This commit is contained in:
nheron 2021-02-02 10:00:22 +01:00
commit fb602c8b01
11 changed files with 32 additions and 16 deletions

View file

@ -357,10 +357,10 @@
<configuration> <configuration>
<!--registry>192.168.1.184:12500</registry--> <!--registry>192.168.1.184:12500</registry-->
<dockerHost>${docker.Host}</dockerHost>
<!-- this is for Mac and Amazon Linux --> <!-- this is for Mac and Amazon Linux -->
<!--dockerHost>unix:///var/run/docker.sock</dockerHost--> <dockerHost>unix:///var/run/docker.sock</dockerHost>
<verbose>true</verbose> <verbose>true</verbose>
<images> <images>

View file

@ -76,6 +76,7 @@ public class DababaseContentUpdate {
User adminUser = userRepository.findByLogin("admin"); User adminUser = userRepository.findByLogin("admin");
if (adminUser == null) { if (adminUser == null) {
this.initDatabase(); this.initDatabase();
this.synchronizeDatabaseWithWorkbenches();
} else { } else {
this.synchronizeDatabaseWithWorkbenches(); this.synchronizeDatabaseWithWorkbenches();
} }
@ -98,19 +99,26 @@ public class DababaseContentUpdate {
userGroupsRepository.save(new UserGroups(UUID.randomUUID().toString(), "demogroup")); userGroupsRepository.save(new UserGroups(UUID.randomUUID().toString(), "demogroup"));
User adminUser = new User(UUID.randomUUID().toString(), "admin", "adminadmin99#"); User adminUser = new User(UUID.randomUUID().toString(), "admin", "adminadmin99#");
adminUser.getUserGroups().add(userGroupsRepository.findByName("kiemgmt")); // adminUser.getUserGroups().add(userGroupsRepository.findByName("kiemgmt"));
adminUser.getUserGroups().add(userGroupsRepository.findByName("admingroup")); // adminUser.getUserGroups().add(userGroupsRepository.findByName("admingroup"));
adminUser.getUserRoles().add(userRolesRepository.findByName("admin")); adminUser.getUserRoles().add(userRolesRepository.findByName("admin"));
adminUser.getUserRoles().add(userRolesRepository.findByName("rest-all")); adminUser.getUserRoles().add(userRolesRepository.findByName("rest-all"));
userRepository.save(adminUser); userRepository.save(adminUser);
User nheronUser = new User(UUID.randomUUID().toString(), "nheron", "adminnheron00@"); User nheronUser = new User(UUID.randomUUID().toString(), "nheron", "adminnheron00@");
nheronUser.getUserGroups().add(userGroupsRepository.findByName("kiemgmt")); // nheronUser.getUserGroups().add(userGroupsRepository.findByName("kiemgmt"));
nheronUser.getUserGroups().add(userGroupsRepository.findByName("admingroup")); // nheronUser.getUserGroups().add(userGroupsRepository.findByName("admingroup"));
nheronUser.getUserRoles().add(userRolesRepository.findByName("admin")); nheronUser.getUserRoles().add(userRolesRepository.findByName("admin"));
nheronUser.getUserRoles().add(userRolesRepository.findByName("rest-all")); nheronUser.getUserRoles().add(userRolesRepository.findByName("rest-all"));
userRepository.save(nheronUser); userRepository.save(nheronUser);
User apiUser = new User(UUID.randomUUID().toString(), "api-user", "api-user");
// nheronUser.getUserGroups().add(userGroupsRepository.findByName("kiemgmt"));
// nheronUser.getUserGroups().add(userGroupsRepository.findByName("admingroup"));
apiUser.getUserRoles().add(userRolesRepository.findByName("rest-all"));
userRepository.save(apiUser);
KieWorkbench mainWorkbench = new KieWorkbench(); KieWorkbench mainWorkbench = new KieWorkbench();
mainWorkbench.setID(UUID.randomUUID().toString()); mainWorkbench.setID(UUID.randomUUID().toString());
mainWorkbench.setName("demo"); mainWorkbench.setName("demo");

