eap-cd-sso-s2i.json 35 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845
  1. {
  2. "kind": "Template",
  3. "apiVersion": "v1",
  4. "metadata": {
  5. "annotations": {
  6. "iconClass": "icon-eap",
  7. "tags": "eap,javaee,java,jboss,hidden",
  8. "version": "1.4.10",
  9. "openshift.io/display-name": "JBoss EAP CD + Single Sign-On (with https)",
  10. "openshift.io/provider-display-name": "Red Hat, Inc.",
  11. "description": "An example JBoss Enterprise Application Platform continuous delivery application Single Sign-On application. For more information about using this template, see https://github.com/jboss-container-images/jboss-eap-7-openshift-image/blob/eap-cd/README.adoc",
  12. "template.openshift.io/long-description": "This template defines resources needed to develop a JBoss Enterprise Application Platform continuous delivery based application, including a build configuration, application deployment configuration and integrated with Red Hat Single Sign-On.",
  13. "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/",
  14. "template.openshift.io/support-url": "https://access.redhat.com"
  15. },
  16. "name": "eap-cd-sso-s2i"
  17. },
  18. "labels": {
  19. "template": "eap-cd-sso-s2i",
  20. "xpaas": "1.4.10"
  21. },
  22. "message": "A new JBoss EAP CD based application with SSL and SSO support has been created in your project. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications.",
  23. "parameters": [
  24. {
  25. "displayName": "Application Name",
  26. "description": "The name for the application.",
  27. "name": "APPLICATION_NAME",
  28. "value": "eap-app",
  29. "required": true
  30. },
  31. {
  32. "displayName": "Custom https Route Hostname",
  33. "description": "Hostname for https service route (e.g. secure-eap-app-myproject.example.com). Required for SSO-enabled applications. This is added to the white list of redirects in the SSO server.",
  34. "name": "HOSTNAME_HTTPS",
  35. "value": "",
  36. "required": true
  37. },
  38. {
  39. "displayName": "Git Repository URL",
  40. "description": "Git source URI for application",
  41. "name": "SOURCE_REPOSITORY_URL",
  42. "value": "https://github.com/redhat-developer/redhat-sso-quickstarts",
  43. "required": true
  44. },
  45. {
  46. "displayName": "Git Reference",
  47. "description": "Git branch/tag reference",
  48. "name": "SOURCE_REPOSITORY_REF",
  49. "value": "7.0.x-ose",
  50. "required": false
  51. },
  52. {
  53. "displayName": "Context Directory",
  54. "description": "Path within Git project to build; empty for root project directory.",
  55. "name": "CONTEXT_DIR",
  56. "value": "",
  57. "required": false
  58. },
  59. {
  60. "displayName": "Queues",
  61. "description": "Queue names",
  62. "name": "MQ_QUEUES",
  63. "value": "",
  64. "required": false
  65. },
  66. {
  67. "displayName": "Topics",
  68. "description": "Topic names",
  69. "name": "MQ_TOPICS",
  70. "value": "",
  71. "required": false
  72. },
  73. {
  74. "displayName": "A-MQ cluster password",
  75. "description": "A-MQ cluster admin password",
  76. "name": "MQ_CLUSTER_PASSWORD",
  77. "from": "[a-zA-Z0-9]{8}",
  78. "generate": "expression",
  79. "required": true
  80. },
  81. {
  82. "displayName": "Server Keystore Secret Name",
  83. "description": "The name of the secret containing the keystore file",
  84. "name": "HTTPS_SECRET",
  85. "value": "eap7-app-secret",
  86. "required": true
  87. },
  88. {
  89. "displayName": "Server Keystore Filename",
  90. "description": "The name of the keystore file within the secret",
  91. "name": "HTTPS_KEYSTORE",
  92. "value": "keystore.jks",
  93. "required": false
  94. },
  95. {
  96. "displayName": "Server Keystore Type",
