Compare commits

..

24 Commits

Author SHA1 Message Date
TeamCity
27da1327c1 ci: bump version to v4.43.0 2026-01-20 19:42:30 +00:00
82a9706deb feat: Simplify authorization request creation in OpenIDConnectService and use environment variables for Keycloak configuration 2026-01-20 20:39:56 +01:00
TeamCity
6479f68b6c ci: bump version to v4.42.0 2026-01-20 18:43:58 +00:00
4f52c1a0f3 feat: Add mainRoute configuration for OpenID in application and environment files 2026-01-20 19:41:29 +01:00
TeamCity
3787e0f3ed ci: bump version to v4.41.0 2026-01-20 15:16:55 +00:00
45dec00b86 feat: Implement transaction management for user addition and removal in HibernateUserManager 2026-01-20 16:14:38 +01:00
TeamCity
fbb3f48b6d ci: bump version to v4.40.0 2026-01-20 15:03:32 +00:00
e32f4eb8ff feat: Integrate UserManager and HibernateUserManager in session management 2026-01-20 16:00:59 +01:00
TeamCity
66edab8ffe ci: bump version to v4.39.0 2026-01-20 14:46:08 +00:00
9ca1813f06 feat: Add logging for user management operations in HibernateUserManager 2026-01-20 15:43:54 +01:00
TeamCity
0572af6ea2 ci: bump version to v4.38.0 2026-01-20 14:33:45 +00:00
9fa1e5e071 feat: Disable default JPA and Hibernate modules and enhance EntityManagerProvider for HikariCP integration 2026-01-20 15:31:14 +01:00
TeamCity
d34f0d16cc ci: bump version to v4.37.0 2026-01-20 14:16:41 +00:00
476db28821 feat: Enhance EntityManagerProvider to use Play configuration for database settings 2026-01-20 15:14:11 +01:00
TeamCity
18c347b6ad ci: bump version to v4.36.0 2026-01-20 14:04:58 +00:00
4aa8709eb5 feat: Add HikariCP specific configuration to db.conf 2026-01-20 15:02:34 +01:00
TeamCity
3766241dad ci: bump version to v4.35.0 2026-01-20 13:48:54 +00:00
009b2b1ad9 feat: Add HikariCP specific configuration to db.conf 2026-01-20 14:46:07 +01:00
TeamCity
ab29008a06 ci: bump version to v4.34.0 2026-01-20 13:37:33 +00:00
71a549b7f0 feat: Update Hibernate connection provider and database configuration 2026-01-20 14:34:34 +01:00
TeamCity
3ef79e5838 ci: bump version to v4.33.0 2026-01-20 13:19:08 +00:00
f4290b4497 feat: Update connection provider in persistence.xml for HikariCP 2026-01-20 14:16:18 +01:00
TeamCity
5a1296ff3a ci: bump version to v4.32.0 2026-01-20 13:00:12 +00:00
a7292e3b5d feat: Update persistence.xml and build.sbt for resource management 2026-01-20 13:57:23 +01:00
16 changed files with 215 additions and 89 deletions

