From 2aabe6b195962d9e2e30997aa75a5d3311ef4a51 Mon Sep 17 00:00:00 2001 From: Mohammad Abudayyeh <47318409+moabu@users.noreply.github.com> Date: Wed, 22 Jan 2025 13:02:16 +0300 Subject: [PATCH 1/4] chore: release nightly (#10709) Signed-off-by: moabu <47318409+moabu@users.noreply.github.com> --- agama/pom.xml | 2 +- agama/transpiler/pom.xml | 2 +- automation/startjanssendemo.sh | 2 +- charts/janssen-all-in-one/Chart.yaml | 6 +- charts/janssen-all-in-one/README.md | 12 ++-- charts/janssen-all-in-one/values.yaml | 6 +- charts/janssen/Chart.yaml | 54 +++++++------- charts/janssen/README.md | 72 +++++++++---------- .../auth-server-key-rotation/Chart.yaml | 4 +- .../charts/auth-server-key-rotation/README.md | 4 +- .../auth-server-key-rotation/values.yaml | 2 +- charts/janssen/charts/auth-server/Chart.yaml | 4 +- charts/janssen/charts/auth-server/README.md | 4 +- charts/janssen/charts/auth-server/values.yaml | 2 +- charts/janssen/charts/casa/Chart.yaml | 4 +- charts/janssen/charts/casa/README.md | 4 +- charts/janssen/charts/casa/values.yaml | 2 +- .../charts/cn-istio-ingress/Chart.yaml | 4 +- .../janssen/charts/cn-istio-ingress/README.md | 2 +- charts/janssen/charts/config-api/Chart.yaml | 4 +- charts/janssen/charts/config-api/README.md | 4 +- charts/janssen/charts/config-api/values.yaml | 2 +- charts/janssen/charts/config/Chart.yaml | 4 +- charts/janssen/charts/config/README.md | 4 +- charts/janssen/charts/config/values.yaml | 2 +- charts/janssen/charts/fido2/Chart.yaml | 4 +- charts/janssen/charts/fido2/README.md | 4 +- charts/janssen/charts/fido2/values.yaml | 2 +- charts/janssen/charts/kc-scheduler/Chart.yaml | 4 +- charts/janssen/charts/kc-scheduler/README.md | 4 +- .../janssen/charts/kc-scheduler/values.yaml | 2 +- charts/janssen/charts/link/Chart.yaml | 4 +- charts/janssen/charts/link/README.md | 4 +- charts/janssen/charts/link/values.yaml | 2 +- .../janssen/charts/nginx-ingress/Chart.yaml | 4 +- charts/janssen/charts/nginx-ingress/README.md | 2 +- charts/janssen/charts/persistence/Chart.yaml | 4 +- charts/janssen/charts/persistence/README.md | 4 +- charts/janssen/charts/persistence/values.yaml | 2 +- charts/janssen/charts/saml/Chart.yaml | 4 +- charts/janssen/charts/saml/README.md | 4 +- charts/janssen/charts/saml/values.yaml | 2 +- charts/janssen/charts/scim/Chart.yaml | 4 +- charts/janssen/charts/scim/README.md | 4 +- charts/janssen/charts/scim/values.yaml | 2 +- charts/janssen/values.yaml | 22 +++--- .../docker-jans-loadtesting-jmeter/Dockerfile | 2 +- .../yaml/load-test/load_test_auth_code.yaml | 2 +- .../yaml/load-test/load_test_dcr.yaml | 2 +- .../yaml/load-test/load_test_ropc.yaml | 2 +- .../yaml/load-users/load_users_rdbms_job.yaml | 2 +- demos/jans-tarp/package.json | 2 +- .../jans-tarp/src/static/chrome/manifest.json | 2 +- .../src/static/firefox/manifest.json | 2 +- docker-jans-all-in-one/Dockerfile | 6 +- docker-jans-auth-server/Dockerfile | 4 +- docker-jans-casa/Dockerfile | 4 +- docker-jans-certmanager/Dockerfile | 4 +- docker-jans-certmanager/README.md | 2 +- docker-jans-config-api/Dockerfile | 4 +- docker-jans-configurator/Dockerfile | 4 +- docker-jans-fido2/Dockerfile | 4 +- docker-jans-kc-scheduler/Dockerfile | 4 +- docker-jans-keycloak-link/Dockerfile | 4 +- docker-jans-link/Dockerfile | 4 +- docker-jans-monolith/Dockerfile | 2 +- docker-jans-monolith/clean.sh | 2 +- docker-jans-monolith/down.sh | 2 +- docker-jans-monolith/jans-mysql-compose.yml | 2 +- .../jans-postgres-compose.yml | 2 +- docker-jans-monolith/up.sh | 2 +- docker-jans-persistence-loader/Dockerfile | 2 +- docker-jans-saml/Dockerfile | 4 +- docker-jans-scim/Dockerfile | 4 +- .../jans/inboundID/project/project.json | 2 +- docs/cedarling/cedarling-sidecar.md | 4 +- .../kubernetes/docker-jans-certmanager.md | 2 +- .../reference/kubernetes/helm-chart.md | 72 +++++++++---------- jans-auth-server/agama/engine/pom.xml | 2 +- jans-auth-server/agama/inboundID/pom.xml | 2 +- jans-auth-server/agama/model/pom.xml | 2 +- jans-auth-server/client/pom.xml | 2 +- jans-auth-server/common/pom.xml | 2 +- jans-auth-server/model/pom.xml | 2 +- jans-auth-server/persistence-model/pom.xml | 2 +- jans-auth-server/pom.xml | 2 +- jans-auth-server/server-fips/pom.xml | 2 +- jans-auth-server/server/pom.xml | 2 +- jans-auth-server/static/pom.xml | 4 +- jans-auth-server/test-model/pom.xml | 2 +- jans-bom/pom.xml | 4 +- jans-casa/agama/pom.xml | 2 +- jans-casa/agama/project/project.json | 2 +- jans-casa/app-fips/pom.xml | 2 +- jans-casa/app/pom.xml | 2 +- jans-casa/config/pom.xml | 2 +- jans-casa/plugins/acct-linking/agama/pom.xml | 2 +- .../acct-linking/agama/project/project.json | 2 +- jans-casa/plugins/acct-linking/pom.xml | 2 +- jans-casa/plugins/bioid/pom.xml | 2 +- .../plugins/client-authorizations/pom.xml | 2 +- jans-casa/plugins/custom-branding/pom.xml | 2 +- jans-casa/plugins/email_2fa/agama/pom.xml | 2 +- .../email_2fa/agama/project/project.json | 2 +- jans-casa/plugins/email_2fa/pom.xml | 2 +- .../authentication-script-properties/pom.xml | 2 +- jans-casa/plugins/samples/helloworld/pom.xml | 2 +- jans-casa/plugins/samples/sample-cred/pom.xml | 2 +- .../plugins/strong-authn-settings/pom.xml | 2 +- jans-casa/pom.xml | 2 +- jans-casa/shared/pom.xml | 2 +- .../bindings/cedarling_python/Cargo.toml | 2 +- .../bindings/cedarling_wasm/Cargo.toml | 2 +- jans-cedarling/cedarling/Cargo.toml | 2 +- jans-cedarling/flask-sidecar/Dockerfile | 2 +- jans-cedarling/flask-sidecar/README.md | 4 +- jans-cedarling/flask-sidecar/pyproject.toml | 2 +- jans-cedarling/test_utils/Cargo.toml | 2 +- jans-cli-tui/cli_tui/version.py | 2 +- jans-config-api/common/pom.xml | 2 +- .../plugins/admin-ui-plugin/pom.xml | 2 +- jans-config-api/plugins/fido2-plugin/pom.xml | 2 +- .../plugins/jans-link-plugin/pom.xml | 2 +- .../plugins/kc-link-plugin/pom.xml | 2 +- .../plugins/kc-saml-plugin/pom.xml | 2 +- jans-config-api/plugins/lock-plugin/pom.xml | 2 +- jans-config-api/plugins/pom.xml | 4 +- jans-config-api/plugins/sample/demo/pom.xml | 2 +- .../plugins/sample/helloworld/pom.xml | 2 +- jans-config-api/plugins/scim-plugin/pom.xml | 2 +- .../plugins/user-mgt-plugin/pom.xml | 2 +- jans-config-api/pom.xml | 2 +- jans-config-api/server-fips/pom.xml | 2 +- jans-config-api/server/pom.xml | 2 +- jans-config-api/shared/pom.xml | 2 +- jans-core/cache/pom.xml | 2 +- jans-core/cdi/pom.xml | 2 +- jans-core/demo-cdi/pom.xml | 2 +- jans-core/doc/pom.xml | 2 +- jans-core/document-store/pom.xml | 2 +- jans-core/exception-extension-cdi/pom.xml | 2 +- jans-core/java-ext/pom.xml | 2 +- jans-core/jsf-util/pom.xml | 2 +- jans-core/message/pom.xml | 2 +- jans-core/model/pom.xml | 2 +- jans-core/notify-client/pom.xml | 2 +- jans-core/pom.xml | 2 +- jans-core/radius/pom.xml | 2 +- jans-core/saml/pom.xml | 2 +- jans-core/saml/src/pom.xml | 2 +- jans-core/script/pom.xml | 2 +- jans-core/security-extension-cdi/pom.xml | 2 +- jans-core/server/pom.xml | 2 +- jans-core/service/pom.xml | 2 +- jans-core/standalone/pom.xml | 2 +- jans-core/timer-weld/pom.xml | 2 +- jans-core/uma-rs-core/pom.xml | 2 +- jans-core/util/pom.xml | 2 +- jans-fido2/client/pom.xml | 2 +- jans-fido2/model/pom.xml | 2 +- jans-fido2/pom.xml | 2 +- jans-fido2/server-fips/pom.xml | 2 +- jans-fido2/server/pom.xml | 2 +- .../job-scheduler/pom.xml | 2 +- jans-keycloak-integration/pom.xml | 2 +- jans-keycloak-integration/spi/pom.xml | 2 +- jans-keycloak-link/model/pom.xml | 2 +- .../resources/archetype-resources/pom.xml | 2 +- jans-keycloak-link/pom.xml | 2 +- jans-keycloak-link/server/pom.xml | 2 +- jans-keycloak-link/service/pom.xml | 2 +- jans-link/model/pom.xml | 2 +- jans-link/pom.xml | 4 +- jans-link/server-fips/pom.xml | 2 +- jans-link/server/pom.xml | 2 +- jans-link/service/pom.xml | 2 +- jans-linux-setup/jans_setup/app_info.json | 4 +- .../jans_setup/setup_app/version.py | 2 +- jans-lock/lock-server/client/pom.xml | 2 +- jans-lock/lock-server/model/pom.xml | 2 +- jans-lock/lock-server/pom.xml | 2 +- jans-lock/lock-server/server-fips/pom.xml | 2 +- jans-lock/lock-server/server/pom.xml | 2 +- jans-lock/lock-server/service/pom.xml | 2 +- jans-orm/annotation/pom.xml | 2 +- jans-orm/cdi/pom.xml | 2 +- jans-orm/core/pom.xml | 2 +- jans-orm/couchbase-libs/pom.xml | 2 +- jans-orm/couchbase-sample/pom.xml | 2 +- jans-orm/couchbase/pom.xml | 2 +- jans-orm/filter/pom.xml | 2 +- jans-orm/hybrid/pom.xml | 2 +- jans-orm/ldap-sample/pom.xml | 2 +- jans-orm/ldap/pom.xml | 2 +- jans-orm/model/pom.xml | 2 +- jans-orm/pom.xml | 2 +- jans-orm/spanner-libs/pom.xml | 2 +- jans-orm/spanner-sample/pom.xml | 2 +- jans-orm/spanner/pom.xml | 2 +- jans-orm/sql-sample/pom.xml | 2 +- jans-orm/sql/pom.xml | 2 +- jans-orm/standalone/pom.xml | 2 +- jans-orm/util/pom.xml | 2 +- jans-pycloudlib/jans/pycloudlib/version.py | 2 +- jans-scim/client/pom.xml | 2 +- jans-scim/model/pom.xml | 2 +- jans-scim/pom.xml | 2 +- jans-scim/server-fips/pom.xml | 2 +- jans-scim/server/pom.xml | 2 +- jans-scim/service/pom.xml | 2 +- 210 files changed, 369 insertions(+), 369 deletions(-) diff --git a/agama/pom.xml b/agama/pom.xml index c4481008df8..3cde1ef02a7 100644 --- a/agama/pom.xml +++ b/agama/pom.xml @@ -5,7 +5,7 @@ io.jans agama pom - 1.3.0 + 0.0.0-nightly agama parent diff --git a/agama/transpiler/pom.xml b/agama/transpiler/pom.xml index cfdb9b2d472..d5e1cb55071 100644 --- a/agama/transpiler/pom.xml +++ b/agama/transpiler/pom.xml @@ -9,7 +9,7 @@ io.jans agama - 1.3.0 + 0.0.0-nightly diff --git a/automation/startjanssendemo.sh b/automation/startjanssendemo.sh index 1a784953a5f..5f73b928919 100644 --- a/automation/startjanssendemo.sh +++ b/automation/startjanssendemo.sh @@ -22,7 +22,7 @@ if [[ $JANS_PERSISTENCE != "MYSQL" ]] && [[ $JANS_PERSISTENCE != "PGSQL" ]]; the exit 1 fi if [[ -z $JANS_VERSION ]]; then - JANS_VERSION="1.3.0" + JANS_VERSION="0.0.0-nightly" fi LOG_TARGET="FILE" LOG_LEVEL="TRACE" diff --git a/charts/janssen-all-in-one/Chart.yaml b/charts/janssen-all-in-one/Chart.yaml index dfe1715715a..6b981a1f0b4 100644 --- a/charts/janssen-all-in-one/Chart.yaml +++ b/charts/janssen-all-in-one/Chart.yaml @@ -3,14 +3,14 @@ annotations: artifacthub.io/containsSecurityUpdates: 'true' artifacthub.io/images: | - name: all-in-one - image: ghcr.io/janssenproject/jans/all-in-one:1.3.0-1 + image: ghcr.io/janssenproject/jans/all-in-one:0.0.0-nightly artifacthub.io/license: Apache-2.0 artifacthub.io/prerelease: 'true' catalog.cattle.io/certified: partner catalog.cattle.io/release-name: janssen-all-in-one catalog.cattle.io/display-name: Janssen Cloud Identity and Access Management All-in-One apiVersion: v2 -appVersion: "1.3.0" +appVersion: "0.0.0-nightly" icon: >- https://raw.githubusercontent.com/JanssenProject/jans/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png home: https://jans.io @@ -22,4 +22,4 @@ maintainers: email: support@jans.io description: Janssen Access and Identity Management All-in-One Chart. This chart deploys the selected janssen microservice all in one deployment. name: janssen-all-in-one -version: 1.3.0 +version: 0.0.0-nightly diff --git a/charts/janssen-all-in-one/README.md b/charts/janssen-all-in-one/README.md index 743b13adf1e..e331b0a1b71 100644 --- a/charts/janssen-all-in-one/README.md +++ b/charts/janssen-all-in-one/README.md @@ -1,6 +1,6 @@ # janssen-all-in-one -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) Janssen Access and Identity Management All-in-One Chart. This chart deploys the selected janssen microservice all in one deployment. @@ -30,7 +30,7 @@ Kubernetes: `>=v1.22.0-0` | adminPassword | string | `"Test1234#"` | Admin password to log in to the UI. | | alb.ingress | bool | `false` | switches the service to Nodeport for ALB ingress | | auth-server | object | `{"appLoggers":{"auditStatsLogLevel":"INFO","auditStatsLogTarget":"FILE","authLogLevel":"INFO","authLogTarget":"STDOUT","enableStdoutLogPrefix":"true","httpLogLevel":"INFO","httpLogTarget":"FILE","persistenceDurationLogLevel":"INFO","persistenceDurationLogTarget":"FILE","persistenceLogLevel":"INFO","persistenceLogTarget":"FILE","scriptLogLevel":"INFO","scriptLogTarget":"FILE"},"authEncKeys":"RSA1_5 RSA-OAEP","authSigKeys":"RS256 RS384 RS512 ES256 ES384 ES512 PS256 PS384 PS512","enabled":true,"ingress":{"authServerAdditionalAnnotations":{},"authServerEnabled":true,"authServerLabels":{},"authzenAdditionalAnnotations":{},"authzenConfigEnabled":true,"authzenConfigLabels":{},"deviceCodeAdditionalAnnotations":{},"deviceCodeEnabled":true,"deviceCodeLabels":{},"firebaseMessagingAdditionalAnnotations":{},"firebaseMessagingEnabled":true,"firebaseMessagingLabels":{},"lockAdditionalAnnotations":{},"lockConfigAdditionalAnnotations":{},"lockConfigEnabled":false,"lockConfigLabels":{},"lockEnabled":false,"lockLabels":{},"openidAdditionalAnnotations":{},"openidConfigEnabled":true,"openidConfigLabels":{},"u2fAdditionalAnnotations":{},"u2fConfigEnabled":true,"u2fConfigLabels":{},"uma2AdditionalAnnotations":{},"uma2ConfigEnabled":true,"uma2ConfigLabels":{},"webdiscoveryAdditionalAnnotations":{},"webdiscoveryEnabled":true,"webdiscoveryLabels":{},"webfingerAdditionalAnnotations":{},"webfingerEnabled":true,"webfingerLabels":{}},"lockEnabled":false}` | Parameters used globally across all services helm charts. | -| auth-server-key-rotation | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","enabled":true,"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/certmanager","tag":"1.3.0-1"},"initKeysLife":48,"keysLife":48,"keysPushDelay":0,"keysPushStrategy":"NEWER","keysStrategy":"NEWER","lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for regenerating auth-keys per x hours | +| auth-server-key-rotation | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","enabled":true,"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/certmanager","tag":"0.0.0-nightly"},"initKeysLife":48,"keysLife":48,"keysPushDelay":0,"keysPushStrategy":"NEWER","keysStrategy":"NEWER","lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for regenerating auth-keys per x hours | | auth-server-key-rotation.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | auth-server-key-rotation.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | auth-server-key-rotation.customCommand | list | `[]` | Add custom jobs's command. If passed, it will override the default conditional command. | @@ -41,7 +41,7 @@ Kubernetes: `>=v1.22.0-0` | auth-server-key-rotation.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | auth-server-key-rotation.image.pullSecrets | list | `[]` | Image Pull Secrets | | auth-server-key-rotation.image.repository | string | `"ghcr.io/janssenproject/jans/certmanager"` | Image to use for deploying. | -| auth-server-key-rotation.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| auth-server-key-rotation.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | auth-server-key-rotation.initKeysLife | int | `48` | The initial auth server key rotation keys life in hours | | auth-server-key-rotation.keysLife | int | `48` | Auth server key rotation keys life in hours | | auth-server-key-rotation.keysPushDelay | int | `0` | Delay (in seconds) before pushing private keys to Auth server | @@ -264,7 +264,7 @@ Kubernetes: `>=v1.22.0-0` | image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | image.pullSecrets | list | `[]` | Image Pull Secrets | | image.repository | string | `"ghcr.io/janssenproject/jans/all-in-one"` | Image to use for deploying. | -| image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | isFqdnRegistered | bool | `false` | Boolean flag to enable mapping lbIp to fqdn inside pods on clouds that provide static ip for load balancers. On cloud that provide only addresses to the LB this flag will enable a script to actively scan config.configmap.lbAddr and update the hosts file inside the pods automatically. | | istio.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | istio.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | @@ -273,7 +273,7 @@ Kubernetes: `>=v1.22.0-0` | istio.ingress | bool | `false` | Boolean flag that enables using istio gateway for Janssen. This assumes istio ingress is installed and hence the LB is available. | | istio.namespace | string | `"istio-system"` | The namespace istio is deployed in. The is normally istio-system. | | istio.tlsSecretName | string | `"istio-tls-certificate"` | | -| kc-scheduler | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","enabled":false,"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/kc-scheduler","tag":"1.3.0-1"},"interval":10,"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for synchronizing Keycloak SAML clients | +| kc-scheduler | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","enabled":false,"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/kc-scheduler","tag":"0.0.0-nightly"},"interval":10,"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for synchronizing Keycloak SAML clients | | kc-scheduler.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | kc-scheduler.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | kc-scheduler.customCommand | list | `[]` | Add custom job's command. If passed, it will override the default conditional command. | @@ -284,7 +284,7 @@ Kubernetes: `>=v1.22.0-0` | kc-scheduler.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | kc-scheduler.image.pullSecrets | list | `[]` | Image Pull Secrets | | kc-scheduler.image.repository | string | `"ghcr.io/janssenproject/jans/kc-scheduler"` | Image to use for deploying. | -| kc-scheduler.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| kc-scheduler.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | kc-scheduler.interval | int | `10` | Interval of running the scheduler (in minutes) | | kc-scheduler.resources | object | `{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}}` | Resource specs. | | kc-scheduler.resources.limits.cpu | string | `"300m"` | CPU limit. | diff --git a/charts/janssen-all-in-one/values.yaml b/charts/janssen-all-in-one/values.yaml index b50f9bc5262..616bd10f675 100644 --- a/charts/janssen-all-in-one/values.yaml +++ b/charts/janssen-all-in-one/values.yaml @@ -300,7 +300,7 @@ auth-server-key-rotation: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/certmanager # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Auth server key rotation keys life in hours @@ -685,7 +685,7 @@ image: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/all-in-one # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. @@ -765,7 +765,7 @@ kc-scheduler: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/kc-scheduler # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Resource specs. diff --git a/charts/janssen/Chart.yaml b/charts/janssen/Chart.yaml index c15341352c5..740bc69b176 100644 --- a/charts/janssen/Chart.yaml +++ b/charts/janssen/Chart.yaml @@ -3,34 +3,34 @@ annotations: artifacthub.io/containsSecurityUpdates: 'true' artifacthub.io/images: | - name: auth-server - image: ghcr.io/janssenproject/jans/auth-server:1.3.0-1 + image: ghcr.io/janssenproject/jans/auth-server:0.0.0-nightly - name: auth-server-key-rotation - image: ghcr.io/janssenproject/jans/certmanager:1.3.0-1 + image: ghcr.io/janssenproject/jans/certmanager:0.0.0-nightly - name: configuration-manager - image: ghcr.io/janssenproject/jans/configurator:1.3.0-1 + image: ghcr.io/janssenproject/jans/configurator:0.0.0-nightly - name: config-api - image: ghcr.io/janssenproject/jans/config-api:1.3.0-1 + image: ghcr.io/janssenproject/jans/config-api:0.0.0-nightly - name: fido2 - image: ghcr.io/janssenproject/jans/fido2:1.3.0-1 + image: ghcr.io/janssenproject/jans/fido2:0.0.0-nightly - name: persistence - image: ghcr.io/janssenproject/jans/persistence-loader:1.3.0-1 + image: ghcr.io/janssenproject/jans/persistence-loader:0.0.0-nightly - name: casa - image: ghcr.io/janssenproject/jans/casa:1.3.0-1 + image: ghcr.io/janssenproject/jans/casa:0.0.0-nightly - name: scim - image: ghcr.io/janssenproject/jans/scim:1.3.0-1 + image: ghcr.io/janssenproject/jans/scim:0.0.0-nightly - name: link - image: ghcr.io/janssenproject/jans/link:1.3.0-1 + image: ghcr.io/janssenproject/jans/link:0.0.0-nightly - name: saml - image: ghcr.io/janssenproject/jans/saml:1.3.0-1 + image: ghcr.io/janssenproject/jans/saml:0.0.0-nightly - name: kc-scheduler - image: ghcr.io/janssenproject/jans/kc-scheduler:1.3.0-1 + image: ghcr.io/janssenproject/jans/kc-scheduler:0.0.0-nightly artifacthub.io/license: Apache-2.0 - artifacthub.io/prerelease: 'false' + artifacthub.io/prerelease: 'true' catalog.cattle.io/certified: partner catalog.cattle.io/release-name: janssen catalog.cattle.io/display-name: Janssen Cloud Identity and Access Management Microservices apiVersion: v2 -appVersion: "1.3.0" +appVersion: "0.0.0-nightly" icon: >- https://raw.githubusercontent.com/JanssenProject/jans/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png home: https://jans.io @@ -42,56 +42,56 @@ maintainers: email: support@jans.io description: Janssen Access and Identity Management Microservices Chart. This chart deploys each janssen microservice as a separate deployment. name: janssen -version: 1.3.0 +version: 