client:
provider:
keycloak:
- token-uri: http://localhost:8080/auth/realms/ONAP/protocol/openid-connect/token
- jwk-set-uri: http://localhost:8080/auth/realms/ONAP/protocol/openid-connect/certs
+ token-uri: http://localhost:8080/realms/ONAP/protocol/openid-connect/token
+ jwk-set-uri: http://localhost:8080/realms/ONAP/protocol/openid-connect/certs
registration:
keycloak:
provider: keycloak
authorization-grant-type: client_credentials
resourceserver:
jwt:
- jwk-set-uri: http://localhost:8080/auth/realms/ONAP/protocol/openid-connect/certs
+ jwk-set-uri: http://localhost:8080/realms/ONAP/protocol/openid-connect/certs
management:
endpoints:
client:
provider:
keycloak:
- token-uri: http://localhost:8080/auth/realms/ONAP/protocol/openid-connect/token
- jwk-set-uri: http://localhost:8080/auth/realms/ONAP/protocol/openid-connect/certs
+ token-uri: http://localhost:8080/realms/ONAP/protocol/openid-connect/token
+ jwk-set-uri: http://localhost:8080/realms/ONAP/protocol/openid-connect/certs
registration:
keycloak:
provider: keycloak
authorization-grant-type: client_credentials
resourceserver:
jwt:
- jwk-set-uri: http://localhost:8080/auth/realms/ONAP/protocol/openid-connect/certs
+ jwk-set-uri: http://localhost:8080/realms/ONAP/protocol/openid-connect/certs
management:
endpoints:
client:
provider:
keycloak:
- token-uri: ${KEYCLOAK_URL}/auth/realms/${KEYCLOAK_REALM}/protocol/openid-connect/token
- jwk-set-uri: ${KEYCLOAK_URL}/auth/realms/${KEYCLOAK_REALM}/protocol/openid-connect/certs
+ token-uri: ${KEYCLOAK_URL}/realms/${KEYCLOAK_REALM}/protocol/openid-connect/token
+ jwk-set-uri: ${KEYCLOAK_URL}/realms/${KEYCLOAK_REALM}/protocol/openid-connect/certs
registration:
keycloak:
provider: keycloak
authorization-grant-type: client_credentials
resourceserver:
jwt:
- jwk-set-uri: ${KEYCLOAK_URL}/auth/realms/${KEYCLOAK_REALM}/protocol/openid-connect/certs
+ jwk-set-uri: ${KEYCLOAK_URL}/realms/${KEYCLOAK_REALM}/protocol/openid-connect/certs
jackson:
serialization:
FAIL_ON_EMPTY_BEANS: false
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/realms/%s/protocol/openid-connect/certs", realm)))
+ String.format("/realms/%s/protocol/openid-connect/certs", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", JWKSet.MIME_TYPE)
WireMock.stubFor(
WireMock.post(
WireMock.urlMatching(
- String.format("/auth/realms/%s/protocol/openid-connect/token", realm)))
+ String.format("/realms/%s/protocol/openid-connect/token", realm)))
.withBasicAuth("test", "test")
.withRequestBody(WireMock.containing("grant_type=client_credentials"))
.willReturn(
@Builder.Default private final List<String> roles = Collections.emptyList();
public String issuer() {
- return String.format("http://localhost:%d/auth/realms/%s", port, realm);
+ return String.format("http://localhost:%d/realms/%s", port, realm);
}
}
}
new ErrorResponseKeycloakDto().errorMessage("Some error message");
WireMock.stubFor(
- WireMock.get(WireMock.urlMatching(String.format("/auth/admin/realms/%s/roles", realm)))
+ WireMock.get(WireMock.urlMatching(String.format("/admin/realms/%s/roles", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
protected void mockListRealmRoles(List<RoleKeycloakDto> roles) throws Exception {
WireMock.stubFor(
- WireMock.get(WireMock.urlMatching(String.format("/auth/admin/realms/%s/roles", realm)))
+ WireMock.get(WireMock.urlMatching(String.format("/admin/realms/%s/roles", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
protected void mockCreateUser(UserKeycloakDto request, String userId) throws Exception {
WireMock.stubFor(
- WireMock.post(WireMock.urlMatching(String.format("/auth/admin/realms/%s/users", realm)))
+ WireMock.post(WireMock.urlMatching(String.format("/admin/realms/%s/users", realm)))
.withRequestBody(WireMock.equalToJson(objectMapper.writeValueAsString(request)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
.withHeader(
"location",
- String.format("/auth/admin/realms/%s/users/%s", realm, userId))));
+ String.format("/admin/realms/%s/users/%s", realm, userId))));
}
protected void mockGetUser(String userId, UserKeycloakDto response) throws Exception {
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/%s", realm, userId)))
+ String.format("/admin/realms/%s/users/%s", realm, userId)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.post(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users/%s/role-mappings/realm", realm, userId)))
