providerId": "basic-flow",
- "topLevel": true,
- "builtIn": true,
- "authenticationExecutions": [
- {
- "authenticator": "registration-page-form",
- "requirement": "REQUIRED",
- "priority": 10,
- "flowAlias": "registration form",
- "userSetupAllowed": false,
- "autheticatorFlow": true
- }
- ]
- },
- {
- "alias": "registration form",
- "description": "registration form",
- "providerId": "form-flow",
- "topLevel": false,
- "builtIn": true,
- "authenticationExecutions": [
- {
- "authenticator": "registration-user-creation",
- "requirement": "REQUIRED",
- "priority": 20,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "registration-profile-action",
- "requirement": "REQUIRED",
- "priority": 40,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "registration-password-action",
- "requirement": "REQUIRED",
- "priority": 50,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "registration-recaptcha-action",
- "requirement": "DISABLED",
- "priority": 60,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- }
- ]
- },
- {
- "alias": "reset credentials",
- "description": "Reset credentials for a user if they forgot their
password or something",
- "providerId": "basic-flow",
- "topLevel": true,
- "builtIn": true,
- "authenticationExecutions": [
- {
- "authenticator": "reset-credentials-choose-user",
- "requirement": "REQUIRED",
- "priority": 10,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "reset-credential-email",
- "requirement": "REQUIRED",
- "priority": 20,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "reset-password",
- "requirement": "REQUIRED",
- "priority": 30,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- },
- {
- "authenticator": "reset-otp",
- "requirement": "OPTIONAL",
- "priority": 40,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- }
- ]
- },
- {
- "alias": "saml ecp",
- "description": "SAML ECP Profile Authentication Flow",
- "providerId": "basic-flow",
- "topLevel": true,
- "builtIn": true,
- "authenticationExecutions": [
- {
- "authenticator": "http-basic-authenticator",
- "requirement": "REQUIRED",
- "priority": 10,
- "userSetupAllowed": false,
- "autheticatorFlow": false
- }
- ]
- }
- ],
- "authenticatorConfig": [
- {
- "alias": "create unique user config",
- "config": {
- "require.password.update.after.registration": "false"
- }
- },
- {
- "alias": "review profile config",
- "config": {
- "update.profile.on.first.login": "missing"
- }
- }
- ],
- "requiredActions": [
- {
- "alias": "CONFIGURE_TOTP",
- "name": "Configure OTP",
- "providerId": "CONFIGURE_TOTP",
- "enabled": true,
- "defaultAction": false,
- "priority": 10,
- "config": {}
- },
- {
- "alias": "terms_and_conditions",
- "name": "Terms and Conditions",
- "providerId": "terms_and_conditions",
- "enabled": false,
- "defaultAction": false,
- "priority": 20,
- "config": {}
- },
- {
- "alias": "UPDATE_PASSWORD",
- "name": "Update Password",
- "providerId": "UPDATE_PASSWORD",
- "enabled": true,
- "defaultAction": false,
- "priority": 30,
- "config": {}
- },
- {
- "alias": "UPDATE_PROFILE",
- "name": "Update Profile",
- "providerId": "UPDATE_PROFILE",
- "enabled": true,
- "defaultAction": false,
- "priority": 40,
- "config": {}
- },
- {
- "alias": "VERIFY_EMAIL",
- "name": "Verify Email",
- "providerId": "VERIFY_EMAIL",
- "enabled": true,
- "defaultAction": false,
- "priority": 50,
- "config": {}
- }
- ],
- "browserFlow": "browser",
- "registrationFlow": "registration",
- "directGrantFlow": "direct grant",
- "resetCredentialsFlow": "reset credentials",
- "clientAuthenticationFlow": "clients",
- "dockerAuthenticationFlow": "docker auth",
- "attributes": {
- "_browser_header.xXSSProtection": "1; mode=block",
- "_browser_header.xFrameOptions": "SAMEORIGIN",
- "_browser_header.strictTransportSecurity": "max-age=31536000;
includeSubDomains",
- "permanentLockout": "false",
- "quickLoginCheckMilliSeconds": "1000",
- "_browser_header.xRobotsTag": "none",
- "maxFailureWaitSeconds": "900",
- "minimumQuickLoginWaitSeconds": "60",
- "failureFactor": "30",
- "actionTokenGeneratedByUserLifespan": "300",
- "maxDeltaTimeSeconds": "43200",
- "_browser_header.xContentTypeOptions": "nosniff",
- "offlineSessionMaxLifespan": "5184000",
- "actionTokenGeneratedByAdminLifespan": "43200",
- "_browser_header.contentSecurityPolicyReportOnly": "",
- "bruteForceProtected": "false",
- "_browser_header.contentSecurityPolicy": "frame-src 'self';
frame-ancestors 'self'; object-src 'none';",
