eap70-sso-s2i.json 31 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767
  1. {
  2. "kind": "Template",
  3. "apiVersion": "v1",
  4. "metadata": {
  5. "annotations": {
  6. "iconClass" : "icon-jboss",
  7. "description": "Application template for EAP 6 applications built using S2I, enabled for SSO.",
  8. "tags": "eap,javaee,java,jboss,xpaas,sso,keycloak",
  9. "version": "1.3.2"
  10. },
  11. "name": "eap70-sso-s2i"
  12. },
  13. "labels": {
  14. "template": "eap70-sso-s2i",
  15. "xpaas": "1.3.2"
  16. },
  17. "parameters": [
  18. {
  19. "description": "The name for the application.",
  20. "name": "APPLICATION_NAME",
  21. "value": "eap-app",
  22. "required": true
  23. },
  24. {
  25. "description": "Hostname for http service route (e.g. eap-app-myproject.example.com). Required for SSO-enabled applications. This is added to the white list of redirects in the SSO server.",
  26. "name": "HOSTNAME_HTTP",
  27. "value": "",
  28. "required": true
  29. },
  30. {
  31. "description": "Hostname for https service route (e.g. secure-eap-app-myproject.example.com). Required for SSO-enabled applications. This is added to the white list of redirects in the SSO server.",
  32. "name": "HOSTNAME_HTTPS",
  33. "value": "",
  34. "required": true
  35. },
  36. {
  37. "description": "Git source URI for application",
  38. "name": "SOURCE_REPOSITORY_URL",
  39. "value": "https://github.com/redhat-developer/redhat-sso-quickstarts",
  40. "required": true
  41. },
  42. {
  43. "description": "Git branch/tag reference",
  44. "name": "SOURCE_REPOSITORY_REF",
  45. "value": "7.0.x-ose",
  46. "required": false
  47. },
  48. {
  49. "description": "Path within Git project to build; empty for root project directory.",
  50. "name": "CONTEXT_DIR",
  51. "value": "",
  52. "required": false
  53. },
  54. {
  55. "description": "Queue names",
  56. "name": "HORNETQ_QUEUES",
  57. "value": "",
  58. "required": false
  59. },
  60. {
  61. "description": "Topic names",
  62. "name": "HORNETQ_TOPICS",
  63. "value": "",
  64. "required": false
  65. },
  66. {
  67. "description": "The name of the service account to use for the deployment. The service account should be configured to allow useage of the secret(s) specified by HTTPS_SECRET and JGROUPS_ENCRYPT_SECRET.",
  68. "name": "SERVICE_ACCOUNT_NAME",
  69. "value": "eap7-service-account",
  70. "required": true
  71. },
  72. {
  73. "description": "The name of the secret containing the keystore file",
  74. "name": "HTTPS_SECRET",
  75. "value": "eap7-app-secret",
  76. "required": true
  77. },
  78. {
  79. "description": "The name of the keystore file within the secret",
  80. "name": "HTTPS_KEYSTORE",
  81. "value": "keystore.jks",
  82. "required": false
  83. },
  84. {
  85. "description": "The type of the keystore file (JKS or JCEKS)",
  86. "name": "HTTPS_KEYSTORE_TYPE",
  87. "value": "",
  88. "required": false
  89. },
  90. {
  91. "description": "The name associated with the server certificate (e.g. jboss)",
  92. "name": "HTTPS_NAME",
  93. "value": "",
  94. "required": false
  95. },
  96. {
  97. "description": "The password for the keystore and certificate (e.g. mykeystorepass)",
  98. "name": "HTTPS_PASSWORD",
  99. "value": "",
  100. "required": false
  101. },
  102. {
  103. "description": "HornetQ cluster admin password",
  104. "name": "HORNETQ_CLUSTER_PASSWORD",
  105. "from": "[a-zA-Z0-9]{8}",
  106. "generate": "expression",
  107. "required": true
  108. },
  109. {
  110. "description": "GitHub trigger secret",
  111. "name": "GITHUB_WEBHOOK_SECRET",
  112. "from": "[a-zA-Z0-9]{8}",
  113. "generate": "expression",
  114. "required": true
  115. },
  116. {
  117. "description": "Generic build trigger secret",
  118. "name": "GENERIC_WEBHOOK_SECRET",
  119. "from": "[a-zA-Z0-9]{8}",
  120. "generate": "expression",
  121. "required": true
