remove hhu keycloak
This commit is contained in:
1
.gitignore
vendored
1
.gitignore
vendored
@ -34,3 +34,4 @@ out/
|
|||||||
.flooignore
|
.flooignore
|
||||||
|
|
||||||
/mysql/db/storage/
|
/mysql/db/storage/
|
||||||
|
/mysql/keycloak/
|
||||||
|
@ -4,20 +4,47 @@ services:
|
|||||||
image: mysql:8.0
|
image: mysql:8.0
|
||||||
container_name: 'dbmysql'
|
container_name: 'dbmysql'
|
||||||
environment:
|
environment:
|
||||||
MYSQL_DATABASE: 'gruppen2'
|
MYSQL_DATABASE: 'gruppen'
|
||||||
MYSQL_USER: 'root'
|
MYSQL_USER: 'gruppen'
|
||||||
MYSQL_ROOT_PASSWORD: 'geheim'
|
MYSQL_PASSWORD: 'password'
|
||||||
|
MYSQL_ROOT_PASSWORD: 'root'
|
||||||
restart: always
|
restart: always
|
||||||
volumes:
|
volumes:
|
||||||
- './mysql/db/storage:/var/lib/mysql'
|
- './mysql/db/storage:/var/lib/mysql'
|
||||||
- './mysql/db/entrypoint:/docker-entrypoint-initdb.d/'
|
- './mysql/db/entrypoint:/docker-entrypoint-initdb.d/'
|
||||||
|
|
||||||
|
keymysql:
|
||||||
|
image: mysql:8.0
|
||||||
|
container_name: 'keymysql'
|
||||||
|
environment:
|
||||||
|
MYSQL_DATABASE: 'keycloak'
|
||||||
|
MYSQL_USER: 'keycloak'
|
||||||
|
MYSQL_PASSWORD: 'password'
|
||||||
|
MYSQL_ROOT_PASSWORD: 'root'
|
||||||
|
volumes:
|
||||||
|
- './mysql/keycloak/storage:/var/lib/mysql'
|
||||||
|
keycloak:
|
||||||
|
image: jboss/keycloak
|
||||||
|
container_name: 'keycloak'
|
||||||
|
depends_on:
|
||||||
|
- keymysql
|
||||||
|
environment:
|
||||||
|
DB_VENDOR: 'MYSQL'
|
||||||
|
DB_ADDR: 'keymysql'
|
||||||
|
DB_DATABASE: 'keycloak'
|
||||||
|
DB_USER: 'keycloak'
|
||||||
|
DB_PASSWORD: 'password'
|
||||||
|
KEYCLOAK_USER: 'admin'
|
||||||
|
KEYCLOAK_PASSWORD: 'admin'
|
||||||
ports:
|
ports:
|
||||||
- '3306:3306'
|
- 8082:8080
|
||||||
|
|
||||||
gruppenapp:
|
gruppenapp:
|
||||||
build: .
|
build: .
|
||||||
container_name: 'gruppenapp'
|
container_name: 'gruppenapp'
|
||||||
depends_on:
|
depends_on:
|
||||||
- dbmysql
|
- dbmysql
|
||||||
|
- keycloak
|
||||||
command: ["/app/wait-for-it.sh", "dbmysql:3306", "--", "java", "-Dspring.profiles.active=docker", "-jar", "/app/gruppen2.jar"]
|
command: ["/app/wait-for-it.sh", "dbmysql:3306", "--", "java", "-Dspring.profiles.active=docker", "-jar", "/app/gruppen2.jar"]
|
||||||
ports:
|
ports:
|
||||||
- '8081:8080'
|
- '8081:8080'
|
||||||
|
@ -2,6 +2,7 @@ package mops.gruppen2.config;
|
|||||||
|
|
||||||
import org.keycloak.OAuth2Constants;
|
import org.keycloak.OAuth2Constants;
|
||||||
import org.keycloak.adapters.springboot.KeycloakSpringBootConfigResolver;
|
import org.keycloak.adapters.springboot.KeycloakSpringBootConfigResolver;
|
||||||
|
import org.keycloak.adapters.springsecurity.KeycloakConfiguration;
|
||||||
import org.springframework.beans.factory.annotation.Value;
|
import org.springframework.beans.factory.annotation.Value;
|
||||||
import org.springframework.context.annotation.Bean;
|
import org.springframework.context.annotation.Bean;
|
||||||
import org.springframework.context.annotation.Configuration;
|
import org.springframework.context.annotation.Configuration;
|
||||||
@ -15,12 +16,13 @@ import org.springframework.web.client.RestTemplate;
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
@Configuration
|
@Configuration
|
||||||
|