  97. "description": "The type of the keystore file (JKS or JCEKS)",
  98. "name": "HTTPS_KEYSTORE_TYPE",
  99. "value": "",
  100. "required": false
  101. },
  102. {
  103. "displayName": "Server Certificate Name",
  104. "description": "The name associated with the server certificate (e.g. jboss)",
  105. "name": "HTTPS_NAME",
  106. "value": "",
  107. "required": false
  108. },
  109. {
  110. "displayName": "Server Keystore Password",
  111. "description": "The password for the keystore and certificate (e.g. mykeystorepass)",
  112. "name": "HTTPS_PASSWORD",
  113. "value": "",
  114. "required": false
  115. },
  116. {
  117. "displayName": "Github Webhook Secret",
  118. "description": "GitHub trigger secret",
  119. "name": "GITHUB_WEBHOOK_SECRET",
  120. "from": "[a-zA-Z0-9]{8}",
  121. "generate": "expression",
  122. "required": true
  123. },
  124. {
  125. "displayName": "Generic Webhook Secret",
  126. "description": "Generic build trigger secret",
  127. "name": "GENERIC_WEBHOOK_SECRET",
  128. "from": "[a-zA-Z0-9]{8}",
  129. "generate": "expression",
  130. "required": true
  131. },
  132. {
  133. "displayName": "ImageStream Namespace",
  134. "description": "Namespace in which the ImageStreams for Red Hat Middleware images are installed. These ImageStreams are normally installed in the openshift namespace. You should only need to modify this if you've installed the ImageStreams in a different namespace/project.",
  135. "name": "IMAGE_STREAM_NAMESPACE",
  136. "value": "openshift",
  137. "required": true
  138. },
  139. {
  140. "displayName": "JGroups Secret Name",
  141. "description": "The name of the secret containing the keystore file",
  142. "name": "JGROUPS_ENCRYPT_SECRET",
  143. "value": "eap7-app-secret",
  144. "required": false
  145. },
  146. {
  147. "displayName": "JGroups Keystore Filename",
  148. "description": "The name of the keystore file within the secret",
  149. "name": "JGROUPS_ENCRYPT_KEYSTORE",
  150. "value": "jgroups.jceks",
  151. "required": false
  152. },
  153. {
  154. "displayName": "JGroups Certificate Name",
  155. "description": "The name associated with the server certificate (e.g. secret-key)",
  156. "name": "JGROUPS_ENCRYPT_NAME",
  157. "value": "",
  158. "required": false
  159. },
  160. {
  161. "displayName": "JGroups Keystore Password",
  162. "description": "The password for the keystore and certificate (e.g. password)",
  163. "name": "JGROUPS_ENCRYPT_PASSWORD",
  164. "value": "",
  165. "required": false
  166. },
  167. {
  168. "displayName": "JGroups Cluster Password",
  169. "description": "JGroups cluster password",
  170. "name": "JGROUPS_CLUSTER_PASSWORD",
  171. "from": "[a-zA-Z0-9]{8}",
  172. "generate": "expression",
  173. "required": true
  174. },
  175. {
  176. "displayName": "Deploy Exploded Archives",
  177. "description": "Controls whether exploded deployment content should be automatically deployed",
  178. "name": "AUTO_DEPLOY_EXPLODED",
  179. "value": "false",
  180. "required": false
  181. },
  182. {
  183. "displayName": "URL for SSO",
  184. "description": "The URL for the SSO server (e.g. https://secure-sso-myproject.example.com/auth). This is the URL through which the user will be redirected when a login or token is required by the application.",
  185. "name": "SSO_URL",
  186. "value": "",
  187. "required": true
  188. },
  189. {
  190. "displayName": "URL for SSO (internal service)",
  191. "description": "The URL for the internal SSO service, where secure-sso (the default) is the kubernetes service exposed by the SSO server. This is used to create the application client(s) (see SSO_USERNAME). This can also be the same as SSO_URL.",
  192. "name": "SSO_SERVICE_URL",
