onecx-tenant-bff

Default properties

src/main/resources/application.properties
quarkus.http.auth.permission.health.paths=/q/*
quarkus.http.auth.permission.health.policy=permit
quarkus.http.auth.permission.default.paths=/*
quarkus.http.auth.permission.default.policy=authenticated
onecx.permissions.application-id=${quarkus.application.name}
org.eclipse.microprofile.rest.client.propagateHeaders=apm-principal-token
%prod.quarkus.rest-client.onecx_tenant_internal.url=http://onecx-tenant-svc:8080
%prod.quarkus.rest-client.onecx_image_internal.url=http://onecx-product-store-svc:8080
quarkus.openapi-generator.codegen.spec.onecx_tenant_internal_yaml.config-key=onecx_tenant_internal
quarkus.openapi-generator.codegen.spec.onecx_tenant_internal_yaml.base-package=gen.org.tkit.onecx.tenant.client
quarkus.openapi-generator.codegen.spec.onecx_tenant_internal_yaml.return-response=true
quarkus.openapi-generator.codegen.spec.onecx_tenant_internal_yaml.additional-api-type-annotations=@org.eclipse.microprofile.rest.client.annotation.RegisterClientHeaders;
quarkus.openapi-generator.codegen.spec.onecx_tenant_internal_yaml.additional-model-type-annotations=@io.quarkus.runtime.annotations.RegisterForReflection;
quarkus.openapi-generator.codegen.spec.onecx_tenant_internal_yaml.enable-security-generation=false
quarkus.openapi-generator.codegen.spec.onecx_tenant_image_internal_yaml.config-key=onecx_image_internal
quarkus.openapi-generator.codegen.spec.onecx_tenant_image_internal_yaml.base-package=gen.org.tkit.onecx.tenant.image.client
quarkus.openapi-generator.codegen.spec.onecx_tenant_image_internal_yaml.return-response=true
quarkus.openapi-generator.codegen.spec.onecx_tenant_image_internal_yaml.additional-api-type-annotations=@org.eclipse.microprofile.rest.client.annotation.RegisterClientHeaders;
quarkus.openapi-generator.codegen.spec.onecx_tenant_image_internal_yaml.type-mappings.File=byte[]
quarkus.openapi-generator.codegen.spec.onecx_tenant_image_internal_yaml.additional-model-type-annotations=@io.quarkus.runtime.annotations.RegisterForReflection;
quarkus.openapi-generator.codegen.spec.onecx_tenant_image_internal_yaml.enable-security-generation=false
%prod.quarkus.rest-client.onecx_image_internal.providers=io.quarkus.oidc.client.reactive.filter.OidcClientRequestReactiveFilter
%prod.quarkus.rest-client.onecx_tenant_internal.providers=io.quarkus.oidc.client.reactive.filter.OidcClientRequestReactiveFilter
%prod.quarkus.oidc-client.client-id=${quarkus.application.name}
quarkus.openapi-generator.codegen.input-base-dir=target/tmp/openapi

Extensions

Extensions

Documentation

Configuration

Version

quarkus-rest

Link

Link

3.27.1

quarkus-smallrye-openapi

Link

Link

3.27.1

quarkus-rest-jackson

Link

3.27.1

quarkus-smallrye-health

Link

Link

3.27.1

quarkus-opentelemetry

Link

Link

3.27.1

quarkus-micrometer-registry-prometheus

Link

Link

3.27.1

quarkus-openapi-generator

Link

Link

2.13.0-lts

quarkus-rest-client-jackson

Link

3.27.1

tkit-quarkus-log-cdi

Link

Link

4.6.0

tkit-quarkus-log-rs

Link

Link

4.6.0

tkit-quarkus-log-json

Link

Link

4.6.0

tkit-quarkus-rest

Link

Link

4.6.0

tkit-quarkus-rest-context

Link

Link

4.6.0

quarkus-hibernate-validator

Link

Link

3.27.1

onecx-permissions

Link

Link

2.3.0

quarkus-oidc

Link

Link

3.27.1

tkit-quarkus-security

Link

Link

4.6.0

onecx-core

Link

2.3.0

quarkus-arc

Link

Link

3.27.1

quarkus-container-image-docker

Link

Link

3.27.1

quarkus-rest-client-oidc-filter

3.27.1

| | | 3.20.2.1

|===th

| | | 2.40.0

|===ttps://github.com/quarkusio/quarkusio.github.io/blob/develop/_generated-doc/latest/config/quarkus-container-image-docker.adoc[Link] | 3.15.1

| quarkus-rest-client-oidc-filter

| | | 3.15.1

=== Container

Docker registry

=== Helm

Helm registry

Default values

.src/main/helm/values.yaml [source,yaml] ---- app: name: bff image: repository: "onecx/onecx-tenant-bff" operator: # Permission permission: enabled: true spec: permissions: tenant: read: permission on all GET requests and POST search write: permission on PUT, POST, PATCH requests, where objects are saved or updated delete: permission on all DELETE requests keycloak: client: enabled: true spec: kcConfig: defaultClientScopes: [ ocx-tn:all, ocx-pm:read ] microservice: spec: description: OneCX Tenant Backend For Frontend name: OneCX Tenant BFF ----

description: OneCX Tenant Backend For Frontend name: OneCX Tenant BFF ----