  122. },
  123. {
  124. "description": "Namespace in which the ImageStreams for Red Hat Middleware images are installed. These ImageStreams are normally installed in the openshift namespace. You should only need to modify this if you've installed the ImageStreams in a different namespace/project.",
  125. "name": "IMAGE_STREAM_NAMESPACE",
  126. "value": "openshift",
  127. "required": true
  128. },
  129. {
  130. "description": "The name of the secret containing the keystore file",
  131. "name": "JGROUPS_ENCRYPT_SECRET",
  132. "value": "eap7-app-secret",
  133. "required": false
  134. },
  135. {
  136. "description": "The name of the keystore file within the secret",
  137. "name": "JGROUPS_ENCRYPT_KEYSTORE",
  138. "value": "jgroups.jceks",
  139. "required": false
  140. },
  141. {
  142. "description": "The name associated with the server certificate (e.g. secret-key)",
  143. "name": "JGROUPS_ENCRYPT_NAME",
  144. "value": "",
  145. "required": false
  146. },
  147. {
  148. "description": "The password for the keystore and certificate (e.g. password)",
  149. "name": "JGROUPS_ENCRYPT_PASSWORD",
  150. "value": "",
  151. "required": false
  152. },
  153. {
  154. "description": "JGroups cluster password",
  155. "name": "JGROUPS_CLUSTER_PASSWORD",
  156. "from": "[a-zA-Z0-9]{8}",
  157. "generate": "expression",
  158. "required": true
  159. },
  160. {
  161. "description": "Controls whether exploded deployment content should be automatically deployed",
  162. "name": "AUTO_DEPLOY_EXPLODED",
  163. "value": "false",
  164. "required": false
  165. },
  166. {
  167. "description": "The URL for the SSO server (e.g. https://secure-sso-myproject.example.com/auth). This is the URL through which the user will be redirected when a login or token is required by the application.",
  168. "name": "SSO_URL",
  169. "value": "",
  170. "required": true
  171. },
  172. {
  173. "description": "The URL for the interal SSO service, where secure-sso (the default) is the kubernetes service exposed by the SSO server. This is used to create the application client(s) (see SSO_USERNAME). This can also be the same as SSO_URL.",
  174. "name": "SSO_SERVICE_URL",
  175. "value": "https://secure-sso:8443/auth",
  176. "required": false
  177. },
  178. {
  179. "description": "The SSO realm to which the application client(s) should be associated (e.g. demo).",
  180. "name": "SSO_REALM",
  181. "value": "",
  182. "required": true
  183. },
  184. {
  185. "description": "The username used to access the SSO service. This is used to create the appliction client(s) within the specified SSO realm. This should match the SSO_SERVICE_USERNAME specified through one of the sso70-* templates.",
  186. "name": "SSO_USERNAME",
  187. "value": "",
  188. "required": false
  189. },
  190. {
  191. "description": "The password for the SSO service user.",
  192. "name": "SSO_PASSWORD",
  193. "value": "",
  194. "required": false
  195. },
  196. {
  197. "description": "SSO Public Key. Public key is recommended to be passed into the template to avoid man-in-the-middle security vulnerability",
  198. "name": "SSO_PUBLIC_KEY",
  199. "value": "",
  200. "required": false
  201. },
  202. {
  203. "description": "SSO Client Access Type",
  204. "name": "SSO_BEARER_ONLY",
  205. "value": "",
  206. "required": false
  207. },
  208. {
  209. "description": "List of directories from which archives will be copied into the deployment folder. If unspecified, all archives in /target will be copied.",
  210. "name": "ARTIFACT_DIR",
  211. "value": "app-jee-jsp/target,service-jee-jaxrs/target,app-profile-jee-jsp/target,app-profile-saml-jee-jsp/target",
  212. "required": false
  213. },
  214. {
  215. "description": "The name of the secret containing the keystore file",
  216. "name": "SSO_SAML_KEYSTORE_SECRET",
  217. "value": "eap7-app-secret",