  193. "value": "https://secure-sso:8443/auth",
  194. "required": false
  195. },
  196. {
  197. "displayName": "SSO Realm",
  198. "description": "The SSO realm to which the application client(s) should be associated (e.g. demo).",
  199. "name": "SSO_REALM",
  200. "value": "",
  201. "required": true
  202. },
  203. {
  204. "displayName": "SSO Username",
  205. "description": "The username used to access the SSO service. This is used to create the appliction client(s) within the specified SSO realm. This should match the SSO_SERVICE_USERNAME specified through one of the sso70-* templates.",
  206. "name": "SSO_USERNAME",
  207. "value": "",
  208. "required": false
  209. },
  210. {
  211. "displayName": "SSO Password",
  212. "description": "The password for the SSO service user.",
  213. "name": "SSO_PASSWORD",
  214. "value": "",
  215. "required": false
  216. },
  217. {
  218. "displayName": "SSO Public Key",
  219. "description": "SSO Public Key. Public key is recommended to be passed into the template to avoid man-in-the-middle security vulnerability",
  220. "name": "SSO_PUBLIC_KEY",
  221. "value": "",
  222. "required": false
  223. },
  224. {
  225. "displayName": "SSO Bearer Only?",
  226. "description": "SSO Client Access Type",
  227. "name": "SSO_BEARER_ONLY",
  228. "value": "",
  229. "required": false
  230. },
  231. {
  232. "displayName": "Artifact Directories",
  233. "description": "List of directories from which archives will be copied into the deployment folder. If unspecified, all archives in /target will be copied.",
  234. "name": "ARTIFACT_DIR",
  235. "value": "app-jee-jsp/target,service-jee-jaxrs/target,app-profile-jee-jsp/target,app-profile-saml-jee-jsp/target",
  236. "required": false
  237. },
  238. {
  239. "displayName": "SSO SAML Keystore Secret",
  240. "description": "The name of the secret containing the keystore file",
  241. "name": "SSO_SAML_KEYSTORE_SECRET",
  242. "value": "eap7-app-secret",
  243. "required": false
  244. },
  245. {
  246. "displayName": "SSO SAML Keystore",
  247. "description": "The name of the keystore file within the secret",
  248. "name": "SSO_SAML_KEYSTORE",
  249. "value": "keystore.jks",
  250. "required": false
  251. },
  252. {
  253. "displayName": "SSO SAML Certificate Name",
  254. "description": "The name associated with the server certificate",
  255. "name": "SSO_SAML_CERTIFICATE_NAME",
  256. "value": "jboss",
  257. "required": false
  258. },
  259. {
  260. "displayName": "SSO SAML Keystore Password",
  261. "description": "The password for the keystore and certificate",
  262. "name": "SSO_SAML_KEYSTORE_PASSWORD",
  263. "value": "mykeystorepass",
  264. "required": false
  265. },
  266. {
  267. "displayName": "SSO Client Secret",
  268. "description": "The SSO Client Secret for Confidential Access",
  269. "name": "SSO_SECRET",
  270. "from": "[a-zA-Z0-9]{8}",
  271. "generate": "expression",
  272. "required": true
  273. },
  274. {
  275. "displayName": "Enable CORS for SSO?",
  276. "description": "Enable CORS for SSO applications",
  277. "name": "SSO_ENABLE_CORS",
  278. "value": "false",
  279. "required": false
  280. },
  281. {
  282. "displayName": "SSO SAML Logout Page",
  283. "description": "SSO logout page for SAML applications",
  284. "name": "SSO_SAML_LOGOUT_PAGE",
  285. "value": "/",
  286. "required": false
  287. },
  288. {
  289. "displayName": "Disable SSL Validation in EAP->SSO communication",
  290. "description": "If true SSL communication between EAP and the SSO Server will be insecure (i.e. certificate validation is disabled with curl)",
  291. "name": "SSO_DISABLE_SSL_CERTIFICATE_VALIDATION",
  292. "value": "true",
  293. "required": false
  294. },
  295. {
