The Parasoft Demo Application is an example Spring Boot project. The application is configurable and customizable, and is used to demonstrate functionality in a variety of Parasoft tools.
The following instructions are for building and running the Parasoft Demo Application locally.
There is also a docker image available here: DockerHub
Once you download the sources, build the project as a .war file using the Gradle wrapper.
In Linux / Cygwin:
./gradlew bootWar
In Windows:
gradlew.bat bootWar
The file parasoft-demo-app-1.1.0.war can be found in build/libs after building.
Notes: If you want to use gradle to build the project, version 6.3~7.6.4 is required.
You can run the application either:
- Directly from sources:
In Linux / Cygwin:
./gradlew bootRun
In Windows:
gradlew.bat bootRun
- Or as a .war file with Java (after building):
java -jar build/libs/parasoft-demo-app-1.1.0.war
The port can be specified when running the .war file:
java -jar build/libs/parasoft-demo-app-1.1.0.war --server.port=8888
If you want to import the project into your IDE, be sure to do the following:
- Import the project as a Gradle project. You may need to synchronize or refresh the project after importing.
- Install a Lombok plugin for your IDE since the project uses Lombok.
- Run the
build/classes
Gradle task to ensure the successful compilation of the project. Thebuild/classes
task generates auto-generated code for technologies used in the project, such as gRPC. It needs to be executed after running thebuild/clean
task.
When launching the app, you can specify the port to use with a command like the following:
./gradlew bootRun -Pport=8888
When running the application from sources:
- By default, configuration properties in application.properties will be loaded. You can modify properties in that file before running the application.
- You can also overwrite the configuration by creating a config folder under the root directory of this project and put a customized version of application.properties file in it. A copy of application.properties which contains all configurable properties is available here.
When running the application as a .war file:
- You can create a config folder under same directory of your .war file and put a customized version of application.properties in it before running the .war file.
- You can also overwrite specific properties using command line arguments:
java -jar build/libs/parasoft-demo-app-1.1.0.war --hsqldb.port=9002 // database server port will be changed to 9002
Notes: The Property column in the configuration tables of this readme refers to the configurable property name in application.properties.
Once started, you can access the application at http://localhost:8080.
Login with one of these users:
- Username
purchaser
passwordpassword
- Username
approver
passwordpassword
This application supports both Http Basic authentication and OAuth 2.0 authentication. To use OAuth 2.0 authentication, you will need to set up a Keycloak server as the OAuth 2.0 provider.
-
Download, install, and start a Keycloak server (19.0.0 or later) with command line in the root directory of Keycloak.
In Linux / Cygwin:
bin/kc.sh start-dev --http-port=8081
In Windows:
bin\kc.bat start-dev --http-port=8081
-
Go to the Keycloak admin console(e.g. http://localhost:8081) to make sure the service has started successfully. Create an initial admin user.
-
Download demo-app-realm.json.
demo-app-realm.json includes a realm demo-app-realm and necessary information to use Keycloak with demo application, including:
- 50 purchasers and 50 approvers with consistent credentials and roles with default data in the database of demo application.
- A client with
demo-app-client
as the id andDzOS5Y4iRmHIQH6ntTGHj78PpFEjUKLo
as the secret. - Valid redirect URI set as
*
, which allows redirection to any URI.
-
Stop the Keycloak server and prepare to import the realm data.
-
Run command line in the root directory of Keycloak to import predefined realm data.
In Linux / Cygwin:
bin/kc.sh import --file path/to/demo-app-realm.json
In Windows:
bin\kc.bat import --file path/to/demo-app-realm.json
-
Restart the Keycloak server.
-
If the Keycloak server is not running on localhost:8081, make sure to change the
spring.security.oauth2.client.provider.keycloak.realm-uri
property value in application.properties file. -
Start the demo application and choose to log in with OAuth 2.0.
Configuration details for Authorization Code type (default)
Option | Value | Property |
---|---|---|
Redirect URI | * (any URI) | N.A. |
Token URI | http://localhost:8081/realms/demo-app-realm/protocol/openid-connect/token | spring.security.oauth2.client.provider.keycloak.token-uri |
Client ID | demo-app-client | spring.security.oauth2.client.registration.keycloak.client-id |
Client secret | DzOS5Y4iRmHIQH6ntTGHj78PpFEjUKLo | spring.security.oauth2.client.registration.keycloak.client-secret |
scope | openid | spring.security.oauth2.client.registration.keycloak.scope |
When creating the login test suite in SOAtest, we can get the authorization endpoint URL for Start Recording From field with following steps:
- Open the login page of this application and sign in with OAuth 2.0 to open the Keycloak login page.
