bff.access-control:
- ACTIONS_CREATE: [ onap_admin, onap_designer, onap_operator ]
- ACTIONS_GET: [ onap_admin, onap_designer, onap_operator ]
- ACTIONS_LIST: [ onap_admin, onap_designer, onap_operator ]
- ACTIVE_ALARM_LIST: [onap_admin, onap_designer, onap_operator]
- KEY_ENCRYPT_BY_USER: [onap_admin, onap_designer, onap_operator]
- KEY_ENCRYPT_BY_VALUE: [onap_admin, onap_designer, onap_operator]
- PREFERENCES_CREATE: [onap_admin, onap_designer, onap_operator]
- PREFERENCES_GET: [onap_admin, onap_designer, onap_operator]
- PREFERENCES_UPDATE: [onap_admin, onap_designer, onap_operator]
+ ACTIONS_CREATE: [ portal_admin, portal_designer, portal_operator ]
+ ACTIONS_GET: [ portal_admin, portal_designer, portal_operator ]
+ ACTIONS_LIST: [ portal_admin, portal_designer, portal_operator ]
+ ACTIVE_ALARM_LIST: [portal_admin, portal_designer, portal_operator]
+ KEY_ENCRYPT_BY_USER: [portal_admin, portal_designer, portal_operator]
+ KEY_ENCRYPT_BY_VALUE: [portal_admin, portal_designer, portal_operator]
+ PREFERENCES_CREATE: [portal_admin, portal_designer, portal_operator]
+ PREFERENCES_GET: [portal_admin, portal_designer, portal_operator]
+ PREFERENCES_UPDATE: [portal_admin, portal_designer, portal_operator]
ROLE_LIST: ["*"]
- USER_CREATE: [onap_admin, onap_designer, onap_operator]
- USER_DELETE: [onap_admin, onap_designer, onap_operator]
- USER_GET: [onap_admin, onap_designer, onap_operator]
- USER_LIST_AVAILABLE_ROLES: [onap_admin, onap_designer, onap_operator]
- USER_LIST_ROLES: [onap_admin, onap_designer, onap_operator]
- USER_LIST: [onap_admin, onap_designer, onap_operator]
- USER_UPDATE_PASSWORD: [onap_admin, onap_designer, onap_operator]
- USER_UPDATE_ROLES: [onap_admin, onap_designer, onap_operator]
- USER_UPDATE: [onap_admin, onap_designer, onap_operator]
+ USER_CREATE: [portal_admin, portal_designer, portal_operator]
+ USER_DELETE: [portal_admin, portal_designer, portal_operator]
+ USER_GET: [portal_admin, portal_designer, portal_operator]
+ USER_LIST_AVAILABLE_ROLES: [portal_admin, portal_designer, portal_operator]
+ USER_LIST_ROLES: [portal_admin, portal_designer, portal_operator]
+ USER_LIST: [portal_admin, portal_designer, portal_operator]
+ USER_UPDATE_PASSWORD: [portal_admin, portal_designer, portal_operator]
+ USER_UPDATE_ROLES: [portal_admin, portal_designer, portal_operator]
+ USER_UPDATE: [portal_admin, portal_designer, portal_operator]
/**
* Object to store common attributes of requests that are going to be made. Adds an Identity
- * header for the <code>onap_admin</code> role to the request.
+ * header for the <code>portal_admin</code> role to the request.
*/
protected RequestSpecification requestSpecification() {
- final String idToken = tokenGenerator.generateToken(getTokenGeneratorConfig("onap_admin"));
+ final String idToken = tokenGenerator.generateToken(getTokenGeneratorConfig("portal_admin"));
return unauthenticatedRequestSpecification()
.auth()
.enabled(keycloakRequest.getEnabled());
mockGetUser(userId, keycloakResponse);
- final RoleKeycloakDto onapAdmin = new RoleKeycloakDto().id(randomUUID()).name("onap_admin");
+ final RoleKeycloakDto onapAdmin = new RoleKeycloakDto().id(randomUUID()).name("portal_admin");
mockAddRoles(userId, List.of(onapAdmin));
mockAssignedRoles(userId, List.of(onapAdmin));
mockListRealmRoles(List.of(onapAdmin));
.firstName(null)
.lastName(null)
.enabled(true)
- .addRolesItem(new RoleApiDto().id(onapAdmin.getId()).name("onap_admin"));
+ .addRolesItem(new RoleApiDto().id(onapAdmin.getId()).name("portal_admin"));
final UserResponseApiDto response =
requestSpecification()
assertThat(response.getFirstName()).isEqualTo(request.getFirstName());
assertThat(response.getLastName()).isEqualTo(request.getLastName());
