Skip to content

Latest commit

 

History

History
118 lines (77 loc) · 3.2 KB

File metadata and controls

118 lines (77 loc) · 3.2 KB

reactima-encore-temporal-zitadel-poc

This is a demo playground for several enterprise ready technologies

  • Encore
  • Temporal workflow engine
  • Zitadel IDP (Indentity Provider) with features include multi-tenancy with branding customization, secure login, self-service, OpenID Connect, OAuth2.x, SAML2, Passwordless with FIDO2 (including Passkeys), OTP, U2F, and an unlimited audit trail.

🧾 Part 1 - Billing Service Demo

Billing Service Demo section is designed to showcase temporal workflow application in context of billing transactions.

🛠 Development Setup

To dive into this demo locally:

🌀 Launching Temporal Server

  1. Grab the latest Temporal.

  2. Start it up with the command:

    temporal server start-dev --db-filename temporal.db
  3. 🌍 To access the Temporal dashboard, navigate to:

    http://127.0.0.1:8233
    

🎵 Working with Encore

For local development, ensure you've got Encore ready.

  1. First of all run test via Encore:

    encore test ./...
  2. Run the following to kick off Encore:

    encore run
  3. 🌍 This spins up the Encore UI in your default browser at:

    http://localhost:9400
    

    Use the UI to monitor and analyze API calls seamlessly.

🧾 Part 2 - Zitadel SDK Demo

Zitadel SDK Demo section is designed to showcase the following actions

  • user creation
  • updating user by email
  • deactivating user
  • changing password
  • changing avatar
  • creating project
  • assigning user by email to project

🚀 Zitadel

Zitadel Cloud

Sign up for cloud version https://zitadel.com/

Zitadel Local/Selfhosted

Go through

For maximum control over Zitadel run the following on Ubuntu 20/22 server

make compile
docker build -f Dockerfile -t zitadel2 .

Run Zitadel

./zitadel start-from-init --config reactima-config/example-zitadel-config.yaml --masterkey "MasterkeyNeedsToHave32Dummy##"

Protobuf/Protoset interface

Generate protoset file

buf build -o zitadel.protoset

gRPC client

For testing gRPC calls to Zitadel install grpcui

grpcui -vv -plaintext -H 'authorization: Bearer XXX_TOKEN_FROM_ZITADEL_HERE' -protoset  /path/zitadel.protoset  -plaintext localhost:8080

Replace "localhost:8080" with Zitadel address. Use "example.com:443" for https cloud base version

Headhunt me

Interested to discuss the above or looking for a partner to work on AI Agents, Data Mining, CRM, B2B Lead Generation and/or Outbound Marketing SaaS system related projects? Feel free to ping me to exchange ideas or request a consultation!