  218. "required": false
  219. },
  220. {
  221. "description": "The name of the keystore file within the secret",
  222. "name": "SSO_SAML_KEYSTORE",
  223. "value": "keystore.jks",
  224. "required": false
  225. },
  226. {
  227. "description": "The name associated with the server certificate",
  228. "name": "SSO_SAML_CERTIFICATE_NAME",
  229. "value": "jboss",
  230. "required": false
  231. },
  232. {
  233. "description": "The password for the keystore and certificate",
  234. "name": "SSO_SAML_KEYSTORE_PASSWORD",
  235. "value": "mykeystorepass",
  236. "required": false
  237. },
  238. {
  239. "description": "The SSO Client Secret for Confidential Access",
  240. "name": "SSO_SECRET",
  241. "from": "[a-zA-Z0-9]{8}",
  242. "generate": "expression",
  243. "required": true
  244. },
  245. {
  246. "description": "Enable CORS for SSO applications",
  247. "name": "SSO_ENABLE_CORS",
  248. "value": "false",
  249. "required": false
  250. },
  251. {
  252. "description": "SSO logout page for SAML applications",
  253. "name": "SSO_SAML_LOGOUT_PAGE",
  254. "value": "/",
  255. "required": false
  256. },
  257. {
  258. "description": "If true SSL communication between EAP and the SSO Server will be insecure (i.e. certificate validation is disabled with curl)",
  259. "name": "SSO_DISABLE_SSL_CERTIFICATE_VALIDATION",
  260. "value": "true",
  261. "required": false
  262. },
  263. {
  264. "description": "The name of the truststore file within the secret (e.g. truststore.jks)",
  265. "name": "SSO_TRUSTSTORE",
  266. "value": "",
  267. "required": false
  268. },
  269. {
  270. "description": "The password for the truststore and certificate (e.g. mykeystorepass)",
  271. "name": "SSO_TRUSTSTORE_PASSWORD",
  272. "value": "",
  273. "required": false
  274. },
  275. {
  276. "description": "The name of the secret containing the truststore file (e.g. truststore-secret). Used for volume secretName",
  277. "name": "SSO_TRUSTSTORE_SECRET",
  278. "value": "eap7-app-secret",
  279. "required": false
  280. }
  281. ],
  282. "objects": [
  283. {
  284. "kind": "Service",
  285. "apiVersion": "v1",
  286. "spec": {
  287. "ports": [
  288. {
  289. "port": 8080,
  290. "targetPort": 8080
  291. }
  292. ],
  293. "selector": {
  294. "deploymentConfig": "${APPLICATION_NAME}"
  295. }
  296. },
  297. "metadata": {
  298. "name": "${APPLICATION_NAME}",
  299. "labels": {
  300. "application": "${APPLICATION_NAME}"
  301. },
  302. "annotations": {
  303. "description": "The web server's http port."
  304. }
  305. }
  306. },
  307. {
  308. "kind": "Service",
  309. "apiVersion": "v1",
  310. "spec": {
  311. "ports": [
  312. {
  313. "port": 8443,
  314. "targetPort": 8443
  315. }
  316. ],
  317. "selector": {
  318. "deploymentConfig": "${APPLICATION_NAME}"
  319. }
  320. },
  321. "metadata": {
  322. "name": "secure-${APPLICATION_NAME}",
  323. "labels": {
  324. "application": "${APPLICATION_NAME}"
  325. },
  326. "annotations": {
  327. "description": "The web server's https port."
  328. }
  329. }
  330. },
  331. {
  332. "kind": "Route",
  333. "apiVersion": "v1",
  334. "id": "${APPLICATION_NAME}-http",
  335. "metadata": {
  336. "name": "${APPLICATION_NAME}",
  337. "labels": {
  338. "application": "${APPLICATION_NAME}"
  339. },
  340. "annotations": {
  341. "description": "Route for application's http service."
  342. }
  343. },
  344. "spec": {
  345. "host": "${HOSTNAME_HTTP}",
  346. "to": {
  347. "name": "${APPLICATION_NAME}"
  348. }
  349. }
  350. },
  351. {
  352. "kind": "Route",
  353. "apiVersion": "v1",
  354. "id": "${APPLICATION_NAME}-https",
  355. "metadata": {
  356. "name": "secure-${APPLICATION_NAME}",
  357. "labels": {
  358. "application": "${APPLICATION_NAME}"
  359. },
  360. "annotations": {
  361. "description": "Route for application's https service."