- "waitIncrementSeconds": "60",
- "offlineSessionMaxLifespanEnabled": "false"
- },
- "users": [
- {
- "username": "admin",
- "enabled": true,
- "totp": false,
- "emailVerified": false,
- "credentials": [
- {
- "type": "password",
- "hashedSaltedValue":
"NICTtwsvSxJ5hL8hLAuleDUv9jwZcuXgxviMXvR++cciyPtiIEStEaJUyfA9DOir59awjPrHOumsclPVjNBplA==",
- "salt": "T/2P5o5oxFJUEk68BRURRg==",
- "hashIterations": 27500,
- "counter": 0,
- "algorithm": "pbkdf2-sha256",
- "digits": 0,
- "period": 0,
- "createdDate": 1554245879354,
- "config": {}
- }
- ],
- "disableableCredentialTypes": [
- "password"
- ],
- "requiredActions": [],
- "realmRoles": [
- "admin",
- "managers",
- "user",
- "IT",
- "HR"
- ],
- "notBefore": 0,
- "groups": []
- },
- {
- "username": "alice",
- "enabled": true,
- "totp": false,
- "emailVerified": false,
- "credentials": [
- {
- "type": "password",
- "hashedSaltedValue":
"A3okqV2T/ybXTVEgKfosoSjP8Yc9IZbFP/SY4cEd6hag7TABQrQ6nUSuwagGt96l8cw1DTijO75PqX6uiTXMzw==",
- "salt": "sl4mXx6T9FypPH/s9TngfQ==",
- "hashIterations": 27500,
- "counter": 0,
- "algorithm": "pbkdf2-sha256",
- "digits": 0,
- "period": 0,
- "createdDate": 1554245879116,
- "config": {}
- }
- ],
- "disableableCredentialTypes": [
- "password"
- ],
- "requiredActions": [],
- "realmRoles": [
- "user",
- "HR"
- ],
- "notBefore": 0,
- "groups": []
- },
- {
- "username": "jdoe",
- "enabled": true,
- "totp": false,
- "emailVerified": false,
- "credentials": [
- {
- "type": "password",
- "hashedSaltedValue":
"JV3DUNLjqOadjbBOtC4rvacQI553CGaDGAzBS8MR5ReCr7SwF3E6CsW3T7/XO8ITZAsch8+A/6loeuCoVLLJrg==",
- "salt": "uCbOH7HZtyDtMd0E9DG/nw==",
- "hashIterations": 27500,
- "counter": 0,
- "algorithm": "pbkdf2-sha256",
- "digits": 0,
- "period": 0,
- "createdDate": 1554245879227,
- "config": {}
- }
- ],
- "disableableCredentialTypes": [
- "password"
- ],
- "requiredActions": [],
- "realmRoles": [
- "managers",
- "user",
- "IT"
- ],
- "notBefore": 0,
- "groups": []
- }
- ],
- "keycloakVersion": "6.0.0",
- "userManagedAccessAllowed": false
-}
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/Job_details.png
b/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/Job_details.png
deleted file mode 100644
index b1e137922..000000000
Binary files
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/Job_details.png
and /dev/null differ
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/JobsPanel.png
b/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/JobsPanel.png
deleted file mode 100644
index 7f93f15e9..000000000
Binary files
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/JobsPanel.png
and /dev/null differ
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_details_1_new_hiring.png
b/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_details_1_new_hiring.png
deleted file mode 100644
index c0b168e52..000000000
Binary files
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_details_1_new_hiring.png
and /dev/null differ
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_details_2_IT_executed_job.png
b/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_details_2_IT_executed_job.png
deleted file mode 100644
index 27a94cb66..000000000
Binary files
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_details_2_IT_executed_job.png
and /dev/null differ
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_list.png
b/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_list.png
deleted file mode 100644
index b9ad3c157..000000000
Binary files
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_list.png
and /dev/null differ
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/README.md
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/README.md
similarity index 74%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/README.md
rename to kogito-quarkus-examples/process-usertasks-timer-quarkus/README.md
index 1ebac9f34..5463ddf89 100644
---
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/README.md
+++ b/kogito-quarkus-examples/process-usertasks-timer-quarkus/README.md
@@ -7,8 +7,6 @@ This Quickstart showcases a basic implementation of the
**Hiring** process.
This quickstart project shows very typical user task orchestration with a
timer that avoids to execute the HR Interview task
after some reasonable time.(configured for test purposes to 40 seconds)
-> **_NOTE:_** This example uses keycloak authentication to enable security
only in the consoles and not in runtime.