assertThat(response.getEnabled()).isEqualTo(request.getEnabled());
- assertThat(response.getRealmRoles()).containsExactly("onap_admin");
+ assertThat(response.getRealmRoles()).containsExactly("portal_admin");
}
@Test
.enabled(keycloakRequest.getEnabled());
mockGetUser(userId, keycloakResponse);
- final RoleKeycloakDto onapAdmin = new RoleKeycloakDto().id(randomUUID()).name("onap_admin");
+ final RoleKeycloakDto onapAdmin = new RoleKeycloakDto().id(randomUUID()).name("portal_admin");
mockAddRoles(userId, List.of(onapAdmin));
mockListRealmRoles(List.of(onapAdmin));
.firstName(null)
.lastName(null)
.enabled(true)
- .addRolesItem(new RoleApiDto().id(onapAdmin.getId()).name("onap_admin"));
+ .addRolesItem(new RoleApiDto().id(onapAdmin.getId()).name("portal_admin"));
final ProblemApiDto response =
requestSpecification()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
.withBody(objectMapper.writeValueAsString(keycloakUser))));
- final RoleKeycloakDto keycloackRole = new RoleKeycloakDto().id(randomUUID()).name("onap_admin");
+ final RoleKeycloakDto keycloackRole = new RoleKeycloakDto().id(randomUUID()).name("portal_admin");
mockAssignedRoles(keycloakUser.getId(), List.of(keycloackRole));
final UserResponseApiDto response =
class ListUsersIntegrationTest extends BaseIntegrationTest {
private final RoleKeycloakDto ONAP_ADMIN =
- new RoleKeycloakDto().id(randomUUID()).name("onap_admin");
+ new RoleKeycloakDto().id(randomUUID()).name("portal_admin");
private final RoleKeycloakDto OFFLINE_ACCESS =
new RoleKeycloakDto().id(randomUUID()).name("offline_access");
.firstName("FirstName4t-admin")
.lastName("LastName4t-admin")
.enabled(true)
- .addRealmRolesItem("onap_admin")
+ .addRealmRolesItem("portal_admin")
.addRealmRolesItem("offline_access");
final UserResponseApiDto expectedTDesigner =
new UserResponseApiDto()
bff.access-control:
- ACTIONS_CREATE: [ onap_admin, onap_designer, onap_operator ]
- ACTIONS_GET: [ onap_admin, onap_designer, onap_operator ]
- ACTIONS_LIST: [ onap_admin, onap_designer, onap_operator ]
- ACTIVE_ALARM_LIST: [onap_admin, onap_designer, onap_operator]
- KEY_ENCRYPT_BY_USER: [onap_admin, onap_designer, onap_operator]
- KEY_ENCRYPT_BY_VALUE: [onap_admin, onap_designer, onap_operator]
- PREFERENCES_CREATE: [onap_admin, onap_designer, onap_operator]
- PREFERENCES_GET: [onap_admin, onap_designer, onap_operator]
- PREFERENCES_UPDATE: [onap_admin, onap_designer, onap_operator]
+ ACTIONS_CREATE: [ portal_admin, portal_designer, portal_operator ]
+ ACTIONS_GET: [ portal_admin, portal_designer, portal_operator ]
+ ACTIONS_LIST: [ portal_admin, portal_designer, portal_operator ]
+ ACTIVE_ALARM_LIST: [portal_admin, portal_designer, portal_operator]
+ KEY_ENCRYPT_BY_USER: [portal_admin, portal_designer, portal_operator]
+ KEY_ENCRYPT_BY_VALUE: [portal_admin, portal_designer, portal_operator]
+ PREFERENCES_CREATE: [portal_admin, portal_designer, portal_operator]
+ PREFERENCES_GET: [portal_admin, portal_designer, portal_operator]
+ PREFERENCES_UPDATE: [portal_admin, portal_designer, portal_operator]
ROLE_LIST: ["*"]
- USER_CREATE: [onap_admin, onap_designer, onap_operator]
- USER_DELETE: [onap_admin, onap_designer, onap_operator]
- USER_GET: [onap_admin, onap_designer, onap_operator]
- USER_LIST_AVAILABLE_ROLES: [onap_admin, onap_designer, onap_operator]
- USER_LIST_ROLES: [onap_admin, onap_designer, onap_operator]
- USER_LIST: [onap_admin, onap_designer, onap_operator]
- USER_UPDATE_PASSWORD: [onap_admin, onap_designer, onap_operator]
- USER_UPDATE_ROLES: [onap_admin, onap_designer, onap_operator]
- USER_UPDATE: [onap_admin, onap_designer, onap_operator]
+ USER_CREATE: [portal_admin, portal_designer, portal_operator]
