eap64-sso-s2i.json 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816
  1. {
  2. "kind": "Template",
  3. "apiVersion": "v1",
  4. "metadata": {
  5. "annotations": {
  6. "iconClass": "icon-eap",
  7. "tags": "eap,javaee,java,jboss,hidden",
  8. "version": "1.4.7",
  9. "openshift.io/display-name": "JBoss EAP 6.4 + Single Sign-On (with https)",
  10. "openshift.io/provider-display-name": "Red Hat, Inc.",
  11. "description": "An example EAP 6 Single Sign-On application. For more information about using this template, see https://github.com/jboss-openshift/application-templates.",
  12. "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Enterprise Application Server 6.4 based application, including a build configuration, application deployment configuration and integrated with Red Hat Single Sign-On.",
  13. "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/",
  14. "template.openshift.io/support-url": "https://access.redhat.com"
  15. },
  16. "name": "eap64-sso-s2i"
  17. },
  18. "labels": {
  19. "template": "eap64-sso-s2i",
  20. "xpaas": "1.4.7"
  21. },
  22. "message": "A new EAP 6 based application with SSL and SSO support has been created in your project. Please be sure to create the \"${SERVICE_ACCOUNT_NAME}\" service account and the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications.",
  23. "parameters": [
  24. {
  25. "displayName": "Application Name",
  26. "description": "The name for the application.",
  27. "name": "APPLICATION_NAME",
  28. "value": "eap-app",
  29. "required": true
  30. },
  31. {
  32. "displayName": "Custom http Route Hostname",
  33. "description": "Hostname for http service route (e.g. eap-app-myproject.example.com). Required for SSO-enabled applications. This is added to the white list of redirects in the SSO server.",
  34. "name": "HOSTNAME_HTTP",
  35. "value": "",
  36. "required": true
  37. },
  38. {
  39. "displayName": "Custom https Route Hostname",
  40. "description": "Hostname for https service route (e.g. secure-eap-app-myproject.example.com). Required for SSO-enabled applications. This is added to the white list of redirects in the SSO server.",
  41. "name": "HOSTNAME_HTTPS",
  42. "value": "",
  43. "required": true
  44. },
  45. {
  46. "displayName": "Git Repository URL",
  47. "description": "Git source URI for application",
  48. "name": "SOURCE_REPOSITORY_URL",
  49. "value": "https://github.com/redhat-developer/redhat-sso-quickstarts",
  50. "required": true
  51. },
  52. {
  53. "displayName": "Git Reference",
  54. "description": "Git branch/tag reference",
  55. "name": "SOURCE_REPOSITORY_REF",
  56. "value": "7.0.x-ose",
  57. "required": false
  58. },
  59. {
  60. "displayName": "Context Directory",
  61. "description": "Path within Git project to build; empty for root project directory.",
  62. "name": "CONTEXT_DIR",
  63. "value": "",
  64. "required": false
  65. },
  66. {
  67. "displayName": "Queues",
  68. "description": "Queue names",
  69. "name": "HORNETQ_QUEUES",
  70. "value": "",
  71. "required": false
  72. },
  73. {
  74. "displayName": "Topics",
  75. "description": "Topic names",
  76. "name": "HORNETQ_TOPICS",
  77. "value": "",
  78. "required": false
  79. },
  80. {
  81. "displayName": "Service Account Name",
  82. "description": "The name of the service account to use for the deployment. The service account should be configured to allow useage of the secret(s) specified by HTTPS_SECRET and JGROUPS_ENCRYPT_SECRET.",
  83. "name": "SERVICE_ACCOUNT_NAME",
  84. "value": "eap-service-account",
  85. "required": true
  86. },
  87. {
  88. "displayName": "Server Keystore Secret Name",