-
<p align="center"><img width=75% height=50%
src="docs/images/Process-with-job.png"></p>
The required *Kogito and Infrastructure Services* for this example are:
@@ -17,8 +15,6 @@ The required *Kogito and Infrastructure Services* for this
example are:
- Kafka
- Kogito Data Index
- Kogito Jobs Service
-- Kogito Management Console
-- Keycloak
## Running the Quickstart
@@ -77,8 +73,6 @@ Once all services bootstrap, the following ports will be
assigned on your local
- Kafka: 9092
- Data Index: 8180
- Jobs Service: 8580
-- Management Console: 8280
-- Keycloak: 8480
- PgAdmin: 8055
> **_NOTE:_** This step requires the project to be compiled, please consider
> running a ```mvn clean install``` command on the project root before running
> the ```startServices.sh``` script for the first time or any time you modify
> the project.
@@ -132,7 +126,7 @@ mvn clean package -Pnative -Ppostgresql
To run the generated native executable, generated in `target/`, execute
```sh
-./target/./target/process-usertasks-timer-quarkus-with-console-runner
+./target/./target/process-usertasks-timer-quarkus
```
### Run Example with Infinispan
@@ -164,8 +158,6 @@ Once all services bootstrap, the following ports will be
assigned on your local
- Kafka: 9092
- Data Index: 8180
- Jobs Service: 8580
-- Management Console: 8280
-- Keycloak: 8480
> **_NOTE:_** This step requires the project to be compiled, please consider
> running a ```mvn clean install -Pinfinispan``` command on the project root
> before running the ```startServices.sh infinispan``` script for the first
> time or any time you modify the project.
@@ -213,23 +205,9 @@ mvn clean package -Pnative -Pinfinispan
To run the generated native executable, generated in `target/`, execute
```sh
-./target/process-usertasks-timer-quarkus-with-console-runner
+./target/process-usertasks-timer-quarkus
```
-
-### Using Keycloak as Authentication Server
-
-In this Quickstart we'll be using [Keycloak](https://www.keycloak.org/) as
*Authentication Server*. It will be started as a part of the project
*Infrastructure Services*, you can check the configuration on the project
[docker-compose.yml](docker-compose/docker-compose.yml) in
[docker-compose](docker-compose) folder.
-
-It will install the *Kogito Realm* that comes with a predefined set of users:
-| Login | Password | Roles |
-| ------------- | ---------- | ------------------- |
-| admin | admin | *admin*, *managers* |
-| alice | alice | *user* |
-| jdoe | jdoe | *managers* |
-
-Once Keycloak is started, you should be able to access your *Keycloak Server*
at [localhost:8480/auth](http://localhost:8480/auth) with *admin* user.
-
### Submit a request to start new hiring
Once the service is up and running you can make use of the **Hiring**
application by a sending request to `http://localhost:8080/hiring` with
following content:
@@ -257,44 +235,6 @@ curl -H "Content-Type: application/json" -H "Accept:
application/json" -X POST h
EOF
```
-### Show active Hiring process instance at Kogito Management Console
-
-To access the Kogito Management Console just open your browser and navigate to
``http://localhost:8280``. You'll be redirected to the *Keycloak* log in page.
-
-<p align="center">
- <img width=75% src="docs/images/keycloak-login.png">
-</p>
-
-Once there, log in using any of the users specified in the [Using Keycloak as
Authentication Server](#using-keycloak-as-authentication-server)
-
-<p align="center">
- <img width=75% src="docs/images/MC_list.png">
-</p>
-
-> **_NOTE:_** For more information about how to work with Kogito Management
Console, please refer to the [Kogito
Documentation](https://docs.jboss.org/kogito/release/latest/html_single/#con-management-console_kogito-developing-process-services)
page.
-
-Check the process instance details to see where is the execution path
-
-<p align="center">
- <img width=75% src="docs/images/MC_details_1_new_hiring.png">
-</p>
-
-We have configured the timer to avoid the HR interview after reasonable time
(40s, just for testing purpose)
-
-Let's give the app more than 40s to see the timer in action.
