blob: eb0b992182b72098b70ee3098ded8f038cf79e57 [file] [log] [blame] [view]
# Process user task orchestration
## Description
A quickstart project shows very typical user task orchestration. It comes with two tasks assigned
to human actors via group assignments - `managers`. So essentially anyone who is a member of that
group can act on the tasks. Though this example applies four eye principles which essentially means
that the user who approved the first task cannot approve the second one. So there must always be at
least two distinct managers involved.
This example shows
* working with user tasks
* four eye principle with user tasks
* Task console to execute human task
* Management console tracking process execution
<p align="center"><img width=75% height=50% src="docs/images/process.png"></p>
## Build and run
### Prerequisites
You will need:
- Java 11+ installed
- Environment variable JAVA_HOME set accordingly
- Maven 3.8.6+ installed
- [jq](https://stedolan.github.io/jq) tool installed. You can download it from [here](https://stedolan.github.io/jq/download)
- Docker and Docker Compose to run the required example infrastructure.
### Starting the Kogito and Infrastructure Services
This quickstart provides a docker compose template that starts all the required services. This setup ensures that all services are connected with a default configuration.
<p align="center"><img width=75% height=50% src="docs/images/services.png"></p>
You should start all the services before you execute any of the **Approvals** example, to do that please execute:
For Linux and MacOS:
1. Open a Terminal
2. Go to the process-usertasks-with-security-oidc-springboot-with-console folder at kogito-examples
3. Run the ```startServices.sh``` script
```bash
sh ./startServices.sh
```
Once all services bootstrap, the following ports will be assigned on your local machine:
- Infinispan: 11222
- Kafka: 9092
- Data Index: 8180
- Management Console: 8280
- Task Console: 8380
- Keycloak server: 8480
- process-usertasks-with-security-oidc-springboot-with-console: 8080
> **_NOTE:_** This step requires the project to be compiled, please consider running a ```mvn clean install -Pcontainer``` command on the project root before running the ```startServices.sh``` script for the first time or any time you modify the project. ```-Pcontainer``` will create a local docker image of the example and will be run by docker-compose with all required services.
Once started you can simply stop all services by executing the ```docker-compose stop```.
All the created containers can be removed by executing the ```docker-compose rm```.
### Using Keycloak as Authentication Server
In this Quickstart we'll be using [Keycloak](https://www.keycloak.org/) as *Authentication Server*. It will be started as a part of the project *Infrastructure Services*, you can check the configuration on the project [docker-compose.yml](docker-compose/docker-compose.yml) in [docker-compose](docker-compose) folder.
It will install the *Kogito Realm* that comes with a predefined set of users:
| Login | Password | Roles |
| ------------- | ---------- | ------------------- |
| admin | admin | *admin*, *managers* |
| alice | alice | *user* |
| jdoe | jdoe | *managers* |
Once Keycloak is started, you should be able to access your *Keycloak Server* at [localhost:8480/auth](http://localhost:8480/auth) with *admin* user.
### Security using OpenID Connect
This Quickstart is taking advantage of the Quarkus OIDC extension that allows an easy integration between the *Kogito* runtime, *Kogito* consoles and *Keycloak*.
This example enables authentication *Kogito Management Console* & *Kogito Task Console* using OpenID Connect,
to do that you must start the consoles using the *keycloak* quarkus profile as a parameter (`-Dquarkus.profile=keycloak`). You can check the configuration on the project [docker-compose.yml](docker-compose/docker-compose.yml) in [docker-compose](docker-compose) folder.
> **_NOTE:_** For more information about how to secure Kogito Management Console with OpenID Connect, please refer to [Kogito Documentation](https://docs.jboss.org/kogito/release/latest/html_single/#proc-management-console-security_kogito-developing-process-services).
>
> For more information about how to secure Kogito Task Console with OpenID Connect, please refer to [Kogito Documentation](https://docs.jboss.org/kogito/release/latest/html_single/#proc-task-console-security_kogito-developing-process-services)
> **_NOTE:_** If you don't want to run the example inside docker compose. You can stop the service container by running below commands.
docker stop process-usertasks-with-security-oidc-springboot-with-console
### Compile and Run in Local Dev Mode
```sh
mvn clean compile spring-boot:run
```
### Package and Run using uberjar
```sh
mvn clean package
```
To run the generated native executable, generated in `target/`, execute
```sh
java -jar target/process-usertasks-with-security-oidc-springboot-with-console.jar
```
We can navigate to [http://localhost:8080](http://localhost:8080) to verify the Kogito runtime is running
### OpenAPI (Swagger) documentation
[Specification at swagger.io](https://swagger.io/docs/specification/about/)
You can take a look at the [OpenAPI definition](http://localhost:8080/v3/api-docs) - automatically generated and included in this service - to determine all available operations exposed by this service. For easy readability you can visualize the OpenAPI definition file using a UI tool like for example available [Swagger UI](https://editor.swagger.io).