@KeycloakConfiguration
|
||||||
public class KeycloakConfig {
|
public class KeycloakConfig {
|
||||||
|
|
||||||
@Value("${keycloak.resource}")
|
@Value("${keycloak.resource}")
|
||||||
private String clientId;
|
private String clientId;
|
||||||
|
|
||||||
@Value("${keycloak.credentials.secret}")
|
@Value("1a13cd9e-5242-4c29-8c50-45ee53464010")
|
||||||
private String clientSecret;
|
private String clientSecret;
|
||||||
|
|
||||||
@Value("${hhu_keycloak.token-uri}")
|
@Value("${hhu_keycloak.token-uri}")
|
||||||
|
@ -29,7 +29,7 @@ import javax.servlet.http.HttpServletRequest;
|
|||||||
@Configuration
|
@Configuration
|
||||||
@EnableWebSecurity
|
@EnableWebSecurity
|
||||||
@ComponentScan(basePackageClasses = KeycloakSecurityComponents.class)
|
@ComponentScan(basePackageClasses = KeycloakSecurityComponents.class)
|
||||||
class SecurityConfig extends KeycloakWebSecurityConfigurerAdapter {
|
public class SecurityConfig extends KeycloakWebSecurityConfigurerAdapter {
|
||||||
|
|
||||||
@Autowired
|
@Autowired
|
||||||
public void configureGlobal(AuthenticationManagerBuilder auth) {
|
public void configureGlobal(AuthenticationManagerBuilder auth) {
|
||||||
|
@ -1,7 +1,4 @@
|
|||||||
# Logging
|
# Logging
|
||||||
logging.application.name = gruppen2
|
|
||||||
logging.pattern.console = [${logging.application.name}], %magenta(%-5level), %d{dd-MM-yyyy HH:mm:ss.SSS},\t%blue(%msg)\t%thread,%logger.%M%n
|
|
||||||
spring.output.ansi.enabled = always
|
|
||||||
logging.level.mops.gruppen2 = trace
|
logging.level.mops.gruppen2 = trace
|
||||||
logging.level.org.springframework.jdbc.core = info
|
logging.level.org.springframework.jdbc.core = info
|
||||||
|
|
||||||
@ -15,18 +12,6 @@ spring.datasource.password =
|
|||||||
spring.jpa.database-platform = org.hibernate.dialect.H2Dialect
|
spring.jpa.database-platform = org.hibernate.dialect.H2Dialect
|
||||||
spring.h2.console.enabled = false
|
spring.h2.console.enabled = false
|
||||||
|
|
||||||
# Security
|
|
||||||
keycloak.principal-attribute = preferred_username
|
|
||||||
keycloak.auth-server-url = https://keycloak.cs.hhu.de/auth
|
|
||||||
keycloak.realm = MOPS
|
|
||||||
hhu_keycloak.token-uri = https://keycloak.cs.hhu.de/auth/realms/MOPS/protocol/openid-connect/token
|
|
||||||
keycloak.resource = gruppenfindung
|
|
||||||
keycloak.credentials.secret = fc6ebf10-8c63-4e71-a667-4eae4e8209a1
|
|
||||||
keycloak.verify-token-audience = true
|
|
||||||
keycloak.use-resource-role-mappings = true
|
|
||||||
keycloak.autodetect-bearer-only = true
|
|
||||||
keycloak.confidential-port = 443
|
|
||||||
|
|
||||||
# Misc
|
# Misc
|
||||||
server.error.include-stacktrace = always
|
server.error.include-stacktrace = always
|
||||||
management.endpoints.web.exposure.include = info,health
|
management.endpoints.web.exposure.include = info,health
|
||||||
|
@ -1,7 +1,4 @@
|
|||||||
# Logging
|
# Logging
|
||||||
logging.application.name = gruppen2
|
|
||||||
logging.pattern.console = [${logging.application.name}], %magenta(%-5level), %d{dd-MM-yyyy HH:mm:ss.SSS},\t%blue(%msg)\t%thread,%logger.%M%n
|
|
||||||
spring.output.ansi.enabled = always
|
|
||||||
logging.level.mops.gruppen2 = info
|
logging.level.mops.gruppen2 = info
|
||||||
