eap64-sso-s2i.json 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812
  1. {
  2. "kind": "Template",
  3. "apiVersion": "v1",
  4. "metadata": {
  5. "annotations": {
  6. "iconClass": "icon-jboss",
  7. "description": "Application template for EAP 6 applications built using S2I, enabled for SSO.",
  8. "tags": "eap,javaee,java,jboss,xpaas",
  9. "version": "1.4.0",
  10. "openshift.io/display-name": "Red Hat JBoss EAP 6.4 + Single Sign-On (with https)"
  11. },
  12. "name": "eap64-sso-s2i"
  13. },
  14. "labels": {
  15. "template": "eap64-sso-s2i",
  16. "xpaas": "1.4.0"
  17. },
  18. "message": "A new EAP 6 based application with SSL and SSO support has been created in your project. Please be sure to create the \"${SERVICE_ACCOUNT_NAME}\" service account and the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications.",
  19. "parameters": [
  20. {
  21. "displayName": "Application Name",
  22. "description": "The name for the application.",
  23. "name": "APPLICATION_NAME",
  24. "value": "eap-app",
  25. "required": true
  26. },
  27. {
  28. "displayName": "Custom http Route Hostname",
  29. "description": "Hostname for http service route (e.g. eap-app-myproject.example.com). Required for SSO-enabled applications. This is added to the white list of redirects in the SSO server.",
  30. "name": "HOSTNAME_HTTP",
  31. "value": "",
  32. "required": true
  33. },
  34. {
  35. "displayName": "Custom https Route Hostname",
  36. "description": "Hostname for https service route (e.g. secure-eap-app-myproject.example.com). Required for SSO-enabled applications. This is added to the white list of redirects in the SSO server.",
  37. "name": "HOSTNAME_HTTPS",
  38. "value": "",
  39. "required": true
  40. },
  41. {
  42. "displayName": "Git Repository URL",
  43. "description": "Git source URI for application",
  44. "name": "SOURCE_REPOSITORY_URL",
  45. "value": "https://github.com/redhat-developer/redhat-sso-quickstarts",
  46. "required": true
  47. },
  48. {
  49. "displayName": "Git Reference",
  50. "description": "Git branch/tag reference",
  51. "name": "SOURCE_REPOSITORY_REF",
  52. "value": "7.0.x-ose",
  53. "required": false
  54. },
  55. {
  56. "displayName": "Context Directory",
  57. "description": "Path within Git project to build; empty for root project directory.",
  58. "name": "CONTEXT_DIR",
  59. "value": "",
  60. "required": false
  61. },
  62. {
  63. "displayName": "Queues",
  64. "description": "Queue names",
  65. "name": "HORNETQ_QUEUES",
  66. "value": "",
  67. "required": false
  68. },
  69. {
  70. "displayName": "Topics",
  71. "description": "Topic names",
  72. "name": "HORNETQ_TOPICS",
  73. "value": "",
  74. "required": false
  75. },
  76. {
  77. "displayName": "Service Account Name",
  78. "description": "The name of the service account to use for the deployment. The service account should be configured to allow useage of the secret(s) specified by HTTPS_SECRET and JGROUPS_ENCRYPT_SECRET.",
  79. "name": "SERVICE_ACCOUNT_NAME",
  80. "value": "eap-service-account",
  81. "required": true
  82. },
  83. {
  84. "displayName": "Server Keystore Secret Name",
  85. "description": "The name of the secret containing the keystore file",
  86. "name": "HTTPS_SECRET",
  87. "value": "eap-app-secret",
  88. "required": true
  89. },
  90. {
  91. "displayName": "Server Keystore Filename",
  92. "description": "The name of the keystore file within the secret",
  93. "name": "HTTPS_KEYSTORE",
  94. "value": "keystore.jks",
  95. "required": false