View file

@ -183,7 +183,7 @@ public class GridRuntime extends Grid<RuntimePersist> {
filterDataProvider = dataProvider.withConfigurableFilter(); filterDataProvider = dataProvider.withConfigurableFilter();
setDataProvider(filterDataProvider); setDataProvider(filterDataProvider);
for (RuntimePersist runtimePersist : dataProvider.getItems()) { for (RuntimePersist runtimePersist : dataProvider.getItems()) {
if (projectPersist.getServerNames().contains(runtimePersist.getServerName())) { if (projectPersist!= null && projectPersist.getServerNames().contains(runtimePersist.getServerName())) {
selectionModel.select(runtimePersist); selectionModel.select(runtimePersist);
} }
} }

View file

@ -236,8 +236,7 @@
<configuration> <configuration>
<!--registry>192.168.1.184:12500</registry--> <!--registry>192.168.1.184:12500</registry-->
<dockerHost>${docker.Host}</dockerHost> <dockerHost>unix:///var/run/docker.sock</dockerHost>
<!-- this is for Mac and Amazon Linux --> <!-- this is for Mac and Amazon Linux -->
<!--dockerHost>unix:///var/run/docker.sock</dockerHost--> <!--dockerHost>unix:///var/run/docker.sock</dockerHost-->

View file

@ -245,7 +245,7 @@
<configuration> <configuration>
<!--registry>192.168.1.184:12500</registry--> <!--registry>192.168.1.184:12500</registry-->
<dockerHost>${docker.Host}</dockerHost> <dockerHost>unix:///var/run/docker.sock</dockerHost>
<!-- this is for Mac and Amazon Linux --> <!-- this is for Mac and Amazon Linux -->
<!--dockerHost>unix:///var/run/docker.sock</dockerHost--> <!--dockerHost>unix:///var/run/docker.sock</dockerHost-->

View file

@ -101,7 +101,7 @@
<configuration> <configuration>
<!--registry>192.168.1.184:12500</registry--> <!--registry>192.168.1.184:12500</registry-->
<dockerHost>${docker.Host}</dockerHost> <dockerHost>unix:///var/run/docker.sock</dockerHost>
<!-- this is for Mac and Amazon Linux --> <!-- this is for Mac and Amazon Linux -->
<!--dockerHost>unix:///var/run/docker.sock</dockerHost--> <!--dockerHost>unix:///var/run/docker.sock</dockerHost-->

View file

@ -77,6 +77,7 @@ public class DroolsBusinessIndexerServer {
props.put(ConsumerConfig.GROUP_ID_CONFIG, groupID); props.put(ConsumerConfig.GROUP_ID_CONFIG, groupID);
props.put(ConsumerConfig.KEY_DESERIALIZER_CLASS_CONFIG, StringDeserializer.class); props.put(ConsumerConfig.KEY_DESERIALIZER_CLASS_CONFIG, StringDeserializer.class);
props.put(ConsumerConfig.VALUE_DESERIALIZER_CLASS_CONFIG, JsonDeserializer.class); props.put(ConsumerConfig.VALUE_DESERIALIZER_CLASS_CONFIG, JsonDeserializer.class);
props.put(ConsumerConfig.FETCH_MAX_BYTES_CONFIG, 4655826);
if (activateSsl) { if (activateSsl) {
props.put(CommonClientConfigs.SECURITY_PROTOCOL_CONFIG, SecurityProtocol.SSL.name); props.put(CommonClientConfigs.SECURITY_PROTOCOL_CONFIG, SecurityProtocol.SSL.name);
props.put(SslConfigs.SSL_TRUSTSTORE_LOCATION_CONFIG, this.sslTruststoreLocation); props.put(SslConfigs.SSL_TRUSTSTORE_LOCATION_CONFIG, this.sslTruststoreLocation);