View File

@@ -348,3 +348,63 @@
### Features ### Features
* BAC-39 Authentication ([#114](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/issues/114)) ([f6d3a18](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/f6d3a1845205318f43eb443601fd257613b7defb)) * BAC-39 Authentication ([#114](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/issues/114)) ([f6d3a18](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/f6d3a1845205318f43eb443601fd257613b7defb))
## (2026-01-20)
### Features
* Update persistence.xml and build.sbt for resource management ([a7292e3](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/a7292e3b5df4788f2f8bea5a2ec7b209b7357608))
## (2026-01-20)
### Features
* Update connection provider in persistence.xml for HikariCP ([f4290b4](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/f4290b44976fb6dcd4fc4b896614ba6062da73b1))
## (2026-01-20)
### Features
* Update Hibernate connection provider and database configuration ([71a549b](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/71a549b7f059e748f7691bb9a27e2861b61c6f6f))
## (2026-01-20)
### Features
* Add HikariCP specific configuration to db.conf ([009b2b1](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/009b2b1ad9180f58a0b1434354f8a467b4e452ca))
## (2026-01-20)
### Features
* Add HikariCP specific configuration to db.conf ([4aa8709](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/4aa8709eb593b03254efc616b6b04c23b23ab6ab))
## (2026-01-20)
### Features
* Enhance EntityManagerProvider to use Play configuration for database settings ([476db28](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/476db288216ed2c1013fe3ddb9b82472254e352b))
## (2026-01-20)
### Features
* Disable default JPA and Hibernate modules and enhance EntityManagerProvider for HikariCP integration ([9fa1e5e](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/9fa1e5e07122aebd0391d47c3513013243a72a0f))
## (2026-01-20)
### Features
* Add logging for user management operations in HibernateUserManager ([9ca1813](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/9ca1813f06539cffeb573d0e00571e4f2d5144f1))
## (2026-01-20)
### Features
* Integrate UserManager and HibernateUserManager in session management ([e32f4eb](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/e32f4eb8fff9daec46f20284e28e94a59231d033))
## (2026-01-20)
### Features
* Implement transaction management for user addition and removal in HibernateUserManager ([45dec00](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/45dec00b86a1395457226ed62ac319c61e38739a))
## (2026-01-20)
### Features
* Add mainRoute configuration for OpenID in application and environment files ([4f52c1a](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/4f52c1a0f30cf0b917452149a52b53b94d82a7c9))
## (2026-01-20)
### Features
* Simplify authorization request creation in OpenIDConnectService and use environment variables for Keycloak configuration ([82a9706](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/82a9706deb97db193015e55a048830d496e76d83))

View File

@@ -59,8 +59,11 @@ lazy val knockoutwhistweb = project.in(file("knockoutwhistweb"))
libraryDependencies += "org.playframework" %% "play-java-jpa" % "3.0.6", libraryDependencies += "org.playframework" %% "play-java-jpa" % "3.0.6",
libraryDependencies += "com.nimbusds" % "oauth2-oidc-sdk" % "11.31.1", libraryDependencies += "com.nimbusds" % "oauth2-oidc-sdk" % "11.31.1",
libraryDependencies += "org.playframework" %% "play-ws" % "3.0.6", libraryDependencies += "org.playframework" %% "play-ws" % "3.0.6",
libraryDependencies += "org.hibernate.orm" % "hibernate-hikaricp" % "7.2.1.Final",
libraryDependencies += ws, libraryDependencies += ws,
JsEngineKeys.engineType := JsEngineKeys.EngineType.Node JsEngineKeys.engineType := JsEngineKeys.EngineType.Node,
PlayKeys.externalizeResourcesExcludes += baseDirectory.value / "conf" / "META-INF" / "persistence.xml"
) )
lazy val root = (project in file(".")) lazy val root = (project in file("."))

View File

@@ -58,17 +58,33 @@ class OpenIDController @Inject()(
} yield { } yield {
openIDService.exchangeCodeForTokens(provider, authCode, sessionState.get).flatMap { openIDService.exchangeCodeForTokens(provider, authCode, sessionState.get).flatMap {
case Some(tokenResponse) => case Some(tokenResponse) =>
openIDService.getUserInfo(provider, tokenResponse.accessToken).map { openIDService.getUserInfo(provider, tokenResponse.accessToken).flatMap {
case Some(userInfo) => case Some(userInfo) =>
// Store user info in session for username selection // Check if user already exists
Redirect(config.get[String]("openid.selectUserRoute")) userManager.authenticateOpenID(provider, userInfo.id) match {
.withSession( case Some(user) =>
"oauth_user_info" -> Json.toJson(userInfo).toString(), // User already exists, log them in
"oauth_provider" -> provider, val sessionToken = sessionManager.createSession(user)
"oauth_access_token" -> tokenResponse.accessToken Future.successful(Redirect(config.getOptional[String]("openid.mainRoute").getOrElse("/"))
) .withCookies(Cookie(
name = "accessToken",
value = sessionToken,
httpOnly = true,
secure = false,
sameSite = Some(Lax)
))
.removingFromSession("oauth_state", "oauth_nonce", "oauth_provider", "oauth_access_token"))
case None =>
// New user, redirect to username selection
Future.successful(Redirect(config.get[String]("openid.selectUserRoute"))
.withSession(
"oauth_user_info" -> Json.toJson(userInfo).toString(),
"oauth_provider" -> provider,
"oauth_access_token" -> tokenResponse.accessToken
))
}
case None => case None =>
Redirect("/login").flashing("error" -> "Failed to retrieve user information") Future.successful(Redirect("/login").flashing("error" -> "Failed to retrieve user information"))
} }
case None => case None =>
Future.successful(Redirect("/login").flashing("error" -> "Failed to exchange authorization code")) Future.successful(Redirect("/login").flashing("error" -> "Failed to exchange authorization code"))