  96. },
  97. {
  98. "displayName": "Server Keystore Type",
  99. "description": "The type of the keystore file (JKS or JCEKS)",
  100. "name": "HTTPS_KEYSTORE_TYPE",
  101. "value": "",
  102. "required": false
  103. },
  104. {
  105. "displayName": "Server Certificate Name",
  106. "description": "The name associated with the server certificate (e.g. jboss)",
  107. "name": "HTTPS_NAME",
  108. "value": "",
  109. "required": false
  110. },
  111. {
  112. "displayName": "Server Keystore Password",
  113. "description": "The password for the keystore and certificate (e.g. mykeystorepass)",
  114. "name": "HTTPS_PASSWORD",
  115. "value": "",
  116. "required": false
  117. },
  118. {
  119. "displayName": "HornetQ Password",
  120. "description": "HornetQ cluster admin password",
  121. "name": "HORNETQ_CLUSTER_PASSWORD",
  122. "from": "[a-zA-Z0-9]{8}",
  123. "generate": "expression",
  124. "required": true
  125. },
  126. {
  127. "displayName": "Github Webhook Secret",
  128. "description": "GitHub trigger secret",
  129. "name": "GITHUB_WEBHOOK_SECRET",
  130. "from": "[a-zA-Z0-9]{8}",
  131. "generate": "expression",
  132. "required": true
  133. },
  134. {
  135. "displayName": "Generic Webhook Secret",
  136. "description": "Generic build trigger secret",
  137. "name": "GENERIC_WEBHOOK_SECRET",
  138. "from": "[a-zA-Z0-9]{8}",
  139. "generate": "expression",
  140. "required": true
  141. },
  142. {
  143. "displayName": "ImageStream Namespace",
  144. "description": "Namespace in which the ImageStreams for Red Hat Middleware images are installed. These ImageStreams are normally installed in the openshift namespace. You should only need to modify this if you've installed the ImageStreams in a different namespace/project.",
  145. "name": "IMAGE_STREAM_NAMESPACE",
  146. "value": "openshift",
  147. "required": true
  148. },
  149. {
  150. "displayName": "JGroups Secret Name",
  151. "description": "The name of the secret containing the keystore file",
  152. "name": "JGROUPS_ENCRYPT_SECRET",
  153. "value": "eap-app-secret",
  154. "required": false
  155. },
  156. {
  157. "displayName": "JGroups Keystore Filename",
  158. "description": "The name of the keystore file within the secret",
  159. "name": "JGROUPS_ENCRYPT_KEYSTORE",
  160. "value": "jgroups.jceks",
  161. "required": false
  162. },
  163. {
  164. "displayName": "JGroups Certificate Name",
  165. "description": "The name associated with the server certificate (e.g. secret-key)",
  166. "name": "JGROUPS_ENCRYPT_NAME",
  167. "value": "",
  168. "required": false
  169. },
  170. {
  171. "displayName": "JGroups Keystore Password",
  172. "description": "The password for the keystore and certificate (e.g. password)",
  173. "name": "JGROUPS_ENCRYPT_PASSWORD",
  174. "value": "",
  175. "required": false
  176. },
  177. {
  178. "displayName": "JGroups Cluster Password",
  179. "description": "JGroups cluster password",
  180. "name": "JGROUPS_CLUSTER_PASSWORD",
  181. "from": "[a-zA-Z0-9]{8}",
  182. "generate": "expression",
  183. "required": true
  184. },
  185. {
  186. "displayName": "Deploy Exploded Archives",
  187. "description": "Controls whether exploded deployment content should be automatically deployed",
  188. "name": "AUTO_DEPLOY_EXPLODED",
  189. "value": "false",
  190. "required": false
  191. },
  192. {
  193. "displayName": "URL for SSO",
  194. "description": "The URL for the SSO server (e.g. https://secure-sso-myproject.example.com/auth). This is the URL through which the user will be redirected when a login or token is required by the application.",