View file

@ -232,7 +232,7 @@
<configuration> <configuration>
<!--registry>192.168.1.184:12500</registry--> <!--registry>192.168.1.184:12500</registry-->
<dockerHost>${docker.Host}</dockerHost> <dockerHost>unix:///var/run/docker.sock</dockerHost>
<!-- this is for Mac and Amazon Linux --> <!-- this is for Mac and Amazon Linux -->
<!--dockerHost>unix:///var/run/docker.sock</dockerHost--> <!--dockerHost>unix:///var/run/docker.sock</dockerHost-->

View file

@ -116,6 +116,9 @@ public class DroolsBusinessProxyServer {
configProps.put( configProps.put(
ProducerConfig.VALUE_SERIALIZER_CLASS_CONFIG, ProducerConfig.VALUE_SERIALIZER_CLASS_CONFIG,
JsonSerializer.class); JsonSerializer.class);
configProps.put(
ProducerConfig.MAX_REQUEST_SIZE_CONFIG, 4655826);
if (activateSsl) { if (activateSsl) {
configProps.put(CommonClientConfigs.SECURITY_PROTOCOL_CONFIG, SecurityProtocol.SSL.name); configProps.put(CommonClientConfigs.SECURITY_PROTOCOL_CONFIG, SecurityProtocol.SSL.name);
configProps.put(SslConfigs.SSL_TRUSTSTORE_LOCATION_CONFIG, this.sslTruststoreLocation); configProps.put(SslConfigs.SSL_TRUSTSTORE_LOCATION_CONFIG, this.sslTruststoreLocation);
@ -143,6 +146,8 @@ public class DroolsBusinessProxyServer {
configProps.put( configProps.put(
ProducerConfig.VALUE_SERIALIZER_CLASS_CONFIG, ProducerConfig.VALUE_SERIALIZER_CLASS_CONFIG,
JsonSerializer.class); JsonSerializer.class);
configProps.put(
ProducerConfig.MAX_REQUEST_SIZE_CONFIG,"41943040");
if (activateSsl) { if (activateSsl) {
configProps.put(CommonClientConfigs.SECURITY_PROTOCOL_CONFIG, SecurityProtocol.SSL.name); configProps.put(CommonClientConfigs.SECURITY_PROTOCOL_CONFIG, SecurityProtocol.SSL.name);
configProps.put(SslConfigs.SSL_TRUSTSTORE_LOCATION_CONFIG, this.sslTruststoreLocation); configProps.put(SslConfigs.SSL_TRUSTSTORE_LOCATION_CONFIG, this.sslTruststoreLocation);

View file

@ -56,7 +56,11 @@ public class RuleService {
} }
} }
chtijbugObjectRequest.setTransactionEndTimeStamp(LocalDateTime.now()); chtijbugObjectRequest.setTransactionEndTimeStamp(LocalDateTime.now());
try {
kafkaTemplateLogging.send(KafkaTopicConstants.LOGING_TOPIC,chtijbugObjectRequest); kafkaTemplateLogging.send(KafkaTopicConstants.LOGING_TOPIC,chtijbugObjectRequest);
}catch (Exception e){
logger.error(" kafkaTemplateLogging.send",e);
}
return chtijbutObjectResponse.getObjectRequest(); return chtijbutObjectResponse.getObjectRequest();
} }

View file

@ -130,8 +130,7 @@
<configuration> <configuration>
<!--registry>192.168.1.184:12500</registry--> <!--registry>192.168.1.184:12500</registry-->
<dockerHost>${docker.Host}</dockerHost> <dockerHost>unix:///var/run/docker.sock</dockerHost>
<!-- this is for Mac and Amazon Linux --> <!-- this is for Mac and Amazon Linux -->
<!--dockerHost>unix:///var/run/docker.sock</dockerHost--> <!--dockerHost>unix:///var/run/docker.sock</dockerHost-->