-
-Check the process instance details
-
-<p align="center">
- <img width=75% src="docs/images/MC_details_2_IT_executed_job.png">
-</p>
-
-Job panel shows the job details related to the timer execution:
-
-<p align="center">
- <img width=75% src="docs/images/Job_details.png">
-</p>
-
### Submit a new request to start new hiring
In a Terminal you can execute this command to start a **Hiring** process for
the "Jon Snow" candidate:
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/.gitignore
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/.gitignore
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/.gitignore
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/.gitignore
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/README.md
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/README.md
similarity index 95%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/README.md
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/README.md
index 55c93d3df..f724f574b 100644
---
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/README.md
+++
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/README.md
@@ -6,8 +6,6 @@ To allow a quick setup of all services required to run this
demo, we provide a d
- Kafka
- Kogito Data Index
- Kogito Jobs
-- Kogito Management Console
-- Keycloak
In order to use it, please ensure you have Docker Compose installed on your
machine, otherwise follow the instructions available
in [here](https://docs.docker.com/compose/install/).
@@ -20,8 +18,6 @@ Once all services bootstrap, the following ports will be
assigned on your local
- Kafka: 9092
- Data Index: 8180
- Jobs: 8580
-- Management Console: 8280
-- Keycloak: 8480
### Postgresql deployment:
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/docker-compose-infinispan.yml
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/docker-compose-infinispan.yml
similarity index 75%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/docker-compose-infinispan.yml
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/docker-compose-infinispan.yml
index f5faf3ac0..52c330e4b 100755
---
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/docker-compose-infinispan.yml
+++
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/docker-compose-infinispan.yml
@@ -69,23 +69,6 @@ services:
KAFKA_OFFSETS_TOPIC_REPLICATION_FACTOR: 1
LOG_DIR: "/tmp/logs"
- keycloak:
- container_name: keycloak
- image: quay.io/keycloak/keycloak:legacy
- ports:
- - "8480:8080"
- volumes:
- - ./keycloak/kogito-realm.json:/tmp/kogito-realm.json
- healthcheck:
- test: [ "CMD", "curl", "-f", "http://localhost:8080/auth/realms/kogito" ]
- interval: 1s
- timeout: 1s
- retries: 50
- environment:
- KEYCLOAK_USER: admin
- KEYCLOAK_PASSWORD: admin
- KEYCLOAK_IMPORT: /tmp/kogito-realm.json
-
data-index:
container_name: data-index
image: quay.io/kiegroup/kogito-data-index-infinispan:${KOGITO_VERSION}
@@ -122,22 +105,3 @@ services:
QUARKUS_INFINISPAN_CLIENT_USE_AUTH: "false"
QUARKUS_INFINISPAN_CLIENT_HOSTS: infinispan:11222
QUARKUS_HTTP_CORS_ORIGINS: "/.*/"
-
- management-console:
- container_name: management-console
- image: quay.io/kiegroup/kogito-management-console:${KOGITO_VERSION}
- ports:
- - 8280:8080
- depends_on:
- data-index:
- condition: service_started
- jobs-service:
- condition: service_started
- keycloak:
- condition: service_healthy
- volumes:
- - ./svg/:/home/kogito/data/svg/
- environment:
- KOGITO_DATAINDEX_HTTP_URL: http://127.0.0.1:8180/graphql
- QUARKUS_HTTP_CORS_ORIGINS: "/.*/"
- KOGITO_MANAGEMENT_CONSOLE_PROPS:
-Dkogito.consoles.keycloak.config.url=http://localhost:8480/auth
-Dkogito.consoles.keycloak.config.health-check-url=http://localhost:8480/auth/realms/kogito/.well-known/openid-configuration
-Dkogito.svg.folder.path=/home/kogito/data/svg
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/docker-compose-postgresql.yml
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/docker-compose-postgresql.yml
similarity index 75%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/docker-compose-postgresql.yml
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/docker-compose-postgresql.yml
index 743179f92..f0db4764d 100755
---
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/docker-compose-postgresql.yml
+++
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/docker-compose-postgresql.yml
@@ -91,29 +91,6 @@ services:
KAFKA_OFFSETS_TOPIC_REPLICATION_FACTOR: 1
LOG_DIR: "/tmp/logs"
- keycloak:
- container_name: keycloak
- image: quay.io/keycloak/keycloak:legacy
- ports:
- - "8480:8080"
- volumes:
- - ./keycloak/kogito-realm.json:/tmp/kogito-realm.json
- healthcheck:
- test: [ "CMD", "curl", "-f", "http://localhost:8080/auth/realms/kogito" ]
- interval: 1s
- timeout: 1s
- retries: 50
- environment:
- DB_VENDOR: POSTGRES
- DB_ADDR: postgres
- DB_DATABASE: keycloak
- DB_USER: kogito-user
- DB_SCHEMA: public
- DB_PASSWORD: kogito-pass
- KEYCLOAK_USER: admin
- KEYCLOAK_PASSWORD: admin
- KEYCLOAK_IMPORT: /tmp/kogito-realm.json
-
data-index:
container_name: data-index
image:
docker.io/apache/incubator-kie-kogito-data-index-postgresql:${KOGITO_VERSION}
@@ -158,26 +135,3 @@ services:
QUARKUS_PROFILE: events-support
QUARKUS_HTTP_PORT: 8580
QUARKUS_HTTP_CORS_ORIGINS: "/.*/"
-
- management-console:
- container_name: management-console
- image:
docker.io/apache/incubator-kie-kogito-management-console:${KOGITO_VERSION}
- ports:
- - "8280:8080"
- depends_on:
- data-index:
- condition: service_started