  195. "name": "SSO_URL",
  196. "value": "",
  197. "required": true
  198. },
  199. {
  200. "displayName": "URL for SSO (internal service)",
  201. "description": "The URL for the internal SSO service, where secure-sso is the kubernetes service exposed by the SSO server. This is used to create the application client(s) (see SSO_USERNAME). This can also be the same as SSO_URL.",
  202. "name": "SSO_SERVICE_URL",
  203. "value": "https://secure-sso:8443/auth",
  204. "required": false
  205. },
  206. {
  207. "displayName": "SSO Realm",
  208. "description": "The SSO realm to which the application client(s) should be associated (e.g. demo).",
  209. "name": "SSO_REALM",
  210. "value": "",
  211. "required": true
  212. },
  213. {
  214. "displayName": "SSO Username",
  215. "description": "The username used to access the SSO service. This is used to create the appliction client(s) within the specified SSO realm. This should match the SSO_SERVICE_USERNAME specified through one of the sso70-* templates.",
  216. "name": "SSO_USERNAME",
  217. "value": "",
  218. "required": false
  219. },
  220. {
  221. "displayName": "SSO Password",
  222. "description": "The password for the SSO service user.",
  223. "name": "SSO_PASSWORD",
  224. "value": "",
  225. "required": false
  226. },
  227. {
  228. "displayName": "SSO Public Key",
  229. "description": "SSO Public Key. Public key is recommended to be passed into the template to avoid man-in-the-middle security vulnerability. This can be retrieved from the SSO server, for the specified realm.",
  230. "name": "SSO_PUBLIC_KEY",
  231. "value": "",
  232. "required": false
  233. },
  234. {
  235. "displayName": "SSO Bearer Only?",
  236. "description": "SSO Client Access Type",
  237. "name": "SSO_BEARER_ONLY",
  238. "value": "",
  239. "required": false
  240. },
  241. {
  242. "displayName": "Artifact Directories",
  243. "description": "List of directories from which archives will be copied into the deployment folder. If unspecified, all archives in /target will be copied.",
  244. "name": "ARTIFACT_DIR",
  245. "value": "app-jee-jsp/target,service-jee-jaxrs/target,app-profile-jee-jsp/target,app-profile-saml-jee-jsp/target",
  246. "required": false
  247. },
  248. {
  249. "displayName": "SSO SAML Keystore Secret",
  250. "description": "The name of the secret containing the keystore file",
  251. "name": "SSO_SAML_KEYSTORE_SECRET",
  252. "value": "eap-app-secret",
  253. "required": false
  254. },
  255. {
  256. "displayName": "SSO SAML Keystore",
  257. "description": "The name of the keystore file within the secret",
  258. "name": "SSO_SAML_KEYSTORE",
  259. "value": "keystore.jks",
  260. "required": false
  261. },
  262. {
  263. "displayName": "SSO SAML Certificate Name",
  264. "description": "The name associated with the server certificate",
  265. "name": "SSO_SAML_CERTIFICATE_NAME",
  266. "value": "jboss",
  267. "required": false
  268. },
  269. {
  270. "displayName": "SSO SAML Keystore Password",
  271. "description": "The password for the keystore and certificate",
  272. "name": "SSO_SAML_KEYSTORE_PASSWORD",
  273. "value": "mykeystorepass",
  274. "required": false
  275. },
  276. {
  277. "displayName": "SSO Client Secret",
  278. "description": "The SSO Client Secret for Confidential Access",
  279. "name": "SSO_SECRET",
  280. "from": "[a-zA-Z0-9]{8}",
  281. "generate": "expression",
  282. "required": true
  283. },
  284. {