  296. "displayName": "SSO Trust Store",
  297. "description": "The name of the truststore file within the secret (e.g. truststore.jks)",
  298. "name": "SSO_TRUSTSTORE",
  299. "value": "",
  300. "required": false
  301. },
  302. {
  303. "displayName": "SSO Trust Store Password",
  304. "description": "The password for the truststore and certificate (e.g. mykeystorepass)",
  305. "name": "SSO_TRUSTSTORE_PASSWORD",
  306. "value": "",
  307. "required": false
  308. },
  309. {
  310. "displayName": "SSO Trust Store Secret",
  311. "description": "The name of the secret containing the truststore file (e.g. truststore-secret). Used for volume secretName",
  312. "name": "SSO_TRUSTSTORE_SECRET",
  313. "value": "eap7-app-secret",
  314. "required": false
  315. },
  316. {
  317. "displayName": "Maven mirror URL",
  318. "description": "Maven mirror to use for S2I builds",
  319. "name": "MAVEN_MIRROR_URL",
  320. "value": "",
  321. "required": false
  322. },
  323. {
  324. "displayName": "Maven Additional Arguments",
  325. "description": "Maven additional arguments to use for S2I builds",
  326. "name": "MAVEN_ARGS_APPEND",
  327. "value": "",
  328. "required": false
  329. },
  330. {
  331. "description": "Container memory limit",
  332. "name": "MEMORY_LIMIT",
  333. "value": "1Gi",
  334. "required": false
  335. }
  336. ],
  337. "objects": [
  338. {
  339. "kind": "Service",
  340. "apiVersion": "v1",
  341. "spec": {
  342. "ports": [
  343. {
  344. "port": 8080,
  345. "targetPort": 8080
  346. }
  347. ],
  348. "selector": {
  349. "deploymentConfig": "${APPLICATION_NAME}"
  350. }
  351. },
  352. "metadata": {
  353. "name": "${APPLICATION_NAME}",
  354. "labels": {
  355. "application": "${APPLICATION_NAME}"
  356. },
  357. "annotations": {
  358. "description": "The web server's http port."
  359. }
  360. }
  361. },
  362. {
  363. "kind": "Service",
  364. "apiVersion": "v1",
  365. "spec": {
  366. "ports": [
  367. {
  368. "port": 8443,
  369. "targetPort": 8443
  370. }
  371. ],
  372. "selector": {
  373. "deploymentConfig": "${APPLICATION_NAME}"
  374. }
  375. },
  376. "metadata": {
  377. "name": "secure-${APPLICATION_NAME}",
  378. "labels": {
  379. "application": "${APPLICATION_NAME}"
  380. },
  381. "annotations": {
  382. "description": "The web server's https port."
  383. }
  384. }
  385. },
  386. {
  387. "kind": "Service",
  388. "apiVersion": "v1",
  389. "spec": {
  390. "clusterIP": "None",
  391. "ports": [
  392. {
  393. "name": "ping",
  394. "port": 8888
  395. }
  396. ],
  397. "selector": {
  398. "deploymentConfig": "${APPLICATION_NAME}"
  399. }
  400. },
  401. "metadata": {
  402. "name": "${APPLICATION_NAME}-ping",
  403. "labels": {
  404. "application": "${APPLICATION_NAME}"
  405. },
  406. "annotations": {
  407. "service.alpha.kubernetes.io/tolerate-unready-endpoints": "true",
  408. "description": "The JGroups ping port for clustering."
  409. }
  410. }
  411. },
  412. {
  413. "kind": "Route",
  414. "apiVersion": "v1",
  415. "id": "${APPLICATION_NAME}-http",
  416. "metadata": {
  417. "name": "${APPLICATION_NAME}",
  418. "labels": {
  419. "application": "${APPLICATION_NAME}"
  420. },
  421. "annotations": {
  422. "description": "Route for application's http service."
  423. }
  424. },
  425. "spec": {
  426. "to": {
  427. "name": "${APPLICATION_NAME}"
  428. }
  429. }
  430. },
  431. {
  432. "kind": "Route",
  433. "apiVersion": "v1",
  434. "id": "${APPLICATION_NAME}-https",
  435. "metadata": {
  436. "name": "secure-${APPLICATION_NAME}",
  437. "labels": {
  438. "application": "${APPLICATION_NAME}"
  439. },
  440. "annotations": {
  441. "description": "Route for application's https service."