0.0.0-nightly dependencies: - name: casa - version: 1.3.0 + version: 0.0.0-nightly condition: global.casa.enabled - name: config condition: global.config.enabled - version: 1.3.0 + version: 0.0.0-nightly - name: config-api condition: global.config-api.enabled - version: 1.3.0 + version: 0.0.0-nightly - name: auth-server condition: global.auth-server.enabled - version: 1.3.0 + version: 0.0.0-nightly - name: fido2 condition: global.fido2.enabled - version: 1.3.0 + version: 0.0.0-nightly - name: scim condition: global.scim.enabled - version: 1.3.0 + version: 0.0.0-nightly - name: nginx-ingress condition: global.nginx-ingress.enabled - version: 1.3.0 + version: 0.0.0-nightly - name: auth-server-key-rotation condition: global.auth-server-key-rotation.enabled - version: 1.3.0 + version: 0.0.0-nightly - name: persistence condition: global.persistence.enabled - version: 1.3.0 + version: 0.0.0-nightly - name: link condition: global.link.enabled - version: 1.3.0 + version: 0.0.0-nightly - name: saml condition: global.saml.enabled - version: 1.3.0 + version: 0.0.0-nightly - name: cn-istio-ingress condition: global.istio.ingress - version: 1.3.0 + version: 0.0.0-nightly - name: kc-scheduler condition: global.kc-scheduler.enabled - version: 1.3.0 + version: 0.0.0-nightly diff --git a/charts/janssen/README.md b/charts/janssen/README.md index dc279d9d3e8..d9af76e4b49 100644 --- a/charts/janssen/README.md +++ b/charts/janssen/README.md @@ -1,6 +1,6 @@ # janssen -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) Janssen Access and Identity Management Microservices Chart. This chart deploys each janssen microservice as a separate deployment. @@ -23,26 +23,26 @@ Kubernetes: `>=v1.22.0-0` | Repository | Name | Version | |------------|------|---------| -| | auth-server | 1.3.0 | -| | auth-server-key-rotation | 1.3.0 | -| | casa | 1.3.0 | -| | cn-istio-ingress | 1.3.0 | -| | config | 1.3.0 | -| | config-api | 1.3.0 | -| | fido2 | 1.3.0 | -| | kc-scheduler | 1.3.0 | -| | link | 1.3.0 | -| | nginx-ingress | 1.3.0 | -| | persistence | 1.3.0 | -| | saml | 1.3.0 | -| | scim | 1.3.0 | +| | auth-server | 0.0.0-nightly | +| | auth-server-key-rotation | 0.0.0-nightly | +| | casa | 0.0.0-nightly | +| | cn-istio-ingress | 0.0.0-nightly | +| | config | 0.0.0-nightly | +| | config-api | 0.0.0-nightly | +| | fido2 | 0.0.0-nightly | +| | kc-scheduler | 0.0.0-nightly | +| | link | 0.0.0-nightly | +| | nginx-ingress | 0.0.0-nightly | +| | persistence | 0.0.0-nightly | +| | saml | 0.0.0-nightly | +| | scim | 0.0.0-nightly | ## Values | Key | Type | Default | Description | |-----|------|---------|-------------| -| auth-server | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/auth-server","tag":"1.3.0-1"},"lifecycle":{},"livenessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"2500m","memory":"2500Mi"},"requests":{"cpu":"2500m","memory":"2500Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | OAuth Authorization Server, the OpenID Connect Provider, the UMA Authorization Server--this is the main Internet facing component of Janssen. It's the service that returns tokens, JWT's and identity assertions. This service must be Internet facing. | -| auth-server-key-rotation | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/certmanager","tag":"1.3.0-1"},"keysLife":48,"keysPushDelay":0,"keysPushStrategy":"NEWER","keysStrategy":"NEWER","lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for regenerating auth-keys per x hours | +| auth-server | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/auth-server","tag":"0.0.0-nightly"},"lifecycle":{},"livenessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"2500m","memory":"2500Mi"},"requests":{"cpu":"2500m","memory":"2500Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | OAuth Authorization Server, the OpenID Connect Provider, the UMA Authorization Server--this is the main Internet facing component of Janssen. It's the service that returns tokens, JWT's and identity assertions. This service must be Internet facing. | +| auth-server-key-rotation | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/certmanager","tag":"0.0.0-nightly"},"keysLife":48,"keysPushDelay":0,"keysPushStrategy":"NEWER","keysStrategy":"NEWER","lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for regenerating auth-keys per x hours | | auth-server-key-rotation.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | auth-server-key-rotation.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | auth-server-key-rotation.customCommand | list | `[]` | Add custom job's command. If passed, it will override the default conditional command. | @@ -52,7 +52,7 @@ Kubernetes: `>=v1.22.0-0` | auth-server-key-rotation.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | auth-server-key-rotation.image.pullSecrets | list | `[]` | Image Pull Secrets | | auth-server-key-rotation.image.repository | string | `"ghcr.io/janssenproject/jans/certmanager"` | Image to use for deploying. | -| auth-server-key-rotation.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| auth-server-key-rotation.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | auth-server-key-rotation.keysLife | int | `48` | Auth server key rotation keys life in hours | | auth-server-key-rotation.keysPushDelay | int | `0` | Delay (in seconds) before pushing private keys to Auth server | | auth-server-key-rotation.keysPushStrategy | string | `"NEWER"` | Set key selection strategy after pushing private keys to Auth server (only takes effect when keysPushDelay value is greater than 0) | @@ -79,7 +79,7 @@ Kubernetes: `>=v1.22.0-0` | auth-server.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | auth-server.image.pullSecrets | list | `[]` | Image Pull Secrets | | auth-server.image.repository | string | `"ghcr.io/janssenproject/jans/auth-server"` | Image to use for deploying. | -| auth-server.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| auth-server.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | auth-server.livenessProbe | object | `{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the auth server if needed. | | auth-server.livenessProbe.exec | object | `{"command":["python3","/app/scripts/healthcheck.py"]}` | Executes the python3 healthcheck. https://github.com/JanssenProject/docker-jans-auth-server/blob/master/scripts/healthcheck.py | | auth-server.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget | @@ -96,7 +96,7 @@ Kubernetes: `>=v1.22.0-0` | auth-server.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 | | auth-server.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers | | auth-server.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod | -| casa | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/casa","tag":"1.3.0-1"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-casa/health-check","port":"http-casa"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-casa/health-check","port":"http-casa"},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"500Mi"},"requests":{"cpu":"500m","memory":"500Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Janssen Casa ("Casa") is a self-service web portal for end-users to manage authentication and authorization preferences for their account in a Janssen Auth Server. | +| casa | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/casa","tag":"0.0.0-nightly"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-casa/health-check","port":"http-casa"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-casa/health-check","port":"http-casa"},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"500Mi"},"requests":{"cpu":"500m","memory":"500Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Janssen Casa ("Casa") is a self-service web portal for end-users to manage authentication and authorization preferences for their account in a Janssen Auth Server. | | casa.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | casa.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | casa.customCommand | list | `[]` | Add custom pod's command. If passed, it will override the default conditional command. | @@ -109,7 +109,7 @@ Kubernetes: `>=v1.22.0-0` | casa.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | casa.image.pullSecrets | list | `[]` | Image Pull Secrets | | casa.image.repository | string | `"ghcr.io/janssenproject/jans/casa"` | Image to use for deploying. | -| casa.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| casa.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | casa.livenessProbe | object | `{"httpGet":{"path":"/jans-casa/health-check","port":"http-casa"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5}` | Configure the liveness healthcheck for casa if needed. | | casa.livenessProbe.httpGet.path | string | `"/jans-casa/health-check"` | http liveness probe endpoint | | casa.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget | @@ -127,8 +127,8 @@ Kubernetes: `>=v1.22.0-0` | casa.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 | | casa.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers | | casa.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod | -| config | object | `{"additionalAnnotations":{},"additionalLabels":{},"adminPassword":"Test1234#","city":"Austin","configmap":{"cnAwsAccessKeyId":"","cnAwsDefaultRegion":"us-west-1","cnAwsProfile":"janssen","cnAwsSecretAccessKey":"","cnAwsSecretsEndpointUrl":"","cnAwsSecretsNamePrefix":"janssen","cnAwsSecretsReplicaRegions":[],"cnCacheType":"NATIVE_PERSISTENCE","cnConfigKubernetesConfigMap":"cn","cnGoogleProjectId":"google-project-to-save-config-and-secrets-to","cnGoogleSecretManagerServiceAccount":"SWFtTm90YVNlcnZpY2VBY2NvdW50Q2hhbmdlTWV0b09uZQo=","cnGoogleSecretNamePrefix":"janssen","cnGoogleSecretVersionId":"latest","cnJettyRequestHeaderSize":8192,"cnMaxRamPercent":"75.0","cnMessageType":"DISABLED","cnOpaUrl":"http://opa.opa.svc.cluster.cluster.local:8181/v1","cnPersistenceHybridMapping":"{}","cnRedisSentinelGroup":"","cnRedisSslTruststore":"","cnRedisType":"STANDALONE","cnRedisUrl":"redis.redis.svc.cluster.local:6379","cnRedisUseSsl":false,"cnScimProtectionMode":"OAUTH","cnSecretKubernetesSecret":"cn","cnSqlDbDialect":"mysql","cnSqlDbHost":"my-release-mysql.default.svc.cluster.local","cnSqlDbName":"jans","cnSqlDbPort":3306,"cnSqlDbSchema":"","cnSqlDbTimezone":"UTC","cnSqlDbUser":"jans","cnSqldbUserPassword":"Test1234#","cnVaultAddr":"http://localhost:8200","cnVaultAppRolePath":"approle","cnVaultKvPath":"secret","cnVaultNamespace":"","cnVaultPrefix":"jans","cnVaultRoleId":"","cnVaultRoleIdFile":"/etc/certs/vault_role_id","cnVaultSecretId":"","cnVaultSecretIdFile":"/etc/certs/vault_secret_id","cnVaultVerify":false,"kcAdminPassword":"Test1234#","kcAdminUsername":"admin","kcDbPassword":"Test1234#","kcDbSchema":"keycloak","kcDbUrlDatabase":"keycloak","kcDbUrlHost":"mysql.kc.svc.cluster.local","kcDbUrlPort":3306,"kcDbUrlProperties":"?useUnicode=true&characterEncoding=UTF-8&character_set_server=utf8mb4","kcDbUsername":"keycloak","kcDbVendor":"mysql","kcLogLevel":"INFO","lbAddr":"","quarkusTransactionEnableRecovery":true},"countryCode":"US","customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","email":"support@jans.io","image":{"pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/configurator","tag":"1.3.0-1"},"lifecycle":{},"orgName":"Janssen","redisPassword":"P@assw0rd","resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"salt":"","state":"TX","usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Configuration parameters for setup and initial configuration secret and config layers used by Janssen services. | -| config-api | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/config-api","tag":"1.3.0-1"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-config-api/api/v1/health/live","port":8074},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"jans-config-api/api/v1/health/ready","port":8074},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"1000m","memory":"1200Mi"},"requests":{"cpu":"1000m","memory":"1200Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Config Api endpoints can be used to configure the auth-server, which is an open-source OpenID Connect Provider (OP) and UMA Authorization Server (AS). | +| config | object | `{"additionalAnnotations":{},"additionalLabels":{},"adminPassword":"Test1234#","city":"Austin","configmap":{"cnAwsAccessKeyId":"","cnAwsDefaultRegion":"us-west-1","cnAwsProfile":"janssen","cnAwsSecretAccessKey":"","cnAwsSecretsEndpointUrl":"","cnAwsSecretsNamePrefix":"janssen","cnAwsSecretsReplicaRegions":[],"cnCacheType":"NATIVE_PERSISTENCE","cnConfigKubernetesConfigMap":"cn","cnGoogleProjectId":"google-project-to-save-config-and-secrets-to","cnGoogleSecretManagerServiceAccount":"SWFtTm90YVNlcnZpY2VBY2NvdW50Q2hhbmdlTWV0b09uZQo=","cnGoogleSecretNamePrefix":"janssen","cnGoogleSecretVersionId":"latest","cnJettyRequestHeaderSize":8192,"cnMaxRamPercent":"75.0","cnMessageType":"DISABLED","cnOpaUrl":"http://opa.opa.svc.cluster.cluster.local:8181/v1","cnPersistenceHybridMapping":"{}","cnRedisSentinelGroup":"","cnRedisSslTruststore":"","cnRedisType":"STANDALONE","cnRedisUrl":"redis.redis.svc.cluster.local:6379","cnRedisUseSsl":false,"cnScimProtectionMode":"OAUTH","cnSecretKubernetesSecret":"cn","cnSqlDbDialect":"mysql","cnSqlDbHost":"my-release-mysql.default.svc.cluster.local","cnSqlDbName":"jans","cnSqlDbPort":3306,"cnSqlDbSchema":"","cnSqlDbTimezone":"UTC","cnSqlDbUser":"jans","cnSqldbUserPassword":"Test1234#","cnVaultAddr":"http://localhost:8200","cnVaultAppRolePath":"approle","cnVaultKvPath":"secret","cnVaultNamespace":"","cnVaultPrefix":"jans","cnVaultRoleId":"","cnVaultRoleIdFile":"/etc/certs/vault_role_id","cnVaultSecretId":"","cnVaultSecretIdFile":"/etc/certs/vault_secret_id","cnVaultVerify":false,"kcAdminPassword":"Test1234#","kcAdminUsername":"admin","kcDbPassword":"Test1234#","kcDbSchema":"keycloak","kcDbUrlDatabase":"keycloak","kcDbUrlHost":"mysql.kc.svc.cluster.local","kcDbUrlPort":3306,"kcDbUrlProperties":"?useUnicode=true&characterEncoding=UTF-8&character_set_server=utf8mb4","kcDbUsername":"keycloak","kcDbVendor":"mysql","kcLogLevel":"INFO","lbAddr":"","quarkusTransactionEnableRecovery":true},"countryCode":"US","customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","email":"support@jans.io","image":{"pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/configurator","tag":"0.0.0-nightly"},"lifecycle":{},"orgName":"Janssen","redisPassword":"P@assw0rd","resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"salt":"","state":"TX","usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Configuration parameters for setup and initial configuration secret and config layers used by Janssen services. | +| config-api | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/config-api","tag":"0.0.0-nightly"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-config-api/api/v1/health/live","port":8074},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"jans-config-api/api/v1/health/ready","port":8074},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"1000m","memory":"1200Mi"},"requests":{"cpu":"1000m","memory":"1200Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Config Api endpoints can be used to configure the auth-server, which is an open-source OpenID Connect Provider (OP) and UMA Authorization Server (AS). | | config-api.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | config-api.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | config-api.customCommand | list | `[]` | Add custom pod's command. If passed, it will override the default conditional command. | @@ -141,7 +141,7 @@ Kubernetes: `>=v1.22.0-0` | config-api.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | config-api.image.pullSecrets | list | `[]` | Image Pull Secrets | | config-api.image.repository | string | `"ghcr.io/janssenproject/jans/config-api"` | Image to use for deploying. | -| config-api.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| config-api.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | config-api.livenessProbe | object | `{"httpGet":{"path":"/jans-config-api/api/v1/health/live","port":8074},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the auth server if needed. | | config-api.livenessProbe.httpGet | object | `{"path":"/jans-config-api/api/v1/health/live","port":8074}` | http liveness probe endpoint | | config-api.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget | @@ -218,7 +218,7 @@ Kubernetes: `>=v1.22.0-0` | config.email | string | `"support@jans.io"` | Email address of the administrator usually. Used for certificate creation. | | config.image.pullSecrets | list | `[]` | Image Pull Secrets | | config.image.repository | string | `"ghcr.io/janssenproject/jans/configurator"` | Image to use for deploying. | -| config.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| config.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | config.orgName | string | `"Janssen"` | Organization name. Used for certificate creation. | | config.redisPassword | string | `"P@assw0rd"` | Redis admin password if `config.configmap.cnCacheType` is set to `REDIS`. | | config.resources | object | `{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}}` | Resource specs. | @@ -233,7 +233,7 @@ Kubernetes: `>=v1.22.0-0` | config.usrEnvs.secret | object | `{}` | Add custom secret envs to the service. variable1: value1 | | config.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers | | config.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod | -| fido2 | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/fido2","tag":"1.3.0-1"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"500Mi"},"requests":{"cpu":"500m","memory":"500Mi"}},"service":{"name":"http-fido2","port":8080},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | FIDO 2.0 (FIDO2) is an open authentication standard that enables leveraging common devices to authenticate to online services in both mobile and desktop environments. | +| fido2 | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/fido2","tag":"0.0.0-nightly"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"500Mi"},"requests":{"cpu":"500m","memory":"500Mi"}},"service":{"name":"http-fido2","port":8080},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | FIDO 2.0 (FIDO2) is an open authentication standard that enables leveraging common devices to authenticate to online services in both mobile and desktop environments. | | fido2.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | fido2.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | fido2.customCommand | list | `[]` | Add custom pod's command. If passed, it will override the default conditional command. | @@ -246,7 +246,7 @@ Kubernetes: `>=v1.22.0-0` | fido2.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | fido2.image.pullSecrets | list | `[]` | Image Pull Secrets | | fido2.image.repository | string | `"ghcr.io/janssenproject/jans/fido2"` | Image to use for deploying. | -| fido2.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| fido2.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | fido2.livenessProbe | object | `{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5}` | Configure the liveness healthcheck for the fido2 if needed. | | fido2.livenessProbe.httpGet | object | `{"path":"/jans-fido2/sys/health-check","port":"http-fido2"}` | http liveness probe endpoint | | fido2.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget | @@ -456,7 +456,7 @@ Kubernetes: `>=v1.22.0-0` | global.usrEnvs | object | `{"normal":{},"secret":{}}` | Add custom normal and secret envs to the service. Envs defined in global.userEnvs will be globally available to all services | | global.usrEnvs.normal | object | `{}` | Add custom normal envs to the service. variable1: value1 | | global.usrEnvs.secret | object | `{}` | Add custom secret envs to the service. variable1: value1 | -| kc-scheduler | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/kc-scheduler","tag":"1.3.0-1"},"interval":10,"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for synchronizing Keycloak SAML clients | +| kc-scheduler | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/kc-scheduler","tag":"0.0.0-nightly"},"interval":10,"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for synchronizing Keycloak SAML clients | | kc-scheduler.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | kc-scheduler.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | kc-scheduler.customCommand | list | `[]` | Add custom job's command. If passed, it will override the default conditional command. | @@ -466,7 +466,7 @@ Kubernetes: `>=v1.22.0-0` | kc-scheduler.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | kc-scheduler.image.pullSecrets | list | `[]` | Image Pull Secrets | | kc-scheduler.image.repository | string | `"ghcr.io/janssenproject/jans/kc-scheduler"` | Image to use for deploying. | -| kc-scheduler.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| kc-scheduler.