Skip to content

Commit

Permalink
remove main security main class + rename google index.html
Browse files Browse the repository at this point in the history
Signed-off-by: tvallin <[email protected]>
  • Loading branch information
tvallin committed Nov 10, 2023
1 parent 73fbcc3 commit 7651570
Show file tree
Hide file tree
Showing 12 changed files with 327 additions and 521 deletions.

This file was deleted.

3 changes: 0 additions & 3 deletions archetypes/helidon/src/main/archetype/common/security.xml
Original file line number Diff line number Diff line change
Expand Up @@ -84,9 +84,6 @@
<option value="abac" name="ABAC" description="Attribute Based Access Control">
<output>
<model>
<list key="providers-config-entries">
<value file="files/application.abac.yaml"/>
</list>
<list key="dependencies">
<map>
<value key="groupId">io.helidon.security.providers</value>
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
- abac:
fail-on-unvalidated: true
fail-if-none-validated: true
Original file line number Diff line number Diff line change
@@ -1,16 +1,16 @@
- oidc:
# use a custom name, so it does not clash with other examples
cookie-name: "OIDC_EXAMPLE_COOKIE"
# support for "Authorization" header with bearer token
header-use: true
# the default redirect-uri, where the webserver listens on redirects from identity server
redirect-uri: "/oidc/redirect"
issuer: "https://tenant.some-server.com/oauth2/default"
audience: "configured audience"
client-id: "some client id"
client-secret: "some client secret"
identity-uri: "https://tenant.some-server.com/oauth2/default"
frontend-uri: "http://localhost:7987"
server-type: "@default"
# We want to redirect to login page (and token can be received either through cookie or header)
redirect: true
- oidc:
# use a custom name, so it does not clash with other examples
cookie-name: "OIDC_EXAMPLE_COOKIE"
# support for "Authorization" header with bearer token
header-use: true
# the default redirect-uri, where the webserver listens on redirects from identity server
redirect-uri: "/oidc/redirect"
issuer: "https://tenant.some-server.com/oauth2/default"
audience: "configured audience"
client-id: "some client id"
client-secret: "some client secret"
identity-uri: "https://tenant.some-server.com/oauth2/default"
frontend-uri: "http://localhost:7987"
server-type: "@default"
# We want to redirect to login page (and token can be received either through cookie or header)
redirect: true
Original file line number Diff line number Diff line change
Expand Up @@ -99,7 +99,17 @@ to your tenant and application configuration.
</model>
</output>
</method>
<method name="security-abac">
<output if="${security.atz} contains ['abac']">
<model>
<list key="providers-config-entries">
<value file="files/application.abac.yaml"/>
</list>
</model>
</output>
</method>
</methods>
<call method="security-abac"/>
<call method="security-oidc"/>
<call method="security-jwt"/>
<call method="security-google"/>
Expand Down
7 changes: 7 additions & 0 deletions archetypes/helidon/src/main/archetype/se/common/common-se.xml
Original file line number Diff line number Diff line change
Expand Up @@ -125,7 +125,14 @@
.build()
.start();
{{#Main-after-server}}
{{.}}
{{/Main-after-server}}
System.out.println("WEB server is up! http://localhost:" + server.port() + "/simple-greet");
{{#Main-logging}}
{{.}}
{{/Main-logging}}
]]></value>
</list>
<list key="main-class-content">
Expand Down

This file was deleted.

This file was deleted.

Loading

0 comments on commit 7651570

Please sign in to comment.