  442. }
  443. },
  444. "spec": {
  445. "host": "${HOSTNAME_HTTPS}",
  446. "to": {
  447. "name": "secure-${APPLICATION_NAME}"
  448. },
  449. "tls": {
  450. "termination": "passthrough"
  451. }
  452. }
  453. },
  454. {
  455. "kind": "ImageStream",
  456. "apiVersion": "v1",
  457. "metadata": {
  458. "name": "${APPLICATION_NAME}",
  459. "labels": {
  460. "application": "${APPLICATION_NAME}"
  461. }
  462. }
  463. },
  464. {
  465. "kind": "BuildConfig",
  466. "apiVersion": "v1",
  467. "metadata": {
  468. "name": "${APPLICATION_NAME}",
  469. "labels": {
  470. "application": "${APPLICATION_NAME}"
  471. }
  472. },
  473. "spec": {
  474. "source": {
  475. "type": "Git",
  476. "git": {
  477. "uri": "${SOURCE_REPOSITORY_URL}",
  478. "ref": "${SOURCE_REPOSITORY_REF}"
  479. },
  480. "contextDir": "${CONTEXT_DIR}"
  481. },
  482. "strategy": {
  483. "type": "Source",
  484. "sourceStrategy": {
  485. "forcePull": true,
  486. "from": {
  487. "kind": "ImageStreamTag",
  488. "namespace": "${IMAGE_STREAM_NAMESPACE}",
  489. "name": "eap-cd-openshift:12"
  490. },
  491. "env": [
  492. {
  493. "name": "ARTIFACT_DIR",
  494. "value": "${ARTIFACT_DIR}"
  495. },
  496. {
  497. "name": "MAVEN_MIRROR_URL",
  498. "value": "${MAVEN_MIRROR_URL}"
  499. },
  500. {
  501. "name": "MAVEN_ARGS_APPEND",
  502. "value": "${MAVEN_ARGS_APPEND}"
  503. }
  504. ]
  505. }
  506. },
  507. "output": {
  508. "to": {
  509. "kind": "ImageStreamTag",
  510. "name": "${APPLICATION_NAME}:latest"
  511. }
  512. },
  513. "triggers": [
  514. {
  515. "type": "GitHub",
  516. "github": {
  517. "secret": "${GITHUB_WEBHOOK_SECRET}"
  518. }
  519. },
  520. {
  521. "type": "Generic",
  522. "generic": {
  523. "secret": "${GENERIC_WEBHOOK_SECRET}"
  524. }
  525. },
  526. {
  527. "type": "ImageChange",
  528. "imageChange": {}
  529. },
  530. {
  531. "type": "ConfigChange"
  532. }
  533. ]
  534. }
  535. },
  536. {
  537. "kind": "DeploymentConfig",
  538. "apiVersion": "v1",
  539. "metadata": {
  540. "name": "${APPLICATION_NAME}",
  541. "labels": {
  542. "application": "${APPLICATION_NAME}"
  543. }
  544. },
  545. "spec": {
  546. "strategy": {
  547. "type": "Recreate"
  548. },
  549. "triggers": [
  550. {
  551. "type": "ImageChange",
  552. "imageChangeParams": {
  553. "automatic": true,
  554. "containerNames": [
  555. "${APPLICATION_NAME}"
  556. ],
  557. "from": {
  558. "kind": "ImageStreamTag",
  559. "name": "${APPLICATION_NAME}:latest"
  560. }
  561. }
  562. },
  563. {
  564. "type": "ConfigChange"
  565. }
  566. ],
  567. "replicas": 1,
  568. "selector": {
  569. "deploymentConfig": "${APPLICATION_NAME}"
  570. },
  571. "template": {
  572. "metadata": {
  573. "name": "${APPLICATION_NAME}",
  574. "labels": {
  575. "deploymentConfig": "${APPLICATION_NAME}",
  576. "application": "${APPLICATION_NAME}"
  577. }
  578. },
  579. "spec": {
  580. "terminationGracePeriodSeconds": 75,
  581. "containers": [