  89. "description": "The name of the secret containing the keystore file",
  90. "name": "HTTPS_SECRET",
  91. "value": "eap-app-secret",
  92. "required": true
  93. },
  94. {
  95. "displayName": "Server Keystore Filename",
  96. "description": "The name of the keystore file within the secret",
  97. "name": "HTTPS_KEYSTORE",
  98. "value": "keystore.jks",
  99. "required": false
  100. },
  101. {
  102. "displayName": "Server Keystore Type",
  103. "description": "The type of the keystore file (JKS or JCEKS)",
  104. "name": "HTTPS_KEYSTORE_TYPE",
  105. "value": "",
  106. "required": false
  107. },
  108. {
  109. "displayName": "Server Certificate Name",
  110. "description": "The name associated with the server certificate (e.g. jboss)",
  111. "name": "HTTPS_NAME",
  112. "value": "",
  113. "required": false
  114. },
  115. {
  116. "displayName": "Server Keystore Password",
  117. "description": "The password for the keystore and certificate (e.g. mykeystorepass)",
  118. "name": "HTTPS_PASSWORD",
  119. "value": "",
  120. "required": false
  121. },
  122. {
  123. "displayName": "HornetQ Password",
  124. "description": "HornetQ cluster admin password",
  125. "name": "HORNETQ_CLUSTER_PASSWORD",
  126. "from": "[a-zA-Z0-9]{8}",
  127. "generate": "expression",
  128. "required": true
  129. },
  130. {
  131. "displayName": "Github Webhook Secret",
  132. "description": "GitHub trigger secret",
  133. "name": "GITHUB_WEBHOOK_SECRET",
  134. "from": "[a-zA-Z0-9]{8}",
  135. "generate": "expression",
  136. "required": true
  137. },
  138. {
  139. "displayName": "Generic Webhook Secret",
  140. "description": "Generic build trigger secret",
  141. "name": "GENERIC_WEBHOOK_SECRET",
  142. "from": "[a-zA-Z0-9]{8}",
  143. "generate": "expression",
  144. "required": true
  145. },
  146. {
  147. "displayName": "ImageStream Namespace",
  148. "description": "Namespace in which the ImageStreams for Red Hat Middleware images are installed. These ImageStreams are normally installed in the openshift namespace. You should only need to modify this if you've installed the ImageStreams in a different namespace/project.",
  149. "name": "IMAGE_STREAM_NAMESPACE",
  150. "value": "openshift",
  151. "required": true
  152. },
  153. {
  154. "displayName": "JGroups Secret Name",
  155. "description": "The name of the secret containing the keystore file",
  156. "name": "JGROUPS_ENCRYPT_SECRET",
  157. "value": "eap-app-secret",
  158. "required": false
  159. },
  160. {
  161. "displayName": "JGroups Keystore Filename",
  162. "description": "The name of the keystore file within the secret",
  163. "name": "JGROUPS_ENCRYPT_KEYSTORE",
  164. "value": "jgroups.jceks",
  165. "required": false
  166. },
  167. {
  168. "displayName": "JGroups Certificate Name",
  169. "description": "The name associated with the server certificate (e.g. secret-key)",
  170. "name": "JGROUPS_ENCRYPT_NAME",
  171. "value": "",
  172. "required": false
  173. },
  174. {
  175. "displayName": "JGroups Keystore Password",
  176. "description": "The password for the keystore and certificate (e.g. password)",
  177. "name": "JGROUPS_ENCRYPT_PASSWORD",
  178. "value": "",
  179. "required": false
  180. },
  181. {
  182. "displayName": "JGroups Cluster Password",
  183. "description": "JGroups cluster password",
  184. "name": "JGROUPS_CLUSTER_PASSWORD",
  185. "from": "[a-zA-Z0-9]{8}",
  186. "generate": "expression",
  187. "required": true
  188. },
  189. {
  190. "displayName": "Deploy Exploded Archives",
  191. "description": "Controls whether exploded deployment content should be automatically deployed",
  192. "name": "AUTO_DEPLOY_EXPLODED",