+ "/admin/realms/%s/users/%s/role-mappings/realm", realm, userId)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.put(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users/%s/execute-actions-email", realm, userId)))
+ "/admin/realms/%s/users/%s/execute-actions-email", realm, userId)))
.withRequestBody(WireMock.equalTo(objectMapper.writeValueAsString(request)))
.willReturn(
WireMock.aResponse()
WireMock.get(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users/%s/role-mappings/realm", realm, userID)))
+ "/admin/realms/%s/users/%s/role-mappings/realm", realm, userID)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.put(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users/%s/execute-actions-email", realm, userId)))
+ "/admin/realms/%s/users/%s/execute-actions-email", realm, userId)))
.withRequestBody(WireMock.equalTo(objectMapper.writeValueAsString(request)))
.willReturn(
WireMock.aResponse().withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)));
protected void mockListRealmRoles(List<RoleKeycloakDto> roles) throws Exception {
WireMock.stubFor(
- WireMock.get(WireMock.urlMatching(String.format("/auth/admin/realms/%s/roles", realm)))
+ WireMock.get(WireMock.urlMatching(String.format("/admin/realms/%s/roles", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
@Test
void userCanBeDeleted() {
WireMock.stubFor(
- WireMock.delete(WireMock.urlMatching(String.format("/auth/admin/realms/%s/users/1", realm)))
+ WireMock.delete(WireMock.urlMatching(String.format("/admin/realms/%s/users/1", realm)))
.willReturn(WireMock.aResponse().withStatus(204)));
requestSpecification()
new ErrorResponseKeycloakDto().errorMessage("Some error message");
WireMock.stubFor(
- WireMock.delete(WireMock.urlMatching(String.format("/auth/admin/realms/%s/users/1", realm)))
+ WireMock.delete(WireMock.urlMatching(String.format("/admin/realms/%s/users/1", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
new UserKeycloakDto().id("1").username("user1").email("user1@localhost").enabled(true);
WireMock.stubFor(
- WireMock.get(WireMock.urlMatching(String.format("/auth/admin/realms/%s/users/1", realm)))
+ WireMock.get(WireMock.urlMatching(String.format("/admin/realms/%s/users/1", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
new ErrorResponseKeycloakDto().errorMessage("Some error message");
WireMock.stubFor(
- WireMock.get(WireMock.urlMatching(String.format("/auth/admin/realms/%s/users/1", realm)))
+ WireMock.get(WireMock.urlMatching(String.format("/admin/realms/%s/users/1", realm)))
.willReturn(
WireMock.aResponse()
.withHeader(HttpHeaders.CONTENT_TYPE, MediaType.APPLICATION_JSON_VALUE)
WireMock.get(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users/%s/role-mappings/realm", realm, userID)))
+ "/admin/realms/%s/users/%s/role-mappings/realm", realm, userID)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.get(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users/1/role-mappings/realm/available", realm)))
+ "/admin/realms/%s/users/1/role-mappings/realm/available", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.get(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users/1/role-mappings/realm/available", realm)))
+ "/admin/realms/%s/users/1/role-mappings/realm/available", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
protected void mockGetUserCount(Integer userCount) {
WireMock.stubFor(
WireMock.get(
- WireMock.urlMatching(String.format("/auth/admin/realms/%s/users/count", realm)))
+ WireMock.urlMatching(String.format("/admin/realms/%s/users/count", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.get(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users\\?first=%s&max=%s", realm, first, max)))
+ "/admin/realms/%s/users\\?first=%s&max=%s", realm, first, max)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
protected void mockListRealmRoles(List<RoleKeycloakDto> roles) throws Exception {
WireMock.stubFor(
- WireMock.get(WireMock.urlMatching(String.format("/auth/admin/realms/%s/roles", realm)))
+ WireMock.get(WireMock.urlMatching(String.format("/admin/realms/%s/roles", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/roles/%s/users", realm, roleName)))
+ String.format("/admin/realms/%s/roles/%s/users", realm, roleName)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.get(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users\\?first=%s&max=%s", realm, first, max)))
+ "/admin/realms/%s/users\\?first=%s&max=%s", realm, first, max)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.get(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users/1/role-mappings/realm/available", realm)))