  362. }
  363. },
  364. "spec": {
  365. "host": "${HOSTNAME_HTTPS}",
  366. "to": {
  367. "name": "secure-${APPLICATION_NAME}"
  368. },
  369. "tls": {
  370. "termination": "passthrough"
  371. }
  372. }
  373. },
  374. {
  375. "kind": "ImageStream",
  376. "apiVersion": "v1",
  377. "metadata": {
  378. "name": "${APPLICATION_NAME}",
  379. "labels": {
  380. "application": "${APPLICATION_NAME}"
  381. }
  382. }
  383. },
  384. {
  385. "kind": "BuildConfig",
  386. "apiVersion": "v1",
  387. "metadata": {
  388. "name": "${APPLICATION_NAME}",
  389. "labels": {
  390. "application": "${APPLICATION_NAME}"
  391. }
  392. },
  393. "spec": {
  394. "source": {
  395. "type": "Git",
  396. "git": {
  397. "uri": "${SOURCE_REPOSITORY_URL}",
  398. "ref": "${SOURCE_REPOSITORY_REF}"
  399. },
  400. "contextDir": "${CONTEXT_DIR}"
  401. },
  402. "strategy": {
  403. "type": "Source",
  404. "sourceStrategy": {
  405. "forcePull": true,
  406. "from": {
  407. "kind": "ImageStreamTag",
  408. "namespace": "${IMAGE_STREAM_NAMESPACE}",
  409. "name": "jboss-eap70-openshift:1.4"
  410. },
  411. "env": [
  412. {
  413. "name": "ARTIFACT_DIR",
  414. "value": "${ARTIFACT_DIR}"
  415. },
  416. {
  417. "name": "MAVEN_ARGS_APPEND",
  418. "value": ""
  419. }
  420. ]
  421. }
  422. },
  423. "output": {
  424. "to": {
  425. "kind": "ImageStreamTag",
  426. "name": "${APPLICATION_NAME}:latest"
  427. }
  428. },
  429. "triggers": [
  430. {
  431. "type": "GitHub",
  432. "github": {
  433. "secret": "${GITHUB_WEBHOOK_SECRET}"
  434. }
  435. },
  436. {
  437. "type": "Generic",
  438. "generic": {
  439. "secret": "${GENERIC_WEBHOOK_SECRET}"
  440. }
  441. },
  442. {
  443. "type": "ImageChange",
  444. "imageChange": {}
  445. },
  446. {
  447. "type": "ConfigChange"
  448. }
  449. ]
  450. }
  451. },
  452. {
  453. "kind": "DeploymentConfig",
  454. "apiVersion": "v1",
  455. "metadata": {
  456. "name": "${APPLICATION_NAME}",
  457. "labels": {
  458. "application": "${APPLICATION_NAME}"
  459. }
  460. },
  461. "spec": {
  462. "strategy": {
  463. "type": "Recreate"
  464. },
  465. "triggers": [
  466. {
  467. "type": "ImageChange",
  468. "imageChangeParams": {
  469. "automatic": true,
  470. "containerNames": [
  471. "${APPLICATION_NAME}"
  472. ],
  473. "from": {
  474. "kind": "ImageStreamTag",
  475. "name": "${APPLICATION_NAME}:latest"
  476. }
  477. }
  478. },
  479. {
  480. "type": "ConfigChange"
  481. }
  482. ],
  483. "replicas": 1,
  484. "selector": {
  485. "deploymentConfig": "${APPLICATION_NAME}"
  486. },
  487. "template": {
  488. "metadata": {
  489. "name": "${APPLICATION_NAME}",
  490. "labels": {
  491. "deploymentConfig": "${APPLICATION_NAME}",
  492. "application": "${APPLICATION_NAME}"
  493. }
  494. },
  495. "spec": {
  496. "serviceAccountName": "${SERVICE_ACCOUNT_NAME}",
  497. "terminationGracePeriodSeconds": 75,
  498. "containers": [
  499. {
  500. "name": "${APPLICATION_NAME}",
