oauth2:
resourceserver:
jwt:
- jwk-set-uri: http://localhost:8080/auth/realms/ONAP/protocol/openid-connect/certs #Keycloak Endpoint
+ jwk-set-uri: http://localhost:8080/realms/ONAP/protocol/openid-connect/certs #Keycloak Endpoint
data:
mongodb:
database: portal_preferences
oauth2:
resourceserver:
jwt:
- jwk-set-uri: ${KEYCLOAK_URL}/auth/realms/${KEYCLOAK_REALM}/protocol/openid-connect/certs #Keycloak Endpoint
+ jwk-set-uri: ${KEYCLOAK_URL}/realms/${KEYCLOAK_REALM}/protocol/openid-connect/certs #Keycloak Endpoint
data:
mongodb:
database: ${MONGO_DATABASE}
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/realms/%s/protocol/openid-connect/certs", realm)))
+ String.format("/realms/%s/protocol/openid-connect/certs", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", JWKSet.MIME_TYPE)
WireMock.stubFor(
WireMock.post(
WireMock.urlMatching(
- String.format("/auth/realms/%s/protocol/openid-connect/token", realm)))
+ String.format("/realms/%s/protocol/openid-connect/token", realm)))
.withBasicAuth("test", "test")
.withRequestBody(WireMock.containing("grant_type=client_credentials"))
.willReturn(
@Builder.Default private final List<String> roles = Collections.emptyList();
public String issuer() {
- return String.format("http://localhost:%d/auth/realms/%s", port, realm);
+ return String.format("http://localhost:%d/realms/%s", port, realm);
}
}
}
oauth2:
resourceserver:
jwt:
- jwk-set-uri: http://localhost:${wiremock.server.port}/auth/realms/ONAP/protocol/openid-connect/certs #Keycloak Endpoint
+ jwk-set-uri: http://localhost:${wiremock.server.port}/realms/ONAP/protocol/openid-connect/certs #Keycloak Endpoint
preferences:
realm: ONAP
KEYCLOAK_IMAGE=quay.io/keycloak/keycloak
-KEYCLOAK_VERSION=18.0.2-legacy
+KEYCLOAK_VERSION=22.04
KEYCLOAK_USER=admin
KEYCLOAK_PASSWORD=password
KEYCLOAK_DB=keycloak
-POST http://localhost:8080/auth/realms/ONAP/protocol/openid-connect/token
+POST http://localhost:8080/realms/ONAP/protocol/openid-connect/token
Content-Type: application/x-www-form-urlencoded
client_id=portal-app&client_secret=&scope=openid&grant_type=password&username=onap-admin&password=password