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | kc-scheduler.interval | int | `10` | Interval of running the scheduler (in minutes) | | kc-scheduler.resources | object | `{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}}` | Resource specs. | | kc-scheduler.resources.limits.cpu | string | `"300m"` | CPU limit. | @@ -478,7 +478,7 @@ Kubernetes: `>=v1.22.0-0` | kc-scheduler.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 | | kc-scheduler.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers | | kc-scheduler.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod | -| link | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/link","tag":"1.3.0-1"},"lifecycle":{},"livenessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"1200Mi"},"requests":{"cpu":"500m","memory":"1200Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Link. | +| link | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/link","tag":"0.0.0-nightly"},"lifecycle":{},"livenessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"1200Mi"},"requests":{"cpu":"500m","memory":"1200Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Link. | | link.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | link.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | link.customCommand | list | `[]` | Add custom pod's command. If passed, it will override the default conditional command. | @@ -491,7 +491,7 @@ Kubernetes: `>=v1.22.0-0` | link.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | link.image.pullSecrets | list | `[]` | Image Pull Secrets | | link.image.repository | string | `"ghcr.io/janssenproject/jans/link"` | Image to use for deploying. | -| link.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| link.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | link.livenessProbe | object | `{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the auth server if needed. | | link.livenessProbe.exec | object | `{"command":["python3","/app/scripts/healthcheck.py"]}` | http liveness probe endpoint | | link.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget | @@ -512,7 +512,7 @@ Kubernetes: `>=v1.22.0-0` | nginx-ingress.ingress.additionalAnnotations | object | `{}` | Additional annotations that will be added across all ingress definitions in the format of {cert-manager.io/issuer: "letsencrypt-prod"} Enable client certificate authentication nginx.ingress.kubernetes.io/auth-tls-verify-client: "optional" Create the secret containing the trusted ca certificates nginx.ingress.kubernetes.io/auth-tls-secret: "janssen/tls-certificate" Specify the verification depth in the client certificates chain nginx.ingress.kubernetes.io/auth-tls-verify-depth: "1" Specify if certificates are passed to upstream server nginx.ingress.kubernetes.io/auth-tls-pass-certificate-to-upstream: "true" | | nginx-ingress.ingress.additionalLabels | object | `{}` | Additional labels that will be added across all ingress definitions in the format of {mylabel: "myapp"} | | nginx-ingress.ingress.tls | list | `[{"hosts":["demoexample.jans.io"],"secretName":"tls-certificate"}]` | Secrets holding HTTPS CA cert and key. | -| persistence | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/persistence-loader","tag":"1.3.0-1"},"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Job to generate data and initial config for Janssen Server persistence layer. | +| persistence | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/persistence-loader","tag":"0.0.0-nightly"},"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Job to generate data and initial config for Janssen Server persistence layer. | | persistence.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | persistence.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | persistence.customCommand | list | `[]` | Add custom job's command. If passed, it will override the default conditional command. | @@ -522,7 +522,7 @@ Kubernetes: `>=v1.22.0-0` | persistence.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | persistence.image.pullSecrets | list | `[]` | Image Pull Secrets | | persistence.image.repository | string | `"ghcr.io/janssenproject/jans/persistence-loader"` | Image to use for deploying. | -| persistence.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| persistence.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | persistence.resources | object | `{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}}` | Resource specs. | | persistence.resources.limits.cpu | string | `"300m"` | CPU limit | | persistence.resources.limits.memory | string | `"300Mi"` | Memory limit. | @@ -533,7 +533,7 @@ Kubernetes: `>=v1.22.0-0` | persistence.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 | | persistence.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers | | persistence.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod | -| saml | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/saml","tag":"1.3.0-1"},"lifecycle":{},"livenessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"failureThreshold":10,"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"failureThreshold":10,"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"1200Mi"},"requests":{"cpu":"500m","memory":"1200Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | SAML. | +| saml | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/saml","tag":"0.0.0-nightly"},"lifecycle":{},"livenessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"failureThreshold":10,"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"failureThreshold":10,"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"1200Mi"},"requests":{"cpu":"500m","memory":"1200Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | SAML. | | saml.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | saml.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | saml.customCommand | list | `[]` | Add custom pod's command. If passed, it will override the default conditional command. | @@ -546,7 +546,7 @@ Kubernetes: `>=v1.22.0-0` | saml.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | saml.image.pullSecrets | list | `[]` | Image Pull Secrets | | saml.image.repository | string | `"ghcr.io/janssenproject/jans/saml"` | Image to use for deploying. | -| saml.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| saml.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | saml.livenessProbe | object | `{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"failureThreshold":10,"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the auth server if needed. | | saml.livenessProbe.exec | object | `{"command":["python3","/app/scripts/healthcheck.py"]}` | http liveness probe endpoint | | saml.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget | @@ -563,7 +563,7 @@ Kubernetes: `>=v1.22.0-0` | saml.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 | | saml.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers | | saml.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod | -| scim | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/scim","tag":"1.3.0-1"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"1000m","memory":"1200Mi"},"requests":{"cpu":"1000m","memory":"1200Mi"}},"service":{"name":"http-scim","port":8080},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | System for Cross-domain Identity Management (SCIM) version 2.0 | +| scim | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/scim","tag":"0.0.0-nightly"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"1000m","memory":"1200Mi"},"requests":{"cpu":"1000m","memory":"1200Mi"}},"service":{"name":"http-scim","port":8080},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | System for Cross-domain Identity Management (SCIM) version 2.0 | | scim.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | scim.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | scim.customCommand | list | `[]` | Add custom pod's command. If passed, it will override the default conditional command. | @@ -576,7 +576,7 @@ Kubernetes: `>=v1.22.0-0` | scim.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | scim.image.pullSecrets | list | `[]` | Image Pull Secrets | | scim.image.repository | string | `"ghcr.io/janssenproject/jans/scim"` | Image to use for deploying. | -| scim.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| scim.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | scim.livenessProbe | object | `{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for SCIM if needed. | | scim.livenessProbe.httpGet.path | string | `"/jans-scim/sys/health-check"` | http liveness probe endpoint | | scim.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget | diff --git a/charts/janssen/charts/auth-server-key-rotation/Chart.yaml b/charts/janssen/charts/auth-server-key-rotation/Chart.yaml index af6252ae546..6991669c0af 100644 --- a/charts/janssen/charts/auth-server-key-rotation/Chart.yaml +++ b/charts/janssen/charts/auth-server-key-rotation/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: auth-server-key-rotation -version: 1.3.0 +version: 0.0.0-nightly kubeVersion: ">=v1.22.0-0" description: Responsible for regenerating auth-keys per x hours type: application @@ -15,4 +15,4 @@ maintainers: email: support@jans.io url: https://github.com/moabu icon: https://github.com/JanssenProject/jans/raw/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png -appVersion: "1.3.0" \ No newline at end of file +appVersion: "0.0.0-nightly" \ No newline at end of file diff --git a/charts/janssen/charts/auth-server-key-rotation/README.md b/charts/janssen/charts/auth-server-key-rotation/README.md index 8ffadd66eb0..bc359502b32 100644 --- a/charts/janssen/charts/auth-server-key-rotation/README.md +++ b/charts/janssen/charts/auth-server-key-rotation/README.md @@ -1,6 +1,6 @@ # auth-server-key-rotation -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) Responsible for regenerating auth-keys per x hours @@ -34,7 +34,7 @@ Kubernetes: `>=v1.22.0-0` | image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | image.pullSecrets | list | `[]` | Image Pull Secrets | | image.repository | string | `"janssenproject/certmanager"` | Image to use for deploying. | -| image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | keysLife | int | `48` | Auth server key rotation keys life in hours | | keysPushDelay | int | `0` | Delay (in seconds) before pushing private keys to Auth server | | keysPushStrategy | string | `"NEWER"` | Set key selection strategy after pushing private keys to Auth server (only takes effect when keysPushDelay value is greater than 0) | diff --git a/charts/janssen/charts/auth-server-key-rotation/values.yaml b/charts/janssen/charts/auth-server-key-rotation/values.yaml index d8f13105e97..f2c4cf65f8e 100644 --- a/charts/janssen/charts/auth-server-key-rotation/values.yaml +++ b/charts/janssen/charts/auth-server-key-rotation/values.yaml @@ -18,7 +18,7 @@ image: # -- Image to use for deploying. repository: janssenproject/certmanager # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Auth server key rotation keys life in hours diff --git a/charts/janssen/charts/auth-server/Chart.yaml b/charts/janssen/charts/auth-server/Chart.yaml index 6e32a73ea3b..c63adf27402 100644 --- a/charts/janssen/charts/auth-server/Chart.yaml +++ b/charts/janssen/charts/auth-server/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: auth-server -version: 1.3.0 +version: 0.0.0-nightly kubeVersion: ">=v1.22.0-0" description: OAuth Authorization Server, the OpenID Connect Provider, the UMA Authorization Server--this is the main Internet facing component of Janssen. It's the service that returns tokens, JWT's and identity assertions. This service must be Internet facing. type: application @@ -17,4 +17,4 @@ maintainers: email: support@jans.io url: https://github.com/moabu icon: https://github.com/JanssenProject/jans/raw/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png -appVersion: "1.3.0" +appVersion: "0.0.0-nightly" diff --git a/charts/janssen/charts/auth-server/README.md b/charts/janssen/charts/auth-server/README.md index 31ade4113c8..4c790700e5e 100644 --- a/charts/janssen/charts/auth-server/README.md +++ b/charts/janssen/charts/auth-server/README.md @@ -1,6 +1,6 @@ # auth-server -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) OAuth Authorization Server, the OpenID Connect Provider, the UMA Authorization Server--this is the main Internet facing component of Janssen. It's the service that returns tokens, JWT's and identity assertions. This service must be Internet facing. @@ -37,7 +37,7 @@ Kubernetes: `>=v1.22.0-0` | image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | image.pullSecrets | list | `[]` | Image Pull Secrets | | image.repository | string | `"janssenproject/auth-server"` | Image to use for deploying. | -| image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | lifecycle | object | `{}` | | | livenessProbe | object | `{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the auth server if needed. | | livenessProbe.exec | object | `{"command":["python3","/app/scripts/healthcheck.py"]}` | Executes the python3 healthcheck. | diff --git a/charts/janssen/charts/auth-server/values.yaml b/charts/janssen/charts/auth-server/values.yaml index 7d784a561b4..589e50d4205 100644 --- a/charts/janssen/charts/auth-server/values.yaml +++ b/charts/janssen/charts/auth-server/values.yaml @@ -28,7 +28,7 @@ image: # -- Image to use for deploying. repository: janssenproject/auth-server # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. diff --git a/charts/janssen/charts/casa/Chart.yaml b/charts/janssen/charts/casa/Chart.yaml index 5ec173204dc..88779ffda92 100644 --- a/charts/janssen/charts/casa/Chart.yaml +++ b/charts/janssen/charts/casa/Chart.yaml @@ -1,6 +1,6 @@ apiVersion: v2 name: casa -version: 1.3.0 +version: 0.0.0-nightly kubeVersion: ">=v1.21.0-0" description: Jans Casa ("Casa") is a self-service web portal for end-users to manage authentication and authorization preferences for their account in a Jans Server. type: application @@ -17,4 +17,4 @@ maintainers: email: support@jans.io url: https://github.com/moabu icon: https://github.com/JanssenProject/jans/raw/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png -appVersion: "1.3.0" +appVersion: "0.0.0-nightly" diff --git a/charts/janssen/charts/casa/README.md b/charts/janssen/charts/casa/README.md index a3b98184b50..9e37fc5008c 100644 --- a/charts/janssen/charts/casa/README.md +++ b/charts/janssen/charts/casa/README.md @@ -1,6 +1,6 @@ # casa -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) Jans Casa ("Casa") is a self-service web portal for end-users to manage authentication and authorization preferences for their account in a Jans Server. @@ -38,7 +38,7 @@ Kubernetes: `>=v1.21.0-0` | image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | image.pullSecrets | list | `[]` | Image Pull Secrets | | image.repository | string | `"janssenproject/casa"` | Image to use for deploying. | -| image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | lifecycle | object | `{}` | | | livenessProbe | object | `{"httpGet":{"path":"/jans-casa/health-check","port":"http-casa"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5}` | Configure the liveness healthcheck for casa if needed. | | livenessProbe.httpGet.path | string | `"/jans-casa/health-check"` | http liveness probe endpoint | diff --git a/charts/janssen/charts/casa/values.yaml b/charts/janssen/charts/casa/values.yaml index 6e5685d30ab..382f7c571e2 100644 --- a/charts/janssen/charts/casa/values.yaml +++ b/charts/janssen/charts/casa/values.yaml @@ -27,7 +27,7 @@ image: # -- Image to use for deploying. repository: janssenproject/casa # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. diff --git a/charts/janssen/charts/cn-istio-ingress/Chart.yaml b/charts/janssen/charts/cn-istio-ingress/Chart.yaml index c81c03ecdf1..9dd6cae113d 100644 --- a/charts/janssen/charts/cn-istio-ingress/Chart.yaml +++ b/charts/janssen/charts/cn-istio-ingress/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: cn-istio-ingress -version: 1.3.0 +version: 0.0.0-nightly kubeVersion: ">=v1.21.0-0" description: Istio Gateway type: application @@ -17,4 +17,4 @@ maintainers: email: support@jans.io url: https://github.com/moabu icon: https://github.com/JanssenProject/jans/raw/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png -appVersion: "1.3.0" +appVersion: "0.0.0-nightly" diff --git a/charts/janssen/charts/cn-istio-ingress/README.md b/charts/janssen/charts/cn-istio-ingress/README.md index e7df4ac67f9..9cf79ca694d 100644 --- a/charts/janssen/charts/cn-istio-ingress/README.md +++ b/charts/janssen/charts/cn-istio-ingress/README.md @@ -1,6 +1,6 @@ # cn-istio-ingress -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) Istio Gateway diff --git a/charts/janssen/charts/config-api/Chart.yaml b/charts/janssen/charts/config-api/Chart.yaml index c92cc176697..c1788343421 100644 --- a/charts/janssen/charts/config-api/Chart.yaml +++ b/charts/janssen/charts/config-api/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: config-api -version: 1.3.0 +version: 0.0.0-nightly kubeVersion: ">=v1.22.0-0" description: Jans Config Api endpoints can be used to configure jans-auth-server, which is an open-source OpenID Connect Provider (OP) and UMA Authorization Server (AS) type: application @@ -17,4 +17,4 @@ maintainers: email: support@jans.io url: https://github.com/moabu icon: https://github.com/JanssenProject/jans/raw/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png -appVersion: "1.3.0" +appVersion: "0.0.0-nightly" diff --git a/charts/janssen/charts/config-api/README.md b/charts/janssen/charts/config-api/README.md index 64a70f97d01..738332940d2 100644 --- a/charts/janssen/charts/config-api/README.md +++ b/charts/janssen/charts/config-api/README.md @@ -1,6 +1,6 @@ # config-api -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) Jans Config Api endpoints can be used to configure jans-auth-server, which is an open-source OpenID Connect Provider (OP) and UMA Authorization Server (AS) @@ -39,7 +39,7 @@ Kubernetes: `>=v1.22.0-0` | image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | image.pullSecrets | list | `[]` | Image Pull Secrets | | image.repository | string | `"janssenproject/config-api"` | Image to use for deploying. | -| image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | lifecycle | object | `{}` | | | livenessProbe | object | `{"httpGet":{"path":"/jans-config-api/api/v1/health/live","port":8074},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the auth server if needed. | | livenessProbe.httpGet | object | `{"path":"/jans-config-api/api/v1/health/live","port":8074}` | Executes the python3 healthcheck. | diff --git a/charts/janssen/charts/config-api/values.yaml b/charts/janssen/charts/config-api/values.yaml index ebb5beeb857..1c98156a67c 100644 --- a/charts/janssen/charts/config-api/values.yaml +++ b/charts/janssen/charts/config-api/values.yaml @@ -31,7 +31,7 @@ image: # -- Image to use for deploying. repository: janssenproject/config-api # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. diff --git a/charts/janssen/charts/config/Chart.yaml b/charts/janssen/charts/config/Chart.yaml index 15f0615bcdd..06f47b9d972 100644 --- a/charts/janssen/charts/config/Chart.yaml +++ b/charts/janssen/charts/config/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: config -version: 1.3.0 +version: 0.0.0-nightly kubeVersion: ">=v1.22.0-0" description: Configuration parameters for setup and initial configuration secret and config layers used by Janssen services. type: application @@ -17,4 +17,4 @@ maintainers: email: support@jans.io url: https://github.com/moabu icon: https://github.com/JanssenProject/jans/raw/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png -appVersion: "1.3.0" +appVersion: "0.0.0-nightly" diff --git a/charts/janssen/charts/config/README.md b/charts/janssen/charts/config/README.md index c62f8ffb46d..891a007874b 100644 --- a/charts/janssen/charts/config/README.md +++ b/charts/janssen/charts/config/README.md @@ -1,6 +1,6 @@ # config -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) Configuration parameters for setup and initial configuration secret and config layers used by Janssen services. @@ -91,7 +91,7 @@ Kubernetes: `>=v1.22.0-0` | fullNameOverride | string | `""` | | | image.pullSecrets | list | `[]` | Image Pull Secrets | | image.repository | string | `"janssenproject/configurator"` | Image to use for deploying. | -| image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | lifecycle | object | `{}` | | | migration | object | `{"enabled":false,"migrationDataFormat":"ldif","migrationDir":"/ce-migration"}` | CE to CN Migration section | | migration.enabled | bool | `false` | Boolean flag to enable migration from CE | diff --git a/charts/janssen/charts/config/values.yaml b/charts/janssen/charts/config/values.yaml index c1ddc9c814e..6efe9c4c1ca 100644 --- a/charts/janssen/charts/config/values.yaml +++ b/charts/janssen/charts/config/values.yaml @@ -146,7 +146,7 @@ image: # -- Image to use for