  285. "displayName": "Enable CORS for SSO?",
  286. "description": "Enable CORS for SSO applications",
  287. "name": "SSO_ENABLE_CORS",
  288. "value": "false",
  289. "required": false
  290. },
  291. {
  292. "displayName": "SSO SAML Logout Page",
  293. "description": "SSO logout page for SAML applications",
  294. "name": "SSO_SAML_LOGOUT_PAGE",
  295. "value": "/",
  296. "required": false
  297. },
  298. {
  299. "displayName": "Disable SSL Validation in EAP->SSO communication",
  300. "description": "If true SSL communication between EAP and the SSO Server will be insecure (i.e. certificate validation is disabled with curl)",
  301. "name": "SSO_DISABLE_SSL_CERTIFICATE_VALIDATION",
  302. "value": "true",
  303. "required": false
  304. },
  305. {
  306. "displayName": "SSO Trust Store",
  307. "description": "The name of the truststore file within the secret (e.g. truststore.jks)",
  308. "name": "SSO_TRUSTSTORE",
  309. "value": "",
  310. "required": false
  311. },
  312. {
  313. "displayName": "SSO Trust Store Password",
  314. "description": "The password for the truststore and certificate (e.g. mykeystorepass)",
  315. "name": "SSO_TRUSTSTORE_PASSWORD",
  316. "value": "",
  317. "required": false
  318. },
  319. {
  320. "displayName": "SSO Trust Store Secret",
  321. "description": "The name of the secret containing the truststore file (e.g. truststore-secret). Used for volume secretName",
  322. "name": "SSO_TRUSTSTORE_SECRET",
  323. "value": "eap-app-secret",
  324. "required": false
  325. },
  326. {
  327. "displayName": "Maven mirror URL",
  328. "description": "Maven mirror to use for S2I builds",
  329. "name": "MAVEN_MIRROR_URL",
  330. "value": "",
  331. "required": false
  332. }
  333. ],
  334. "objects": [
  335. {
  336. "kind": "Service",
  337. "apiVersion": "v1",
  338. "spec": {
  339. "ports": [
  340. {
  341. "port": 8080,
  342. "targetPort": 8080
  343. }
  344. ],
  345. "selector": {
  346. "deploymentConfig": "${APPLICATION_NAME}"
  347. }
  348. },
  349. "metadata": {
  350. "name": "${APPLICATION_NAME}",
  351. "labels": {
  352. "application": "${APPLICATION_NAME}"
  353. },
  354. "annotations": {
  355. "description": "The web server's http port."
  356. }
  357. }
  358. },
  359. {
  360. "kind": "Service",
  361. "apiVersion": "v1",
  362. "spec": {
  363. "ports": [
  364. {
  365. "port": 8443,
  366. "targetPort": 8443
  367. }
  368. ],
  369. "selector": {
  370. "deploymentConfig": "${APPLICATION_NAME}"
  371. }
  372. },
  373. "metadata": {
  374. "name": "secure-${APPLICATION_NAME}",
  375. "labels": {
  376. "application": "${APPLICATION_NAME}"
  377. },
  378. "annotations": {
  379. "description": "The web server's https port."
  380. }
  381. }
  382. },
  383. {
  384. "kind": "Route",
  385. "apiVersion": "v1",
  386. "id": "${APPLICATION_NAME}-http",
  387. "metadata": {
  388. "name": "${APPLICATION_NAME}",
  389. "labels": {
  390. "application": "${APPLICATION_NAME}"
  391. },
  392. "annotations": {
  393. "description": "Route for application's http service."
  394. }
  395. },
  396. "spec": {
  397. "host": "${HOSTNAME_HTTP}",
  398. "to": {
  399. "name": "${APPLICATION_NAME}"
  400. }
  401. }
  402. },
  403. {
  404. "kind": "Route",
  405. "apiVersion": "v1",
  406. "id": "${APPLICATION_NAME}-https",
  407. "metadata": {
  408. "name": "secure-${APPLICATION_NAME}",
  409. "labels": {
  410. "application": "${APPLICATION_NAME}"
  411. },
  412. "annotations": {
  413. "description": "Route for application's https service."
