server.port=${ACT_QUERY_PORT:8182} spring.application.name=${ACT_QUERY_APP_NAME:query} spring.cloud.stream.bindings.producer.destination=${ACT_QUERY_PRODUCER_DEST:engineEvents} spring.cloud.stream.bindings.producer.contentType=${ACT_QUERY_PRODUCER_CONTENT_TYPE:application/json} spring.cloud.stream.bindings.queryConsumer.destination=${ACT_QUERY_CONSUMER_DEST:engineEvents} spring.cloud.stream.bindings.queryConsumer.group=${ACT_QUERY_CONSUMER_GROUP:query} spring.cloud.stream.bindings.queryConsumer.contentType=${ACT_QUERY_CONSUMER_CONTENT_TYPE:application/json} spring.jackson.serialization.fail-on-unwrapped-type-identifiers=${ACT_QUERY_JACKSON_FAIL_ON_UNWRAPPED_IDS:false} keycloak.auth-server-url=${ACT_KEYCLOAK_URL:http://activiti-cloud-sso-idm:8180/auth} keycloak.realm=${ACT_KEYCLOAK_REALM:springboot} keycloak.resource=${ACT_KEYCLOAK_RESOURCE:activiti} keycloak.public-client=${ACT_KEYCLOAK_CLIENT:true} keycloak.ssl-required=${ACT_KEYCLOAK_SSL_REQUIRED:none} keycloak.security-constraints[0].authRoles[0]=${ACT_KEYCLOAK_ROLES:user} keycloak.security-constraints[0].securityCollections[0].patterns[0]=${ACT_KEYCLOAK_PATTERNS:/*} keycloak.principal-attribute=${ACT_KEYCLOAK_PRINCIPAL_ATTRIBUTE:preferred-username} # see https://issues.jboss.org/browse/KEYCLOAK-810 for configuration options keycloakadminclientapp=${ACT_KEYCLOAK_CLIENT_APP:admin-cli} keycloakclientuser=${ACT_KEYCLOAK_CLIENT_USER:client} keycloakclientpassword=${ACT_KEYCLOAK_CLIENT_PASSWORD:client} # this user needs to have the realm management roles assigned spring.rabbitmq.host=${ACT_RABBITMQ_HOST:rabbitmq} eureka.client.serviceUrl.defaultZone=${ACT_EUREKA_URL:http://activiti-cloud-registry:8761/eureka/} #hostname as declared to eureka eureka.instance.hostname=${ACT_QUERY_HOST:activiti-cloud-query} eureka.client.enabled=${ACT_QUERY_EUREKA_CLIENT_ENABLED:true}