deploying. repository: janssenproject/configurator # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Organization name. Used for certificate creation. diff --git a/charts/janssen/charts/fido2/Chart.yaml b/charts/janssen/charts/fido2/Chart.yaml index e6cb608836a..bbb0d286159 100644 --- a/charts/janssen/charts/fido2/Chart.yaml +++ b/charts/janssen/charts/fido2/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: fido2 -version: 1.3.0 +version: 0.0.0-nightly kubeVersion: ">=v1.22.0-0" description: FIDO 2.0 (FIDO2) is an open authentication standard that enables leveraging common devices to authenticate to online services in both mobile and desktop environments. type: application @@ -18,4 +18,4 @@ maintainers: email: support@jans.io url: https://github.com/moabu icon: https://github.com/JanssenProject/jans/raw/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png -appVersion: "1.3.0" +appVersion: "0.0.0-nightly" diff --git a/charts/janssen/charts/fido2/README.md b/charts/janssen/charts/fido2/README.md index 856c11c119b..965032156a2 100644 --- a/charts/janssen/charts/fido2/README.md +++ b/charts/janssen/charts/fido2/README.md @@ -1,6 +1,6 @@ # fido2 -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) FIDO 2.0 (FIDO2) is an open authentication standard that enables leveraging common devices to authenticate to online services in both mobile and desktop environments. @@ -38,7 +38,7 @@ Kubernetes: `>=v1.22.0-0` | image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | image.pullSecrets | list | `[]` | Image Pull Secrets | | image.repository | string | `"janssenproject/fido2"` | Image to use for deploying. | -| image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | lifecycle | object | `{}` | | | livenessProbe | object | `{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5}` | Configure the liveness healthcheck for the fido2 if needed. | | livenessProbe.httpGet | object | `{"path":"/jans-fido2/sys/health-check","port":"http-fido2"}` | http liveness probe endpoint | diff --git a/charts/janssen/charts/fido2/values.yaml b/charts/janssen/charts/fido2/values.yaml index c21e232d1fa..75601f95cc2 100644 --- a/charts/janssen/charts/fido2/values.yaml +++ b/charts/janssen/charts/fido2/values.yaml @@ -29,7 +29,7 @@ image: # -- Image to use for deploying. repository: janssenproject/fido2 # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. diff --git a/charts/janssen/charts/kc-scheduler/Chart.yaml b/charts/janssen/charts/kc-scheduler/Chart.yaml index 28c7279fdca..5865904d54e 100644 --- a/charts/janssen/charts/kc-scheduler/Chart.yaml +++ b/charts/janssen/charts/kc-scheduler/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: kc-scheduler -version: 1.3.0 +version: 0.0.0-nightly kubeVersion: ">=v1.22.0-0" description: Responsible for synchronizing Keycloak SAML clients type: application @@ -16,4 +16,4 @@ maintainers: email: support@jans.io url: https://github.com/moabu icon: https://github.com/JanssenProject/jans/raw/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png -appVersion: "1.3.0" +appVersion: "0.0.0-nightly" diff --git a/charts/janssen/charts/kc-scheduler/README.md b/charts/janssen/charts/kc-scheduler/README.md index b7d87ac9a12..e6cd9072742 100644 --- a/charts/janssen/charts/kc-scheduler/README.md +++ b/charts/janssen/charts/kc-scheduler/README.md @@ -1,6 +1,6 @@ # kc-scheduler -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) Responsible for synchronizing Keycloak SAML clients @@ -33,7 +33,7 @@ Kubernetes: `>=v1.22.0-0` | image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | image.pullSecrets | list | `[]` | Image Pull Secrets | | image.repository | string | `"ghcr.io/janssenproject/jans/kc-scheduler"` | Image to use for deploying. | -| image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | interval | int | `10` | Interval of running the scheduler (in minutes) | | lifecycle | object | `{}` | | | resources | object | `{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}}` | Resource specs. | diff --git a/charts/janssen/charts/kc-scheduler/values.yaml b/charts/janssen/charts/kc-scheduler/values.yaml index 401de0aed6d..98ec8bf0fbc 100644 --- a/charts/janssen/charts/kc-scheduler/values.yaml +++ b/charts/janssen/charts/kc-scheduler/values.yaml @@ -16,7 +16,7 @@ image: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/kc-scheduler # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Resource specs. diff --git a/charts/janssen/charts/link/Chart.yaml b/charts/janssen/charts/link/Chart.yaml index 33d29216521..240add79c74 100644 --- a/charts/janssen/charts/link/Chart.yaml +++ b/charts/janssen/charts/link/Chart.yaml @@ -1,6 +1,6 @@ apiVersion: v2 name: link -version: 1.3.0 +version: 0.0.0-nightly kubeVersion: ">=v1.22.0-0" description: Jans Link type: application @@ -15,4 +15,4 @@ maintainers: email: support@jans.io url: https://github.com/moabu icon: https://github.com/JanssenProject/jans/raw/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png -appVersion: "1.3.0" +appVersion: "0.0.0-nightly" diff --git a/charts/janssen/charts/link/README.md b/charts/janssen/charts/link/README.md index b33d8580f66..dadd4e3630a 100644 --- a/charts/janssen/charts/link/README.md +++ b/charts/janssen/charts/link/README.md @@ -1,6 +1,6 @@ # link -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) Jans Link @@ -39,7 +39,7 @@ Kubernetes: `>=v1.22.0-0` | image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | image.pullSecrets | list | `[]` | Image Pull Secrets | | image.repository | string | `"ghcr.io/janssenproject/jans/link"` | Image to use for deploying. | -| image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | lifecycle | object | `{}` | | | livenessProbe | object | `{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the link if needed. | | livenessProbe.exec | object | `{"command":["python3","/app/scripts/healthcheck.py"]}` | Executes the python3 healthcheck. | diff --git a/charts/janssen/charts/link/values.yaml b/charts/janssen/charts/link/values.yaml index 07eb249bbfe..98d1542a3d6 100644 --- a/charts/janssen/charts/link/values.yaml +++ b/charts/janssen/charts/link/values.yaml @@ -31,7 +31,7 @@ image: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/link # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. diff --git a/charts/janssen/charts/nginx-ingress/Chart.yaml b/charts/janssen/charts/nginx-ingress/Chart.yaml index 09b42499c51..43beb7c60bf 100644 --- a/charts/janssen/charts/nginx-ingress/Chart.yaml +++ b/charts/janssen/charts/nginx-ingress/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: nginx-ingress -version: 1.3.0 +version: 0.0.0-nightly kubeVersion: ">=v1.22.0-0" description: Nginx ingress definitions chart type: application @@ -17,4 +17,4 @@ maintainers: email: support@jans.io url: https://github.com/moabu icon: https://github.com/JanssenProject/jans/raw/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png -appVersion: "1.3.0" +appVersion: "0.0.0-nightly" diff --git a/charts/janssen/charts/nginx-ingress/README.md b/charts/janssen/charts/nginx-ingress/README.md index 5ad15595f88..f65059771b7 100644 --- a/charts/janssen/charts/nginx-ingress/README.md +++ b/charts/janssen/charts/nginx-ingress/README.md @@ -1,6 +1,6 @@ # nginx-ingress -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) Nginx ingress definitions chart diff --git a/charts/janssen/charts/persistence/Chart.yaml b/charts/janssen/charts/persistence/Chart.yaml index cfcbfc77e81..6528003477d 100644 --- a/charts/janssen/charts/persistence/Chart.yaml +++ b/charts/janssen/charts/persistence/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: persistence -version: 1.3.0 +version: 0.0.0-nightly kubeVersion: ">=v1.22.0-0" description: Job to generate data and initial config for Janssen Server persistence layer. type: application @@ -15,5 +15,5 @@ maintainers: email: support@jans.io url: https://github.com/moabu icon: https://github.com/JanssenProject/jans/raw/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png -appVersion: "1.3.0" +appVersion: "0.0.0-nightly" diff --git a/charts/janssen/charts/persistence/README.md b/charts/janssen/charts/persistence/README.md index b1abce75d77..85b30cf685e 100644 --- a/charts/janssen/charts/persistence/README.md +++ b/charts/janssen/charts/persistence/README.md @@ -1,6 +1,6 @@ # persistence -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) Job to generate data and initial config for Janssen Server persistence layer. @@ -34,7 +34,7 @@ Kubernetes: `>=v1.22.0-0` | image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | image.pullSecrets | list | `[]` | Image Pull Secrets | | image.repository | string | `"janssenproject/persistence"` | Image to use for deploying. | -| image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | imagePullSecrets | list | `[]` | | | lifecycle | object | `{}` | | | nameOverride | string | `""` | | diff --git a/charts/janssen/charts/persistence/values.yaml b/charts/janssen/charts/persistence/values.yaml index 9c26a2ec6a2..78735cbfa19 100644 --- a/charts/janssen/charts/persistence/values.yaml +++ b/charts/janssen/charts/persistence/values.yaml @@ -18,7 +18,7 @@ image: # -- Image to use for deploying. repository: janssenproject/persistence # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Resource specs. diff --git a/charts/janssen/charts/saml/Chart.yaml b/charts/janssen/charts/saml/Chart.yaml index 36d147c89e0..4b9c55d9b7e 100644 --- a/charts/janssen/charts/saml/Chart.yaml +++ b/charts/janssen/charts/saml/Chart.yaml @@ -1,6 +1,6 @@ apiVersion: v2 name: saml -version: 1.3.0 +version: 0.0.0-nightly kubeVersion: ">=v1.21.0-0" description: Jans SAML type: application @@ -15,4 +15,4 @@ maintainers: email: support@jans.io url: https://github.com/moabu icon: https://github.com/JanssenProject/jans/raw/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png -appVersion: "1.3.0" +appVersion: "0.0.0-nightly" diff --git a/charts/janssen/charts/saml/README.md b/charts/janssen/charts/saml/README.md index 070e11f5259..0659af4fe85 100644 --- a/charts/janssen/charts/saml/README.md +++ b/charts/janssen/charts/saml/README.md @@ -1,6 +1,6 @@ # saml -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) Jans SAML @@ -37,7 +37,7 @@ Kubernetes: `>=v1.21.0-0` | image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | image.pullSecrets | list | `[]` | Image Pull Secrets | | image.repository | string | `"janssenproject/saml"` | Image to use for deploying. | -| image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | lifecycle | object | `{}` | | | livenessProbe | object | `{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"failureThreshold":10,"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for saml if needed. | | livenessProbe.exec | object | `{"command":["python3","/app/scripts/healthcheck.py"]}` | Executes the python3 healthcheck. | diff --git a/charts/janssen/charts/saml/values.yaml b/charts/janssen/charts/saml/values.yaml index 1849f7a9499..dd888b2c947 100644 --- a/charts/janssen/charts/saml/values.yaml +++ b/charts/janssen/charts/saml/values.yaml @@ -27,7 +27,7 @@ image: # -- Image to use for deploying. repository: janssenproject/saml # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. diff --git a/charts/janssen/charts/scim/Chart.yaml b/charts/janssen/charts/scim/Chart.yaml index dc26dd046b1..22d24108aae 100644 --- a/charts/janssen/charts/scim/Chart.yaml +++ b/charts/janssen/charts/scim/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: scim -version: 1.3.0 +version: 0.0.0-nightly kubeVersion: ">=v1.22.0-0" description: System for Cross-domain Identity Management (SCIM) version 2.0 type: application @@ -17,4 +17,4 @@ maintainers: email: support@jans.io url: https://github.com/moabu icon: https://github.com/JanssenProject/jans/raw/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png -appVersion: "1.3.0" +appVersion: "0.0.0-nightly" diff --git a/charts/janssen/charts/scim/README.md b/charts/janssen/charts/scim/README.md index 29b544ee89f..906e70cf1a5 100644 --- a/charts/janssen/charts/scim/README.md +++ b/charts/janssen/charts/scim/README.md @@ -1,6 +1,6 @@ # scim -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) System for Cross-domain Identity Management (SCIM) version 2.0 @@ -37,7 +37,7 @@ Kubernetes: `>=v1.22.0-0` | image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | image.pullSecrets | list | `[]` | Image Pull Secrets | | image.repository | string | `"janssenproject/scim"` | Image to use for deploying. | -| image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | lifecycle | object | `{}` | | | livenessProbe | object | `{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for SCIM if needed. | | livenessProbe.httpGet.path | string | `"/jans-scim/sys/health-check"` | http liveness probe endpoint | diff --git a/charts/janssen/charts/scim/values.yaml b/charts/janssen/charts/scim/values.yaml index 386d6569af5..d27dbf2824a 100644 --- a/charts/janssen/charts/scim/values.yaml +++ b/charts/janssen/charts/scim/values.yaml @@ -28,7 +28,7 @@ image: # -- Image to use for deploying. repository: janssenproject/scim # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. diff --git a/charts/janssen/values.yaml b/charts/janssen/values.yaml index e44ff4e3404..edecfe88d4f 100644 --- a/charts/janssen/values.yaml +++ b/charts/janssen/values.yaml @@ -47,7 +47,7 @@ auth-server: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/auth-server # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. @@ -126,7 +126,7 @@ auth-server-key-rotation: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/certmanager # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Auth server key rotation keys life in hours @@ -326,7 +326,7 @@ config: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/configurator # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Organization name. Used for certificate creation. @@ -420,7 +420,7 @@ config-api: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/config-api # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. @@ -525,7 +525,7 @@ fido2: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/fido2 # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. @@ -635,7 +635,7 @@ casa: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/casa # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. @@ -1254,7 +1254,7 @@ persistence: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/persistence-loader # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Resource specs. @@ -1340,7 +1340,7 @@ scim: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/scim # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. @@ -1450,7 +1450,7 @@ link: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/link # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. @@ -1559,7 +1559,7 @@ saml: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/saml # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Service replica number. @@ -1640,7 +1640,7 @@ kc-scheduler: # -- Image to use for deploying. repository: ghcr.io/janssenproject/jans/kc-scheduler # -- Image tag to use for deploying. - tag: 1.3.0-1 + tag: 0.0.0-nightly # -- Image Pull Secrets pullSecrets: [ ] # -- Resource specs. diff --git a/demos/benchmarking/docker-jans-loadtesting-jmeter/Dockerfile b/demos/benchmarking/docker-jans-loadtesting-jmeter/Dockerfile index c39a99fa6d4..ac11e837321 100644 --- a/demos/benchmarking/docker-jans-loadtesting-jmeter/Dockerfile +++ b/demos/benchmarking/docker-jans-loadtesting-jmeter/Dockerfile @@ -61,7 +61,7 @@ RUN mkdir -p /root/.bzt/jmeter-taurus \ LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/loadtesting-jmeter" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen Jmeter tests" \ org.opencontainers.image.description="Janssen Jmeter and user loader image" diff --git a/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-test/load_test_auth_code.yaml b/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-test/load_test_auth_code.yaml index a6042708ed8..9eec0d7837b 100644 --- a/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-test/load_test_auth_code.yaml +++ b/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-test/load_test_auth_code.yaml @@ -36,7 +36,7 @@ spec: - envFrom: - configMapRef: name: load-test-authz-cm - image: ghcr.io/janssenproject/jans/loadtesting-jmeter:1.3.0-1 + image: ghcr.io/janssenproject/jans/loadtesting-jmeter:0.0.0-nightly imagePullPolicy: Always name: load-test-authz resources: diff --git a/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-test/load_test_dcr.yaml b/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-test/load_test_dcr.yaml index 6c61c91f750..d1c331290e8 100644 --- a/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-test/load_test_dcr.yaml +++ b/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-test/load_test_dcr.yaml @@ -34,7 +34,7 @@ spec: - envFrom: - configMapRef: name: load-test-dcr-cm - image: ghcr.io/janssenproject/jans/loadtesting-jmeter:1.3.0-1 + image: ghcr.io/janssenproject/jans/loadtesting-jmeter:0.0.0-nightly imagePullPolicy: Always name: load-test-dcr resources: diff --git a/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-test/load_test_ropc.yaml b/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-test/load_test_ropc.yaml index 7f9f4fc813e..56a6504bf2d 100644 --- a/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-test/load_test_ropc.yaml +++ b/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-test/load_test_ropc.yaml @@ -36,7 +36,7 @@ spec: - envFrom: - configMapRef: name: load-testing-ropc-cm - image: ghcr.io/janssenproject/jans/loadtesting-jmeter:1.3.0-1 + image: ghcr.io/janssenproject/jans/loadtesting-jmeter:0.0.0-nightly imagePullPolicy: Always name: load-testing-ropc resources: diff --git a/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-users/load_users_rdbms_job.yaml b/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-users/load_users_rdbms_job.yaml index 6add0d4908f..02525c0b4de 100644 --- a/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-users/load_users_rdbms_job.yaml +++ b/demos/benchmarking/docker-jans-loadtesting-jmeter/yaml/load-users/load_users_rdbms_job.yaml @@ -34,7 +34,7 @@ spec: - envFrom: - configMapRef: name: load-users-mysql-cm - image: ghcr.io/janssenproject/jans/loadtesting-jmeter:1.3.0-1 + image: ghcr.io/janssenproject/jans/loadtesting-jmeter:0.0.0-nightly name: load-users-mysql resources: limits: diff --git a/demos/jans-tarp/package.json b/demos/jans-tarp/package.json index 39a28de664b..5fe6b4f5abd 100644 --- a/demos/jans-tarp/package.json +++ b/demos/jans-tarp/package.json @@ -1,6 +1,6 @@ { "name": "jans-tarp", - "version": "1.3.0", + "version": "0.0.0", "description": "Relying Party tool in form of a Chrome Extension.", "main": "index.js", "license": "Apache", diff --git a/demos/jans-tarp/src/static/chrome/manifest.json b/demos/jans-tarp/src/static/chrome/manifest.json index 99ebfbff5be..3d66b11539d 100644 --- a/demos/jans-tarp/src/static/chrome/manifest.json +++ b/demos/jans-tarp/src/static/chrome/manifest.json @@ -1,7 +1,7 @@ { "manifest_version": 3, "name": "jans-tarp", - "version": "1.3.0", + "version": "0.0.0", "version_name": "nightly", "description": "Relying Party tool in form of a Chrome Extension. Please note that the manifest version field should be one to four dot-separated integers identifying the version of this extension. The descriptive version string can be stated in the `version_name` field. For more details see https://developer.chrome.com/docs/extensions/reference/manifest/version.", "icons": { diff --git a/demos/jans-tarp/src/static/firefox/manifest.json b/demos/jans-tarp/src/static/firefox/manifest.json index 5361a2aa467..3616b23f980 100644 --- a/demos/jans-tarp/src/static/firefox/manifest.json +++ b/demos/jans-tarp/src/static/firefox/manifest.json @@ -1,7 +1,7 @@ { "manifest_version": 3, "name": "jans-tarp", - "version": "1.3.0", + "version": "0.0.0", "description": "Relying Party tool in form of a Firefox Extension.", "icons": { "16": "icon.png", diff --git a/docker-jans-all-in-one/Dockerfile b/docker-jans-all-in-one/Dockerfile index 3f7383b4397..238dd45daaf 100644 --- a/docker-jans-all-in-one/Dockerfile +++ b/docker-jans-all-in-one/Dockerfile @@ -3,7 +3,7 @@ # ============== # original Janssen base version -ARG BASE_VERSION=1.3.0-1 +ARG BASE_VERSION=0.0.0-nightly # the following ARGs set default base images # they can be overriden in build process via --build-arg option @@ -178,7 +178,7 @@ RUN mkdir -p /opt/jans/configurator/db \ COPY app /app # CN version as env var (with suffix if any, i.e. SNAPSHOT) -ENV CN_VERSION=1.3.0 +ENV CN_VERSION=0.0.0-nightly # set directory contains installer code that will be added to Python sys.path ENV PYTHONPATH=/app @@ -235,7 +235,7 @@ ENV JETTY_BASE=/opt/jans/jetty \ LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/all-in-one" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen All-in-One" \ org.opencontainers.image.description="" diff --git a/docker-jans-auth-server/Dockerfile