- Copy the URL from location bar in the Keycloak login page and change the redirect_uri parameter value to any URI other than the original value.
- Paste the modified URL into Start Recording From field.
When setting up an OAuth 2.0 Authentication in SOAtest, we can use any URI as Redirect URI other than the original value.
The URI ishttp://{host.and.port.of.this.application}/login/oauth2/code/keycloak
by default (e.g. http://localhost:8080/login/oauth2/code/keycloak).
The demo application will consume the authorization code to exchange for an access token when redirecting to the original URI. In that way, SOAtest will not be able to use the authorization code again since it's one-time-use.
There are four databases (one for global and three for industries) in this Application, which are global, outdoor, defense and aerospace.
Database name | Description |
---|---|
global | Used to store the user, role and configuration data. |
outdoor | Used to store the data about outdoor industry. |
defense | Used to store the data about defense industry. |
aerospace | Used to store the data about aerospace industry. |
- User-relevant tables in the global database
Table name | Description |
---|---|
TBL_USER | Used to store the user data. |
TBL_ROLE | Used to store the role data. |
- User-relevant tables in the industry databases
Table name | Description |
---|---|
TBL_CATEGORY | Used to store the category data. |
TBL_ITEM | Used to store the item data. |
TBL_ITEM_INVENTORY | Used to store the item inventory data. |
TBL_CART | Used to store the cart data. |
TBL_ORDER | Used to store the order data. |
TBL_ORDER_ITEM | Used to store the order item data. |
This application exposes port 9001 for the user to connect to the HSQLDB database remotely. This port is configurable as hsqldb.port in application.properties.
- Global database
Option | Value | Property |
---|---|---|
Driver | org.hsqldb.jdbcDriver |
global.datasource.configuration.driver-class-name |
URL | jdbc:hsqldb:hsql://localhost:9001/global |
global.datasource.configuration.url |
Username | SA |
global.datasource.configuration.username |
Password | pass |
global.datasource.configuration.password |
- Industry database
Option | Value | Property |
---|---|---|
Driver | org.hsqldb.jdbcDriver |
industry.datasource.configurations.{database name}.driver-class-name |
URL | jdbc:hsqldb:hsql://localhost:9001/{database name} |
industry.datasource.configurations.{database name}.url |
Username | SA |
industry.datasource.configurations.{database name}.username |
Password | pass |
industry.datasource.configurations.{database name}.password |
There are two main services for order management in this application, order service and inventory service. After an order is submitted, order service sends a request through message queue to check and decrease the inventory. After the operation is done, inventory service sends a response through message queue which includes the information of the operation result.
Two default queues/topics are used to support messaging between order service and inventory service. The configuration for queues/topics can be changed or reset to default on Demo Administration page.
Configuration details for embedded ActiveMQ server (default)
Option | Value | Property |
---|---|---|
Provider URL | tcp://localhost:61626 |
spring.activemq.broker-url |
Initial context class | org.apache.activemq.jndi.ActiveMQInitialContextFactory |
N.A. |
Connection factory | ConnectionFactory |
N.A. |
Username | admin |
spring.activemq.user |
Password | admin |
spring.activemq.password |
Inventory service request queue | inventory.request |
N.A. |
Inventory service response queue | inventory.response |
N.A. |
Configuration details for external Kafka server (default)
Option | Value | Property |
---|---|---|
Broker URL | localhost:9092 |
spring.kafka.bootstrap-servers |
Group ID | inventory-operation |
spring.kafka.consumer.group-id |
For simplicity, messages produced or consumed in this application will be in partition 0 of the Kafka topics. When the expected behavior is to consume messages from both inside and outside this application (e.g. in SOAtest & Virtualize), make sure to use different group ID for the external consumer.
Configuration details for external RabbitMQ server (default)
Option | Value | Property |
---|---|---|
Host | localhost |
spring.rabbitmq.host |
Port | 5672 |
spring.rabbitmq.port |
Username | guest |
spring.rabbitmq.username |
Password | guest |
spring.rabbitmq.password |
Exchange | inventory.direct |
N.A. |
Request queue routing key | inventory.queue.request |
N.A. |
Response queue routing key | inventory.queue.response |
N.A. |
This application supports Direct Reply-to feature. If you want to use RPC (request/reply) pattern in SOAtest, make sure to configure the following fields with the pre-existing pseudo-queue
amq.rabbitmq.reply-to
:
- Set Reply To (Transport -> Basic Properties -> Reply To) to
amq.rabbitmq.reply-to
to publish the response message to it.- Set Queue Name (Transport -> Consume -> Queue Name) to
amq.rabbitmq.reply-to
to consume response message from it.
