This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
how to protect Apicurio Registry with Louketo Reverse Proxy
# download the 3 servers we are going to use
podman pull quay.io/keycloak/keycloak
podman pull apicurio/apicurio-registry-mem
# louketo hasn't released a OCI image yet# assuming you are on Linux. If not download the correct image
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
In a nutshell, those components do not fetch data from the API, they just dispatch actions and subscribe to a granular slice of state served by a centralized store which lazy loads more instances of state as required.
The components there are just dummy components that implement ZERO business logic, they just render data, pushed by the Store using the Observer pattern.
When new user interactions happen, the components dispatch actions, which are stringly typed function classes. Those actions are intercepted by a reducer, which inspects the action type and its payload.
The reducer is obvlivious about WHO/WHAT dispatched that action and doesn't care.
It just selects if the action emitted is concerned to it (a web app can have dozens of isolated reducers working in parallel), inspects its payload, saves a snapshot of the state, clones the state, updates it according to the action payload, and replaces the former state snapshot with a new one.
The new state is reported through the store, so all components (
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This is going to be a technical description of the idea concept of Integration and how its logical model is implemented.
It's not a comprehensive definition of how Syndesis work. We are not going to describe system pods and their respective responsibilities.
Data Model
Be aware that we currently don't have the logical model defined in any document or UML diagram. There is actually an ER Diagram here, but it's not reflecting entirely the current status of the information architecture.
The entry point for out model is the Integrationentity, that represents an interaction between systems.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters