You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/1.9/content/_index.md
+22-8Lines changed: 22 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,25 +3,39 @@
3
3
Many organizations are using WebLogic Server, with or without other Oracle Fusion Middleware components, to run their enterprise applications. As more and more organizations move toward Continuous Delivery of their applications, the importance of automated testing grows. Automating WebLogic Server domain creation and application deployment with hand-coded WLST scripts is challenging. After those scripts exist for a project, they must be maintained as the project evolves. WebLogic Deploy Tooling (WDT) removes the need for most users to write WLST scripts for routine domain creation and application deployment tasks. Instead, you can write a declarative, metadata model describing the domain and applications (with their dependent resources), and use one or more of the single-purpose tools that perform domain lifecycle operations based on the content of the model. This makes it easy to stand up environments and perform domain lifecycle operations in a repeatable fashion based on a metadata model that can be treated as source and evolve as the project evolves.
4
4
5
5
6
-
WDT provides several single-purpose tools, all exposed as shell scripts (for both Windows and UNIX). For detailed information, see [WDT Tools]({{< relref "/userguide/tools/" >}}).
7
-
8
-
6
+
WDT provides several single-purpose tools, all exposed as shell scripts (for both Windows and UNIX), that can:
7
+
8
+
* Create or update a domain.
9
+
* Populate a domain with all the resources and applications specified in a model.
10
+
* Add resources and applications to an existing domain.
11
+
* Introspect an existing domain and create a model file describing the domain and an archive file of the binaries deployed to the domain.
12
+
* Encrypt the passwords in a model (or its variable file).
13
+
* Validate a model as well as provide model usage information.
14
+
* Compare model files.
15
+
* Prepare model files for deploying to the WebLogic Kubernetes Operator environment.
16
+
* Generate a domain resource YAML file for use with the WebLogic Kubernetes Operator.
17
+
* Tokenize a model with variables.
18
+
* Provide information about the folders and attributes that are valid for sections and folders of a domain model.
19
+
20
+
For detailed information, see [WDT Tools]({{< relref "/userguide/tools/" >}}).
21
+
22
+
***
9
23
### Current production release
10
24
11
-
The current [release](https://github.com/oracle/weblogic-deploy-tooling/releases) of WebLogic Deploy Tooling is 1.9.11. This release was published on March, 2021.
12
-
25
+
The current [release](https://github.com/oracle/weblogic-deploy-tooling/releases) of WebLogic Deploy Tooling is 1.9.12. This release was published on April, 29, 2021.
26
+
***
13
27
### Recent changes and known issues
14
28
15
29
See the [Release Notes]({{< relref "/release-notes.md" >}}) for recent changes, known issues, and workarounds.
16
30
17
31
### About this documentation
18
32
19
-
This documentation includes sections targeted to different audiences. To help you find what you are looking for more easily, please consult this table of contents:
33
+
This documentation includes sections targeted to different audiences:
20
34
21
-
*[Concepts]({{< relref "/concepts/" >}}) explains the underlying metadata model, files, and configurations...
35
+
*[Concepts]({{< relref "/concepts/" >}}) explains the underlying metadata models, archive files, tool configuration, and target environments.
22
36
* The [User guide]({{< relref "/userguide/" >}}) contains detailed usage information, including how to install and configure WebLogic Deploy Tooling, and how to use each tool.
23
37
* The [Samples]({{< relref "/samples/" >}}) provide detailed example code and instructions that show you how to perform various tasks.
24
-
* The [Developer guide]({{< relref "/developer/" >}}) provides details for people who want to understand how WDT is built, tested, and so on.
38
+
* The [Developer guide]({{< relref "/developer/" >}}) provides details for people who want to understand how WDT is built, its features mapped and implemented.
Copy file name to clipboardExpand all lines: documentation/1.9/content/concepts/model.md
+12-9Lines changed: 12 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,18 @@ draft: false
5
5
weight: 1
6
6
---
7
7
8
+
### Contents
9
+
10
+
-[Overview](#overview)
11
+
-[Top-Level Sections](#top-level-model-sections)
12
+
-[Simple Example](#simple-example)
13
+
-[Model Names](#model-names)
14
+
-[Model Tokens](#model-tokens)
15
+
-[Model Semantics](#model-semantics)
16
+
-[Declaring Named MBeans to Delete](#declaring-named-mbeans-to-delete)
17
+
-[Using Multiple Models](#using-multiple-models)
18
+
19
+
### Overview
8
20
9
21
The metadata model (or model, for short) is a version-independent description of a WebLogic Server domain configuration. The tools are designed to support a sparse model so that the model need only describe what is required for the specific operation without describing other artifacts. For example, to deploy an application that depends on a JDBC data source into an existing domain that may contain other applications or data sources, the model needs to describe only the application and the data source in question. If the data source was previously created, the `deployApps` tool will not try to recreate it but may update part of that data source's configuration if the model description is different than the existing values. If the application was previously deployed, the `deployApps` tool will compare the binaries to determine if the application needs to be redeployed or not.
10
22
@@ -31,15 +43,6 @@ The model is written in YAML (or optionally, JSON). The YAML parser, built into
31
43
32
44
All assignment statements must have one or more spaces between the colon and the value. All comments must have a space after the pound sign (also known as hash) to be considered a comment. YAML doesn't allow comments in all locations. While the YAML parser used by the framework does not try to enforce these restrictions, it is likely that putting comments in some locations may cause parse errors since YAML is a difficult language to parse due to its complex indention rules.
33
45
34
-
### Contents
35
-
36
-
-[Top-Level Sections](#top-level-model-sections)
37
-
-[Simple Example](#simple-example)
38
-
-[Model Names](#model-names)
39
-
-[Model Tokens](#model-tokens)
40
-
-[Model Semantics](#model-semantics)
41
-
-[Declaring Named MBeans to Delete](#declaring-named-mbeans-to-delete)
The `<target-name>` value corresponds to the value of the `-target` argument on the tool's command line. The WLS installation includes two pre-defined targets:
You can define a new or extended target environment with a new `target-name` in the above location, or using a [Custom Configuration]({{< relref "/concepts/tool_configuration#custom-configuration" >}}) directory, such as `$WDT_CUSTOM_CONFIG/target/<my-target-name>/target.json`.
Copy file name to clipboardExpand all lines: documentation/1.9/content/concepts/use_cases.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -326,7 +326,8 @@ weight: 3
326
326
```
327
327
#### Trust Service Identity Asserter
328
328
329
-
**NOTE:** The Trust Identity Asserter Security Provider is installed by JRF in 12c versions and newer.
329
+
{{% notice note %}} The Trust Identity Asserter Security Provider is installed by JRF in 12c versions and newer.
330
+
{{% /notice %}}
330
331
331
332
The JRF installed Trust Identity Asserter does not supply a schema file by default. Before you can configure this asserter with WLST offline or WDT offline, you must first build the schema file using the `prepareCustomProvider` script.
332
333
@@ -343,7 +344,8 @@ weight: 3
343
344
344
345
#### Custom Security Providers
345
346
346
-
**NOTE:** Creating and updating domains with custom security providers is limited to WebLogic version 12.1.2 and newer.
347
+
{{% notice note %}} Creating and updating domains with custom security providers is limited to WebLogic version 12.1.2 and newer.
348
+
{{% /notice %}}
347
349
348
350
Prior to using this tooling to create or update a domain with a custom security provider, there are several prerequisites. First, WebLogic Server requires the custom MBean JAR to be in the Oracle Home directory before it can be configured, `WLSERVER/server/lib/mbeantypes`. Second, WebLogic Scripting Tool, WLST, requires that the schema JAR be placed in the Oracle Home directory before WLST offline can be used to discover it or configure it, `ORACLEHOME/oracle_common/lib/schematypes`. Generating an MBean JAR documentation can be found in the WebLogic Server [documentation](https://docs.oracle.com/en/middleware/standalone/weblogic-server/14.1.1.0/devsp/generate_mbeantype.html). Generating the schema JAR can be done with the `prepareCustomProvider` script provided in the WebLogic Server installation.
349
351
@@ -366,10 +368,10 @@ weight: 3
366
368
367
369
368
370
### Modeling WebLogic Users, Groups, and Roles
369
-
WebLogic Server has the ability to establish a set of users, groups, and global roles as part of the WebLogic domain creation. The WebLogic global roles become part of the WebLogic role mapper (i.e. `XACMLRoleMapper`) and are specified under `domainInfo` in the `WLSRoles` section. The users and groups become part of the Embedded LDAP server (i.e. `DefaultAuthenticator`) and are specified under `topology` in the `Security` section.
371
+
WebLogic Server has the ability to establish a set of users, groups, and global roles as part of the WebLogic domain creation. The WebLogic global roles become part of the WebLogic role mapper (for example, `XACMLRoleMapper`) and are specified under `domainInfo` in the `WLSRoles` section. The users and groups become part of the Embedded LDAP server (for example, `DefaultAuthenticator`) and are specified under `topology` in the `Security` section.
370
372
371
373
#### WebLogic Global Roles
372
-
The model allows for the definition of WebLogic roles that can augment the well known WebLogic global roles (e.g. `Admin`, `Deployer`, `Monitor`, ...) in addition to defining new roles. When updating the well known WebLogic roles, an `UpdateMode` can be specified as `{ append | prepend | replace }` with the default being `replace` when not specified. Also, when updating the well known roles, the specified `Expression` will be a logical `OR` with the default expression. The `Expression` value for the role is the same as when using the WebLogic `RoleEditorMBean` for a WebLogic security role mapping provider.
374
+
The model allows for the definition of WebLogic roles that can augment the well known WebLogic global roles (for example, `Admin`, `Deployer`, `Monitor`, ...) in addition to defining new roles. When updating the well known WebLogic roles, an `UpdateMode` can be specified as `{ append | prepend | replace }` with the default being `replace` when not specified. Also, when updating the well known roles, the specified `Expression` will be a logical `OR` with the default expression. The `Expression` value for the role is the same as when using the WebLogic `RoleEditorMBean` for a WebLogic security role mapping provider.
373
375
374
376
For example, the `WLSRoles` section below updates the well known `Admin`, `Deployer` and `Monitor` roles while adding a new global role with `Tester` as the role name:
375
377
@@ -394,7 +396,7 @@ weight: 3
394
396
In addition, the `Expression` value can use the variable placeholder syntax specified when running the [Create Tool]({{< relref "/userguide/tools/create.md" >}}) as shown in the above example.
395
397
396
398
#### WebLogic Users and Groups
397
-
The model allows for the definition of a set of users and groups that will be loaded into the WebLogic Embedded LDAP Server (i.e. `DefaultAuthenticator`). New groups can be specified and users can be added as members of the new groups or existing groups such as the `Administrators` group which is defaulted to be in the WebLogic `Admin` global role. Please see Known Limitations below for additional information on users and groups.
399
+
The model allows for the definition of a set of users and groups that will be loaded into the WebLogic Embedded LDAP Server (for example, `DefaultAuthenticator`). New groups can be specified and users can be added as members of the new groups or existing groups such as the `Administrators` group which is defaulted to be in the WebLogic `Admin` global role. Please see Known Limitations below for additional information on users and groups.
398
400
399
401
The user password can be specified with a placeholder or encrypted with the [Encrypt Tool](encrypt.md). An example `Security` section that adds an additional group `AppMonitors`, adds two new users and places the users into groups is as follows:
400
402
@@ -415,9 +417,9 @@ weight: 3
415
417
416
418
#### Known Limitations
417
419
418
-
- The processing of users, groups, and roles will only take place when using the [Create Domain Tool]({{< relref "/userguide/tools/create.md" >}})
419
-
- WebLogic global roles are only supported with WebLogic Server version 12.2.1 or greater
420
-
- WebLogic global roles are only updated for the WebLogic security XACML role mapping provider (i.e. `XACMLRoleMapper`)
420
+
- The processing of users, groups, and roles will only take place when using the [Create Domain Tool]({{< relref "/userguide/tools/create.md" >}}).
421
+
- WebLogic global roles are only supported with WebLogic Server version 12.2.1 or greater.
422
+
- WebLogic global roles are only updated for the WebLogic security XACML role mapping provider (for example, `XACMLRoleMapper`).
421
423
- The user and group processing is not complete, currently, users cannot be assigned to groups. Users created using the `Security` section are automatically added to the `Administrators` group and are not added to the groups specified. See [Known Issues]({{< relref "/release-notes#assigning-security-groups-to-users" >}}) for information about a patch for this issue.
422
424
423
425
### Modeling WebLogic User Password Credential Mapping
Copy file name to clipboardExpand all lines: documentation/1.9/content/developer/buildWDT.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ Execution of the unit tests requires a WebLogic Server installation, because the
19
19
20
20
The WLST directory can be specified in one of two ways:
21
21
22
-
- Specify the `-Dunit-test-wlst-dir=<wlst-directory>` on the mvn command line.
22
+
- Specify the `-Dunit-test-wlst-dir=<wlst-directory>` on the `mvn` command line.
23
23
24
24
- Create a file `.mvn/maven.config` file in the project directory, containing a single line with the `-Dunit-test-wlst-dir=<wlst-directory>` value. The `.mvn` directory contains a `maven.config-template` file that can be copied and used as a starting point.
Copy file name to clipboardExpand all lines: documentation/1.9/content/userguide/install.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,8 @@ The following table specifies the supported WebLogic Server versions, along with
19
19
20
20
To create a domain with the proper JDK (particularly if the `JAVA_HOME` is different from the one which will be used by the target domain), set the domain `JavaHome` attribute in the domain model.
21
21
22
-
**Note**: The WDT Encryption Model Tool used to encrypt and decrypt clear text passwords in the model and variable files, requires WDT to run with a minimum JDK version of 1.8.
22
+
{{% notice note %}} The WDT Encryption Model Tool used to encrypt and decrypt clear text passwords in the model and variable files, requires WDT to run with a minimum JDK version of 1.8.
0 commit comments