+ "/admin/realms/%s/users/1/role-mappings/realm/available", realm)))
.inScenario("test")
.whenScenarioStateIs(Scenario.STARTED)
.willReturn(
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.inScenario("test")
.whenScenarioStateIs(Scenario.STARTED)
.willReturn(
WireMock.stubFor(
WireMock.post(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.inScenario("test")
.whenScenarioStateIs(Scenario.STARTED)
.withRequestBody(WireMock.equalTo(objectMapper.writeValueAsString(keycloakRolesToAdd)))
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.inScenario("test")
.whenScenarioStateIs("rolesUpdated")
.willReturn(
WireMock.get(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users/1/role-mappings/realm/available", realm)))
+ "/admin/realms/%s/users/1/role-mappings/realm/available", realm)))
.inScenario("test")
.whenScenarioStateIs(Scenario.STARTED)
.willReturn(
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.inScenario("test")
.whenScenarioStateIs(Scenario.STARTED)
.willReturn(
WireMock.stubFor(
WireMock.delete(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.inScenario("test")
.whenScenarioStateIs(Scenario.STARTED)
.withRequestBody(
WireMock.stubFor(
WireMock.post(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.inScenario("test")
.whenScenarioStateIs(Scenario.STARTED)
.withRequestBody(WireMock.equalTo(objectMapper.writeValueAsString(keycloakRolesToAdd)))
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.inScenario("test")
.whenScenarioStateIs("rolesUpdated")
.willReturn(
WireMock.get(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users/1/role-mappings/realm/available", realm)))
+ "/admin/realms/%s/users/1/role-mappings/realm/available", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.stubFor(
WireMock.delete(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.withRequestBody(
WireMock.equalTo(objectMapper.writeValueAsString(keycloakRolesToRemove)))
.willReturn(WireMock.aResponse().withStatus(HttpStatus.NO_CONTENT.value())));
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.get(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users/1/role-mappings/realm/available", realm)))
+ "/admin/realms/%s/users/1/role-mappings/realm/available", realm)))
.inScenario("test")
.whenScenarioStateIs(Scenario.STARTED)
.willReturn(
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.inScenario("test")
.whenScenarioStateIs(Scenario.STARTED)
.willReturn(
WireMock.stubFor(
WireMock.post(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.inScenario("test")
.whenScenarioStateIs(Scenario.STARTED)
.withRequestBody(WireMock.equalTo(objectMapper.writeValueAsString(keycloakRolesToAdd)))
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.inScenario("test")
.whenScenarioStateIs("rolesUpdated")
.willReturn(
WireMock.get(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users/1/role-mappings/realm/available", realm)))
+ "/admin/realms/%s/users/1/role-mappings/realm/available", realm)))
.inScenario("test")
.whenScenarioStateIs(Scenario.STARTED)
.willReturn(
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.inScenario("test")
.whenScenarioStateIs(Scenario.STARTED)
.willReturn(
WireMock.stubFor(
WireMock.delete(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.inScenario("test")
.whenScenarioStateIs(Scenario.STARTED)
.withRequestBody(
WireMock.stubFor(
WireMock.post(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.inScenario("test")
.whenScenarioStateIs(Scenario.STARTED)
.withRequestBody(WireMock.equalTo(objectMapper.writeValueAsString(keycloakRolesToAdd)))
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/role-mappings/realm", realm)))
+ String.format("/admin/realms/%s/users/1/role-mappings/realm", realm)))
.inScenario("test")
.whenScenarioStateIs("rolesUpdated")
.willReturn(
final UserKeycloakDto keycloakRequest = new UserKeycloakDto().firstName("User1").enabled(false);
WireMock.stubFor(
- WireMock.put(WireMock.urlMatching(String.format("/auth/admin/realms/%s/users/1", realm)))
+ WireMock.put(WireMock.urlMatching(String.format("/admin/realms/%s/users/1", realm)))
.withRequestBody(WireMock.equalTo(objectMapper.writeValueAsString(keycloakRequest)))
.willReturn(
WireMock.aResponse()
WireMock.stubFor(
WireMock.put(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/%s", realm, userId)))
+ String.format("/admin/realms/%s/users/%s", realm, userId)))
.withRequestBody(WireMock.equalTo(objectMapper.writeValueAsString(request)))