View File

@@ -1,14 +1,33 @@
package di package di
import com.google.inject.Provider import com.google.inject.{Inject, Provider}
import com.google.inject.Inject
import jakarta.inject.Singleton import jakarta.inject.Singleton
import jakarta.persistence.{EntityManager, EntityManagerFactory, Persistence} import jakarta.persistence.{EntityManager, EntityManagerFactory, Persistence}
import play.api.Configuration
@Singleton @Singleton
class EntityManagerProvider @Inject()() extends Provider[EntityManager] { class EntityManagerProvider @Inject()(config: Configuration) extends Provider[EntityManager] {
private val emf: EntityManagerFactory = Persistence.createEntityManagerFactory("defaultPersistenceUnit") private val emf: EntityManagerFactory = {
val dbConfig = config.get[Configuration]("db.default")
val props = new java.util.HashMap[String, Object]()
// Map Play configuration to Jakarta Persistence properties
props.put("jakarta.persistence.jdbc.driver", dbConfig.get[String]("driver"))
props.put("jakarta.persistence.jdbc.url", dbConfig.get[String]("url"))
props.put("jakarta.persistence.jdbc.user", dbConfig.get[String]("username"))
props.put("jakarta.persistence.jdbc.password", dbConfig.get[String]("password"))
// Also pass HikariCP settings if present
dbConfig.getOptional[Configuration]("hikaricp").foreach { hikariConfig =>
hikariConfig.keys.foreach { key =>
val value = hikariConfig.underlying.getValue(key).unwrapped()
props.put(s"hibernate.hikari.$key", value)
}
}
Persistence.createEntityManagerFactory("defaultPersistenceUnit", props)
}
override def get(): EntityManager = { override def get(): EntityManager = {
emf.createEntityManager() emf.createEntityManager()

View File

@@ -1,25 +0,0 @@
package di
import com.google.inject.AbstractModule
import com.google.inject.name.Names
import logic.user.impl.HibernateUserManager
import play.api.db.DBApi
import play.api.{Configuration, Environment}
class ProductionModule(
environment: Environment,
configuration: Configuration
) extends AbstractModule {
override def configure(): Unit = {
// Bind HibernateUserManager for production
bind(classOf[logic.user.UserManager])
.to(classOf[logic.user.impl.HibernateUserManager])
.asEagerSingleton()
// Bind EntityManager for JPA
bind(classOf[jakarta.persistence.EntityManager])
.toProvider(classOf[EntityManagerProvider])
.asEagerSingleton()
}
}