  501. "image": "${APPLICATION_NAME}",
  502. "imagePullPolicy": "Always",
  503. "volumeMounts": [
  504. {
  505. "name": "sso-saml-keystore-volume",
  506. "mountPath": "/etc/sso-saml-secret-volume",
  507. "readOnly": true
  508. },
  509. {
  510. "name": "eap-keystore-volume",
  511. "mountPath": "/etc/eap-secret-volume",
  512. "readOnly": true
  513. },
  514. {
  515. "name": "eap-jgroups-keystore-volume",
  516. "mountPath": "/etc/jgroups-encrypt-secret-volume",
  517. "readOnly": true
  518. },
  519. {
  520. "name": "sso-truststore-volume",
  521. "mountPath": "/etc/sso-secret-volume",
  522. "readOnly": true
  523. }
  524. ],
  525. "lifecycle": {
  526. "preStop": {
  527. "exec": {
  528. "command": [
  529. "/opt/eap/bin/jboss-cli.sh",
  530. "-c",
  531. ":shutdown(timeout=60)"
  532. ]
  533. }
  534. }
  535. },
  536. "livenessProbe": {
  537. "exec": {
  538. "command": [
  539. "/bin/bash",
  540. "-c",
  541. "/opt/eap/bin/livenessProbe.sh"
  542. ]
  543. }
  544. },
  545. "readinessProbe": {
  546. "exec": {
  547. "command": [
  548. "/bin/bash",
  549. "-c",
  550. "/opt/eap/bin/readinessProbe.sh"
  551. ]
  552. }
  553. },
  554. "ports": [
  555. {
  556. "name": "jolokia",
  557. "containerPort": 8778,
  558. "protocol": "TCP"
  559. },
  560. {
  561. "name": "http",
  562. "containerPort": 8080,
  563. "protocol": "TCP"
  564. },
  565. {
  566. "name": "https",
  567. "containerPort": 8443,
  568. "protocol": "TCP"
  569. },
  570. {
  571. "name": "ping",
  572. "containerPort": 8888,
  573. "protocol": "TCP"
  574. }
  575. ],
  576. "env": [
  577. {
  578. "name": "OPENSHIFT_KUBE_PING_LABELS",
  579. "value": "application=${APPLICATION_NAME}"
  580. },
  581. {
  582. "name": "OPENSHIFT_KUBE_PING_NAMESPACE",
  583. "valueFrom": {
  584. "fieldRef": {
  585. "fieldPath": "metadata.namespace"
  586. }
  587. }
  588. },
  589. {
  590. "name": "HOSTNAME_HTTP",
  591. "value": "${HOSTNAME_HTTP}"
  592. },
  593. {
  594. "name": "HOSTNAME_HTTPS",
  595. "value": "${HOSTNAME_HTTPS}"
  596. },
  597. {
  598. "name": "HTTPS_KEYSTORE_DIR",
  599. "value": "/etc/eap-secret-volume"
  600. },
  601. {
  602. "name": "HTTPS_KEYSTORE",
  603. "value": "${HTTPS_KEYSTORE}"
  604. },
  605. {
  606. "name": "HTTPS_KEYSTORE_TYPE",
  607. "value": "${HTTPS_KEYSTORE_TYPE}"
  608. },
  609. {
  610. "name": "HTTPS_NAME",
  611. "value": "${HTTPS_NAME}"
  612. },
  613. {
  614. "name": "HTTPS_PASSWORD",
  615. "value": "${HTTPS_PASSWORD}"
  616. },
  617. {
  618. "name": "HORNETQ_CLUSTER_PASSWORD",
  619. "value": "${HORNETQ_CLUSTER_PASSWORD}"
  620. },
  621. {
  622. "name": "HORNETQ_QUEUES",
  623. "value": "${HORNETQ_QUEUES}"
  624. },
  625. {
  626. "name": "HORNETQ_TOPICS",
  627. "value": "${HORNETQ_TOPICS}"
  628. },
  629. {
  630. "name": "JGROUPS_ENCRYPT_SECRET",
  631. "value": "${JGROUPS_ENCRYPT_SECRET}"
  632. },
  633. {
  634. "name": "JGROUPS_ENCRYPT_KEYSTORE_DIR",
  635. "value": "/etc/jgroups-encrypt-secret-volume"