  414. }
  415. },
  416. "spec": {
  417. "host": "${HOSTNAME_HTTPS}",
  418. "to": {
  419. "name": "secure-${APPLICATION_NAME}"
  420. },
  421. "tls": {
  422. "termination": "passthrough"
  423. }
  424. }
  425. },
  426. {
  427. "kind": "ImageStream",
  428. "apiVersion": "v1",
  429. "metadata": {
  430. "name": "${APPLICATION_NAME}",
  431. "labels": {
  432. "application": "${APPLICATION_NAME}"
  433. }
  434. }
  435. },
  436. {
  437. "kind": "BuildConfig",
  438. "apiVersion": "v1",
  439. "metadata": {
  440. "name": "${APPLICATION_NAME}",
  441. "labels": {
  442. "application": "${APPLICATION_NAME}"
  443. }
  444. },
  445. "spec": {
  446. "source": {
  447. "type": "Git",
  448. "git": {
  449. "uri": "${SOURCE_REPOSITORY_URL}",
  450. "ref": "${SOURCE_REPOSITORY_REF}"
  451. },
  452. "contextDir": "${CONTEXT_DIR}"
  453. },
  454. "strategy": {
  455. "type": "Source",
  456. "sourceStrategy": {
  457. "forcePull": true,
  458. "from": {
  459. "kind": "ImageStreamTag",
  460. "namespace": "${IMAGE_STREAM_NAMESPACE}",
  461. "name": "jboss-eap64-openshift:1.5"
  462. },
  463. "env": [
  464. {
  465. "name": "ARTIFACT_DIR",
  466. "value": "${ARTIFACT_DIR}"
  467. },
  468. {
  469. "name": "MAVEN_ARGS_APPEND",
  470. "value": ""
  471. },
  472. {
  473. "name": "MAVEN_MIRROR_URL",
  474. "value": "${MAVEN_MIRROR_URL}"
  475. }
  476. ]
  477. }
  478. },
  479. "output": {
  480. "to": {
  481. "kind": "ImageStreamTag",
  482. "name": "${APPLICATION_NAME}:latest"
  483. }
  484. },
  485. "triggers": [
  486. {
  487. "type": "GitHub",
  488. "github": {
  489. "secret": "${GITHUB_WEBHOOK_SECRET}"
  490. }
  491. },
  492. {
  493. "type": "Generic",
  494. "generic": {
  495. "secret": "${GENERIC_WEBHOOK_SECRET}"
  496. }
  497. },
  498. {
  499. "type": "ImageChange",
  500. "imageChange": {}
  501. },
  502. {
  503. "type": "ConfigChange"
  504. }
  505. ]
  506. }
  507. },
  508. {
  509. "kind": "DeploymentConfig",
  510. "apiVersion": "v1",
  511. "metadata": {
  512. "name": "${APPLICATION_NAME}",
  513. "labels": {
  514. "application": "${APPLICATION_NAME}"
  515. }
  516. },
  517. "spec": {
  518. "strategy": {
  519. "type": "Recreate"
  520. },
  521. "triggers": [
  522. {
  523. "type": "ImageChange",
  524. "imageChangeParams": {
  525. "automatic": true,
  526. "containerNames": [
  527. "${APPLICATION_NAME}"
  528. ],
  529. "from": {
  530. "kind": "ImageStreamTag",
  531. "name": "${APPLICATION_NAME}:latest"
  532. }
  533. }
  534. },
  535. {
  536. "type": "ConfigChange"
  537. }
  538. ],
  539. "replicas": 1,
  540. "selector": {
  541. "deploymentConfig": "${APPLICATION_NAME}"
  542. },
  543. "template": {
  544. "metadata": {
  545. "name": "${APPLICATION_NAME}",
  546. "labels": {
  547. "deploymentConfig": "${APPLICATION_NAME}",
  548. "application": "${APPLICATION_NAME}"
  549. }
  550. },
  551. "spec": {
  552. "serviceAccountName": "${SERVICE_ACCOUNT_NAME}",