  193. "value": "false",
  194. "required": false
  195. },
  196. {
  197. "displayName": "URL for SSO",
  198. "description": "The URL for the SSO server (e.g. https://secure-sso-myproject.example.com/auth). This is the URL through which the user will be redirected when a login or token is required by the application.",
  199. "name": "SSO_URL",
  200. "value": "",
  201. "required": true
  202. },
  203. {
  204. "displayName": "URL for SSO (internal service)",
  205. "description": "The URL for the internal SSO service, where secure-sso is the kubernetes service exposed by the SSO server. This is used to create the application client(s) (see SSO_USERNAME). This can also be the same as SSO_URL.",
  206. "name": "SSO_SERVICE_URL",
  207. "value": "https://secure-sso:8443/auth",
  208. "required": false
  209. },
  210. {
  211. "displayName": "SSO Realm",
  212. "description": "The SSO realm to which the application client(s) should be associated (e.g. demo).",
  213. "name": "SSO_REALM",
  214. "value": "",
  215. "required": true
  216. },
  217. {
  218. "displayName": "SSO Username",
  219. "description": "The username used to access the SSO service. This is used to create the appliction client(s) within the specified SSO realm. This should match the SSO_SERVICE_USERNAME specified through one of the sso70-* templates.",
  220. "name": "SSO_USERNAME",
  221. "value": "",
  222. "required": false
  223. },
  224. {
  225. "displayName": "SSO Password",
  226. "description": "The password for the SSO service user.",
  227. "name": "SSO_PASSWORD",
  228. "value": "",
  229. "required": false
  230. },
  231. {
  232. "displayName": "SSO Public Key",
  233. "description": "SSO Public Key. Public key is recommended to be passed into the template to avoid man-in-the-middle security vulnerability. This can be retrieved from the SSO server, for the specified realm.",
  234. "name": "SSO_PUBLIC_KEY",
  235. "value": "",
  236. "required": false
  237. },
  238. {
  239. "displayName": "SSO Bearer Only?",
  240. "description": "SSO Client Access Type",
  241. "name": "SSO_BEARER_ONLY",
  242. "value": "",
  243. "required": false
  244. },
  245. {
  246. "displayName": "Artifact Directories",
  247. "description": "List of directories from which archives will be copied into the deployment folder. If unspecified, all archives in /target will be copied.",
  248. "name": "ARTIFACT_DIR",
  249. "value": "app-jee-jsp/target,service-jee-jaxrs/target,app-profile-jee-jsp/target,app-profile-saml-jee-jsp/target",
  250. "required": false
  251. },
  252. {
  253. "displayName": "SSO SAML Keystore Secret",
  254. "description": "The name of the secret containing the keystore file",
  255. "name": "SSO_SAML_KEYSTORE_SECRET",
  256. "value": "eap-app-secret",
  257. "required": false
  258. },
  259. {
  260. "displayName": "SSO SAML Keystore",
  261. "description": "The name of the keystore file within the secret",
  262. "name": "SSO_SAML_KEYSTORE",
  263. "value": "keystore.jks",
  264. "required": false
  265. },
  266. {
  267. "displayName": "SSO SAML Certificate Name",
  268. "description": "The name associated with the server certificate",
  269. "name": "SSO_SAML_CERTIFICATE_NAME",
  270. "value": "jboss",
  271. "required": false
  272. },
  273. {
  274. "displayName": "SSO SAML Keystore Password",
  275. "description": "The password for the keystore and certificate",
  276. "name": "SSO_SAML_KEYSTORE_PASSWORD",
  277. "value": "mykeystorepass",
  278. "required": false
  279. },
  280. {
  281. "displayName": "SSO Client Secret",
  282. "description": "The SSO Client Secret for Confidential Access",
  283. "name": "SSO_SECRET",