In addition, various clients to interact with this service can be easily generated using this OpenAPI definition.
We can access to deployed [http://localhost:8080/swagger-ui](http://localhost:8080/swagger-ui.html) even the current example has the security enabled and some endpoint will require authenication.
### Submit a request to start new approval
The application is using bearer token authorization and the first thing to do is obtain an access token from the Keycloak
Server in order to access the application resources. Obtain an access token for user john.
```sh
export access_token=$(\
curl -X POST http://localhost:8480/auth/realms/kogito/protocol/openid-connect/token \
--user kogito-app:secret \
-H 'content-type: application/x-www-form-urlencoded' \
-d 'username=jdoe&password=jdoe&grant_type=password' | jq --raw-output '.access_token' \
)
```
To make use of this application it is as simple as putting a sending request to `http://localhost:8080/approvals`
```json
{
"traveller" : {
"firstName" : "John",
"lastName" : "Doe",
"email" : "jon.doe@example.com",
"nationality" : "American",
"address" : {
"street" : "main street",
"city" : "Boston",
"zipCode" : "10005",
"country" : "US" }
}
}
```
Complete curl command can be found below, passing the token as Authorization header :
```sh
curl -X POST -H "Authorization: Bearer "$access_token -H 'Content-Type:application/json' -H 'Accept:application/json' -d '{"traveller" : { "firstName" : "John", "lastName" : "Doe", "email" : "jon.doe@example.com", "nationality" : "American","address" : { "street" : "main street", "city" : "Boston", "zipCode" : "10005", "country" : "US" }}}' http://localhost:8080/approvals
```
### Kogito Management Console
To access the Kogito Management Console just open your browser and navigate to ``http://localhost:8280``. You'll be redirected to the *Keycloak* log in page.
<p align="center">
<img width=75% src="docs/images/keycloak-login.png">
</p>
Once there, log in using any of the users specified in the [Using Keycloak as Authentication Server](#using-keycloak-as-authentication-server)
<p align="center">
<img width=75% src="docs/images/management-console.png">
</p>
> **_NOTE:_** For more information about how to work with Kogito Management Console, please refer to the [Kogito Documentation](https://docs.jboss.org/kogito/release/latest/html_single/#con-management-console_kogito-developing-process-services) page.
### Kogito Task Console
To access the Kogito Task Console just open your browser and navigate to ``http://localhost:8380``. You'll be redirected to the *Keycloak* log in page.
<p align="center">
<img width=75% src="docs/images/keycloak-login.png">
</p>
Once there, log in with an *managers* user (for example *admin*) and you should be redirected to the user **Task Inbox**:
<p align="center">
<img width=75% src="docs/images/task-console.png">
</p>
There you'll see all the tasks assigned to the user or to any of the group he belongs to.
### Show active process instances at Kogito Management Console
To access the Kogito Management Console just open your browser and navigate to ``http://localhost:8280``.
<p align="center">
<img width=75% src="docs/images/MC_list1.png">
</p>
> **_NOTE:_** For more information about how to work with Kogito Management Console, please refer to the [Kogito Documentation](https://docs.jboss.org/kogito/release/latest/html_single/#con-management-console_kogito-developing-process-services) page.
Check the process instance details to see where is the execution path
<p align="center">
<img width=75% src="docs/images/MC_details1.png">
</p>
### Execute 'First Line approval' task at Kogito Task Console
To access the Kogito Task Console just open your browser and navigate to ``http://localhost:8380`` and you should be redirected to the **Task Inbox**.
Ensure you are logged as a user with role manager to be able to see the First Line approval (i.e: jdoe / jdoe)
<p align="center">
<img width=75% src="docs/images/TC_list1.png">
</p>
> **_NOTE:_** For more information about how to work with Kogito Task Console, please refer to the [Kogito Documentation](https://docs.jboss.org/kogito/release/latest/html_single/#con-task-console_kogito-developing-process-services) page.
Access to 'First Line approval' task and complete
<p align="center">
<img width=75% src="docs/images/TC_FirstLine.png">
</p>
Check the process instance details at Kogito Management Console to see the execution path reflects the completed task
<p align="center">
<img width=75% src="docs/images/MC_details2.png">
</p>
### Execute 'Second Line approval' task at Kogito Task Console
Access the Kogito Task Console and ensure you are logged as a user with role manager to be able to see the Second Line approval
following the second eye principle (i.e: admin / admin)
<p align="center">
<img width=75% src="docs/images/TC_list2.png">
</p>
Access to 'Second Line approval' task and complete
<p align="center">
<img width=75% src="docs/images/TC_SecondLine.png">
</p>
Check the process instance details at Kogito Management Console, and verify the execution path is reflected in the diagram.
<p align="center">
<img width=75% src="docs/images/MC_details3.png">
</p>