View File

@@ -4,7 +4,7 @@ import com.auth0.jwt.algorithms.Algorithm
import com.auth0.jwt.{JWT, JWTVerifier} import com.auth0.jwt.{JWT, JWTVerifier}
import com.github.benmanes.caffeine.cache.{Cache, Caffeine} import com.github.benmanes.caffeine.cache.{Cache, Caffeine}
import com.typesafe.config.Config import com.typesafe.config.Config
import logic.user.SessionManager import logic.user.{SessionManager, UserManager}
import model.users.User import model.users.User
import scalafx.util.Duration import scalafx.util.Duration
import services.JwtKeyProvider import services.JwtKeyProvider
@@ -16,7 +16,7 @@ import javax.inject.{Inject, Singleton}
import scala.util.Try import scala.util.Try
@Singleton @Singleton
class BaseSessionManager @Inject()(val keyProvider: JwtKeyProvider, val userManager: StubUserManager, val config: Config) extends SessionManager { class BaseSessionManager @Inject()(val keyProvider: JwtKeyProvider, val userManager: UserManager, val config: Config) extends SessionManager {
private val algorithm = Algorithm.RSA512(keyProvider.publicKey, keyProvider.privateKey) private val algorithm = Algorithm.RSA512(keyProvider.publicKey, keyProvider.privateKey)
private val verifier: JWTVerifier = JWT.require(algorithm) private val verifier: JWTVerifier = JWT.require(algorithm)

View File

@@ -5,6 +5,7 @@ import jakarta.inject.Inject
import jakarta.persistence.EntityManager import jakarta.persistence.EntityManager
import logic.user.UserManager import logic.user.UserManager
import model.users.{User, UserEntity} import model.users.{User, UserEntity}
import play.api.Logger
import services.OpenIDUserInfo import services.OpenIDUserInfo
import util.UserHash import util.UserHash
@@ -14,14 +15,20 @@ import scala.jdk.CollectionConverters.*
@Singleton @Singleton
class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends UserManager { class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends UserManager {
private val logger = Logger(getClass.getName)
override def addUser(name: String, password: String): Boolean = { override def addUser(name: String, password: String): Boolean = {
val tx = em.getTransaction
try { try {
tx.begin()
// Check if user already exists // Check if user already exists
val existing = em.createQuery("SELECT u FROM UserEntity u WHERE u.username = :username", classOf[UserEntity]) val existing = em.createQuery("SELECT u FROM UserEntity u WHERE u.username = :username", classOf[UserEntity])
.setParameter("username", name) .setParameter("username", name)
.getResultList .getResultList
if (!existing.isEmpty) { if (!existing.isEmpty) {
logger.warn(s"User $name already exists")
tx.rollback()
return false return false
} }
@@ -35,20 +42,30 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
em.persist(userEntity) em.persist(userEntity)
em.flush() em.flush()
tx.commit()
true true
} catch { } catch {
case _: Exception => false case e: Exception => {
if (tx.isActive) tx.rollback()
logger.error(s"Error adding user $name", e)
false
}
} }
} }
override def addOpenIDUser(name: String, userInfo: OpenIDUserInfo): Boolean = { override def addOpenIDUser(name: String, userInfo: OpenIDUserInfo): Boolean = {