  284. "from": "[a-zA-Z0-9]{8}",
  285. "generate": "expression",
  286. "required": true
  287. },
  288. {
  289. "displayName": "Enable CORS for SSO?",
  290. "description": "Enable CORS for SSO applications",
  291. "name": "SSO_ENABLE_CORS",
  292. "value": "false",
  293. "required": false
  294. },
  295. {
  296. "displayName": "SSO SAML Logout Page",
  297. "description": "SSO logout page for SAML applications",
  298. "name": "SSO_SAML_LOGOUT_PAGE",
  299. "value": "/",
  300. "required": false
  301. },
  302. {
  303. "displayName": "Disable SSL Validation in EAP->SSO communication",
  304. "description": "If true SSL communication between EAP and the SSO Server will be insecure (i.e. certificate validation is disabled with curl)",
  305. "name": "SSO_DISABLE_SSL_CERTIFICATE_VALIDATION",
  306. "value": "true",
  307. "required": false
  308. },
  309. {
  310. "displayName": "SSO Trust Store",
  311. "description": "The name of the truststore file within the secret (e.g. truststore.jks)",
  312. "name": "SSO_TRUSTSTORE",
  313. "value": "",
  314. "required": false
  315. },
  316. {
  317. "displayName": "SSO Trust Store Password",
  318. "description": "The password for the truststore and certificate (e.g. mykeystorepass)",
  319. "name": "SSO_TRUSTSTORE_PASSWORD",
  320. "value": "",
  321. "required": false
  322. },
  323. {
  324. "displayName": "SSO Trust Store Secret",
  325. "description": "The name of the secret containing the truststore file (e.g. truststore-secret). Used for volume secretName",
  326. "name": "SSO_TRUSTSTORE_SECRET",
  327. "value": "eap-app-secret",
  328. "required": false
  329. },
  330. {
  331. "displayName": "Maven mirror URL",
  332. "description": "Maven mirror to use for S2I builds",
  333. "name": "MAVEN_MIRROR_URL",
  334. "value": "",
  335. "required": false
  336. }
  337. ],
  338. "objects": [
  339. {
  340. "kind": "Service",
  341. "apiVersion": "v1",
  342. "spec": {
  343. "ports": [
  344. {
  345. "port": 8080,
  346. "targetPort": 8080
  347. }
  348. ],
  349. "selector": {
  350. "deploymentConfig": "${APPLICATION_NAME}"
  351. }
  352. },
  353. "metadata": {
  354. "name": "${APPLICATION_NAME}",
  355. "labels": {
  356. "application": "${APPLICATION_NAME}"
  357. },
  358. "annotations": {
  359. "description": "The web server's http port."
  360. }
  361. }
  362. },
  363. {
  364. "kind": "Service",
  365. "apiVersion": "v1",
  366. "spec": {
  367. "ports": [
  368. {
  369. "port": 8443,
  370. "targetPort": 8443
  371. }
  372. ],
  373. "selector": {
  374. "deploymentConfig": "${APPLICATION_NAME}"
  375. }
  376. },
  377. "metadata": {
  378. "name": "secure-${APPLICATION_NAME}",
  379. "labels": {
  380. "application": "${APPLICATION_NAME}"
  381. },
  382. "annotations": {
  383. "description": "The web server's https port."
  384. }
  385. }
  386. },
  387. {
  388. "kind": "Route",
  389. "apiVersion": "v1",
  390. "id": "${APPLICATION_NAME}-http",
  391. "metadata": {
  392. "name": "${APPLICATION_NAME}",
  393. "labels": {
  394. "application": "${APPLICATION_NAME}"
  395. },
  396. "annotations": {
  397. "description": "Route for application's http service."
  398. }
  399. },
  400. "spec": {
  401. "host": "${HOSTNAME_HTTP}",
  402. "to": {
  403. "name": "${APPLICATION_NAME}"
  404. }
  405. }
  406. },
  407. {
  408. "kind": "Route",
  409. "apiVersion": "v1",
  410. "id": "${APPLICATION_NAME}-https",
  411. "metadata": {
  412. "name": "secure-${APPLICATION_NAME}",
  413. "labels": {
  414. "application": "${APPLICATION_NAME}"
  415. },
  416. "annotations": {
  417. "description": "Route for application's https service."