b/docker-jans-auth-server/Dockerfile index b95f8b559b6..9db3237ae49 100644 --- a/docker-jans-auth-server/Dockerfile +++ b/docker-jans-auth-server/Dockerfile @@ -50,7 +50,7 @@ RUN /opt/jython/bin/pip uninstall -y pip setuptools # Auth server # =========== -ENV CN_VERSION=1.3.0 +ENV CN_VERSION=0.0.0-nightly ENV CN_BUILD_DATE='2025-01-13 16:11' ENV CN_SOURCE_URL=https://jenkins.jans.io/maven/io/jans/jans-auth-server/${CN_VERSION}/jans-auth-server-${CN_VERSION}.war @@ -245,7 +245,7 @@ EXPOSE $CN_AUTH_JETTY_PORT LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/auth-server" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen Authorization Server" \ org.opencontainers.image.description="OAuth 2.0 server and client; OpenID Connect Provider (OP) & UMA Authorization Server (AS)" diff --git a/docker-jans-casa/Dockerfile b/docker-jans-casa/Dockerfile index 199601cd6e2..106df3ddb5e 100644 --- a/docker-jans-casa/Dockerfile +++ b/docker-jans-casa/Dockerfile @@ -29,7 +29,7 @@ RUN wget -q https://repo1.maven.org/maven2/org/eclipse/jetty/jetty-home/${JETTY_ # Casa # ==== -ENV CN_VERSION=1.3.0 +ENV CN_VERSION=0.0.0-nightly ENV CN_BUILD_DATE='2024-12-20 09:16' ENV CN_SOURCE_URL=https://jenkins.jans.io/maven/io/jans/casa/${CN_VERSION}/casa-${CN_VERSION}.war @@ -206,7 +206,7 @@ EXPOSE $CN_CASA_JETTY_PORT LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/casa" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen Casa" \ org.opencontainers.image.description="Self-service portal for people to manage their account security preferences in the Janssen, like 2FA" diff --git a/docker-jans-certmanager/Dockerfile b/docker-jans-certmanager/Dockerfile index fefb30cda55..97e03c661af 100644 --- a/docker-jans-certmanager/Dockerfile +++ b/docker-jans-certmanager/Dockerfile @@ -14,7 +14,7 @@ RUN apk update \ # =========== # JAR files required to generate OpenID Connect keys -ENV CN_VERSION=1.3.0 +ENV CN_VERSION=0.0.0-nightly ENV CN_BUILD_DATE='2024-12-20 08:29' ENV CN_SOURCE_URL=https://jenkins.jans.io/maven/io/jans/jans-auth-client/${CN_VERSION}/jans-auth-client-${CN_VERSION}-jar-with-dependencies.jar @@ -130,7 +130,7 @@ ENV CN_WAIT_MAX_TIME=300 \ LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/certmanager" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen Certmanager" \ org.opencontainers.image.description="Manage certs and crypto keys for Janssen Server" diff --git a/docker-jans-certmanager/README.md b/docker-jans-certmanager/README.md index f835942ca00..adb12653d6a 100644 --- a/docker-jans-certmanager/README.md +++ b/docker-jans-certmanager/README.md @@ -186,7 +186,7 @@ spec: spec: containers: - name: auth-key-rotation - image: ghcr.io/janssenproject/jans/certmanager:1.3.0-1 + image: ghcr.io/janssenproject/jans/certmanager:0.0.0-nightly resources: requests: memory: "300Mi" diff --git a/docker-jans-config-api/Dockerfile b/docker-jans-config-api/Dockerfile index b3c075f2ba8..c2605485b3a 100644 --- a/docker-jans-config-api/Dockerfile +++ b/docker-jans-config-api/Dockerfile @@ -40,7 +40,7 @@ RUN wget -q https://maven.jans.io/maven/io/jans/jython-installer/${JYTHON_VERSIO # Config API # ========== -ENV CN_VERSION=1.3.0 +ENV CN_VERSION=0.0.0-nightly ENV CN_BUILD_DATE='2024-12-20 09:07' ENV CN_SOURCE_URL=https://jenkins.jans.io/maven/io/jans/jans-config-api-server/${CN_VERSION}/jans-config-api-server-${CN_VERSION}.war @@ -223,7 +223,7 @@ EXPOSE $CN_CONFIG_API_JETTY_PORT LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/config-api" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen Config API" \ org.opencontainers.image.description="" diff --git a/docker-jans-configurator/Dockerfile b/docker-jans-configurator/Dockerfile index e606a4fcaea..8ada80d9715 100644 --- a/docker-jans-configurator/Dockerfile +++ b/docker-jans-configurator/Dockerfile @@ -15,7 +15,7 @@ RUN apk update \ # JAR files required to generate OpenID Connect keys -ENV CN_VERSION=1.3.0 +ENV CN_VERSION=0.0.0-nightly ENV CN_BUILD_DATE='2024-12-20 08:29' ENV CN_SOURCE_URL=https://jenkins.jans.io/maven/io/jans/jans-auth-client/${CN_VERSION}/jans-auth-client-${CN_VERSION}-jar-with-dependencies.jar @@ -125,7 +125,7 @@ ENV CN_WAIT_MAX_TIME=300 \ LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/configurator" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen Configuration Manager" \ org.opencontainers.image.description="Manage config and secret" diff --git a/docker-jans-fido2/Dockerfile b/docker-jans-fido2/Dockerfile index 62c4e839e01..e045c9c1560 100644 --- a/docker-jans-fido2/Dockerfile +++ b/docker-jans-fido2/Dockerfile @@ -41,7 +41,7 @@ RUN wget -q https://maven.jans.io/maven/io/jans/jython-installer/${JYTHON_VERSIO # ===== -ENV CN_VERSION=1.3.0 +ENV CN_VERSION=0.0.0-nightly ENV CN_BUILD_DATE='2024-12-20 11:02' ENV CN_SOURCE_URL=https://jenkins.jans.io/maven/io/jans/jans-fido2-server/${CN_VERSION}/jans-fido2-server-${CN_VERSION}.war @@ -209,7 +209,7 @@ EXPOSE $CN_FIDO2_JETTY_PORT LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/fido2" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen FIDO2" \ org.opencontainers.image.description="FIDO2 server" diff --git a/docker-jans-kc-scheduler/Dockerfile b/docker-jans-kc-scheduler/Dockerfile index 5b1135dd0c7..d61a326457d 100644 --- a/docker-jans-kc-scheduler/Dockerfile +++ b/docker-jans-kc-scheduler/Dockerfile @@ -13,7 +13,7 @@ RUN apk update \ # KC scheduler # ============ -ENV CN_VERSION=1.3.0 +ENV CN_VERSION=0.0.0-nightly ENV CN_BUILD_DATE='2024-12-20 09:15' ENV SCHEDULER_HOME=/opt/kc-scheduler @@ -139,7 +139,7 @@ EXPOSE $CN_SAML_HTTP_PORT LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/kc-scheduler" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen KC scheduler" \ org.opencontainers.image.description="" diff --git a/docker-jans-keycloak-link/Dockerfile b/docker-jans-keycloak-link/Dockerfile index 3cd9c64fd20..86d0ae7e80c 100644 --- a/docker-jans-keycloak-link/Dockerfile +++ b/docker-jans-keycloak-link/Dockerfile @@ -41,7 +41,7 @@ RUN wget -q https://maven.jans.io/maven/io/jans/jython-installer/${JYTHON_VERSIO # ======= -ENV CN_VERSION=1.3.0 +ENV CN_VERSION=0.0.0-nightly ENV CN_BUILD_DATE='2024-12-20 09:05' ENV CN_SOURCE_URL=https://jenkins.jans.io/maven/io/jans/jans-keycloak-link-server/${CN_VERSION}/jans-keycloak-link-server-${CN_VERSION}.war @@ -202,7 +202,7 @@ EXPOSE $CN_KEYCLOAK_LINK_JETTY_PORT LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/keycloak-link" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen Keycloak Link" \ org.opencontainers.image.description="" diff --git a/docker-jans-link/Dockerfile b/docker-jans-link/Dockerfile index f0fa8b23719..177ac163251 100644 --- a/docker-jans-link/Dockerfile +++ b/docker-jans-link/Dockerfile @@ -41,7 +41,7 @@ RUN wget -q https://maven.jans.io/maven/io/jans/jython-installer/${JYTHON_VERSIO # ==== -ENV CN_VERSION=1.3.0 +ENV CN_VERSION=0.0.0-nightly ENV CN_BUILD_DATE='2024-12-20 08:56' ENV CN_SOURCE_URL=https://jenkins.jans.io/maven/io/jans/jans-link-server/${CN_VERSION}/jans-link-server-${CN_VERSION}.war @@ -202,7 +202,7 @@ EXPOSE $CN_LINK_JETTY_PORT LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/link" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen Link" \ org.opencontainers.image.description="" diff --git a/docker-jans-monolith/Dockerfile b/docker-jans-monolith/Dockerfile index 25ab0018e30..b69652e66f1 100644 --- a/docker-jans-monolith/Dockerfile +++ b/docker-jans-monolith/Dockerfile @@ -92,7 +92,7 @@ ENV CN_HOSTNAME="demoexample.jans.io" \ LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/monolith" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen Monolith Image" \ org.opencontainers.image.description="Janssen Authorization server" diff --git a/docker-jans-monolith/clean.sh b/docker-jans-monolith/clean.sh index ff9bbd47109..96b650b521a 100644 --- a/docker-jans-monolith/clean.sh +++ b/docker-jans-monolith/clean.sh @@ -23,7 +23,7 @@ if [ -z "$INSTALLED_JANSSEN_NAME" ]; then fi if [ -z "$JANSSEN_VERSION" ]; then - JANSSEN_VERSION="1.3.0-1" + JANSSEN_VERSION="0.0.0-nightly" fi if [ -z "$DATABASE_VOLUME_NAME" ]; then diff --git a/docker-jans-monolith/down.sh b/docker-jans-monolith/down.sh index 2b2b921507d..d1af54d8a61 100644 --- a/docker-jans-monolith/down.sh +++ b/docker-jans-monolith/down.sh @@ -23,7 +23,7 @@ if [ -z "$INSTALLED_JANSSEN_NAME" ]; then fi if [ -z "$JANSSEN_VERSION" ]; then - JANSSEN_VERSION="1.3.0-1" + JANSSEN_VERSION="0.0.0-nightly" fi if [ -z "$JANSSEN_SERVICE_NAME" ]; then diff --git a/docker-jans-monolith/jans-mysql-compose.yml b/docker-jans-monolith/jans-mysql-compose.yml index 95708ffbc0e..07a4d639d67 100644 --- a/docker-jans-monolith/jans-mysql-compose.yml +++ b/docker-jans-monolith/jans-mysql-compose.yml @@ -16,7 +16,7 @@ services: - MYSQL_PASSWORD=1t5Fin3#security - MYSQL_ROOT_PASSWORD=1t5Fin3#security jans: - image: ${JANSSEN_IMAGE:-ghcr.io/janssenproject/jans/monolith:1.3.0-1} + image: ${JANSSEN_IMAGE:-ghcr.io/janssenproject/jans/monolith:0.0.0-nightly} restart: always ports: - "443:443" diff --git a/docker-jans-monolith/jans-postgres-compose.yml b/docker-jans-monolith/jans-postgres-compose.yml index 891a496cada..c7707f0a342 100644 --- a/docker-jans-monolith/jans-postgres-compose.yml +++ b/docker-jans-monolith/jans-postgres-compose.yml @@ -14,7 +14,7 @@ services: POSTGRES_PASSWORD: 1t5Fin3#security POSTGRES_DB: jans jans: - image: ${JANSSEN_IMAGE:-ghcr.io/janssenproject/jans/monolith:1.3.0-1} + image: ${JANSSEN_IMAGE:-ghcr.io/janssenproject/jans/monolith:0.0.0-nightly} restart: always ports: - "443:443" diff --git a/docker-jans-monolith/up.sh b/docker-jans-monolith/up.sh index e5a6170a651..7dd0eb8cff8 100644 --- a/docker-jans-monolith/up.sh +++ b/docker-jans-monolith/up.sh @@ -23,7 +23,7 @@ if [ -z "$INSTALLED_JANSSEN_NAME" ]; then fi if [ -z "$JANSSEN_VERSION" ]; then - JANSSEN_VERSION="1.3.0-1" + JANSSEN_VERSION="0.0.0-nightly" fi if [ -z "$DATABASE_VOLUME_NAME" ]; then diff --git a/docker-jans-persistence-loader/Dockerfile b/docker-jans-persistence-loader/Dockerfile index 675ea717070..3610c6f26c7 100644 --- a/docker-jans-persistence-loader/Dockerfile +++ b/docker-jans-persistence-loader/Dockerfile @@ -159,7 +159,7 @@ ENV CN_CACHE_TYPE=NATIVE_PERSISTENCE \ LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/persistence-loader" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen Authorization Server Persistence loader" \ org.opencontainers.image.description="Generate initial data for persistence layer" diff --git a/docker-jans-saml/Dockerfile b/docker-jans-saml/Dockerfile index ce66e05ed61..d2144790ace 100644 --- a/docker-jans-saml/Dockerfile +++ b/docker-jans-saml/Dockerfile @@ -23,7 +23,7 @@ RUN mkdir -p /opt/keycloak/logs \ # KC integration # ============== -ENV CN_VERSION=1.3.0 +ENV CN_VERSION=0.0.0-nightly ENV CN_BUILD_DATE='2024-12-20 09:15' RUN wget -q https://jenkins.jans.io/maven/io/jans/kc-jans-spi/${CN_VERSION}/kc-jans-spi-${CN_VERSION}.jar -P /opt/keycloak/providers \ @@ -173,7 +173,7 @@ EXPOSE $CN_SAML_HTTP_PORT LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/saml" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen SAML" \ org.opencontainers.image.description="" diff --git a/docker-jans-scim/Dockerfile b/docker-jans-scim/Dockerfile index 9ff848d9f88..bf0d1135616 100644 --- a/docker-jans-scim/Dockerfile +++ b/docker-jans-scim/Dockerfile @@ -40,7 +40,7 @@ RUN wget -q https://maven.jans.io/maven/io/jans/jython-installer/${JYTHON_VERSIO # SCIM # ==== -ENV CN_VERSION=1.3.0 +ENV CN_VERSION=0.0.0-nightly ENV CN_BUILD_DATE='2024-12-20 10:33' ENV CN_SOURCE_URL=https://jenkins.jans.io/maven/io/jans/jans-scim-server/${CN_VERSION}/jans-scim-server-${CN_VERSION}.war @@ -204,7 +204,7 @@ EXPOSE $CN_SCIM_JETTY_PORT LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/scim" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="Janssen SCIM" \ org.opencontainers.image.description="SCIM server" diff --git a/docs/agama-catalog/jans/inboundID/project/project.json b/docs/agama-catalog/jans/inboundID/project/project.json index f06e2f76819..2ff995479db 100644 --- a/docs/agama-catalog/jans/inboundID/project/project.json +++ b/docs/agama-catalog/jans/inboundID/project/project.json @@ -2,7 +2,7 @@ "projectName": "agama-inbound-oauth", "author": "jgomer2001", "type": "Community", - "version": "1.3.0", + "version": "0.0.0-nightly", "description": "A project useful to delegate authorization to external services like social sites", "noDirectLaunch": [ "io.jans.inbound.Apple", "io.jans.inbound.GenericProvider", "io.jans.inbound.oauth2.AuthzCode", "io.jans.inbound.oauth2.AuthzCodeWithUserInfo" ], "configs": { diff --git a/docs/cedarling/cedarling-sidecar.md b/docs/cedarling/cedarling-sidecar.md index 6a3647a0fc6..5f34d647c67 100644 --- a/docs/cedarling/cedarling-sidecar.md +++ b/docs/cedarling/cedarling-sidecar.md @@ -15,7 +15,7 @@ The sidecar is a containerized Flask project that uses the `cedarling_python` bi - Modify the bootstrap file to your specifications. In particular you need to provide a link to your policy store in `CEDARLING_POLICY_STORE_URI`. The configuration keys are described [here](https://github.com/JanssenProject/jans/blob/main/jans-cedarling/bindings/cedarling_python/cedarling_python.pyi#L10). - Pull the docker image: ``` - docker pull ghcr.io/janssenproject/jans/cedarling-flask-sidecar:1.3.0-1 + docker pull ghcr.io/janssenproject/jans/cedarling-flask-sidecar:0.0.0-nightly ``` - Run the docker image, replacing `` with the absolute path to your bootstrap file: @@ -26,7 +26,7 @@ The sidecar is a containerized Flask project that uses the `cedarling_python` bi -e SIDECAR_DEBUG_RESPONSE=False \ --mount type=bind,src=,dst=/bootstrap.json \ -p 5000:5000\ - ghcr.io/janssenproject/jans/cedarling-flask-sidecar:1.3.0-1 + ghcr.io/janssenproject/jans/cedarling-flask-sidecar:0.0.0-nightly ``` - `SIDECAR_DEBUG_RESPONSE` is an option that will cause the sidecar to return extra diagnostic information for each query if set to `True`. This may be useful to check which policies are being used to reach a decision. diff --git a/docs/janssen-server/reference/kubernetes/docker-jans-certmanager.md b/docs/janssen-server/reference/kubernetes/docker-jans-certmanager.md index f835942ca00..adb12653d6a 100644 --- a/docs/janssen-server/reference/kubernetes/docker-jans-certmanager.md +++ b/docs/janssen-server/reference/kubernetes/docker-jans-certmanager.md @@ -186,7 +186,7 @@ spec: spec: containers: - name: auth-key-rotation - image: ghcr.io/janssenproject/jans/certmanager:1.3.0-1 + image: ghcr.io/janssenproject/jans/certmanager:0.0.0-nightly resources: requests: memory: "300Mi" diff --git a/docs/janssen-server/reference/kubernetes/helm-chart.md b/docs/janssen-server/reference/kubernetes/helm-chart.md index 45a843062a3..55b13627ecd 100644 --- a/docs/janssen-server/reference/kubernetes/helm-chart.md +++ b/docs/janssen-server/reference/kubernetes/helm-chart.md @@ -6,7 +6,7 @@ tags: --- # janssen -![Version: 1.3.0](https://img.shields.io/badge/Version-1.3.0-informational?style=flat-square) ![AppVersion: 1.3.0](https://img.shields.io/badge/AppVersion-1.3.0-informational?style=flat-square) +![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square) Janssen Access and Identity Management Microservices Chart. This chart deploys each janssen microservice as a separate deployment. @@ -29,26 +29,26 @@ Kubernetes: `>=v1.22.0-0` | Repository | Name | Version | |------------|------|---------| -| | auth-server | 1.3.0 | -| | auth-server-key-rotation | 1.3.0 | -| | casa | 1.3.0 | -| | cn-istio-ingress | 1.3.0 | -| | config | 1.3.0 | -| | config-api | 1.3.0 | -| | fido2 | 1.3.0 | -| | kc-scheduler | 1.3.0 | -| | link | 1.3.0 | -| | nginx-ingress | 1.3.0 | -| | persistence | 1.3.0 | -| | saml | 1.3.0 | -| | scim | 1.3.0 | +| | auth-server | 0.0.0-nightly | +| | auth-server-key-rotation | 0.0.0-nightly | +| | casa | 0.0.0-nightly | +| | cn-istio-ingress | 0.0.0-nightly | +| | config | 0.0.0-nightly | +| | config-api | 0.0.0-nightly | +| | fido2 | 0.0.0-nightly | +| | kc-scheduler | 0.0.0-nightly | +| | link | 0.0.0-nightly | +| | nginx-ingress | 0.0.0-nightly | +| | persistence | 0.0.0-nightly | +| | saml | 0.0.0-nightly | +| | scim | 0.0.0-nightly | ## Values | Key | Type | Default | Description | |-----|------|---------|-------------| -| auth-server | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/auth-server","tag":"1.3.0-1"},"lifecycle":{},"livenessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"2500m","memory":"2500Mi"},"requests":{"cpu":"2500m","memory":"2500Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | OAuth Authorization Server, the OpenID Connect Provider, the UMA Authorization Server--this is the main Internet facing component of Janssen. It's the service that returns tokens, JWT's and identity assertions. This service must be Internet facing. | -| auth-server-key-rotation | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/certmanager","tag":"1.3.0-1"},"keysLife":48,"keysPushDelay":0,"keysPushStrategy":"NEWER","keysStrategy":"NEWER","lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for regenerating auth-keys per x hours | +| auth-server | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/auth-server","tag":"0.0.0-nightly"},"lifecycle":{},"livenessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"2500m","memory":"2500Mi"},"requests":{"cpu":"2500m","memory":"2500Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | OAuth Authorization Server, the OpenID Connect Provider, the UMA Authorization Server--this is the main Internet facing component of Janssen. It's the service that returns tokens, JWT's and identity assertions. This service must be Internet facing. | +| auth-server-key-rotation | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/certmanager","tag":"0.0.0-nightly"},"keysLife":48,"keysPushDelay":0,"keysPushStrategy":"NEWER","keysStrategy":"NEWER","lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for regenerating auth-keys per x hours | | auth-server-key-rotation.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | auth-server-key-rotation.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | auth-server-key-rotation.customCommand | list | `[]` | Add custom job's command. If passed, it will override the default conditional command. | @@ -58,7 +58,7 @@ Kubernetes: `>=v1.22.0-0` | auth-server-key-rotation.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | auth-server-key-rotation.image.pullSecrets | list | `[]` | Image Pull Secrets | | auth-server-key-rotation.image.repository | string | `"ghcr.io/janssenproject/jans/certmanager"` | Image to use for deploying. | -| auth-server-key-rotation.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| auth-server-key-rotation.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | auth-server-key-rotation.keysLife | int | `48` | Auth server key rotation keys life in hours | | auth-server-key-rotation.keysPushDelay | int | `0` | Delay (in seconds) before pushing private keys to Auth server | | auth-server-key-rotation.keysPushStrategy | string | `"NEWER"` | Set key selection strategy after pushing private keys to Auth server (only takes effect when keysPushDelay value is greater than 0) | @@ -85,7 +85,7 @@ Kubernetes: `>=v1.22.0-0` | auth-server.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | auth-server.image.pullSecrets | list | `[]` | Image Pull Secrets | | auth-server.image.repository | string | `"ghcr.io/janssenproject/jans/auth-server"` | Image to use for deploying. | -| auth-server.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| auth-server.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | auth-server.livenessProbe | object | `{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the auth server if needed. | | auth-server.livenessProbe.exec | object | `{"command":["python3","/app/scripts/healthcheck.py"]}` | Executes the python3 healthcheck. https://github.com/JanssenProject/docker-jans-auth-server/blob/master/scripts/healthcheck.py | | auth-server.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget | @@ -102,7 +102,7 @@ Kubernetes: `>=v1.22.0-0` | auth-server.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 | | auth-server.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers | | auth-server.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod | -| casa | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/casa","tag":"1.3.0-1"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-casa/health-check","port":"http-casa"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-casa/health-check","port":"http-casa"},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"500Mi"},"requests":{"cpu":"500m","memory":"500Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Janssen Casa ("Casa") is a self-service web portal for end-users to manage authentication and authorization preferences for their account in a Janssen Auth Server. | +| casa | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/casa","tag":"0.0.0-nightly"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-casa/health-check","port":"http-casa"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-casa/health-check","port":"http-casa"},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"500Mi"},"requests":{"cpu":"500m","memory":"500Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Janssen Casa ("Casa") is a self-service web portal for end-users to manage authentication and authorization preferences for their account in a Janssen Auth Server. | | casa.