val tx = em.getTransaction
try { try {
tx.begin()
// Check if user already exists // Check if user already exists
val existing = em.createQuery("SELECT u FROM UserEntity u WHERE u.username = :username", classOf[UserEntity]) val existing = em.createQuery("SELECT u FROM UserEntity u WHERE u.username = :username", classOf[UserEntity])
.setParameter("username", name) .setParameter("username", name)
.getResultList .getResultList
if (!existing.isEmpty) { if (!existing.isEmpty) {
logger.warn(s"User $name already exists")
tx.rollback()
return false return false
} }
@@ -62,6 +79,8 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
.getResultList .getResultList
if (!existingOpenID.isEmpty) { if (!existingOpenID.isEmpty) {
logger.warn(s"OpenID user ${userInfo.provider}_${userInfo.id} already exists")
tx.rollback()
return false return false
} }
@@ -70,9 +89,14 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
em.persist(userEntity) em.persist(userEntity)
em.flush() em.flush()
tx.commit()
true true
} catch { } catch {
case _: Exception => false case e: Exception => {
if (tx.isActive) tx.rollback()
logger.error(s"Error adding OpenID user ${userInfo.provider}_${userInfo.id}", e)
false
}
} }
} }
@@ -93,7 +117,10 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
None None
} }
} catch { } catch {
case _: Exception => None case e: Exception => {
logger.error(s"Error authenticating user $name", e)
None
}
} }
} }
@@ -113,7 +140,10 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
Some(users.get(0).toUser) Some(users.get(0).toUser)
} }
} catch { } catch {
case _: Exception => None case e: Exception => {
logger.error(s"Error authenticating OpenID user ${provider}_$providerId", e)
None
}
} }
} }
@@ -129,7 +159,10 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
Some(users.get(0).toUser) Some(users.get(0).toUser)
} }
} catch { } catch {
case _: Exception => None case e: Exception => {
logger.error(s"Error checking if user $name exists", e)
None
}
} }
} }
@@ -137,25 +170,35 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
try { try {
Option(em.find(classOf[UserEntity], id)).map(_.toUser) Option(em.find(classOf[UserEntity], id)).map(_.toUser)
} catch { } catch {
case _: Exception => None case e: Exception => {
logger.error(s"Error checking if user with ID $id exists", e)
None
}
} }
} }
override def removeUser(name: String): Boolean = { override def removeUser(name: String): Boolean = {
val tx = em.getTransaction
try { try {
tx.begin()
val users = em.createQuery("SELECT u FROM UserEntity u WHERE u.username = :username", classOf[UserEntity]) val users = em.createQuery("SELECT u FROM UserEntity u WHERE u.username = :username", classOf[UserEntity])
.setParameter("username", name) .setParameter("username", name)
.getResultList .getResultList
if (users.isEmpty) { if (users.isEmpty) {
tx.rollback()
false false
} else { } else {
em.remove(users.get(0)) em.remove(users.get(0))
em.flush() em.flush()
tx.commit()
true true
} }
} catch { } catch {
case _: Exception => false case _: Exception => {
if (tx.isActive) tx.rollback()
false
}
} }
} }
} }