  582. {
  583. "name": "${APPLICATION_NAME}",
  584. "image": "${APPLICATION_NAME}",
  585. "imagePullPolicy": "Always",
  586. "resources": {
  587. "limits": {
  588. "memory": "${MEMORY_LIMIT}"
  589. }
  590. },
  591. "volumeMounts": [
  592. {
  593. "name": "sso-saml-keystore-volume",
  594. "mountPath": "/etc/sso-saml-secret-volume",
  595. "readOnly": true
  596. },
  597. {
  598. "name": "eap-keystore-volume",
  599. "mountPath": "/etc/eap-secret-volume",
  600. "readOnly": true
  601. },
  602. {
  603. "name": "eap-jgroups-keystore-volume",
  604. "mountPath": "/etc/jgroups-encrypt-secret-volume",
  605. "readOnly": true
  606. },
  607. {
  608. "name": "sso-truststore-volume",
  609. "mountPath": "/etc/sso-secret-volume",
  610. "readOnly": true
  611. }
  612. ],
  613. "livenessProbe": {
  614. "exec": {
  615. "command": [
  616. "/bin/bash",
  617. "-c",
  618. "/opt/eap/bin/livenessProbe.sh"
  619. ]
  620. },
  621. "initialDelaySeconds": 60
  622. },
  623. "readinessProbe": {
  624. "exec": {
  625. "command": [
  626. "/bin/bash",
  627. "-c",
  628. "/opt/eap/bin/readinessProbe.sh"
  629. ]
  630. }
  631. },
  632. "ports": [
  633. {
  634. "name": "jolokia",
  635. "containerPort": 8778,
  636. "protocol": "TCP"
  637. },
  638. {
  639. "name": "http",
  640. "containerPort": 8080,
  641. "protocol": "TCP"
  642. },
  643. {
  644. "name": "https",
  645. "containerPort": 8443,
  646. "protocol": "TCP"
  647. },
  648. {
  649. "name": "ping",
  650. "containerPort": 8888,
  651. "protocol": "TCP"
  652. }
  653. ],
  654. "env": [
  655. {
  656. "name": "JGROUPS_PING_PROTOCOL",
  657. "value": "openshift.DNS_PING"
  658. },
  659. {
  660. "name": "OPENSHIFT_DNS_PING_SERVICE_NAME",
  661. "value": "${APPLICATION_NAME}-ping"
  662. },
  663. {
  664. "name": "OPENSHIFT_DNS_PING_SERVICE_PORT",
  665. "value": "8888"
  666. },
  667. {
  668. "name": "HOSTNAME_HTTP",
  669. "value": "${HOSTNAME_HTTP}"
  670. },
  671. {
  672. "name": "HOSTNAME_HTTPS",
  673. "value": "${HOSTNAME_HTTPS}"
  674. },
  675. {
  676. "name": "HTTPS_KEYSTORE_DIR",
  677. "value": "/etc/eap-secret-volume"
  678. },
  679. {
  680. "name": "HTTPS_KEYSTORE",
  681. "value": "${HTTPS_KEYSTORE}"
  682. },
  683. {
  684. "name": "HTTPS_KEYSTORE_TYPE",
  685. "value": "${HTTPS_KEYSTORE_TYPE}"
  686. },
  687. {
  688. "name": "HTTPS_NAME",
  689. "value": "${HTTPS_NAME}"
  690. },
  691. {
  692. "name": "HTTPS_PASSWORD",
  693. "value": "${HTTPS_PASSWORD}"
  694. },
  695. {
  696. "name": "MQ_CLUSTER_PASSWORD",
  697. "value": "${MQ_CLUSTER_PASSWORD}"
  698. },
  699. {
  700. "name": "MQ_QUEUES",
  701. "value": "${MQ_QUEUES}"
  702. },
  703. {
  704. "name": "MQ_TOPICS",
  705. "value": "${MQ_TOPICS}"
  706. },
  707. {
  708. "name": "JGROUPS_ENCRYPT_SECRET",
  709. "value": "${JGROUPS_ENCRYPT_SECRET}"
  710. },
  711. {
  712. "name": "JGROUPS_ENCRYPT_KEYSTORE_DIR",
  713. "value": "/etc/jgroups-encrypt-secret-volume"
  714. },
