Extensions
Configuration that applies to the catalogue of extensions to the framework.
Property | Default | Description | ||
---|---|---|---|---|
causeway.extensions.audit-trail. |
Whether the One reason to use this option is if you wish to provide your own implementation that wraps or delegates to the default implementation of |
|||
causeway.extensions.command-log. |
Whether the One reason to use this option is if you wish to provide your own implementation that wraps or delegates to the default implementation of |
|||
causeway.extensions.command-replay. |
true |
null |
||
causeway.extensions.command-replay. |
true |
null |
||
causeway.extensions.command-replay. |
10 |
null |
||
causeway.extensions.command-replay. |
null |
|||
causeway.extensions.command-replay. |
null |
|||
causeway.extensions.command-replay. |
null |
|||
causeway.extensions.command-replay. |
null |
|||
causeway.extensions.command-replay. |
10000 |
Number of milliseconds before running again. |
||
causeway.extensions.command-replay. |
15000 |
Number of milliseconds before starting the job. |
||
causeway.extensions.command-replay. |
causewayModuleExtCommandReplaySeco |
null |
||
causeway.extensions.command-replay. |
causewayModuleExtCommandReplaySeco |
The user that runs the replay session secondary. |
||
causeway.extensions.command-replay. |
null |
|||
causeway.extensions.cors. |
Whether the resource supports user credentials. This flag is exposed as part of 'Access-Control-Allow-Credentials' header in a pre-flight response. It helps browser determine whether or not an actual request can be made using credentials. By default this is not set (i.e. user credentials are not supported). For more information, check the usage of the |
|||
causeway.extensions.cors. |
Which HTTP headers can be allowed in a CORS request. These header will also be returned as part of 'Access-Control-Allow-Headers' header in a pre-flight response. For more information, check the usage of the |
|||
causeway.extensions.cors. |
Which HTTP methods are permitted in a CORS request. A comma separated list of HTTP methods that can be used to access the resource, using cross-origin requests. These are the methods which will also be included as part of 'Access-Control-Allow-Methods' header in a pre-flight response. Default is For more information, check the usage of the |
|||
causeway.extensions.cors. |
* |
Which origins are allowed to make CORS requests. The default is the wildcard ("*"), meaning any origin is allowed to access the resource, but this can be made more restrictive if necessary using a whitelist of comma separated origins eg:
For more information, check the usage of the |
||
causeway.extensions.cors. |
Authorization |
Which HTTP headers are exposed in a CORS request. A comma separated list of headers other than the simple response headers that browsers are allowed to access. These are the headers which will also be included as part of 'Access-Control-Expose-Headers' header in the pre-flight response. Default is none. For more information, check the usage of the |
||
causeway.extensions.execution-log. |
Whether the One reason to use this option is if you wish to provide your own implementation that wraps or delegates to the default implementation of |
|||
causeway.extensions. |
Whether the One reason to use this option is if you wish to provide your own implementation that wraps or delegates to the outbox implementation of |
|||
causeway.extensions. |
100 |
The maximum number of interactions that will be returned when the REST API is polled. |
||
causeway.extensions.layout-loaders. |
As per https://github.com/settings/tokens, must have permissions to the |
|||
causeway.extensions.layout-loaders. |
eg |
|||
causeway.extensions.secman. |
Whether delegated users should be autocreated as locked (the default) or unlocked. BE AWARE THAT if any users are auto-created as unlocked, then the set of roles that they are given should be highly restricted !!! NOTE also that this configuration policy is ignored if running secman with Spring OAuth2 or Keycloak as the authenticator; users are always auto-created. |
|||
causeway.extensions.secman. |
The set of roles that users that have been automatically created are granted automatically. Typically the regular user role (as per |
|||
causeway.extensions.secman. |
Whether to check if every featureId passed in exists or not. |
|||
causeway.extensions.secman. |
If there are conflicting (allow vs veto) permissions at the same scope, then this policy determines whether to prefer to allow the permission or to veto it. This is only used an implementation of secman’s |
|||
causeway.extensions.secman.seed. |
null |
|||
causeway.extensions.secman.seed. |
null |
|||
causeway.extensions.secman.seed. |
An (optional) additional set of namespaces that the role is granted. These are in addition to the main namespaces granted. @see NamespacePermissions#getSticky() |
|||
causeway.extensions.secman.seed. |
The set of namespaces to which the role is granted. These namespaces are intended to be sufficient to allow users with this admin role to be able to administer the security module itself, for example to manage users and roles. The security user is not necessarily able to use the main business logic within the domain application itself, though. These roles cannot be removed via user interface
@see NamespacePermissions#getAdditional() |
|||
causeway.extensions.secman.seed. |
The corresponding password for user. @see #getUserName() |
|||
causeway.extensions.secman.seed. |
The name of security admin role. Users with this role (in particular, the default user are granted access to a set of namespaces ( @see Admin#getUserName() @see NamespacePermissions#getSticky() @see NamespacePermissions#getAdditional() |
|||
causeway.extensions.secman.seed. |
The name of the security super user. This user is automatically made a member of the role, from which it is granted permissions to administer other users. The password for this user is set in @see #getPassword() @see #getRoleName() |
|||
causeway.extensions.secman.seed. |
The role name for regular users of the application, granting them access to basic security features. The exact set of permissions is hard-wired in the |
|||
causeway.extensions.secman.seed. |
Path to local YAML file, if present, to use as an alternative seeding strategy. Eg. seed from a YAML file, that was previously exported by SecMan’s ApplicationRoleManager_exportAsYaml mixin. |
|||
Whether the presence of SecMan should result in the automatic suppression of the This is normally what is required as SecMan’s |
||||
causeway.extensions.secman. |
The set of roles that users registering with the app are granted automatically. If using the wicket viewer, also requires causeway.viewer.wicket.suppress-signup to be set |
|||
causeway.extensions.session-log. |
true |
null |