From f52ac0d10b4c5f1219a4af9fa659659d5aff5012 Mon Sep 17 00:00:00 2001 From: Scott Dodson Date: Mon, 5 Feb 2018 13:30:52 -0500 Subject: xPaaS v1.4.8 for v3.7 --- .../examples/v3.7/xpaas-templates/sso71-https.json | 82 +++++++++++++--------- 1 file changed, 50 insertions(+), 32 deletions(-) (limited to 'roles/openshift_examples/files/examples/v3.7/xpaas-templates/sso71-https.json') diff --git a/roles/openshift_examples/files/examples/v3.7/xpaas-templates/sso71-https.json b/roles/openshift_examples/files/examples/v3.7/xpaas-templates/sso71-https.json index 26dd26624..655ec2eaa 100644 --- a/roles/openshift_examples/files/examples/v3.7/xpaas-templates/sso71-https.json +++ b/roles/openshift_examples/files/examples/v3.7/xpaas-templates/sso71-https.json @@ -5,7 +5,7 @@ "annotations": { "iconClass" : "icon-sso", "tags" : "sso,keycloak,jboss,hidden", - "version": "1.4.7", + "version": "1.4.8", "openshift.io/display-name": "Single Sign-On 7.1", "openshift.io/provider-display-name": "Red Hat, Inc.", "description": "An example SSO 7 application. For more information about using this template, see https://github.com/jboss-openshift/application-templates.", @@ -17,9 +17,9 @@ }, "labels": { "template": "sso71-https", - "xpaas": "1.4.7" + "xpaas": "1.4.8" }, - "message": "A new SSO service has been created in your project. The admin username/password for accessing the master realm via the SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. Please be sure to create the \"${SERVICE_ACCOUNT_NAME}\" service account and the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing SSO requests.", + "message": "A new SSO service has been created in your project. The admin username/password for accessing the master realm via the SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing SSO requests.", "parameters": [ { "displayName": "Application Name", @@ -42,13 +42,6 @@ "value": "", "required": false }, - { - "displayName": "Service Account Name", - "description": "The name of the service account to use for the deployment. The service account should be configured to allow useage of the secret(s) specified by HTTPS_SECRET and JGROUPS_ENCRYPT_SECRET.", - "name": "SERVICE_ACCOUNT_NAME", - "value": "sso-service-account", - "required": true - }, { "displayName": "Server Keystore Secret Name", "description": "The name of the secret containing the keystore file", @@ -202,6 +195,12 @@ "name": "SSO_TRUSTSTORE_SECRET", "value": "sso-app-secret", "required": false + }, + { + "description": "Container memory limit", + "name": "MEMORY_LIMIT", + "value": "1Gi", + "required": false } ], "objects": [ @@ -253,6 +252,32 @@ } } }, + { + "kind": "Service", + "apiVersion": "v1", + "spec": { + "clusterIP": "None", + "ports": [ + { + "name": "ping", + "port": 8888 + } + ], + "selector": { + "deploymentConfig": "${APPLICATION_NAME}" + } + }, + "metadata": { + "name": "${APPLICATION_NAME}-ping", + "labels": { + "application": "${APPLICATION_NAME}" + }, + "annotations": { + "service.alpha.kubernetes.io/tolerate-unready-endpoints": "true", + "description": "The JGroups ping port for clustering." + } + } + }, { "kind": "Route", "apiVersion": "v1", @@ -320,7 +345,7 @@ "from": { "kind": "ImageStreamTag", "namespace": "${IMAGE_STREAM_NAMESPACE}", - "name": "redhat-sso71-openshift:1.2" + "name": "redhat-sso71-openshift:1.3" } } }, @@ -341,13 +366,17 @@ } }, "spec": { - "serviceAccountName": "${SERVICE_ACCOUNT_NAME}", "terminationGracePeriodSeconds": 75, "containers": [ { "name": "${APPLICATION_NAME}", "image": "${APPLICATION_NAME}", "imagePullPolicy": "Always", + "resources": { + "limits": { + "memory": "${MEMORY_LIMIT}" + } + }, "volumeMounts": [ { "name": "eap-keystore-volume", @@ -365,17 +394,6 @@ "readOnly": true } ], - "lifecycle": { - "preStop": { - "exec": { - "command": [ - "/opt/eap/bin/jboss-cli.sh", - "-c", - ":shutdown(timeout=60)" - ] - } - } - }, "livenessProbe": { "exec": { "command": [ @@ -384,7 +402,7 @@ "/opt/eap/bin/livenessProbe.sh" ] }, - "initialDelaySeconds": 10 + "initialDelaySeconds": 60 }, "readinessProbe": { "exec": { @@ -431,16 +449,16 @@ "value": "${DB_TX_ISOLATION}" }, { - "name": "OPENSHIFT_KUBE_PING_LABELS", - "value": "application=${APPLICATION_NAME}" + "name": "JGROUPS_PING_PROTOCOL", + "value": "openshift.DNS_PING" + }, + { + "name": "OPENSHIFT_DNS_PING_SERVICE_NAME", + "value": "${APPLICATION_NAME}-ping" }, { - "name": "OPENSHIFT_KUBE_PING_NAMESPACE", - "valueFrom": { - "fieldRef": { - "fieldPath": "metadata.namespace" - } - } + "name": "OPENSHIFT_DNS_PING_SERVICE_PORT", + "value": "8888" }, { "name": "HTTPS_KEYSTORE_DIR", -- cgit v1.2.1