  715. {
  716. "name": "JGROUPS_ENCRYPT_KEYSTORE",
  717. "value": "${JGROUPS_ENCRYPT_KEYSTORE}"
  718. },
  719. {
  720. "name": "JGROUPS_ENCRYPT_NAME",
  721. "value": "${JGROUPS_ENCRYPT_NAME}"
  722. },
  723. {
  724. "name": "JGROUPS_ENCRYPT_PASSWORD",
  725. "value": "${JGROUPS_ENCRYPT_PASSWORD}"
  726. },
  727. {
  728. "name": "JGROUPS_CLUSTER_PASSWORD",
  729. "value": "${JGROUPS_CLUSTER_PASSWORD}"
  730. },
  731. {
  732. "name": "AUTO_DEPLOY_EXPLODED",
  733. "value": "${AUTO_DEPLOY_EXPLODED}"
  734. },
  735. {
  736. "name": "SSO_URL",
  737. "value": "${SSO_URL}"
  738. },
  739. {
  740. "name": "SSO_SERVICE_URL",
  741. "value": "${SSO_SERVICE_URL}"
  742. },
  743. {
  744. "name": "SSO_REALM",
  745. "value": "${SSO_REALM}"
  746. },
  747. {
  748. "name": "SSO_USERNAME",
  749. "value": "${SSO_USERNAME}"
  750. },
  751. {
  752. "name": "SSO_PASSWORD",
  753. "value": "${SSO_PASSWORD}"
  754. },
  755. {
  756. "name": "SSO_PUBLIC_KEY",
  757. "value": "${SSO_PUBLIC_KEY}"
  758. },
  759. {
  760. "name": "SSO_BEARER_ONLY",
  761. "value": "${SSO_BEARER_ONLY}"
  762. },
  763. {
  764. "name": "SSO_SAML_KEYSTORE_SECRET",
  765. "value": "${SSO_SAML_KEYSTORE_SECRET}"
  766. },
  767. {
  768. "name": "SSO_SAML_KEYSTORE",
  769. "value": "${SSO_SAML_KEYSTORE}"
  770. },
  771. {
  772. "name": "SSO_SAML_KEYSTORE_DIR",
  773. "value": "/etc/sso-saml-secret-volume"
  774. },
  775. {
  776. "name": "SSO_SAML_CERTIFICATE_NAME",
  777. "value": "${SSO_SAML_CERTIFICATE_NAME}"
  778. },
  779. {
  780. "name": "SSO_SAML_KEYSTORE_PASSWORD",
  781. "value": "${SSO_SAML_KEYSTORE_PASSWORD}"
  782. },
  783. {
  784. "name": "SSO_SECRET",
  785. "value": "${SSO_SECRET}"
  786. },
  787. {
  788. "name": "SSO_ENABLE_CORS",
  789. "value": "${SSO_ENABLE_CORS}"
  790. },
  791. {
  792. "name": "SSO_SAML_LOGOUT_PAGE",
  793. "value": "${SSO_SAML_LOGOUT_PAGE}"
  794. },
  795. {
  796. "name": "SSO_DISABLE_SSL_CERTIFICATE_VALIDATION",
  797. "value": "${SSO_DISABLE_SSL_CERTIFICATE_VALIDATION}"
  798. },
  799. {
  800. "name": "SSO_TRUSTSTORE",
  801. "value": "${SSO_TRUSTSTORE}"
  802. },
  803. {
  804. "name": "SSO_TRUSTSTORE_DIR",
  805. "value": "/etc/sso-secret-volume"
  806. },
  807. {
  808. "name": "SSO_TRUSTSTORE_PASSWORD",
  809. "value": "${SSO_TRUSTSTORE_PASSWORD}"
  810. }
  811. ]
  812. }
  813. ],
  814. "volumes": [
  815. {
  816. "name": "sso-saml-keystore-volume",
  817. "secret": {
  818. "secretName": "${SSO_SAML_KEYSTORE_SECRET}"
  819. }
  820. },
  821. {
  822. "name": "eap-keystore-volume",
  823. "secret": {
  824. "secretName": "${HTTPS_SECRET}"
  825. }
  826. },
  827. {
  828. "name": "eap-jgroups-keystore-volume",
  829. "secret": {
  830. "secretName": "${JGROUPS_ENCRYPT_SECRET}"
  831. }
  832. },
  833. {
  834. "name": "sso-truststore-volume",
  835. "secret": {
  836. "secretName": "${SSO_TRUSTSTORE_SECRET}"
  837. }
  838. }
  839. ]
  840. }
  841. }
  842. }
  843. }
  844. ]
  845. }