  418. }
  419. },
  420. "spec": {
  421. "host": "${HOSTNAME_HTTPS}",
  422. "to": {
  423. "name": "secure-${APPLICATION_NAME}"
  424. },
  425. "tls": {
  426. "termination": "passthrough"
  427. }
  428. }
  429. },
  430. {
  431. "kind": "ImageStream",
  432. "apiVersion": "v1",
  433. "metadata": {
  434. "name": "${APPLICATION_NAME}",
  435. "labels": {
  436. "application": "${APPLICATION_NAME}"
  437. }
  438. }
  439. },
  440. {
  441. "kind": "BuildConfig",
  442. "apiVersion": "v1",
  443. "metadata": {
  444. "name": "${APPLICATION_NAME}",
  445. "labels": {
  446. "application": "${APPLICATION_NAME}"
  447. }
  448. },
  449. "spec": {
  450. "source": {
  451. "type": "Git",
  452. "git": {
  453. "uri": "${SOURCE_REPOSITORY_URL}",
  454. "ref": "${SOURCE_REPOSITORY_REF}"
  455. },
  456. "contextDir": "${CONTEXT_DIR}"
  457. },
  458. "strategy": {
  459. "type": "Source",
  460. "sourceStrategy": {
  461. "forcePull": true,
  462. "from": {
  463. "kind": "ImageStreamTag",
  464. "namespace": "${IMAGE_STREAM_NAMESPACE}",
  465. "name": "jboss-eap64-openshift:1.6"
  466. },
  467. "env": [
  468. {
  469. "name": "ARTIFACT_DIR",
  470. "value": "${ARTIFACT_DIR}"
  471. },
  472. {
  473. "name": "MAVEN_ARGS_APPEND",
  474. "value": ""
  475. },
  476. {
  477. "name": "MAVEN_MIRROR_URL",
  478. "value": "${MAVEN_MIRROR_URL}"
  479. }
  480. ]
  481. }
  482. },
  483. "output": {
  484. "to": {
  485. "kind": "ImageStreamTag",
  486. "name": "${APPLICATION_NAME}:latest"
  487. }
  488. },
  489. "triggers": [
  490. {
  491. "type": "GitHub",
  492. "github": {
  493. "secret": "${GITHUB_WEBHOOK_SECRET}"
  494. }
  495. },
  496. {
  497. "type": "Generic",
  498. "generic": {
  499. "secret": "${GENERIC_WEBHOOK_SECRET}"
  500. }
  501. },
  502. {
  503. "type": "ImageChange",
  504. "imageChange": {}
  505. },
  506. {
  507. "type": "ConfigChange"
  508. }
  509. ]
  510. }
  511. },
  512. {
  513. "kind": "DeploymentConfig",
  514. "apiVersion": "v1",
  515. "metadata": {
  516. "name": "${APPLICATION_NAME}",
  517. "labels": {
  518. "application": "${APPLICATION_NAME}"
  519. }
  520. },
  521. "spec": {
  522. "strategy": {
  523. "type": "Recreate"
  524. },
  525. "triggers": [
  526. {
  527. "type": "ImageChange",
  528. "imageChangeParams": {
  529. "automatic": true,
  530. "containerNames": [
  531. "${APPLICATION_NAME}"
  532. ],
  533. "from": {
  534. "kind": "ImageStreamTag",
  535. "name": "${APPLICATION_NAME}:latest"
  536. }
  537. }
  538. },
  539. {
  540. "type": "ConfigChange"
  541. }
  542. ],
  543. "replicas": 1,
  544. "selector": {
  545. "deploymentConfig": "${APPLICATION_NAME}"
  546. },
  547. "template": {
  548. "metadata": {
  549. "name": "${APPLICATION_NAME}",
  550. "labels": {
  551. "deploymentConfig": "${APPLICATION_NAME}",
  552. "application": "${APPLICATION_NAME}"
  553. }
  554. },
  555. "spec": {
  556. "serviceAccountName": "${SERVICE_ACCOUNT_NAME}",