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | casa.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | casa.customCommand | list | `[]` | Add custom pod's command. If passed, it will override the default conditional command. | @@ -115,7 +115,7 @@ Kubernetes: `>=v1.22.0-0` | casa.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | casa.image.pullSecrets | list | `[]` | Image Pull Secrets | | casa.image.repository | string | `"ghcr.io/janssenproject/jans/casa"` | Image to use for deploying. | -| casa.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| casa.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | casa.livenessProbe | object | `{"httpGet":{"path":"/jans-casa/health-check","port":"http-casa"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5}` | Configure the liveness healthcheck for casa if needed. | | casa.livenessProbe.httpGet.path | string | `"/jans-casa/health-check"` | http liveness probe endpoint | | casa.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget | @@ -133,8 +133,8 @@ Kubernetes: `>=v1.22.0-0` | casa.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 | | casa.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers | | casa.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod | -| config | object | `{"additionalAnnotations":{},"additionalLabels":{},"adminPassword":"Test1234#","city":"Austin","configmap":{"cnAwsAccessKeyId":"","cnAwsDefaultRegion":"us-west-1","cnAwsProfile":"janssen","cnAwsSecretAccessKey":"","cnAwsSecretsEndpointUrl":"","cnAwsSecretsNamePrefix":"janssen","cnAwsSecretsReplicaRegions":[],"cnCacheType":"NATIVE_PERSISTENCE","cnConfigKubernetesConfigMap":"cn","cnGoogleProjectId":"google-project-to-save-config-and-secrets-to","cnGoogleSecretManagerServiceAccount":"SWFtTm90YVNlcnZpY2VBY2NvdW50Q2hhbmdlTWV0b09uZQo=","cnGoogleSecretNamePrefix":"janssen","cnGoogleSecretVersionId":"latest","cnJettyRequestHeaderSize":8192,"cnMaxRamPercent":"75.0","cnMessageType":"DISABLED","cnOpaUrl":"http://opa.opa.svc.cluster.cluster.local:8181/v1","cnPersistenceHybridMapping":"{}","cnRedisSentinelGroup":"","cnRedisSslTruststore":"","cnRedisType":"STANDALONE","cnRedisUrl":"redis.redis.svc.cluster.local:6379","cnRedisUseSsl":false,"cnScimProtectionMode":"OAUTH","cnSecretKubernetesSecret":"cn","cnSqlDbDialect":"mysql","cnSqlDbHost":"my-release-mysql.default.svc.cluster.local","cnSqlDbName":"jans","cnSqlDbPort":3306,"cnSqlDbSchema":"","cnSqlDbTimezone":"UTC","cnSqlDbUser":"jans","cnSqldbUserPassword":"Test1234#","cnVaultAddr":"http://localhost:8200","cnVaultAppRolePath":"approle","cnVaultKvPath":"secret","cnVaultNamespace":"","cnVaultPrefix":"jans","cnVaultRoleId":"","cnVaultRoleIdFile":"/etc/certs/vault_role_id","cnVaultSecretId":"","cnVaultSecretIdFile":"/etc/certs/vault_secret_id","cnVaultVerify":false,"kcAdminPassword":"Test1234#","kcAdminUsername":"admin","kcDbPassword":"Test1234#","kcDbSchema":"keycloak","kcDbUrlDatabase":"keycloak","kcDbUrlHost":"mysql.kc.svc.cluster.local","kcDbUrlPort":3306,"kcDbUrlProperties":"?useUnicode=true&characterEncoding=UTF-8&character_set_server=utf8mb4","kcDbUsername":"keycloak","kcDbVendor":"mysql","kcLogLevel":"INFO","lbAddr":"","quarkusTransactionEnableRecovery":true},"countryCode":"US","customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","email":"support@jans.io","image":{"pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/configurator","tag":"1.3.0-1"},"lifecycle":{},"orgName":"Janssen","redisPassword":"P@assw0rd","resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"salt":"","state":"TX","usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Configuration parameters for setup and initial configuration secret and config layers used by Janssen services. | -| config-api | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/config-api","tag":"1.3.0-1"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-config-api/api/v1/health/live","port":8074},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"jans-config-api/api/v1/health/ready","port":8074},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"1000m","memory":"1200Mi"},"requests":{"cpu":"1000m","memory":"1200Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Config Api endpoints can be used to configure the auth-server, which is an open-source OpenID Connect Provider (OP) and UMA Authorization Server (AS). | +| config | object | `{"additionalAnnotations":{},"additionalLabels":{},"adminPassword":"Test1234#","city":"Austin","configmap":{"cnAwsAccessKeyId":"","cnAwsDefaultRegion":"us-west-1","cnAwsProfile":"janssen","cnAwsSecretAccessKey":"","cnAwsSecretsEndpointUrl":"","cnAwsSecretsNamePrefix":"janssen","cnAwsSecretsReplicaRegions":[],"cnCacheType":"NATIVE_PERSISTENCE","cnConfigKubernetesConfigMap":"cn","cnGoogleProjectId":"google-project-to-save-config-and-secrets-to","cnGoogleSecretManagerServiceAccount":"SWFtTm90YVNlcnZpY2VBY2NvdW50Q2hhbmdlTWV0b09uZQo=","cnGoogleSecretNamePrefix":"janssen","cnGoogleSecretVersionId":"latest","cnJettyRequestHeaderSize":8192,"cnMaxRamPercent":"75.0","cnMessageType":"DISABLED","cnOpaUrl":"http://opa.opa.svc.cluster.cluster.local:8181/v1","cnPersistenceHybridMapping":"{}","cnRedisSentinelGroup":"","cnRedisSslTruststore":"","cnRedisType":"STANDALONE","cnRedisUrl":"redis.redis.svc.cluster.local:6379","cnRedisUseSsl":false,"cnScimProtectionMode":"OAUTH","cnSecretKubernetesSecret":"cn","cnSqlDbDialect":"mysql","cnSqlDbHost":"my-release-mysql.default.svc.cluster.local","cnSqlDbName":"jans","cnSqlDbPort":3306,"cnSqlDbSchema":"","cnSqlDbTimezone":"UTC","cnSqlDbUser":"jans","cnSqldbUserPassword":"Test1234#","cnVaultAddr":"http://localhost:8200","cnVaultAppRolePath":"approle","cnVaultKvPath":"secret","cnVaultNamespace":"","cnVaultPrefix":"jans","cnVaultRoleId":"","cnVaultRoleIdFile":"/etc/certs/vault_role_id","cnVaultSecretId":"","cnVaultSecretIdFile":"/etc/certs/vault_secret_id","cnVaultVerify":false,"kcAdminPassword":"Test1234#","kcAdminUsername":"admin","kcDbPassword":"Test1234#","kcDbSchema":"keycloak","kcDbUrlDatabase":"keycloak","kcDbUrlHost":"mysql.kc.svc.cluster.local","kcDbUrlPort":3306,"kcDbUrlProperties":"?useUnicode=true&characterEncoding=UTF-8&character_set_server=utf8mb4","kcDbUsername":"keycloak","kcDbVendor":"mysql","kcLogLevel":"INFO","lbAddr":"","quarkusTransactionEnableRecovery":true},"countryCode":"US","customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","email":"support@jans.io","image":{"pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/configurator","tag":"0.0.0-nightly"},"lifecycle":{},"orgName":"Janssen","redisPassword":"P@assw0rd","resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"salt":"","state":"TX","usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Configuration parameters for setup and initial configuration secret and config layers used by Janssen services. | +| config-api | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/config-api","tag":"0.0.0-nightly"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-config-api/api/v1/health/live","port":8074},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"jans-config-api/api/v1/health/ready","port":8074},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"1000m","memory":"1200Mi"},"requests":{"cpu":"1000m","memory":"1200Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Config Api endpoints can be used to configure the auth-server, which is an open-source OpenID Connect Provider (OP) and UMA Authorization Server (AS). | | config-api.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | config-api.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | config-api.customCommand | list | `[]` | Add custom pod's command. If passed, it will override the default conditional command. | @@ -147,7 +147,7 @@ Kubernetes: `>=v1.22.0-0` | config-api.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | config-api.image.pullSecrets | list | `[]` | Image Pull Secrets | | config-api.image.repository | string | `"ghcr.io/janssenproject/jans/config-api"` | Image to use for deploying. | -| config-api.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| config-api.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | config-api.livenessProbe | object | `{"httpGet":{"path":"/jans-config-api/api/v1/health/live","port":8074},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the auth server if needed. | | config-api.livenessProbe.httpGet | object | `{"path":"/jans-config-api/api/v1/health/live","port":8074}` | http liveness probe endpoint | | config-api.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget | @@ -224,7 +224,7 @@ Kubernetes: `>=v1.22.0-0` | config.email | string | `"support@jans.io"` | Email address of the administrator usually. Used for certificate creation. | | config.image.pullSecrets | list | `[]` | Image Pull Secrets | | config.image.repository | string | `"ghcr.io/janssenproject/jans/configurator"` | Image to use for deploying. | -| config.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| config.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | config.orgName | string | `"Janssen"` | Organization name. Used for certificate creation. | | config.redisPassword | string | `"P@assw0rd"` | Redis admin password if `config.configmap.cnCacheType` is set to `REDIS`. | | config.resources | object | `{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}}` | Resource specs. | @@ -239,7 +239,7 @@ Kubernetes: `>=v1.22.0-0` | config.usrEnvs.secret | object | `{}` | Add custom secret envs to the service. variable1: value1 | | config.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers | | config.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod | -| fido2 | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/fido2","tag":"1.3.0-1"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"500Mi"},"requests":{"cpu":"500m","memory":"500Mi"}},"service":{"name":"http-fido2","port":8080},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | FIDO 2.0 (FIDO2) is an open authentication standard that enables leveraging common devices to authenticate to online services in both mobile and desktop environments. | +| fido2 | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/fido2","tag":"0.0.0-nightly"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"500Mi"},"requests":{"cpu":"500m","memory":"500Mi"}},"service":{"name":"http-fido2","port":8080},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | FIDO 2.0 (FIDO2) is an open authentication standard that enables leveraging common devices to authenticate to online services in both mobile and desktop environments. | | fido2.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | fido2.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | fido2.customCommand | list | `[]` | Add custom pod's command. If passed, it will override the default conditional command. | @@ -252,7 +252,7 @@ Kubernetes: `>=v1.22.0-0` | fido2.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | fido2.image.pullSecrets | list | `[]` | Image Pull Secrets | | fido2.image.repository | string | `"ghcr.io/janssenproject/jans/fido2"` | Image to use for deploying. | -| fido2.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| fido2.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | fido2.livenessProbe | object | `{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5}` | Configure the liveness healthcheck for the fido2 if needed. | | fido2.livenessProbe.httpGet | object | `{"path":"/jans-fido2/sys/health-check","port":"http-fido2"}` | http liveness probe endpoint | | fido2.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget | @@ -462,7 +462,7 @@ Kubernetes: `>=v1.22.0-0` | global.usrEnvs | object | `{"normal":{},"secret":{}}` | Add custom normal and secret envs to the service. Envs defined in global.userEnvs will be globally available to all services | | global.usrEnvs.normal | object | `{}` | Add custom normal envs to the service. variable1: value1 | | global.usrEnvs.secret | object | `{}` | Add custom secret envs to the service. variable1: value1 | -| kc-scheduler | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/kc-scheduler","tag":"1.3.0-1"},"interval":10,"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for synchronizing Keycloak SAML clients | +| kc-scheduler | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/kc-scheduler","tag":"0.0.0-nightly"},"interval":10,"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for synchronizing Keycloak SAML clients | | kc-scheduler.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | kc-scheduler.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | kc-scheduler.customCommand | list | `[]` | Add custom job's command. If passed, it will override the default conditional command. | @@ -472,7 +472,7 @@ Kubernetes: `>=v1.22.0-0` | kc-scheduler.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | kc-scheduler.image.pullSecrets | list | `[]` | Image Pull Secrets | | kc-scheduler.image.repository | string | `"ghcr.io/janssenproject/jans/kc-scheduler"` | Image to use for deploying. | -| kc-scheduler.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| kc-scheduler.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | kc-scheduler.interval | int | `10` | Interval of running the scheduler (in minutes) | | kc-scheduler.resources | object | `{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}}` | Resource specs. | | kc-scheduler.resources.limits.cpu | string | `"300m"` | CPU limit. | @@ -484,7 +484,7 @@ Kubernetes: `>=v1.22.0-0` | kc-scheduler.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 | | kc-scheduler.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers | | kc-scheduler.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod | -| link | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/link","tag":"1.3.0-1"},"lifecycle":{},"livenessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"1200Mi"},"requests":{"cpu":"500m","memory":"1200Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Link. | +| link | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/link","tag":"0.0.0-nightly"},"lifecycle":{},"livenessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"1200Mi"},"requests":{"cpu":"500m","memory":"1200Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Link. | | link.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | link.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | link.customCommand | list | `[]` | Add custom pod's command. If passed, it will override the default conditional command. | @@ -497,7 +497,7 @@ Kubernetes: `>=v1.22.0-0` | link.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | link.image.pullSecrets | list | `[]` | Image Pull Secrets | | link.image.repository | string | `"ghcr.io/janssenproject/jans/link"` | Image to use for deploying. | -| link.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| link.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | link.livenessProbe | object | `{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the auth server if needed. | | link.livenessProbe.exec | object | `{"command":["python3","/app/scripts/healthcheck.py"]}` | http liveness probe endpoint | | link.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget | @@ -518,7 +518,7 @@ Kubernetes: `>=v1.22.0-0` | nginx-ingress.ingress.additionalAnnotations | object | `{}` | Additional annotations that will be added across all ingress definitions in the format of {cert-manager.io/issuer: "letsencrypt-prod"} Enable client certificate authentication nginx.ingress.kubernetes.io/auth-tls-verify-client: "optional" Create the secret containing the trusted ca certificates nginx.ingress.kubernetes.io/auth-tls-secret: "janssen/tls-certificate" Specify the verification depth in the client certificates chain nginx.ingress.kubernetes.io/auth-tls-verify-depth: "1" Specify if certificates are passed to upstream server nginx.ingress.kubernetes.io/auth-tls-pass-certificate-to-upstream: "true" | | nginx-ingress.ingress.additionalLabels | object | `{}` | Additional labels that will be added across all ingress definitions in the format of {mylabel: "myapp"} | | nginx-ingress.ingress.tls | list | `[{"hosts":["demoexample.jans.io"],"secretName":"tls-certificate"}]` | Secrets holding HTTPS CA cert and key. | -| persistence | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/persistence-loader","tag":"1.3.0-1"},"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Job to generate data and initial config for Janssen Server persistence layer. | +| persistence | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/persistence-loader","tag":"0.0.0-nightly"},"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Job to generate data and initial config for Janssen Server persistence layer. | | persistence.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | persistence.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | persistence.customCommand | list | `[]` | Add custom job's command. If passed, it will override the default conditional command. | @@ -528,7 +528,7 @@ Kubernetes: `>=v1.22.0-0` | persistence.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | persistence.image.pullSecrets | list | `[]` | Image Pull Secrets | | persistence.image.repository | string | `"ghcr.io/janssenproject/jans/persistence-loader"` | Image to use for deploying. | -| persistence.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| persistence.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | persistence.resources | object | `{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}}` | Resource specs. | | persistence.resources.limits.cpu | string | `"300m"` | CPU limit | | persistence.resources.limits.memory | string | `"300Mi"` | Memory limit. | @@ -539,7 +539,7 @@ Kubernetes: `>=v1.22.0-0` | persistence.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 | | persistence.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers | | persistence.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod | -| saml | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/saml","tag":"1.3.0-1"},"lifecycle":{},"livenessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"failureThreshold":10,"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"failureThreshold":10,"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"1200Mi"},"requests":{"cpu":"500m","memory":"1200Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | SAML. | +| saml | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/saml","tag":"0.0.0-nightly"},"lifecycle":{},"livenessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"failureThreshold":10,"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"failureThreshold":10,"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"1200Mi"},"requests":{"cpu":"500m","memory":"1200Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | SAML. | | saml.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | saml.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | saml.customCommand | list | `[]` | Add custom pod's command. If passed, it will override the default conditional command. | @@ -552,7 +552,7 @@ Kubernetes: `>=v1.22.0-0` | saml.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | saml.image.pullSecrets | list | `[]` | Image Pull Secrets | | saml.image.repository | string | `"ghcr.io/janssenproject/jans/saml"` | Image to use for deploying. | -| saml.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| saml.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | saml.livenessProbe | object | `{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"failureThreshold":10,"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the auth server if needed. | | saml.livenessProbe.exec | object | `{"command":["python3","/app/scripts/healthcheck.py"]}` | http liveness probe endpoint | | saml.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget | @@ -569,7 +569,7 @@ Kubernetes: `>=v1.22.0-0` | saml.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 | | saml.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers | | saml.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod | -| scim | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/scim","tag":"1.3.0-1"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"1000m","memory":"1200Mi"},"requests":{"cpu":"1000m","memory":"1200Mi"}},"service":{"name":"http-scim","port":8080},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | System for Cross-domain Identity Management (SCIM) version 2.0 | +| scim | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/scim","tag":"0.0.0-nightly"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"1000m","memory":"1200Mi"},"requests":{"cpu":"1000m","memory":"1200Mi"}},"service":{"name":"http-scim","port":8080},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | System for Cross-domain Identity Management (SCIM) version 2.0 | | scim.