View File

@@ -1,10 +1,24 @@
package modules package modules
import com.google.inject.AbstractModule import com.google.inject.AbstractModule
import di.EntityManagerProvider
import jakarta.persistence.EntityManager
import logic.Gateway import logic.Gateway
import logic.user.UserManager
import logic.user.impl.HibernateUserManager
class GatewayModule extends AbstractModule { class GatewayModule extends AbstractModule {
override def configure(): Unit = { override def configure(): Unit = {
bind(classOf[Gateway]).asEagerSingleton() bind(classOf[Gateway]).asEagerSingleton()
// Bind HibernateUserManager for production (when GatewayModule is used)
bind(classOf[UserManager])
.to(classOf[HibernateUserManager])
.asEagerSingleton()
// Bind EntityManager for JPA
bind(classOf[EntityManager])
.toProvider(classOf[EntityManagerProvider])
.asEagerSingleton()
} }
} }

View File

@@ -75,30 +75,15 @@ class OpenIDConnectService@Inject(ws: WSClient, config: Configuration)(implicit
def getAuthorizationUrl(providerName: String, state: String, nonce: String): Option[String] = { def getAuthorizationUrl(providerName: String, state: String, nonce: String): Option[String] = {
providers.get(providerName).map { provider => providers.get(providerName).map { provider =>
val authRequest = if (provider.scopes.contains("openid")) { val authRequest = new AuthorizationRequest.Builder(
// Use OpenID Connect AuthenticationRequest for OpenID providers new ResponseType(ResponseType.Value.CODE),
new AuthenticationRequest.Builder( new com.nimbusds.oauth2.sdk.id.ClientID(provider.clientId)
new ResponseType(ResponseType.Value.CODE), )
new com.nimbusds.oauth2.sdk.Scope(provider.scopes.mkString(" ")), .scope(new com.nimbusds.oauth2.sdk.Scope(provider.scopes.mkString(" ")))
new com.nimbusds.oauth2.sdk.id.ClientID(provider.clientId), .state(new com.nimbusds.oauth2.sdk.id.State(state))
URI.create(provider.redirectUri) .redirectionURI(URI.create(provider.redirectUri))
) .endpointURI(URI.create(provider.authorizationEndpoint))
.state(new com.nimbusds.oauth2.sdk.id.State(state)) .build()
.nonce(new Nonce(nonce))
.endpointURI(URI.create(provider.authorizationEndpoint))
.build()
} else {
// Use standard OAuth2 AuthorizationRequest for non-OpenID providers (like Discord)
new AuthorizationRequest.Builder(
new ResponseType(ResponseType.Value.CODE),
new com.nimbusds.oauth2.sdk.id.ClientID(provider.clientId)
)
.scope(new com.nimbusds.oauth2.sdk.Scope(provider.scopes.mkString(" ")))
.state(new com.nimbusds.oauth2.sdk.id.State(state))
.redirectionURI(URI.create(provider.redirectUri))
.endpointURI(URI.create(provider.authorizationEndpoint))
.build()
}
authRequest.toURI.toString authRequest.toURI.toString
} }

View File

@@ -7,19 +7,13 @@
<persistence-unit name="defaultPersistenceUnit"> <persistence-unit name="defaultPersistenceUnit">
<provider>org.hibernate.jpa.HibernatePersistenceProvider</provider> <provider>org.hibernate.jpa.HibernatePersistenceProvider</provider>
<class>model.users.UserEntity</class> <class>model.users.UserEntity</class>
<properties> <properties>
<!-- Database connection settings -->
<property name="jakarta.persistence.jdbc.driver" value="org.postgresql.Driver"/>
<property name="jakarta.persistence.jdbc.url" value="${DATABASE_URL}"/>
<property name="jakarta.persistence.jdbc.user" value="${DB_USER}"/>
<property name="jakarta.persistence.jdbc.password" value="${DB_PASSWORD}"/>
<!-- Hibernate specific settings --> <!-- Hibernate specific settings -->
<property name="hibernate.dialect" value="org.hibernate.dialect.PostgreSQLDialect"/>
<property name="hibernate.hbm2ddl.auto" value="update"/> <property name="hibernate.hbm2ddl.auto" value="update"/>
<property name="hibernate.archive.autodetection" value="class"/>
<property name="hibernate.show_sql" value="false"/> <property name="hibernate.show_sql" value="false"/>
<property name="hibernate.format_sql" value="true"/> <property name="hibernate.format_sql" value="true"/>
<property name="hibernate.use_sql_comments" value="true"/> <property name="hibernate.use_sql_comments" value="true"/>

View File

@@ -2,6 +2,9 @@
play.filters.disabled += play.filters.csrf.CSRFFilter play.filters.disabled += play.filters.csrf.CSRFFilter
play.filters.disabled += play.filters.hosts.AllowedHostsFilter play.filters.disabled += play.filters.hosts.AllowedHostsFilter
# Disable default JPA and Hibernate modules to use custom EntityManagerProvider
play.modules.disabled += "play.db.jpa.JPAModule"
play.http.secret.key="QCY?tAnfk?aZ?iwrNwnxIlR6CTf:G3gf:90Latabg@5241AB`R5W:1uDFN];Ik@n" play.http.secret.key="QCY?tAnfk?aZ?iwrNwnxIlR6CTf:G3gf:90Latabg@5241AB`R5W:1uDFN];Ik@n"
play.http.secret.key=${?APPLICATION_SECRET} play.http.secret.key=${?APPLICATION_SECRET}
@@ -26,6 +29,7 @@ play.filters.cors {
# Local Development OpenID Connect Configuration # Local Development OpenID Connect Configuration
openid { openid {
selectUserRoute="http://localhost:5173/select-username" selectUserRoute="http://localhost:5173/select-username"
mainRoute="http://localhost:5173/"
discord { discord {
clientId = ${?DISCORD_CLIENT_ID} clientId = ${?DISCORD_CLIENT_ID}