  557. "terminationGracePeriodSeconds": 60,
  558. "containers": [
  559. {
  560. "name": "${APPLICATION_NAME}",
  561. "image": "${APPLICATION_NAME}",
  562. "imagePullPolicy": "Always",
  563. "volumeMounts": [
  564. {
  565. "name": "sso-saml-keystore-volume",
  566. "mountPath": "/etc/sso-saml-secret-volume",
  567. "readOnly": true
  568. },
  569. {
  570. "name": "eap-keystore-volume",
  571. "mountPath": "/etc/eap-secret-volume",
  572. "readOnly": true
  573. },
  574. {
  575. "name": "eap-jgroups-keystore-volume",
  576. "mountPath": "/etc/jgroups-encrypt-secret-volume",
  577. "readOnly": true
  578. },
  579. {
  580. "name": "sso-truststore-volume",
  581. "mountPath": "/etc/sso-secret-volume",
  582. "readOnly": true
  583. }
  584. ],
  585. "livenessProbe": {
  586. "exec": {
  587. "command": [
  588. "/bin/bash",
  589. "-c",
  590. "/opt/eap/bin/livenessProbe.sh"
  591. ]
  592. }
  593. },
  594. "readinessProbe": {
  595. "exec": {
  596. "command": [
  597. "/bin/bash",
  598. "-c",
  599. "/opt/eap/bin/readinessProbe.sh"
  600. ]
  601. }
  602. },
  603. "ports": [
  604. {
  605. "name": "jolokia",
  606. "containerPort": 8778,
  607. "protocol": "TCP"
  608. },
  609. {
  610. "name": "http",
  611. "containerPort": 8080,
  612. "protocol": "TCP"
  613. },
  614. {
  615. "name": "https",
  616. "containerPort": 8443,
  617. "protocol": "TCP"
  618. },
  619. {
  620. "name": "ping",
  621. "containerPort": 8888,
  622. "protocol": "TCP"
  623. }
  624. ],
  625. "env": [
  626. {
  627. "name": "OPENSHIFT_KUBE_PING_LABELS",
  628. "value": "application=${APPLICATION_NAME}"
  629. },
  630. {
  631. "name": "OPENSHIFT_KUBE_PING_NAMESPACE",
  632. "valueFrom": {
  633. "fieldRef": {
  634. "fieldPath": "metadata.namespace"
  635. }
  636. }
  637. },
  638. {
  639. "name": "HOSTNAME_HTTP",
  640. "value": "${HOSTNAME_HTTP}"
  641. },
  642. {
  643. "name": "HOSTNAME_HTTPS",
  644. "value": "${HOSTNAME_HTTPS}"
  645. },
  646. {
  647. "name": "HTTPS_KEYSTORE_DIR",
  648. "value": "/etc/eap-secret-volume"
  649. },
  650. {
  651. "name": "HTTPS_KEYSTORE",
  652. "value": "${HTTPS_KEYSTORE}"
  653. },
  654. {
  655. "name": "HTTPS_KEYSTORE_TYPE",
  656. "value": "${HTTPS_KEYSTORE_TYPE}"
  657. },
  658. {
  659. "name": "HTTPS_NAME",
  660. "value": "${HTTPS_NAME}"
  661. },
  662. {
  663. "name": "HTTPS_PASSWORD",
  664. "value": "${HTTPS_PASSWORD}"
  665. },
  666. {
  667. "name": "HORNETQ_CLUSTER_PASSWORD",
  668. "value": "${HORNETQ_CLUSTER_PASSWORD}"
  669. },
  670. {
  671. "name": "HORNETQ_QUEUES",
  672. "value": "${HORNETQ_QUEUES}"
  673. },
  674. {
  675. "name": "HORNETQ_TOPICS",
  676. "value": "${HORNETQ_TOPICS}"
  677. },
  678. {
  679. "name": "JGROUPS_ENCRYPT_SECRET",
  680. "value": "${JGROUPS_ENCRYPT_SECRET}"
  681. },
  682. {
  683. "name": "JGROUPS_ENCRYPT_KEYSTORE_DIR",
  684. "value": "/etc/jgroups-encrypt-secret-volume"
  685. },
  686. {