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} | | scim.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} | | scim.customCommand | list | `[]` | Add custom pod's command. If passed, it will override the default conditional command. | @@ -582,7 +582,7 @@ Kubernetes: `>=v1.22.0-0` | scim.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. | | scim.image.pullSecrets | list | `[]` | Image Pull Secrets | | scim.image.repository | string | `"ghcr.io/janssenproject/jans/scim"` | Image to use for deploying. | -| scim.image.tag | string | `"1.3.0-1"` | Image tag to use for deploying. | +| scim.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. | | scim.livenessProbe | object | `{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for SCIM if needed. | | scim.livenessProbe.httpGet.path | string | `"/jans-scim/sys/health-check"` | http liveness probe endpoint | | scim.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget | diff --git a/jans-auth-server/agama/engine/pom.xml b/jans-auth-server/agama/engine/pom.xml index 668d2deca51..e71e6898375 100644 --- a/jans-auth-server/agama/engine/pom.xml +++ b/jans-auth-server/agama/engine/pom.xml @@ -9,7 +9,7 @@ io.jans jans-auth-server-parent - 1.3.0 + 0.0.0-nightly ../../pom.xml diff --git a/jans-auth-server/agama/inboundID/pom.xml b/jans-auth-server/agama/inboundID/pom.xml index 86c6792934a..95dd3a28b2d 100644 --- a/jans-auth-server/agama/inboundID/pom.xml +++ b/jans-auth-server/agama/inboundID/pom.xml @@ -18,7 +18,7 @@ io.jans jans-auth-server-parent - 1.3.0 + 0.0.0-nightly ../../pom.xml diff --git a/jans-auth-server/agama/model/pom.xml b/jans-auth-server/agama/model/pom.xml index 650bbcda8b1..2c9a19fe788 100644 --- a/jans-auth-server/agama/model/pom.xml +++ b/jans-auth-server/agama/model/pom.xml @@ -9,7 +9,7 @@ io.jans jans-auth-server-parent - 1.3.0 + 0.0.0-nightly ../../pom.xml diff --git a/jans-auth-server/client/pom.xml b/jans-auth-server/client/pom.xml index 46e3fc9a2a1..e97a272ee7f 100644 --- a/jans-auth-server/client/pom.xml +++ b/jans-auth-server/client/pom.xml @@ -8,7 +8,7 @@ io.jans jans-auth-server-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-auth-server/common/pom.xml b/jans-auth-server/common/pom.xml index eb9267f0a56..e6445e1c69a 100644 --- a/jans-auth-server/common/pom.xml +++ b/jans-auth-server/common/pom.xml @@ -8,7 +8,7 @@ io.jans jans-auth-server-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-auth-server/model/pom.xml b/jans-auth-server/model/pom.xml index f0f2ec88416..8a740c09428 100644 --- a/jans-auth-server/model/pom.xml +++ b/jans-auth-server/model/pom.xml @@ -8,7 +8,7 @@ io.jans jans-auth-server-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-auth-server/persistence-model/pom.xml b/jans-auth-server/persistence-model/pom.xml index 9e1fe618953..598f9b7bb59 100644 --- a/jans-auth-server/persistence-model/pom.xml +++ b/jans-auth-server/persistence-model/pom.xml @@ -4,7 +4,7 @@ io.jans jans-auth-server-parent - 1.3.0 + 0.0.0-nightly jans-auth-persistence-model Persistence model diff --git a/jans-auth-server/pom.xml b/jans-auth-server/pom.xml index 5850e5200c8..05999ad6882 100644 --- a/jans-auth-server/pom.xml +++ b/jans-auth-server/pom.xml @@ -5,7 +5,7 @@ io.jans jans-auth-server-parent pom - 1.3.0 + 0.0.0-nightly Jans authentication server parent diff --git a/jans-auth-server/server-fips/pom.xml b/jans-auth-server/server-fips/pom.xml index e066e58e98a..207baf86397 100644 --- a/jans-auth-server/server-fips/pom.xml +++ b/jans-auth-server/server-fips/pom.xml @@ -9,7 +9,7 @@ io.jans jans-auth-server-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-auth-server/server/pom.xml b/jans-auth-server/server/pom.xml index a679cd37894..6c08b7e9434 100644 --- a/jans-auth-server/server/pom.xml +++ b/jans-auth-server/server/pom.xml @@ -8,7 +8,7 @@ io.jans jans-auth-server-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-auth-server/static/pom.xml b/jans-auth-server/static/pom.xml index 1bff845966b..204957fcbda 100644 --- a/jans-auth-server/static/pom.xml +++ b/jans-auth-server/static/pom.xml @@ -3,7 +3,7 @@ io.jans jans-auth-static - 1.3.0 + 0.0.0-nightly jar jans-auth-static @@ -11,7 +11,7 @@ io.jans jans-auth-server-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-auth-server/test-model/pom.xml b/jans-auth-server/test-model/pom.xml index bbe19fe18ca..28bea7579e7 100644 --- a/jans-auth-server/test-model/pom.xml +++ b/jans-auth-server/test-model/pom.xml @@ -8,7 +8,7 @@ io.jans jans-auth-server-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-bom/pom.xml b/jans-bom/pom.xml index 3eb4552bbbe..2015b451200 100644 --- a/jans-bom/pom.xml +++ b/jans-bom/pom.xml @@ -5,7 +5,7 @@ jans-bom pom jans-bom - 1.3.0 + 0.0.0-nightly @@ -424,7 +424,7 @@ diff --git a/jans-casa/agama/pom.xml b/jans-casa/agama/pom.xml index cb8c42b8b7d..309a5ac4b9d 100644 --- a/jans-casa/agama/pom.xml +++ b/jans-casa/agama/pom.xml @@ -8,7 +8,7 @@ io.jans casa-base - 1.3.0 + 0.0.0-nightly diff --git a/jans-casa/agama/project/project.json b/jans-casa/agama/project/project.json index 8d7a5a6cd2c..2a50b1be366 100644 --- a/jans-casa/agama/project/project.json +++ b/jans-casa/agama/project/project.json @@ -1,6 +1,6 @@ { "projectName": "casa", - "version": "1.3.0", + "version": "0.0.0-nightly", "author": "jgomer2001", "description": "2FA flow featuring pluggable authentication methods", "noDirectLaunch": [ "io.jans.casa.authn.fido2", "io.jans.casa.authn.otp", "io.jans.casa.authn.super_gluu", "io.jans.casa.authn.twilio_sms" ], diff --git a/jans-casa/app-fips/pom.xml b/jans-casa/app-fips/pom.xml index 2f2c60c7613..588db1b0976 100644 --- a/jans-casa/app-fips/pom.xml +++ b/jans-casa/app-fips/pom.xml @@ -9,7 +9,7 @@ io.jans casa-base - 1.3.0 + 0.0.0-nightly diff --git a/jans-casa/app/pom.xml b/jans-casa/app/pom.xml index 565664e3d66..012af6d76e1 100644 --- a/jans-casa/app/pom.xml +++ b/jans-casa/app/pom.xml @@ -9,7 +9,7 @@ io.jans casa-base - 1.3.0 + 0.0.0-nightly diff --git a/jans-casa/config/pom.xml b/jans-casa/config/pom.xml index 4ce416e8cc5..fe25c99c8ed 100644 --- a/jans-casa/config/pom.xml +++ b/jans-casa/config/pom.xml @@ -9,7 +9,7 @@ io.jans casa-base - 1.3.0 + 0.0.0-nightly diff --git a/jans-casa/plugins/acct-linking/agama/pom.xml b/jans-casa/plugins/acct-linking/agama/pom.xml index 2f0fd07ce02..4b1494fc3af 100644 --- a/jans-casa/plugins/acct-linking/agama/pom.xml +++ b/jans-casa/plugins/acct-linking/agama/pom.xml @@ -5,7 +5,7 @@ io.jans.casa.plugins acct-linking-agama - 1.3.0 + 0.0.0-nightly github diff --git a/jans-casa/plugins/acct-linking/agama/project/project.json b/jans-casa/plugins/acct-linking/agama/project/project.json index dc91a5d0a54..b7deef2a864 100644 --- a/jans-casa/plugins/acct-linking/agama/project/project.json +++ b/jans-casa/plugins/acct-linking/agama/project/project.json @@ -2,7 +2,7 @@ "projectName": "casa-account-linking", "author": "jgomer2001", "type": "Community", - "version": "1.3.0", + "version": "0.0.0-nightly", "description": "A helper project for Jans Casa accounts linking plugin", "noDirectLaunch": [ ], "configs": { diff --git a/jans-casa/plugins/acct-linking/pom.xml b/jans-casa/plugins/acct-linking/pom.xml index 2ff4c855586..8b6f291e163 100644 --- a/jans-casa/plugins/acct-linking/pom.xml +++ b/jans-casa/plugins/acct-linking/pom.xml @@ -5,7 +5,7 @@ io.jans.casa.plugins ${plugin.id} - 1.3.0 + 0.0.0-nightly jar diff --git a/jans-casa/plugins/bioid/pom.xml b/jans-casa/plugins/bioid/pom.xml index 4e773564a06..4f935a34dd4 100644 --- a/jans-casa/plugins/bioid/pom.xml +++ b/jans-casa/plugins/bioid/pom.xml @@ -5,7 +5,7 @@ io.jans.casa.plugins ${plugin.id} - 1.3.0 + 0.0.0-nightly jar diff --git a/jans-casa/plugins/client-authorizations/pom.xml b/jans-casa/plugins/client-authorizations/pom.xml index 4913590a5d2..d11e9fad704 100644 --- a/jans-casa/plugins/client-authorizations/pom.xml +++ b/jans-casa/plugins/client-authorizations/pom.xml @@ -5,7 +5,7 @@ io.jans.casa.plugins ${plugin.id} - 1.3.0 + 0.0.0-nightly jar diff --git a/jans-casa/plugins/custom-branding/pom.xml b/jans-casa/plugins/custom-branding/pom.xml index 4ac024cf54b..2eea7fddb24 100644 --- a/jans-casa/plugins/custom-branding/pom.xml +++ b/jans-casa/plugins/custom-branding/pom.xml @@ -5,7 +5,7 @@ io.jans.casa.plugins ${plugin.id} - 1.3.0 + 0.0.0-nightly jar diff --git a/jans-casa/plugins/email_2fa/agama/pom.xml b/jans-casa/plugins/email_2fa/agama/pom.xml index 8d14456bff5..6694fe7d193 100644 --- a/jans-casa/plugins/email_2fa/agama/pom.xml +++ b/jans-casa/plugins/email_2fa/agama/pom.xml @@ -5,7 +5,7 @@ io.jans.casa.plugins email_2fa-agama - 1.3.0 + 0.0.0-nightly diff --git a/jans-casa/plugins/email_2fa/agama/project/project.json b/jans-casa/plugins/email_2fa/agama/project/project.json index ba4adb4ff58..e2e89e37495 100644 --- a/jans-casa/plugins/email_2fa/agama/project/project.json +++ b/jans-casa/plugins/email_2fa/agama/project/project.json @@ -2,7 +2,7 @@ "projectName": "email_2fa", "author": "jgomer2001", "type": "Community", - "version": "1.3.0", + "version": "0.0.0-nightly", "noDirectLaunch": [], "configs": { "io.jans.casa.authn.emailotp": { diff --git a/jans-casa/plugins/email_2fa/pom.xml b/jans-casa/plugins/email_2fa/pom.xml index fef44276637..d9117c3f930 100644 --- a/jans-casa/plugins/email_2fa/pom.xml +++ b/jans-casa/plugins/email_2fa/pom.xml @@ -5,7 +5,7 @@ io.jans.casa.plugins ${plugin.id} - 1.3.0 + 0.0.0-nightly jar diff --git a/jans-casa/plugins/samples/authentication-script-properties/pom.xml b/jans-casa/plugins/samples/authentication-script-properties/pom.xml index b1d5df3d0a0..16a18e36080 100644 --- a/jans-casa/plugins/samples/authentication-script-properties/pom.xml +++ b/jans-casa/plugins/samples/authentication-script-properties/pom.xml @@ -5,7 +5,7 @@ co.acme ${plugin.id} - 1.3.0 + 0.0.0-nightly jar diff --git a/jans-casa/plugins/samples/helloworld/pom.xml b/jans-casa/plugins/samples/helloworld/pom.xml index e8ccdd9121b..1067490b09d 100644 --- a/jans-casa/plugins/samples/helloworld/pom.xml +++ b/jans-casa/plugins/samples/helloworld/pom.xml @@ -5,7 +5,7 @@ co.acme ${plugin.id} - 1.3.0 + 0.0.0-nightly jar diff --git a/jans-casa/plugins/samples/sample-cred/pom.xml b/jans-casa/plugins/samples/sample-cred/pom.xml index bff7ff550fb..dc5074b505e 100644 --- a/jans-casa/plugins/samples/sample-cred/pom.xml +++ b/jans-casa/plugins/samples/sample-cred/pom.xml @@ -5,7 +5,7 @@ io.jans.casa.plugins ${plugin.id} - 1.3.0 + 0.0.0-nightly jar diff --git a/jans-casa/plugins/strong-authn-settings/pom.xml b/jans-casa/plugins/strong-authn-settings/pom.xml index 4a9ad548538..8eb464c3886 100644 --- a/jans-casa/plugins/strong-authn-settings/pom.xml +++ b/jans-casa/plugins/strong-authn-settings/pom.xml @@ -5,7 +5,7 @@ io.jans.casa.plugins ${plugin.id} - 1.3.0 + 0.0.0-nightly jar diff --git a/jans-casa/pom.xml b/jans-casa/pom.xml index 61dd1c904c5..9388b923188 100644 --- a/jans-casa/pom.xml +++ b/jans-casa/pom.xml @@ -5,7 +5,7 @@ io.jans casa-base - 1.3.0 + 0.0.0-nightly pom diff --git a/jans-casa/shared/pom.xml b/jans-casa/shared/pom.xml index d144e04c938..cb26a712863 100644 --- a/jans-casa/shared/pom.xml +++ b/jans-casa/shared/pom.xml @@ -9,7 +9,7 @@ io.jans casa-base - 1.3.0 + 0.0.0-nightly diff --git a/jans-cedarling/bindings/cedarling_python/Cargo.toml b/jans-cedarling/bindings/cedarling_python/Cargo.toml index cf198a68059..b28c005cdba 100644 --- a/jans-cedarling/bindings/cedarling_python/Cargo.toml +++ b/jans-cedarling/bindings/cedarling_python/Cargo.toml @@ -1,6 +1,6 @@ [package] name = "cedarling_python" -version = "1.3.0" +version = "0.0.0" edition = "2021" description = "Python binding to Cedarling" license = "Apache-2.0" diff --git a/jans-cedarling/bindings/cedarling_wasm/Cargo.toml b/jans-cedarling/bindings/cedarling_wasm/Cargo.toml index fdbefd360e9..9749bcf08e8 100644 --- a/jans-cedarling/bindings/cedarling_wasm/Cargo.toml +++ b/jans-cedarling/bindings/cedarling_wasm/Cargo.toml @@ -1,6 +1,6 @@ [package] name = "cedarling_wasm" -version = "1.3.0" +version = "0.0.0" edition = "2021" description = "The Cedarling is a performant local authorization service that runs the Rust Cedar Engine" license = "Apache-2.0" diff --git a/jans-cedarling/cedarling/Cargo.toml b/jans-cedarling/cedarling/Cargo.toml index c2315cd650f..2e924cad531 100644 --- a/jans-cedarling/cedarling/Cargo.toml +++ b/jans-cedarling/cedarling/Cargo.toml @@ -1,6 +1,6 @@ [package] name = "cedarling" -version = "1.3.0" +version = "0.0.0-nightly" edition = "2021" description = "The Cedarling: a high-performance local authorization service powered by the Rust Cedar Engine." license = "Apache-2.0" diff --git a/jans-cedarling/flask-sidecar/Dockerfile b/jans-cedarling/flask-sidecar/Dockerfile index eef4c3b8d60..cd6b14afa01 100644 --- a/jans-cedarling/flask-sidecar/Dockerfile +++ b/jans-cedarling/flask-sidecar/Dockerfile @@ -77,7 +77,7 @@ EXPOSE 5000 LABEL org.opencontainers.image.url="ghcr.io/janssenproject/jans/cedarling-flask-sidecar" \ org.opencontainers.image.authors="Janssen Project " \ org.opencontainers.image.vendor="Janssen Project" \ - org.opencontainers.image.version="1.3.0-1" \ + org.opencontainers.image.version="0.0.0-nightly" \ org.opencontainers.image.title="AuthZen Flask API" \ org.opencontainers.image.description="Flask API that implements the [AuthZen](https://openid.github.io/authzen/) specification with the [cedarling](../) python binding." diff --git a/jans-cedarling/flask-sidecar/README.md b/jans-cedarling/flask-sidecar/README.md index 617fdf318d1..3f2f3565983 100644 --- a/jans-cedarling/flask-sidecar/README.md +++ b/jans-cedarling/flask-sidecar/README.md @@ -57,7 +57,7 @@ Not yet implemented - Modify the file to your specifications. Configuration values are described [here](https://github.com/JanssenProject/jans/blob/main/jans-cedarling/bindings/cedarling_python/cedarling_python.pyi). - Pull the docker image: ``` - docker pull ghcr.io/janssenproject/jans/cedarling-flask-sidecar:1.3.0-1 + docker pull ghcr.io/janssenproject/jans/cedarling-flask-sidecar:0.0.0-nightly ``` - Run the docker image, replacing `` with the absolute path to your bootstrap file: @@ -68,7 +68,7 @@ Not yet implemented -e SIDECAR_DEBUG_RESPONSE=False \ --mount type=bind,src=,dst=/bootstrap.json \ -p 5000:5000\ - ghcr.io/janssenproject/jans/cedarling-flask-sidecar:1.3.0-1 + ghcr.io/janssenproject/jans/cedarling-flask-sidecar:0.0.0-nightly ``` - The service is running on `http://0.0.0.0:5000`. OpenAPI documentation is available at `/swagger-ui` diff --git a/jans-cedarling/flask-sidecar/pyproject.toml b/jans-cedarling/flask-sidecar/pyproject.toml index 10b45db64b0..153c565f69f 100644 --- a/jans-cedarling/flask-sidecar/pyproject.toml +++ b/jans-cedarling/flask-sidecar/pyproject.toml @@ -1,6 +1,6 @@ [tool.poetry] name = "flask-sidecar" -version = "1.3.0" +version = "0.0.0" description = "Sidecar for cedarling" authors = ["SafinWasi <6601566+SafinWasi@users.noreply.github.com>"] license = "Apache-2.0" diff --git a/jans-cedarling/test_utils/Cargo.toml b/jans-cedarling/test_utils/Cargo.toml index 41b6014e6dc..b03100d9fed 100644 --- a/jans-cedarling/test_utils/Cargo.toml +++ b/jans-cedarling/test_utils/Cargo.toml @@ -1,6 +1,6 @@ [package] name = "test_utils" -version = "1.3.0" +version = "0.0.0-nightly" edition = "2021" [dependencies] diff --git a/jans-cli-tui/cli_tui/version.py b/jans-cli-tui/cli_tui/version.py index 4cedf2c31d2..b915669433e 100644 --- a/jans-cli-tui/cli_tui/version.py +++ b/jans-cli-tui/cli_tui/version.py @@ -3,4 +3,4 @@ https://www.apache.org/licenses/LICENSE-2.0 """ -__version__ = "1.3.0" +__version__ = "0.0.0" diff --git a/jans-config-api/common/pom.xml b/jans-config-api/common/pom.xml index 0a183376bcf..a33c08a4ec7 100644 --- a/jans-config-api/common/pom.xml +++ b/jans-config-api/common/pom.xml @@ -9,7 +9,7 @@ io.jans jans-config-api-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-config-api/plugins/admin-ui-plugin/pom.xml b/jans-config-api/plugins/admin-ui-plugin/pom.xml index 0c68946b8ee..c47467970a1 100644 --- a/jans-config-api/plugins/admin-ui-plugin/pom.xml +++ b/jans-config-api/plugins/admin-ui-plugin/pom.xml @@ -3,7 +3,7 @@ plugins io.jans.jans-config-api.plugins - 1.3.0 + 0.0.0-nightly 4.0.0 diff --git a/jans-config-api/plugins/fido2-plugin/pom.xml b/jans-config-api/plugins/fido2-plugin/pom.xml index d9f362ad066..08eeea05b3d 100644 --- a/jans-config-api/plugins/fido2-plugin/pom.xml +++ b/jans-config-api/plugins/fido2-plugin/pom.xml @@ -3,7 +3,7 @@ plugins io.jans.jans-config-api.plugins - 1.3.0 + 0.0.0-nightly 4.0.0 fido2-plugin diff --git a/jans-config-api/plugins/jans-link-plugin/pom.xml b/jans-config-api/plugins/jans-link-plugin/pom.xml index c72d51ec294..1b65f2ded34 100644 --- a/jans-config-api/plugins/jans-link-plugin/pom.xml +++ b/jans-config-api/plugins/jans-link-plugin/pom.xml @@ -3,7 +3,7 @@ plugins io.jans.jans-config-api.plugins - 1.3.0 + 0.0.0-nightly 4.0.0 jans-link-plugin diff --git a/jans-config-api/plugins/kc-link-plugin/pom.xml b/jans-config-api/plugins/kc-link-plugin/pom.xml index d4ddc55630a..d92ec7aeba1 100644 --- a/jans-config-api/plugins/kc-link-plugin/pom.xml +++ b/jans-config-api/plugins/kc-link-plugin/pom.xml @@ -5,7 +5,7 @@ plugins io.jans.jans-config-api.plugins - 1.3.0 + 0.0.0-nightly 4.0.0 diff --git a/jans-config-api/plugins/kc-saml-plugin/pom.xml b/jans-config-api/plugins/kc-saml-plugin/pom.xml index d9b89dcf2f7..29feff15e1e 100644 --- a/jans-config-api/plugins/kc-saml-plugin/pom.xml +++ b/jans-config-api/plugins/kc-saml-plugin/pom.xml @@ -5,7 +5,7 @@ plugins io.jans.jans-config-api.plugins - 1.3.0 + 0.0.0-nightly 4.0.0 diff --git a/jans-config-api/plugins/lock-plugin/pom.xml b/jans-config-api/plugins/lock-plugin/pom.xml index 0a9554455bc..cace2d322a5 100644 --- a/jans-config-api/plugins/lock-plugin/pom.xml +++ b/jans-config-api/plugins/lock-plugin/pom.xml @@ -5,7 +5,7 @@ plugins io.jans.jans-config-api.plugins - 1.3.0 + 0.0.0-nightly 4.0.0 diff --git a/jans-config-api/plugins/pom.xml b/jans-config-api/plugins/pom.xml index b3d5f3fce0c..e845759a7a8 100644 --- a/jans-config-api/plugins/pom.xml +++ b/jans-config-api/plugins/pom.xml @@ -4,14 +4,14 @@ io.jans jans-config-api-parent - 1.3.0 + 0.0.0-nightly 4.0.0 io.jans.jans-config-api.plugins plugins - 1.3.0 + 0.0.0-nightly pom diff --git a/jans-config-api/plugins/sample/demo/pom.xml b/jans-config-api/plugins/sample/demo/pom.xml index 344bdb02c91..e1ad30f926b 100644 --- a/jans-config-api/plugins/sample/demo/pom.xml +++ b/jans-config-api/plugins/sample/demo/pom.xml @@ -3,7 +3,7 @@ io.jans.jans-config-api.plugins ${plugin.id} - 1.3.0 + 0.0.0-nightly jar demo diff --git a/jans-config-api/plugins/sample/helloworld/pom.xml b/jans-config-api/plugins/sample/helloworld/pom.xml index e7c9b0a512a..ad4ed9ee899 100644 --- a/jans-config-api/plugins/sample/helloworld/pom.xml +++ b/jans-config-api/plugins/sample/helloworld/pom.xml @@ -3,7 +3,7 @@ com.spl ${plugin.id} - 1.3.0 + 0.0.0-nightly jar helloworld diff --git a/jans-config-api/plugins/scim-plugin/pom.xml b/jans-config-api/plugins/scim-plugin/pom.xml index 0150eaaf30a..7d460c68a29 100644 --- a/jans-config-api/plugins/scim-plugin/pom.xml +++ b/jans-config-api/plugins/scim-plugin/pom.xml @@ -3,7 +3,7 @@ plugins io.jans.jans-config-api.plugins - 1.3.0 + 0.0.0-nightly 4.0.0 scim-plugin diff --git a/jans-config-api/plugins/user-mgt-plugin/pom.xml b/jans-config-api/plugins/user-mgt-plugin/pom.xml index 7aa98b2dd99..27c77ea328b 100644 --- a/jans-config-api/plugins/user-mgt-plugin/pom.xml +++ b/jans-config-api/plugins/user-mgt-plugin/pom.xml @@ -3,7 +3,7 @@ plugins io.jans.jans-config-api.plugins - 1.3.0 + 0.0.0-nightly 4.0.0 user-mgt-plugin diff --git a/jans-config-api/pom.xml b/jans-config-api/pom.xml index 500c88059d5..efb8f25fd64 100644 --- a/jans-config-api/pom.xml +++ b/jans-config-api/pom.xml @@ -5,7 +5,7 @@ io.jans jans-config-api-parent pom - 1.3.0 + 0.0.0-nightly jans-config-api-parent diff --git a/jans-config-api/server-fips/pom.xml b/jans-config-api/server-fips/pom.xml index 16ffdd144cd..cd312af0803 100644 --- a/jans-config-api/server-fips/pom.xml +++ b/jans-config-api/server-fips/pom.xml @@ -9,7 +9,7 @@ io.jans jans-config-api-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-config-api/server/pom.xml b/jans-config-api/server/pom.xml index 976035f12aa..b0d052e9f61 100644 --- a/jans-config-api/server/pom.xml +++ b/jans-config-api/server/pom.xml @@ -9,7 +9,7 @@ io.jans jans-config-api-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-config-api/shared/pom.xml b/jans-config-api/shared/pom.xml index 53a9d5596de..15efc9f1800 100644 --- a/jans-config-api/shared/pom.xml +++ b/jans-config-api/shared/pom.xml @@ -7,7 +7,7 @@ io.jans jans-config-api-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/cache/pom.xml b/jans-core/cache/pom.xml index