.willReturn(
WireMock.aResponse().withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)));
WireMock.stubFor(
WireMock.get(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/%s", realm, userId)))
+ String.format("/admin/realms/%s/users/%s", realm, userId)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.get(
WireMock.urlMatching(
String.format(
- "/auth/admin/realms/%s/users/%s/role-mappings/realm", realm, userID)))
+ "/admin/realms/%s/users/%s/role-mappings/realm", realm, userID)))
.willReturn(
WireMock.aResponse()
.withHeader("Content-Type", MediaType.APPLICATION_JSON_VALUE)
WireMock.stubFor(
WireMock.put(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/reset-password", realm)))
+ String.format("/admin/realms/%s/users/1/reset-password", realm)))
.withRequestBody(WireMock.equalTo(objectMapper.writeValueAsString(keycloakRequest)))
.willReturn(WireMock.aResponse().withStatus(204)));
WireMock.stubFor(
WireMock.put(
WireMock.urlMatching(
- String.format("/auth/admin/realms/%s/users/1/reset-password", realm)))
+ String.format("/admin/realms/%s/users/1/reset-password", realm)))
.withRequestBody(WireMock.equalTo(objectMapper.writeValueAsString(keycloakRequest)))
.willReturn(
WireMock.aResponse()
client:
provider:
keycloak:
- token-uri: http://localhost:${wiremock.server.port}/auth/realms/ONAP/protocol/openid-connect/token
- jwk-set-uri: http://localhost:${wiremock.server.port}/auth/realms/ONAP/protocol/openid-connect/certs
+ token-uri: http://localhost:${wiremock.server.port}/realms/ONAP/protocol/openid-connect/token
+ jwk-set-uri: http://localhost:${wiremock.server.port}/realms/ONAP/protocol/openid-connect/certs
registration:
keycloak:
provider: keycloak
authorization-grant-type: client_credentials
resourceserver:
jwt:
- jwk-set-uri: http://localhost:${wiremock.server.port}/auth/realms/ONAP/protocol/openid-connect/certs
+ jwk-set-uri: http://localhost:${wiremock.server.port}/realms/ONAP/protocol/openid-connect/certs
jackson:
serialization:
FAIL_ON_EMPTY_BEANS: false
client:
provider:
keycloak:
- token-uri: http://localhost:${wiremock.server.port}/auth/realms/ONAP/protocol/openid-connect/token
- jwk-set-uri: http://localhost:${wiremock.server.port}/auth/realms/ONAP/protocol/openid-connect/certs
+ token-uri: http://localhost:${wiremock.server.port}/realms/ONAP/protocol/openid-connect/token
+ jwk-set-uri: http://localhost:${wiremock.server.port}/realms/ONAP/protocol/openid-connect/certs
registration:
keycloak:
provider: keycloak
authorization-grant-type: client_credentials
resourceserver:
jwt:
- jwk-set-uri: http://localhost:${wiremock.server.port}/auth/realms/ONAP/protocol/openid-connect/certs
+ jwk-set-uri: http://localhost:${wiremock.server.port}/realms/ONAP/protocol/openid-connect/certs
jackson:
serialization:
FAIL_ON_EMPTY_BEANS: false
}
],
"attributes": {
- "frontendUrl": "http://localhost:8080/auth/"
+ "frontendUrl": "http://localhost:8080/"
}
}
# @name login
@access_token = {{login.response.body.access_token}}
@id_token = {{login.response.body.id_token}}
-POST http://localhost:8080/auth/realms/ONAP/protocol/openid-connect/token
+POST http://localhost:8080/realms/ONAP/protocol/openid-connect/token
Content-Type: application/x-www-form-urlencoded
Authorization: Basic admin:password
# @name userinfo
@user_id = {{userinfo.response.body.sub}}
@user_name = {{userinfo.response.body.preferred_username}}
-GET http://localhost:8080/auth/realms/ONAP/protocol/openid-connect/userinfo
+GET http://localhost:8080/realms/ONAP/protocol/openid-connect/userinfo
Authorization: Bearer {{access_token}}
X-Auth-Identity: Bearer {{id_token}}
# To be used with IntelliJ IDEA
-POST http://localhost:8080/auth/realms/ONAP/protocol/openid-connect/token
+POST http://localhost:8080/realms/ONAP/protocol/openid-connect/token
Content-Type: application/x-www-form-urlencoded
client_id=portal-app&client_secret=&scope=openid&grant_type=password&username=onap-admin&password=password
###
-GET http://localhost:8080/auth/realms/ONAP/protocol/openid-connect/userinfo
+GET http://localhost:8080/realms/ONAP/protocol/openid-connect/userinfo
Authorization: Bearer {{access_token}}
X-Auth-Identity: Bearer {{id_token}}
// Extract service name and version from BasePath
String urlBasePathPrefix =
- String.format("%s/auth/admin/realms/%s", bffConfig.getKeycloakUrl(), bffConfig.getRealm());
+ String.format("%s/admin/realms/%s", bffConfig.getKeycloakUrl(), bffConfig.getRealm());
return apiConstructor.apply(apiClient.setBasePath(urlBasePathPrefix));
}