use of io.github.microcks.minion.async.client.KeycloakConfig in project microcks by microcks.
the class AsyncMinionApp method onStart.
/**
* Application startup method.
*/
void onStart(@Observes StartupEvent ev) {
// We need to retrieve Keycloak server from Microcks config.
KeycloakConfig config = microcksAPIConnector.getKeycloakConfig();
logger.infof("Microcks Keycloak server url {%s} and realm {%s}", config.getAuthServerUrl(), config.getRealm());
String keycloakEndpoint = config.getAuthServerUrl() + "/realms/" + config.getRealm() + "/protocol/openid-connect/token";
if (!keycloakAuthURL.isEmpty() && keycloakAuthURL.get().length() > 0) {
logger.infof("Use locally defined Keycloak Auth URL: %s", keycloakAuthURL);
keycloakEndpoint = keycloakAuthURL.get() + "/realms/" + config.getRealm() + "/protocol/openid-connect/token";
}
try {
// First retrieve an authentication token before fetching async messages to publish.
String oauthToken;
if (config.isEnabled()) {
// We've got a full Keycloak config, attempt an authent.
oauthToken = keycloakConnector.connectAndGetOAuthToken(keycloakEndpoint);
logger.info("Authentication to Keycloak server succeed!");
} else {
// No realm config, probably a dev mode - use a fake token.
oauthToken = "<anonymous-admin-token>";
logger.info("Keycloak protection is not enabled, using a fake token");
}
int page = 0;
boolean fetchServices = true;
while (fetchServices) {
List<Service> services = microcksAPIConnector.listServices("Bearer " + oauthToken, page, SERVICES_FETCH_SIZE);
for (Service service : services) {
logger.debug("Found service " + service.getName() + " - " + service.getVersion());
if (service.getType().equals(ServiceType.EVENT)) {
// Find the operations matching this minion constraints..
List<Operation> operations = service.getOperations().stream().filter(o -> Arrays.asList(restrictedFrequencies).contains(o.getDefaultDelay())).filter(o -> o.getBindings().keySet().stream().anyMatch(Arrays.asList(supportedBindings)::contains)).collect(Collectors.toList());
if (operations.size() > 0) {
logger.info("Found " + operations.size() + " candidate operations in " + service.getName() + " - " + service.getVersion());
ServiceView serviceView = microcksAPIConnector.getService("Bearer " + oauthToken, service.getId(), true);
for (Operation operation : operations) {
AsyncMockDefinition mockDefinition = new AsyncMockDefinition(serviceView.getService(), operation, serviceView.getMessagesMap().get(operation.getName()).stream().filter(e -> e instanceof UnidirectionalEvent).map(e -> ((UnidirectionalEvent) e).getEventMessage()).collect(Collectors.toList()));
mockRepository.storeMockDefinition(mockDefinition);
schemaRegistry.updateRegistryForService(mockDefinition.getOwnerService());
}
}
}
}
if (services.size() < SERVICES_FETCH_SIZE) {
fetchServices = false;
}
page++;
}
logger.info("Starting scheduling of all producer jobs...");
producerScheduler.scheduleAllProducerJobs();
} catch (ConnectorException ce) {
logger.error("Cannot authenticate to Keycloak server and thus enable to call Microcks API" + "to get Async APIs to mocks...", ce);
throw new RuntimeException("Unable to start the Minion due to connection exception");
} catch (IOException ioe) {
logger.error("IOException while communicating with Keycloak or Microcks API", ioe);
throw new RuntimeException("Unable to start the Minion due to IO exception");
}
}
Aggregations