  687. "name": "JGROUPS_ENCRYPT_KEYSTORE",
  688. "value": "${JGROUPS_ENCRYPT_KEYSTORE}"
  689. },
  690. {
  691. "name": "JGROUPS_ENCRYPT_NAME",
  692. "value": "${JGROUPS_ENCRYPT_NAME}"
  693. },
  694. {
  695. "name": "JGROUPS_ENCRYPT_PASSWORD",
  696. "value": "${JGROUPS_ENCRYPT_PASSWORD}"
  697. },
  698. {
  699. "name": "JGROUPS_CLUSTER_PASSWORD",
  700. "value": "${JGROUPS_CLUSTER_PASSWORD}"
  701. },
  702. {
  703. "name": "AUTO_DEPLOY_EXPLODED",
  704. "value": "${AUTO_DEPLOY_EXPLODED}"
  705. },
  706. {
  707. "name": "SSO_URL",
  708. "value": "${SSO_URL}"
  709. },
  710. {
  711. "name": "SSO_SERVICE_URL",
  712. "value": "${SSO_SERVICE_URL}"
  713. },
  714. {
  715. "name": "SSO_REALM",
  716. "value": "${SSO_REALM}"
  717. },
  718. {
  719. "name": "SSO_USERNAME",
  720. "value": "${SSO_USERNAME}"
  721. },
  722. {
  723. "name": "SSO_PASSWORD",
  724. "value": "${SSO_PASSWORD}"
  725. },
  726. {
  727. "name": "SSO_PUBLIC_KEY",
  728. "value": "${SSO_PUBLIC_KEY}"
  729. },
  730. {
  731. "name": "SSO_BEARER_ONLY",
  732. "value": "${SSO_BEARER_ONLY}"
  733. },
  734. {
  735. "name": "SSO_SAML_KEYSTORE_SECRET",
  736. "value": "${SSO_SAML_KEYSTORE_SECRET}"
  737. },
  738. {
  739. "name": "SSO_SAML_KEYSTORE",
  740. "value": "${SSO_SAML_KEYSTORE}"
  741. },
  742. {
  743. "name": "SSO_SAML_KEYSTORE_DIR",
  744. "value": "/etc/sso-saml-secret-volume"
  745. },
  746. {
  747. "name": "SSO_SAML_CERTIFICATE_NAME",
  748. "value": "${SSO_SAML_CERTIFICATE_NAME}"
  749. },
  750. {
  751. "name": "SSO_SAML_KEYSTORE_PASSWORD",
  752. "value": "${SSO_SAML_KEYSTORE_PASSWORD}"
  753. },
  754. {
  755. "name": "SSO_SECRET",
  756. "value": "${SSO_SECRET}"
  757. },
  758. {
  759. "name": "SSO_ENABLE_CORS",
  760. "value": "${SSO_ENABLE_CORS}"
  761. },
  762. {
  763. "name": "SSO_SAML_LOGOUT_PAGE",
  764. "value": "${SSO_SAML_LOGOUT_PAGE}"
  765. },
  766. {
  767. "name": "SSO_DISABLE_SSL_CERTIFICATE_VALIDATION",
  768. "value": "${SSO_DISABLE_SSL_CERTIFICATE_VALIDATION}"
  769. },
  770. {
  771. "name": "SSO_TRUSTSTORE",
  772. "value": "${SSO_TRUSTSTORE}"
  773. },
  774. {
  775. "name": "SSO_TRUSTSTORE_DIR",
  776. "value": "/etc/sso-secret-volume"
  777. },
  778. {
  779. "name": "SSO_TRUSTSTORE_PASSWORD",
  780. "value": "${SSO_TRUSTSTORE_PASSWORD}"
  781. }
  782. ]
  783. }
  784. ],
  785. "volumes": [
  786. {
  787. "name": "sso-saml-keystore-volume",
  788. "secret": {
  789. "secretName": "${SSO_SAML_KEYSTORE_SECRET}"
  790. }
  791. },
  792. {
  793. "name": "eap-keystore-volume",
  794. "secret": {
  795. "secretName": "${HTTPS_SECRET}"
  796. }
  797. },
  798. {
  799. "name": "eap-jgroups-keystore-volume",
  800. "secret": {
  801. "secretName": "${JGROUPS_ENCRYPT_SECRET}"
  802. }
  803. },
  804. {
  805. "name": "sso-truststore-volume",
  806. "secret": {
  807. "secretName": "${SSO_TRUSTSTORE_SECRET}"
  808. }
  809. }
  810. ]
  811. }
  812. }
  813. }
  814. }
  815. ]
  816. }