+ USER_DELETE: [portal_admin, portal_designer, portal_operator]
+ USER_GET: [portal_admin, portal_designer, portal_operator]
+ USER_LIST_AVAILABLE_ROLES: [portal_admin, portal_designer, portal_operator]
+ USER_LIST_ROLES: [portal_admin, portal_designer, portal_operator]
+ USER_LIST: [portal_admin, portal_designer, portal_operator]
+ USER_UPDATE_PASSWORD: [portal_admin, portal_designer, portal_operator]
+ USER_UPDATE_ROLES: [portal_admin, portal_designer, portal_operator]
+ USER_UPDATE: [portal_admin, portal_designer, portal_operator]
# General image repository
-IMAGE_REPOSITORY=tbd
+IMAGE_REPOSITORY=nexus3.onap.org:10001/onap/portal-ng
# Keycloak
KEYCLOAK_IMAGE=quay.io/keycloak/keycloak
KEYCLOAK_DB=keycloak
KEYCLOAK_DB_USER=keycloak
KEYCLOAK_DB_PASSWORD=password
-KEYCLOAK_URL:http://keycloak-bff:8080
-KEYCLOAK_REALM:ONAP
+KEYCLOAK_URL=http://keycloak-bff:8080
+KEYCLOAK_REALM=ONAP
# Postgres for Keycloak
POSTGRES_IMAGE=postgres
# preferences
PREFERENCES_IMAGE_NAME=preferences
-PREFERENCES_IMAGE_TAG=0.1.0-master-faef0c0e
-PORTALPREFS_USERNAME:root
-PORTALPREFS_PASSWORD:password
-PORTALPREFS_DATABASE:Preferences
-PORTALPREFS_HOST:mongo-preferences
-PORTALPREFS_PORT:27017
+PREFERENCES_IMAGE_TAG=latest
+PREFERENCES_USERNAME=root
+PREFERENCES_PASSWORD=password
+PREFERENCES_DATABASE=Preferences
+PREFERENCES_HOST=mongo-preferences
+PREFERENCES_PORT=27017
# history
HISTORY_IMAGE_NAME=history
-HISTORY_IMAGE_TAG=0.1.1-de369ace
-HISTORY_USERNAME:root
-HISTORY_PASSWORD:password
-HISTORY_DATABASE:History
-HISTORY_HOST:mongo-history
-HISTORY_PORT:27017
+HISTORY_IMAGE_TAG=latest
+HISTORY_USERNAME=root
+HISTORY_PASSWORD=password
+HISTORY_DATABASE=History
+HISTORY_HOST=mongo-history
+HISTORY_PORT=27017
} ],
"disableableCredentialTypes" : [ ],
"requiredActions" : [ ],
- "realmRoles" : [ "default-roles-onap", "onap_admin" ],
+ "realmRoles" : [ "default-roles-onap", "portal_admin" ],
"notBefore" : 0,
"groups" : [ ]
}, {
"credentials" : [ ],
"disableableCredentialTypes" : [ ],
"requiredActions" : [ ],
- "realmRoles" : [ "default-roles-onap", "onap_designer" ],
+ "realmRoles" : [ "default-roles-onap", "portal_designer" ],
"notBefore" : 0,
"groups" : [ ]
}, {
"credentials" : [ ],
"disableableCredentialTypes" : [ ],
"requiredActions" : [ ],
- "realmRoles" : [ "default-roles-onap", "onap_operator" ],
+ "realmRoles" : [ "default-roles-onap", "portal_operator" ],
"notBefore" : 0,
"groups" : [ ]
}, {
container_name: mongo-preferences
image: "${MONGO_IMAGE}:${MONGO_VERSION}"
environment:
- MONGO_INITDB_ROOT_USERNAME: ${PORTALPREFS_USERNAME}
- MONGO_INITDB_ROOT_PASSWORD: ${PORTALPREFS_PASSWORD}
+ MONGO_INITDB_ROOT_USERNAME: ${PREFERENCES_USERNAME}
+ MONGO_INITDB_ROOT_PASSWORD: ${PREFERENCES_PASSWORD}
preferences:
container_name: preferences
image: "${IMAGE_REPOSITORY}/${PREFERENCES_IMAGE_NAME}:${PREFERENCES_IMAGE_TAG}"
ports:
- 9001:9001
environment:
- PORTALPREFS_USERNAME: ${PORTALPREFS_USERNAME}
- PORTALPREFS_PASSWORD: ${PORTALPREFS_PASSWORD}
- PORTALPREFS_DATABASE: ${PORTALPREFS_DATABASE}
+ PREFERENCES_USERNAME: ${PREFERENCES_USERNAME}
+ PREFERENCES_PASSWORD: ${PREFERENCES_PASSWORD}
+ PREFERENCES_DATABASE: ${PREFERENCES_DATABASE}
KEYCLOAK_URL: ${KEYCLOAK_URL}
KEYCLOAK_REALM: ${KEYCLOAK_REALM}
- PORTALPREFS_HOST: ${PORTALPREFS_HOST}
- PORTALPREFS_PORT: ${PORTALPREFS_PORT}
+ PREFERENCES_HOST: ${PREFERENCES_HOST}
+ PREFERENCES_PORT: ${PREFERENCES_PORT}
depends_on:
- mongo-preferences
\ No newline at end of file
}
@Bean
- public PreferencesApi portalPrefsApi(WebClient.Builder webClientBuilder) {
+ public PreferencesApi preferencesApi(WebClient.Builder webClientBuilder) {
return constructApiClient(webClientBuilder, PreferencesApi::new);
}