- jobs-service:
- condition: service_started
- keycloak:
- condition: service_healthy
- volumes:
- - ../target/classes/META-INF/processSVG/:/home/kogito/data/svg/
- environment:
- RUNTIME_TOOLS_MANAGEMENT_CONSOLE_KOGITO_ENV_MODE: "PROD"
- RUNTIME_TOOLS_MANAGEMENT_CONSOLE_DATA_INDEX_ENDPOINT:
http://127.0.0.1:8180/graphql
- KOGITO_CONSOLES_KEYCLOAK_HEALTH_CHECK_URL:
http://localhost:8480/auth/realms/kogito/.well-known/openid-configuration
- KOGITO_CONSOLES_KEYCLOAK_URL: http://localhost:8480/auth
- KOGITO_CONSOLES_KEYCLOAK_REALM: kogito
- KOGITO_CONSOLES_KEYCLOAK_CLIENT_ID: kogito-console-quarkus
-
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/infinispan/infinispan.xml
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/infinispan/infinispan.xml
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/infinispan/infinispan.xml
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/infinispan/infinispan.xml
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/pgadmin/pgpass
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/pgadmin/pgpass
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/pgadmin/pgpass
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/pgadmin/pgpass
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/pgadmin/servers.json
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/pgadmin/servers.json
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/pgadmin/servers.json
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/pgadmin/servers.json
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/sql/init.sql
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/sql/init.sql
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/sql/init.sql
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/sql/init.sql
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/startServices.sh
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/startServices.sh
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/startServices.sh
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/startServices.sh
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/Process-with-job.png
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docs/images/Process-with-job.png
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/Process-with-job.png
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/docs/images/Process-with-job.png
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/services.png
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docs/images/services.png
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/services.png
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/docs/images/services.png
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/pom.xml
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/pom.xml
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/pom.xml
rename to kogito-quarkus-examples/process-usertasks-timer-quarkus/pom.xml
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/java/org/kie/kogito/hr/Candidate.java
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/java/org/kie/kogito/hr/Candidate.java
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/java/org/kie/kogito/hr/Candidate.java
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/java/org/kie/kogito/hr/Candidate.java
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/META-INF/processSVG/hiring.svg
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/META-INF/processSVG/hiring.svg
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/META-INF/processSVG/hiring.svg
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/META-INF/processSVG/hiring.svg
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/META-INF/resources/index.html
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/META-INF/resources/index.html
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/META-INF/resources/index.html
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/META-INF/resources/index.html
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/application.properties
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/application.properties
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/application.properties
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/application.properties
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/hiring.bpmn
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/hiring.bpmn
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/hiring.bpmn
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/hiring.bpmn
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/test/java/org/kie/kogito/hr/HiringProcessIT.java
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/src/test/java/org/kie/kogito/hr/HiringProcessIT.java
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/test/java/org/kie/kogito/hr/HiringProcessIT.java
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/src/test/java/org/kie/kogito/hr/HiringProcessIT.java
diff --git
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/test/resources/application.properties
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/src/test/resources/application.properties
similarity index 100%
rename from
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/test/resources/application.properties
rename to
kogito-quarkus-examples/process-usertasks-timer-quarkus/src/test/resources/application.properties
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]