View File

@@ -1,10 +1,21 @@
# Database configuration - PostgreSQL with environment variables # Database configuration - PostgreSQL with environment variables
db.default.driver=org.postgresql.Driver db.default.driver="org.postgresql.Driver"
db.default.url="jdbc:postgresql://localhost:5432/knockoutwhist"
db.default.url=${?DATABASE_URL} db.default.url=${?DATABASE_URL}
db.default.username="kw_user"
db.default.username=${?DB_USER} db.default.username=${?DB_USER}
db.default.password="postgres"
db.default.password=${?DB_PASSWORD} db.default.password=${?DB_PASSWORD}
db.default.password=""
# HikariCP specific configuration
db.default.hikaricp.driverClassName="org.postgresql.Driver"
db.default.hikaricp.jdbcUrl="jdbc:postgresql://localhost:5432/knockoutwhist"
db.default.hikaricp.jdbcUrl=${?DATABASE_URL}
db.default.hikaricp.username="kw_user"
db.default.hikaricp.username=${?DB_USER}
db.default.hikaricp.password="postgres"
db.default.hikaricp.password=${?DB_PASSWORD}
# JPA/Hibernate configuration # JPA/Hibernate configuration
jpa.default=defaultPersistenceUnit jpa.default=defaultPersistenceUnit

View File

@@ -18,17 +18,18 @@ play.filters.cors {
openid { openid {
selectUserRoute="https://knockout.janis-eccarius.de/select-username" selectUserRoute="https://knockout.janis-eccarius.de/select-username"
mainRoute="https://knockout.janis-eccarius.de/"
discord { discord {
clientId = ${?DISCORD_CLIENT_ID} clientId = ${?DISCORD_CLIENT_ID}
clientSecret = ${?DISCORD_CLIENT_SECRET} clientSecret = ${?DISCORD_CLIENT_SECRET}
redirectUri = ${?DISCORD_REDIRECT_URI} redirectUri = ${?DISCORD_REDIRECT_URI}
redirectUri = "https://knockout.janis-eccarius.de/auth/discord/callback" redirectUri = "https://knockout.janis-eccarius.de/api/auth/discord/callback"
} }
keycloak { keycloak {
clientId = "your-keycloak-client-id" clientId = ${?KEYCLOAK_CLIENT_ID}
clientSecret = "your-keycloak-client-secret" clientSecret = ${?KEYCLOAK_CLIENT_SECRET}
redirectUri = "https://knockout.janis-eccarius.de/api/auth/keycloak/callback" redirectUri = "https://knockout.janis-eccarius.de/api/auth/keycloak/callback"
authUrl = ${?KEYCLOAK_AUTH_URL} authUrl = ${?KEYCLOAK_AUTH_URL}
authUrl = "https://identity.janis-eccarius.de/realms/master" authUrl = "https://identity.janis-eccarius.de/realms/master"

View File

@@ -15,12 +15,13 @@ play.filters.cors {
openid { openid {
selectUserRoute="https://st.knockout.janis-eccarius.de/select-username" selectUserRoute="https://st.knockout.janis-eccarius.de/select-username"
mainRoute="https://st.knockout.janis-eccarius.de/"
discord { discord {
clientId = ${?DISCORD_CLIENT_ID} clientId = ${?DISCORD_CLIENT_ID}
clientSecret = ${?DISCORD_CLIENT_SECRET} clientSecret = ${?DISCORD_CLIENT_SECRET}
redirectUri = ${?DISCORD_REDIRECT_URI} redirectUri = ${?DISCORD_REDIRECT_URI}
redirectUri = "https://st.knockout.janis-eccarius.de/auth/discord/callback" redirectUri = "https://st.knockout.janis-eccarius.de/api/auth/discord/callback"
} }
keycloak { keycloak {

View File

@@ -1,3 +1,3 @@
MAJOR=4 MAJOR=4
MINOR=31 MINOR=43
PATCH=0 PATCH=0