  636. },
  637. {
  638. "name": "JGROUPS_ENCRYPT_KEYSTORE",
  639. "value": "${JGROUPS_ENCRYPT_KEYSTORE}"
  640. },
  641. {
  642. "name": "JGROUPS_ENCRYPT_NAME",
  643. "value": "${JGROUPS_ENCRYPT_NAME}"
  644. },
  645. {
  646. "name": "JGROUPS_ENCRYPT_PASSWORD",
  647. "value": "${JGROUPS_ENCRYPT_PASSWORD}"
  648. },
  649. {
  650. "name": "JGROUPS_CLUSTER_PASSWORD",
  651. "value": "${JGROUPS_CLUSTER_PASSWORD}"
  652. },
  653. {
  654. "name": "AUTO_DEPLOY_EXPLODED",
  655. "value": "${AUTO_DEPLOY_EXPLODED}"
  656. },
  657. {
  658. "name": "SSO_URL",
  659. "value": "${SSO_URL}"
  660. },
  661. {
  662. "name": "SSO_SERVICE_URL",
  663. "value": "${SSO_SERVICE_URL}"
  664. },
  665. {
  666. "name": "SSO_REALM",
  667. "value": "${SSO_REALM}"
  668. },
  669. {
  670. "name": "SSO_USERNAME",
  671. "value": "${SSO_USERNAME}"
  672. },
  673. {
  674. "name": "SSO_PASSWORD",
  675. "value": "${SSO_PASSWORD}"
  676. },
  677. {
  678. "name": "SSO_PUBLIC_KEY",
  679. "value": "${SSO_PUBLIC_KEY}"
  680. },
  681. {
  682. "name": "SSO_BEARER_ONLY",
  683. "value": "${SSO_BEARER_ONLY}"
  684. },
  685. {
  686. "name": "SSO_SAML_KEYSTORE_SECRET",
  687. "value": "${SSO_SAML_KEYSTORE_SECRET}"
  688. },
  689. {
  690. "name": "SSO_SAML_KEYSTORE",
  691. "value": "${SSO_SAML_KEYSTORE}"
  692. },
  693. {
  694. "name": "SSO_SAML_KEYSTORE_DIR",
  695. "value": "/etc/sso-saml-secret-volume"
  696. },
  697. {
  698. "name": "SSO_SAML_CERTIFICATE_NAME",
  699. "value": "${SSO_SAML_CERTIFICATE_NAME}"
  700. },
  701. {
  702. "name": "SSO_SAML_KEYSTORE_PASSWORD",
  703. "value": "${SSO_SAML_KEYSTORE_PASSWORD}"
  704. },
  705. {
  706. "name": "SSO_SECRET",
  707. "value": "${SSO_SECRET}"
  708. },
  709. {
  710. "name": "SSO_ENABLE_CORS",
  711. "value": "${SSO_ENABLE_CORS}"
  712. },
  713. {
  714. "name": "SSO_SAML_LOGOUT_PAGE",
  715. "value": "${SSO_SAML_LOGOUT_PAGE}"
  716. },
  717. {
  718. "name": "SSO_DISABLE_SSL_CERTIFICATE_VALIDATION",
  719. "value": "${SSO_DISABLE_SSL_CERTIFICATE_VALIDATION}"
  720. },
  721. {
  722. "name": "SSO_TRUSTSTORE",
  723. "value": "${SSO_TRUSTSTORE}"
  724. },
  725. {
  726. "name": "SSO_TRUSTSTORE_DIR",
  727. "value": "/etc/sso-secret-volume"
  728. },
  729. {
  730. "name": "SSO_TRUSTSTORE_PASSWORD",
  731. "value": "${SSO_TRUSTSTORE_PASSWORD}"
  732. }
  733. ]
  734. }
  735. ],
  736. "volumes": [
  737. {
  738. "name": "sso-saml-keystore-volume",
  739. "secret": {
  740. "secretName": "${SSO_SAML_KEYSTORE_SECRET}"
  741. }
  742. },
  743. {
  744. "name": "eap-keystore-volume",
  745. "secret": {
  746. "secretName": "${HTTPS_SECRET}"
  747. }
  748. },
  749. {
  750. "name": "eap-jgroups-keystore-volume",
  751. "secret": {
  752. "secretName": "${JGROUPS_ENCRYPT_SECRET}"
  753. }
  754. },
  755. {
  756. "name": "sso-truststore-volume",
  757. "secret": {
  758. "secretName": "${SSO_TRUSTSTORE_SECRET}"
  759. }
  760. }
  761. ]
  762. }
  763. }
  764. }
  765. }
  766. ]
  767. }