  553. "terminationGracePeriodSeconds": 60,
  554. "containers": [
  555. {
  556. "name": "${APPLICATION_NAME}",
  557. "image": "${APPLICATION_NAME}",
  558. "imagePullPolicy": "Always",
  559. "volumeMounts": [
  560. {
  561. "name": "sso-saml-keystore-volume",
  562. "mountPath": "/etc/sso-saml-secret-volume",
  563. "readOnly": true
  564. },
  565. {
  566. "name": "eap-keystore-volume",
  567. "mountPath": "/etc/eap-secret-volume",
  568. "readOnly": true
  569. },
  570. {
  571. "name": "eap-jgroups-keystore-volume",
  572. "mountPath": "/etc/jgroups-encrypt-secret-volume",
  573. "readOnly": true
  574. },
  575. {
  576. "name": "sso-truststore-volume",
  577. "mountPath": "/etc/sso-secret-volume",
  578. "readOnly": true
  579. }
  580. ],
  581. "livenessProbe": {
  582. "exec": {
  583. "command": [
  584. "/bin/bash",
  585. "-c",
  586. "/opt/eap/bin/livenessProbe.sh"
  587. ]
  588. }
  589. },
  590. "readinessProbe": {
  591. "exec": {
  592. "command": [
  593. "/bin/bash",
  594. "-c",
  595. "/opt/eap/bin/readinessProbe.sh"
  596. ]
  597. }
  598. },
  599. "ports": [
  600. {
  601. "name": "jolokia",
  602. "containerPort": 8778,
  603. "protocol": "TCP"
  604. },
  605. {
  606. "name": "http",
  607. "containerPort": 8080,
  608. "protocol": "TCP"
  609. },
  610. {
  611. "name": "https",
  612. "containerPort": 8443,
  613. "protocol": "TCP"
  614. },
  615. {
  616. "name": "ping",
  617. "containerPort": 8888,
  618. "protocol": "TCP"
  619. }
  620. ],
  621. "env": [
  622. {
  623. "name": "OPENSHIFT_KUBE_PING_LABELS",
  624. "value": "application=${APPLICATION_NAME}"
  625. },
  626. {
  627. "name": "OPENSHIFT_KUBE_PING_NAMESPACE",
  628. "valueFrom": {
  629. "fieldRef": {
  630. "fieldPath": "metadata.namespace"
  631. }
  632. }
  633. },
  634. {
  635. "name": "HOSTNAME_HTTP",
  636. "value": "${HOSTNAME_HTTP}"
  637. },
  638. {
  639. "name": "HOSTNAME_HTTPS",
  640. "value": "${HOSTNAME_HTTPS}"
  641. },
  642. {
  643. "name": "HTTPS_KEYSTORE_DIR",
  644. "value": "/etc/eap-secret-volume"
  645. },
  646. {
  647. "name": "HTTPS_KEYSTORE",
  648. "value": "${HTTPS_KEYSTORE}"
  649. },
  650. {
  651. "name": "HTTPS_KEYSTORE_TYPE",
  652. "value": "${HTTPS_KEYSTORE_TYPE}"
  653. },
  654. {
  655. "name": "HTTPS_NAME",
  656. "value": "${HTTPS_NAME}"
  657. },
  658. {
  659. "name": "HTTPS_PASSWORD",
  660. "value": "${HTTPS_PASSWORD}"
  661. },
  662. {
  663. "name": "HORNETQ_CLUSTER_PASSWORD",
  664. "value": "${HORNETQ_CLUSTER_PASSWORD}"
  665. },
  666. {
  667. "name": "HORNETQ_QUEUES",
  668. "value": "${HORNETQ_QUEUES}"
  669. },
  670. {
  671. "name": "HORNETQ_TOPICS",
  672. "value": "${HORNETQ_TOPICS}"
  673. },
  674. {
  675. "name": "JGROUPS_ENCRYPT_SECRET",
  676. "value": "${JGROUPS_ENCRYPT_SECRET}"
  677. },
  678. {
  679. "name": "JGROUPS_ENCRYPT_KEYSTORE_DIR",
  680. "value": "/etc/jgroups-encrypt-secret-volume"
  681. },
  682. {