logging.level.org.springframework.jdbc.core = info
|
logging.level.org.springframework.jdbc.core = info
|
||||||
|
|
||||||
@ -9,21 +6,9 @@ logging.level.org.springframework.jdbc.core = info
|
|||||||
spring.datasource.platform = mysql
|
spring.datasource.platform = mysql
|
||||||
spring.datasource.driver-class-name = com.mysql.cj.jdbc.Driver
|
spring.datasource.driver-class-name = com.mysql.cj.jdbc.Driver
|
||||||
spring.datasource.initialization-mode = never
|
spring.datasource.initialization-mode = never
|
||||||
spring.datasource.url = jdbc:mysql://dbmysql:3306/gruppen2
|
spring.datasource.url = jdbc:mysql://dbmysql:3306/gruppen
|
||||||
spring.datasource.username = root
|
spring.datasource.username = gruppen
|
||||||
spring.datasource.password = geheim
|
spring.datasource.password = password
|
||||||
|
|
||||||
# Security
|
|
||||||
keycloak.principal-attribute = preferred_username
|
|
||||||
keycloak.auth-server-url = https://keycloak.cs.hhu.de/auth
|
|
||||||
keycloak.realm = MOPS
|
|
||||||
hhu_keycloak.token-uri = https://keycloak.cs.hhu.de/auth/realms/MOPS/protocol/openid-connect/token
|
|
||||||
keycloak.resource = gruppenfindung
|
|
||||||
keycloak.credentials.secret = fc6ebf10-8c63-4e71-a667-4eae4e8209a1
|
|
||||||
keycloak.verify-token-audience = true
|
|
||||||
keycloak.use-resource-role-mappings = true
|
|
||||||
keycloak.autodetect-bearer-only = true
|
|
||||||
keycloak.confidential-port = 443
|
|
||||||
|
|
||||||
# Misc
|
# Misc
|
||||||
management.endpoints.web.exposure.include = info,health
|
management.endpoints.web.exposure.include = info,health
|
||||||
|
@ -1,2 +1,28 @@
|
|||||||
spring.profiles.active = dev
|
spring.profiles.active = dev
|
||||||
|
|
||||||
|
# Security
|
||||||
|
#keycloak.principal-attribute = preferred_username
|
||||||
|
#keycloak.auth-server-url = https://keycloak.cs.hhu.de/auth
|
||||||
|
#keycloak.realm = MOPS
|
||||||
|
#hhu_keycloak.token-uri = https://keycloak.cs.hhu.de/auth/realms/MOPS/protocol/openid-connect/token
|
||||||
|
#keycloak.resource = gruppenfindung
|
||||||
|
#keycloak.credentials.secret = fc6ebf10-8c63-4e71-a667-4eae4e8209a1
|
||||||
|
#keycloak.verify-token-audience = true
|
||||||
|
#keycloak.use-resource-role-mappings = true
|
||||||
|
#keycloak.autodetect-bearer-only = true
|
||||||
|
#keycloak.confidential-port = 443
|
||||||
|
keycloak.principal-attribute = preferred_username
|
||||||
|
keycloak.auth-server-url = http://localhost:8082/auth
|
||||||
|
keycloak.realm = Gruppen
|
||||||
|
hhu_keycloak.token-uri = http://localhost:8082/auth/realms/Gruppen/protocol/openid-connect/token
|
||||||
|
keycloak.resource = gruppen-app
|
||||||
|
keycloak.credentials.secret = 1a13cd9e-5242-4c29-8c50-45ee53464010
|
||||||
|
keycloak.verify-token-audience = true
|
||||||
|
keycloak.use-resource-role-mappings = true
|
||||||
|
keycloak.autodetect-bearer-only = true
|
||||||
|
keycloak.confidential-port = 443
|
||||||
|
|
||||||
|
# Logging
|
||||||
|
logging.application.name = gruppen2
|
||||||
|
logging.pattern.console = [${logging.application.name}], %magenta(%-5level), %d{dd-MM-yyyy HH:mm:ss.SSS},\t%blue(%msg)\t%thread,%logger.%M%n
|
||||||
|
spring.output.ansi.enabled = always
|
||||||
|
Reference in New Issue
Block a user