To use the queueing system with JMS proxy, you can change Destination queue and Reply to queue to customized queue names. The Client Connection in message proxy should be configured with the two customized queues. The Server Connection in message proxy should be configured with the two default queues.
To use JMS or RabbitMQ with virtual asset, you can change Inventory service request queue to a customized destination queue name. The virtual asset deployment should be configured to listen to the customized destination queue and reply to the default response queue.
To use Kafka with virtual asset, you can change Inventory service request topic to a customized request topic name. The virtual asset deployment should be configured to listen to the customized request topic and produce messages to the default response topic.
- Download, install, and start a Kafka server (0.10.0.0 or later) using default settings.
- Set Kafka broker URL and consumer group ID in application.properties file.
- Start the demo application and change queue type to Kafka in PARASOFT QUEUE CONFIGURATION section of Demo Administration page.
- To test connection with Kafka server, either use Test Connection button in Kafka configuration details link or save changes in Demo Administration page.
- Download and install Erlang and RabbitMQ, then start the RabbitMQ server using default settings.
The minimum version of RabbitMQ supported in demo application is 2.0.0 (compatible Erlang version is R13B).
Reference for compatibility of RabbitMQ and Erlang versions: RabbitMQ and Erlang/OTP Compatibility Matrix.
- Set the RabbitMQ host, port, username, password in application.properties file.
- Start the demo application and change queue type to RabbitMQ in PARASOFT QUEUE CONFIGURATION section of Demo Administration page.
- To test connection with RabbitMQ server, either use Test Connection button in RabbitMQ configuration details link or save changes in Demo Administration page.
The gRPC service in this application has three methods which support both JSON and Protobuf formats.
Option | Value | Property |
---|---|---|
Host | localhost |
N.A. |
Port | 50051 |
grpc.server.port |
Json Service Name | grpc.demoApp.JsonService |
N.A. |
Proto Service Name | grpc.demoApp.ProtobufService |
N.A. |
Method | Description |
---|---|
getStockByItemId | Unary call which sends item id and receives stock quantity |
getItemsInStock | Server streaming method which gets information of all items in stock in stream |
updateItemsInStock | Bidirectional streaming method which takes information to update item stock and responds with updated item information |
- getItemsInStock: expects a request body as below.
{ "id": 1 // Long }
- getItemsInStock: expects empty request body.
- updateItemsInStock: expects a request body as below.
{ "id": 1, // Long "value": 1, // Int "operation": "ADD" // Enum type: ADD | REMOVE }
To use gRPC Protobuf service with SOAtest Protobuf clients, you need to add protobuf-extension.jar to Parasoft > Preferences > System Properties in SOAtest & Virtualize desktop first. Then the message types for request body will be loaded into the Protobuf clients.
- Download IoT/Microservices Pack from Parasoft Marketplace.
- Download protoc and add "bin" folder path to your system's PATH environment variable.
protoc --version // ensure that protoc is installed successfully
- Extract the jar file for com.parasoft.soavirt.messages.protobuf and run the following command with ProtobufService.proto under the directory.
java -jar com.parasoft.soavirt.messages.protobuf.jar --protoDir path/to/proto/files
- Find the ParasoftJDBCDriver.jar in {SOAtest & Virtualize installation directory}/{version}/proxies.
- Copy it to {root directory of parasoft-demo-app}/lib. (Create the folder if it does not already exist.)
- Open SOAtest & Virtualize desktop and add the ParasoftJDBCDriver.jar to Parasoft > Preferences > JDBC Drivers.
- Start Virtualize server in Virtualize Server view.
- Enable the PARASOFT JDBC PROXY in Demo Administration page, modify started server's URL, Parasoft Virtualize Server path, and Parasoft Virtualize group ID if necessary.
- Go to SOAtest & Virtualize desktop and refresh the Server. If the Parasoft JDBC Proxy is enabled successfully, there will be a controller which has the same name as group ID under JDBC Controllers.
- Change the settings of the controller.
- Open SOAtest & Virtualize desktop and add the hsqldb driver to Parasoft > Preferences > JDBC Drivers.
- Create a tst file with DB Tool.
- Open the DB Tool and open the Connection tab. Select Local option and fill in Driver, URL, Username, and Password for the database.
Option | Value |
---|---|
Driver | org.hsqldb.jdbcDriver |
URL | jdbc:hsqldb:hsql://localhost:9001/{database name} |
Username | SA |
Password | pass |
- Write SQL statement in SQL Query tab and run the test. The query results will be shown in Traffic Object.