  683. "name": "JGROUPS_ENCRYPT_KEYSTORE",
  684. "value": "${JGROUPS_ENCRYPT_KEYSTORE}"
  685. },
  686. {
  687. "name": "JGROUPS_ENCRYPT_NAME",
  688. "value": "${JGROUPS_ENCRYPT_NAME}"
  689. },
  690. {
  691. "name": "JGROUPS_ENCRYPT_PASSWORD",
  692. "value": "${JGROUPS_ENCRYPT_PASSWORD}"
  693. },
  694. {
  695. "name": "JGROUPS_CLUSTER_PASSWORD",
  696. "value": "${JGROUPS_CLUSTER_PASSWORD}"
  697. },
  698. {
  699. "name": "AUTO_DEPLOY_EXPLODED",
  700. "value": "${AUTO_DEPLOY_EXPLODED}"
  701. },
  702. {
  703. "name": "SSO_URL",
  704. "value": "${SSO_URL}"
  705. },
  706. {
  707. "name": "SSO_SERVICE_URL",
  708. "value": "${SSO_SERVICE_URL}"
  709. },
  710. {
  711. "name": "SSO_REALM",
  712. "value": "${SSO_REALM}"
  713. },
  714. {
  715. "name": "SSO_USERNAME",
  716. "value": "${SSO_USERNAME}"
  717. },
  718. {
  719. "name": "SSO_PASSWORD",
  720. "value": "${SSO_PASSWORD}"
  721. },
  722. {
  723. "name": "SSO_PUBLIC_KEY",
  724. "value": "${SSO_PUBLIC_KEY}"
  725. },
  726. {
  727. "name": "SSO_BEARER_ONLY",
  728. "value": "${SSO_BEARER_ONLY}"
  729. },
  730. {
  731. "name": "SSO_SAML_KEYSTORE_SECRET",
  732. "value": "${SSO_SAML_KEYSTORE_SECRET}"
  733. },
  734. {
  735. "name": "SSO_SAML_KEYSTORE",
  736. "value": "${SSO_SAML_KEYSTORE}"
  737. },
  738. {
  739. "name": "SSO_SAML_KEYSTORE_DIR",
  740. "value": "/etc/sso-saml-secret-volume"
  741. },
  742. {
  743. "name": "SSO_SAML_CERTIFICATE_NAME",
  744. "value": "${SSO_SAML_CERTIFICATE_NAME}"
  745. },
  746. {
  747. "name": "SSO_SAML_KEYSTORE_PASSWORD",
  748. "value": "${SSO_SAML_KEYSTORE_PASSWORD}"
  749. },
  750. {
  751. "name": "SSO_SECRET",
  752. "value": "${SSO_SECRET}"
  753. },
  754. {
  755. "name": "SSO_ENABLE_CORS",
  756. "value": "${SSO_ENABLE_CORS}"
  757. },
  758. {
  759. "name": "SSO_SAML_LOGOUT_PAGE",
  760. "value": "${SSO_SAML_LOGOUT_PAGE}"
  761. },
  762. {
  763. "name": "SSO_DISABLE_SSL_CERTIFICATE_VALIDATION",
  764. "value": "${SSO_DISABLE_SSL_CERTIFICATE_VALIDATION}"
  765. },
  766. {
  767. "name": "SSO_TRUSTSTORE",
  768. "value": "${SSO_TRUSTSTORE}"
  769. },
  770. {
  771. "name": "SSO_TRUSTSTORE_DIR",
  772. "value": "/etc/sso-secret-volume"
  773. },
  774. {
  775. "name": "SSO_TRUSTSTORE_PASSWORD",
  776. "value": "${SSO_TRUSTSTORE_PASSWORD}"
  777. }
  778. ]
  779. }
  780. ],
  781. "volumes": [
  782. {
  783. "name": "sso-saml-keystore-volume",
  784. "secret": {
  785. "secretName": "${SSO_SAML_KEYSTORE_SECRET}"
  786. }
  787. },
  788. {
  789. "name": "eap-keystore-volume",
  790. "secret": {
  791. "secretName": "${HTTPS_SECRET}"
  792. }
  793. },
  794. {
  795. "name": "eap-jgroups-keystore-volume",
  796. "secret": {
  797. "secretName": "${JGROUPS_ENCRYPT_SECRET}"
  798. }
  799. },
  800. {
  801. "name": "sso-truststore-volume",
  802. "secret": {
  803. "secretName": "${SSO_TRUSTSTORE_SECRET}"
  804. }
  805. }
  806. ]
  807. }
  808. }
  809. }
  810. }
  811. ]
  812. }