a3d2d9d4a87..00e847e0563 100644 --- a/jans-core/cache/pom.xml +++ b/jans-core/cache/pom.xml @@ -7,7 +7,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/cdi/pom.xml b/jans-core/cdi/pom.xml index e848a96da97..ac52625aca5 100644 --- a/jans-core/cdi/pom.xml +++ b/jans-core/cdi/pom.xml @@ -8,7 +8,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/demo-cdi/pom.xml b/jans-core/demo-cdi/pom.xml index b4a60ae0b83..d0b66175ad2 100644 --- a/jans-core/demo-cdi/pom.xml +++ b/jans-core/demo-cdi/pom.xml @@ -7,7 +7,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/doc/pom.xml b/jans-core/doc/pom.xml index 46a1fe76f73..5745756dfab 100644 --- a/jans-core/doc/pom.xml +++ b/jans-core/doc/pom.xml @@ -3,7 +3,7 @@ jans-core-parent io.jans - 1.3.0 + 0.0.0-nightly 4.0.0 diff --git a/jans-core/document-store/pom.xml b/jans-core/document-store/pom.xml index 6669c7040f4..56f84ac019d 100644 --- a/jans-core/document-store/pom.xml +++ b/jans-core/document-store/pom.xml @@ -7,7 +7,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/exception-extension-cdi/pom.xml b/jans-core/exception-extension-cdi/pom.xml index 0b24d7153ad..f987522a154 100644 --- a/jans-core/exception-extension-cdi/pom.xml +++ b/jans-core/exception-extension-cdi/pom.xml @@ -8,7 +8,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/java-ext/pom.xml b/jans-core/java-ext/pom.xml index 7d30d4c2710..0615bd52db7 100644 --- a/jans-core/java-ext/pom.xml +++ b/jans-core/java-ext/pom.xml @@ -8,7 +8,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/jsf-util/pom.xml b/jans-core/jsf-util/pom.xml index d8ee7f92b36..a078aea54db 100644 --- a/jans-core/jsf-util/pom.xml +++ b/jans-core/jsf-util/pom.xml @@ -9,7 +9,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/message/pom.xml b/jans-core/message/pom.xml index 7ba372a05eb..520aff88ac4 100644 --- a/jans-core/message/pom.xml +++ b/jans-core/message/pom.xml @@ -7,7 +7,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/model/pom.xml b/jans-core/model/pom.xml index 9e80fc69049..8674b055597 100644 --- a/jans-core/model/pom.xml +++ b/jans-core/model/pom.xml @@ -8,7 +8,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/notify-client/pom.xml b/jans-core/notify-client/pom.xml index a9982f95fba..c1e90ac5a92 100644 --- a/jans-core/notify-client/pom.xml +++ b/jans-core/notify-client/pom.xml @@ -9,7 +9,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/pom.xml b/jans-core/pom.xml index 70f8ed86cc9..de11e79b5fe 100644 --- a/jans-core/pom.xml +++ b/jans-core/pom.xml @@ -3,7 +3,7 @@ io.jans jans-core-parent pom - 1.3.0 + 0.0.0-nightly jans-core diff --git a/jans-core/radius/pom.xml b/jans-core/radius/pom.xml index 33e44fbd978..86716d3420a 100644 --- a/jans-core/radius/pom.xml +++ b/jans-core/radius/pom.xml @@ -8,7 +8,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/saml/pom.xml b/jans-core/saml/pom.xml index 76a95fdc567..2f44cf5fa78 100644 --- a/jans-core/saml/pom.xml +++ b/jans-core/saml/pom.xml @@ -8,7 +8,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/saml/src/pom.xml b/jans-core/saml/src/pom.xml index b049f86cdaf..2b51deeb5fd 100644 --- a/jans-core/saml/src/pom.xml +++ b/jans-core/saml/src/pom.xml @@ -8,7 +8,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/script/pom.xml b/jans-core/script/pom.xml index 618ecf67d8c..30ab009c0df 100644 --- a/jans-core/script/pom.xml +++ b/jans-core/script/pom.xml @@ -8,7 +8,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/security-extension-cdi/pom.xml b/jans-core/security-extension-cdi/pom.xml index 07c9b53128d..367eb5ca661 100644 --- a/jans-core/security-extension-cdi/pom.xml +++ b/jans-core/security-extension-cdi/pom.xml @@ -8,7 +8,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/server/pom.xml b/jans-core/server/pom.xml index 683066f5c93..5f5d0d12bdd 100644 --- a/jans-core/server/pom.xml +++ b/jans-core/server/pom.xml @@ -8,7 +8,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/service/pom.xml b/jans-core/service/pom.xml index 2e5ca187fa8..2e72b28bbdb 100644 --- a/jans-core/service/pom.xml +++ b/jans-core/service/pom.xml @@ -8,7 +8,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/standalone/pom.xml b/jans-core/standalone/pom.xml index f409a67e3e2..403797d90b4 100644 --- a/jans-core/standalone/pom.xml +++ b/jans-core/standalone/pom.xml @@ -7,7 +7,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/timer-weld/pom.xml b/jans-core/timer-weld/pom.xml index ff5e157b75a..d336feccceb 100644 --- a/jans-core/timer-weld/pom.xml +++ b/jans-core/timer-weld/pom.xml @@ -7,7 +7,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-core/uma-rs-core/pom.xml b/jans-core/uma-rs-core/pom.xml index 2596fa9c058..041954a9e64 100644 --- a/jans-core/uma-rs-core/pom.xml +++ b/jans-core/uma-rs-core/pom.xml @@ -9,7 +9,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly true diff --git a/jans-core/util/pom.xml b/jans-core/util/pom.xml index 931cc00f360..64acdedd18f 100644 --- a/jans-core/util/pom.xml +++ b/jans-core/util/pom.xml @@ -8,7 +8,7 @@ io.jans jans-core-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-fido2/client/pom.xml b/jans-fido2/client/pom.xml index 125332152cb..87fa2fe23c4 100644 --- a/jans-fido2/client/pom.xml +++ b/jans-fido2/client/pom.xml @@ -9,7 +9,7 @@ io.jans jans-fido2-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-fido2/model/pom.xml b/jans-fido2/model/pom.xml index 5678828c3e0..28744e700a1 100644 --- a/jans-fido2/model/pom.xml +++ b/jans-fido2/model/pom.xml @@ -10,7 +10,7 @@ io.jans jans-fido2-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-fido2/pom.xml b/jans-fido2/pom.xml index 5073833ce4b..d67fdad2bdc 100644 --- a/jans-fido2/pom.xml +++ b/jans-fido2/pom.xml @@ -5,7 +5,7 @@ io.jans jans-fido2-parent pom - 1.3.0 + 0.0.0-nightly Fido2 API diff --git a/jans-fido2/server-fips/pom.xml b/jans-fido2/server-fips/pom.xml index 3a374743b25..94b80f112c5 100644 --- a/jans-fido2/server-fips/pom.xml +++ b/jans-fido2/server-fips/pom.xml @@ -9,7 +9,7 @@ io.jans jans-fido2-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-fido2/server/pom.xml b/jans-fido2/server/pom.xml index 7c13926146a..2c3398985f5 100644 --- a/jans-fido2/server/pom.xml +++ b/jans-fido2/server/pom.xml @@ -9,7 +9,7 @@ io.jans jans-fido2-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-keycloak-integration/job-scheduler/pom.xml b/jans-keycloak-integration/job-scheduler/pom.xml index ef73e6c5663..9735209945b 100644 --- a/jans-keycloak-integration/job-scheduler/pom.xml +++ b/jans-keycloak-integration/job-scheduler/pom.xml @@ -17,7 +17,7 @@ io.jans jans-kc-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-keycloak-integration/pom.xml b/jans-keycloak-integration/pom.xml index d7c1b2c18e3..56ea4beef87 100644 --- a/jans-keycloak-integration/pom.xml +++ b/jans-keycloak-integration/pom.xml @@ -4,7 +4,7 @@ io.jans jans-kc-parent pom - 1.3.0 + 0.0.0-nightly keycloak-integration-parent diff --git a/jans-keycloak-integration/spi/pom.xml b/jans-keycloak-integration/spi/pom.xml index 0e7150caa70..65ce4066eb7 100644 --- a/jans-keycloak-integration/spi/pom.xml +++ b/jans-keycloak-integration/spi/pom.xml @@ -9,7 +9,7 @@ io.jans jans-kc-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-keycloak-link/model/pom.xml b/jans-keycloak-link/model/pom.xml index 13b586b2ad0..b0e6c6ae469 100644 --- a/jans-keycloak-link/model/pom.xml +++ b/jans-keycloak-link/model/pom.xml @@ -2,7 +2,7 @@ jans-keycloak-link-parent io.jans - 1.3.0 + 0.0.0-nightly 4.0.0 jans-keycloak-link-model diff --git a/jans-keycloak-link/model/src/main/resources/archetype-resources/pom.xml b/jans-keycloak-link/model/src/main/resources/archetype-resources/pom.xml index 3d1dfe16882..fed7c7d1183 100644 --- a/jans-keycloak-link/model/src/main/resources/archetype-resources/pom.xml +++ b/jans-keycloak-link/model/src/main/resources/archetype-resources/pom.xml @@ -2,7 +2,7 @@ 4.0.0 $io.jans $model - 1.3.0 + 0.0.0-nightly junit diff --git a/jans-keycloak-link/pom.xml b/jans-keycloak-link/pom.xml index 18738872388..108b7cc578b 100644 --- a/jans-keycloak-link/pom.xml +++ b/jans-keycloak-link/pom.xml @@ -2,7 +2,7 @@ 4.0.0 io.jans jans-keycloak-link-parent - 1.3.0 + 0.0.0-nightly model service diff --git a/jans-keycloak-link/server/pom.xml b/jans-keycloak-link/server/pom.xml index 98b1a17c2e1..034ca6d63f9 100644 --- a/jans-keycloak-link/server/pom.xml +++ b/jans-keycloak-link/server/pom.xml @@ -2,7 +2,7 @@ jans-keycloak-link-parent io.jans - 1.3.0 + 0.0.0-nightly 4.0.0 jans-keycloak-link-server diff --git a/jans-keycloak-link/service/pom.xml b/jans-keycloak-link/service/pom.xml index e2c4fe0cd08..20cd4850062 100644 --- a/jans-keycloak-link/service/pom.xml +++ b/jans-keycloak-link/service/pom.xml @@ -2,7 +2,7 @@ jans-keycloak-link-parent io.jans - 1.3.0 + 0.0.0-nightly 4.0.0 diff --git a/jans-link/model/pom.xml b/jans-link/model/pom.xml index f2d4f8389c8..a979f6df6bf 100644 --- a/jans-link/model/pom.xml +++ b/jans-link/model/pom.xml @@ -2,7 +2,7 @@ jans-link-server-parent io.jans - 1.3.0 + 0.0.0-nightly 4.0.0 jans-link-model diff --git a/jans-link/pom.xml b/jans-link/pom.xml index d032b7c064a..954fca152c8 100644 --- a/jans-link/pom.xml +++ b/jans-link/pom.xml @@ -2,12 +2,12 @@ 4.0.0 io.jans jans-link-server-parent - 1.3.0 + 0.0.0-nightly io.jans jans-bom - 1.3.0 + 0.0.0-nightly diff --git a/jans-link/server-fips/pom.xml b/jans-link/server-fips/pom.xml index 03197a38db5..c1b7e2261af 100644 --- a/jans-link/server-fips/pom.xml +++ b/jans-link/server-fips/pom.xml @@ -17,7 +17,7 @@ jans-link-server-parent io.jans - 1.3.0 + 0.0.0-nightly diff --git a/jans-link/server/pom.xml b/jans-link/server/pom.xml index e5723b1c5c1..3f223c23209 100644 --- a/jans-link/server/pom.xml +++ b/jans-link/server/pom.xml @@ -2,7 +2,7 @@ jans-link-server-parent io.jans - 1.3.0 + 0.0.0-nightly 4.0.0 jans-link-server diff --git a/jans-link/service/pom.xml b/jans-link/service/pom.xml index 6e7d17262a4..f55a8f80fc4 100644 --- a/jans-link/service/pom.xml +++ b/jans-link/service/pom.xml @@ -2,7 +2,7 @@ jans-link-server-parent io.jans - 1.3.0 + 0.0.0-nightly 4.0.0 jans-link-service diff --git a/jans-linux-setup/jans_setup/app_info.json b/jans-linux-setup/jans_setup/app_info.json index 0fdc4286520..caf5ed20004 100644 --- a/jans-linux-setup/jans_setup/app_info.json +++ b/jans-linux-setup/jans_setup/app_info.json @@ -1,6 +1,6 @@ { - "JANS_APP_VERSION": "1.3.0", - "JANS_BUILD": "", + "JANS_APP_VERSION": "0.0.0", + "JANS_BUILD": "-nightly", "JETTY_VERSION": "11.0.15", "AMAZON_CORRETTO_VERSION": "17", "JYTHON_VERSION": "2.7.3", diff --git a/jans-linux-setup/jans_setup/setup_app/version.py b/jans-linux-setup/jans_setup/setup_app/version.py index 67bc602abf0..6c8e6b979c5 100644 --- a/jans-linux-setup/jans_setup/setup_app/version.py +++ b/jans-linux-setup/jans_setup/setup_app/version.py @@ -1 +1 @@ -__version__ = "1.3.0" +__version__ = "0.0.0" diff --git a/jans-lock/lock-server/client/pom.xml b/jans-lock/lock-server/client/pom.xml index db5a8a31ebb..6fa0e1f7a48 100644 --- a/jans-lock/lock-server/client/pom.xml +++ b/jans-lock/lock-server/client/pom.xml @@ -11,7 +11,7 @@ jans-lock-server-parent io.jans - 1.3.0 + 0.0.0-nightly diff --git a/jans-lock/lock-server/model/pom.xml b/jans-lock/lock-server/model/pom.xml index 0c9ade44bd0..a0044861c1c 100644 --- a/jans-lock/lock-server/model/pom.xml +++ b/jans-lock/lock-server/model/pom.xml @@ -10,7 +10,7 @@ jans-lock-server-parent io.jans - 1.3.0 + 0.0.0-nightly diff --git a/jans-lock/lock-server/pom.xml b/jans-lock/lock-server/pom.xml index 52d831900c3..5e926cea610 100644 --- a/jans-lock/lock-server/pom.xml +++ b/jans-lock/lock-server/pom.xml @@ -4,7 +4,7 @@ 4.0.0 io.jans jans-lock-server-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-lock/lock-server/server-fips/pom.xml b/jans-lock/lock-server/server-fips/pom.xml index 3b0fcdecfb5..50b480d1f66 100644 --- a/jans-lock/lock-server/server-fips/pom.xml +++ b/jans-lock/lock-server/server-fips/pom.xml @@ -9,7 +9,7 @@ jans-lock-server-parent io.jans - 1.3.0 + 0.0.0-nightly diff --git a/jans-lock/lock-server/server/pom.xml b/jans-lock/lock-server/server/pom.xml index b371b0afb2a..2782ecd2200 100644 --- a/jans-lock/lock-server/server/pom.xml +++ b/jans-lock/lock-server/server/pom.xml @@ -6,7 +6,7 @@ jans-lock-server-parent io.jans - 1.3.0 + 0.0.0-nightly 4.0.0 diff --git a/jans-lock/lock-server/service/pom.xml b/jans-lock/lock-server/service/pom.xml index 66e333ec584..5a35cea34df 100644 --- a/jans-lock/lock-server/service/pom.xml +++ b/jans-lock/lock-server/service/pom.xml @@ -5,7 +5,7 @@ jans-lock-server-parent io.jans - 1.3.0 + 0.0.0-nightly 4.0.0 diff --git a/jans-orm/annotation/pom.xml b/jans-orm/annotation/pom.xml index 92ebcc9485e..d90d742c1d2 100644 --- a/jans-orm/annotation/pom.xml +++ b/jans-orm/annotation/pom.xml @@ -8,6 +8,6 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly \ No newline at end of file diff --git a/jans-orm/cdi/pom.xml b/jans-orm/cdi/pom.xml index 687fb577a36..73b4126f83b 100644 --- a/jans-orm/cdi/pom.xml +++ b/jans-orm/cdi/pom.xml @@ -7,7 +7,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/core/pom.xml b/jans-orm/core/pom.xml index 84555866aa6..a91d65c4c9b 100644 --- a/jans-orm/core/pom.xml +++ b/jans-orm/core/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/couchbase-libs/pom.xml b/jans-orm/couchbase-libs/pom.xml index 22242f90157..88361ac0f35 100644 --- a/jans-orm/couchbase-libs/pom.xml +++ b/jans-orm/couchbase-libs/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/couchbase-sample/pom.xml b/jans-orm/couchbase-sample/pom.xml index 1fbe8c17ef3..427414ba04f 100644 --- a/jans-orm/couchbase-sample/pom.xml +++ b/jans-orm/couchbase-sample/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/couchbase/pom.xml b/jans-orm/couchbase/pom.xml index b9b82800959..17001811d60 100644 --- a/jans-orm/couchbase/pom.xml +++ b/jans-orm/couchbase/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/filter/pom.xml b/jans-orm/filter/pom.xml index 9de5ec8023e..de2d5a01a2e 100644 --- a/jans-orm/filter/pom.xml +++ b/jans-orm/filter/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/hybrid/pom.xml b/jans-orm/hybrid/pom.xml index 7b06f729e1a..7cf9d17cde0 100644 --- a/jans-orm/hybrid/pom.xml +++ b/jans-orm/hybrid/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/ldap-sample/pom.xml b/jans-orm/ldap-sample/pom.xml index 446cfaa71db..7716be8e0a4 100644 --- a/jans-orm/ldap-sample/pom.xml +++ b/jans-orm/ldap-sample/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/ldap/pom.xml b/jans-orm/ldap/pom.xml index f92ac7269a2..46e74184aa8 100644 --- a/jans-orm/ldap/pom.xml +++ b/jans-orm/ldap/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/model/pom.xml b/jans-orm/model/pom.xml index fbe817933c2..9c703401d13 100644 --- a/jans-orm/model/pom.xml +++ b/jans-orm/model/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/pom.xml b/jans-orm/pom.xml index c06b4c64e56..4d5ef7027d6 100644 --- a/jans-orm/pom.xml +++ b/jans-orm/pom.xml @@ -3,7 +3,7 @@ io.jans jans-orm-parent pom - 1.3.0 + 0.0.0-nightly orm diff --git a/jans-orm/spanner-libs/pom.xml b/jans-orm/spanner-libs/pom.xml index 631b4002e19..141da99833e 100644 --- a/jans-orm/spanner-libs/pom.xml +++ b/jans-orm/spanner-libs/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/spanner-sample/pom.xml b/jans-orm/spanner-sample/pom.xml index 1792854bfe4..0b2c33b2f02 100644 --- a/jans-orm/spanner-sample/pom.xml +++ b/jans-orm/spanner-sample/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/spanner/pom.xml b/jans-orm/spanner/pom.xml index 5e4575a3ac7..76dc2b7b74a 100644 --- a/jans-orm/spanner/pom.xml +++ b/jans-orm/spanner/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/sql-sample/pom.xml b/jans-orm/sql-sample/pom.xml index 454c2c93682..9ef118bb0d4 100644 --- a/jans-orm/sql-sample/pom.xml +++ b/jans-orm/sql-sample/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/sql/pom.xml b/jans-orm/sql/pom.xml index 0c9cbe76f17..b40e48cc865 100644 --- a/jans-orm/sql/pom.xml +++ b/jans-orm/sql/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/standalone/pom.xml b/jans-orm/standalone/pom.xml index e71aeb88f4d..ba2eafc2e3e 100644 --- a/jans-orm/standalone/pom.xml +++ b/jans-orm/standalone/pom.xml @@ -7,7 +7,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-orm/util/pom.xml b/jans-orm/util/pom.xml index af9bf8edb51..841cce5e1c1 100644 --- a/jans-orm/util/pom.xml +++ b/jans-orm/util/pom.xml @@ -8,7 +8,7 @@ io.jans jans-orm-parent - 1.3.0 + 0.0.0-nightly diff --git a/jans-pycloudlib/jans/pycloudlib/version.py b/jans-pycloudlib/jans/pycloudlib/version.py index bd559f84965..231faa30226 100644 --- a/jans-pycloudlib/jans/pycloudlib/version.py +++ b/jans-pycloudlib/jans/pycloudlib/version.py @@ -1,3 +1,3 @@ """This module contains version-related info.""" -__version__ = "1.3.0" # pragma: no cover +__version__ = "0.0.0" # pragma: no cover diff --git a/jans-scim/client/pom.xml b/jans-scim/client/pom.xml index c3074e521a6..08ba0c5d9d1 100644 --- a/jans-scim/client/pom.xml +++ b/jans-scim/client/pom.xml @@ -10,7 +10,7 @@ io.jans jans-scim - 1.3.0 + 0.0.0-nightly diff --git a/jans-scim/model/pom.xml b/jans-scim/model/pom.xml index 00beea3d104..cb5678ca729 100644 --- a/jans-scim/model/pom.xml +++ b/jans-scim/model/pom.xml @@ -10,7 +10,7 @@ io.jans jans-scim - 1.3.0 + 0.0.0-nightly diff --git a/jans-scim/pom.xml b/jans-scim/pom.xml index 7d86259320e..ccbaf0506bb 100644 --- a/jans-scim/pom.xml +++ b/jans-scim/pom.xml @@ -5,7 +5,7 @@ io.jans jans-scim pom - 1.3.0 + 0.0.0-nightly SCIM API http://www.gluu.org diff --git a/jans-scim/server-fips/pom.xml b/jans-scim/server-fips/pom.xml index 7f855f637fb..f38c8cd4c7e 100644 --- a/jans-scim/server-fips/pom.xml +++ b/jans-scim/server-fips/pom.xml @@ -9,7 +9,7 @@ io.jans jans-scim - 1.3.0 + 0.0.0-nightly diff --git a/jans-scim/server/pom.xml b/jans-scim/server/pom.xml index b4a761ebd1f..6bed3919ff3 100644 --- a/jans-scim/server/pom.xml +++ b/jans-scim/server/pom.xml @@ -10,7 +10,7 @@ io.jans jans-scim - 1.3.0 + 0.0.0-nightly diff --git a/jans-scim/service/pom.xml b/jans-scim/service/pom.xml index 243e423d0df..86e289a1747 100644 --- a/jans-scim/service/pom.xml +++ b/jans-scim/service/pom.xml @@ -8,7 +8,7 @@ io.jans jans-scim - 1.3.0 + 0.0.0-nightly From 1275c3c3acdeaa3b0e151365b5621fc9a20b67f1 Mon Sep 17 00:00:00 2001 From: Mohammad Abudayyeh <47318409+moabu@users.noreply.github.com> Date: Wed, 22 Jan 2025 13:03:52 +0300 Subject: [PATCH 2/4] docs: fix installation references (#10711) Signed-off-by: moabu <47318409+moabu@users.noreply.github.com> --- .github/workflows/build-docs.yml | 1 + .../janssen-server/install/vm-install/rhel.md | 10 +++++----- .../janssen-server/install/vm-install/suse.md | 8 ++++---- .../install/vm-install/ubuntu.md | 20 +++++++++---------- 4 files changed, 20 insertions(+), 19 deletions(-) diff --git a/.github/workflows/build-docs.yml b/.github/workflows/build-docs.yml index 28e9ce016b9..ec1c9b69fee 100644 --- a/.github/workflows/build-docs.yml +++ b/.github/workflows/build-docs.yml @@ -218,6 +218,7 @@ jobs: echo "Replacing release number markers with actual release number" cd ${LATEST} if [[ "${LATEST}" == "nightly" ]]; then + egrep -lRZ --exclude=CONTRIBUTING.md . | xargs -0 -l sed -i -e "s/replace-janssen-version-stable/0.0.0-nightly/g" egrep -lRZ --exclude=CONTRIBUTING.md . | xargs -0 -l sed -i -e "s/replace-janssen-version/0.0.0-nightly/g" egrep -lRZ --exclude=CONTRIBUTING.md . | xargs -0 -l sed -i -e "s/v0.0.0-nightly/nightly/g" else diff --git a/docs/janssen-server/install/vm-install/rhel.md b/docs/janssen-server/install/vm-install/rhel.md index 730d2c26989..ae4e1a05854 100644 --- a/docs/janssen-server/install/vm-install/rhel.md +++ b/docs/janssen-server/install/vm-install/rhel.md @@ -41,7 +41,7 @@ sudo rpm -import automation-jans-public-gpg.asc [Releases](https://github.com/JanssenProject/jans/releases) ``` -wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans-replace-janssen-version.el8.x86_64.rpm -P ~/ +wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans-replace-janssen-version-stable.el8.x86_64.rpm -P ~/ ``` - Verify integrity of the downloaded package using published `sha256sum`. @@ -49,25 +49,25 @@ wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-v Download `sha256sum` file for the package ```shell - wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans-replace-janssen-version.el8.x86_64.rpm.sha256sum -P ~/ + wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans-replace-janssen-version-stable.el8.x86_64.rpm.sha256sum -P ~/ ``` Check the hash if it is matching. ```shell - sha256sum -c jans-replace-janssen-version-el8.x86_64.rpm.sha256sum + sha256sum -c jans-replace-janssen-version-stable-el8.x86_64.rpm.sha256sum ``` Output similar to below should confirm the integrity of the downloaded package. ```text - jans-replace-janssen-version-el8.x86_64.rpm: OK + jans-replace-janssen-version-stable-el8.x86_64.rpm: OK ``` - Install the package ``` -sudo yum install ~/jans-replace-janssen-version-el8.x86_64.rpm +sudo yum install ~/jans-replace-janssen-version-stable-el8.x86_64.rpm ``` ## Run the setup script diff --git a/docs/janssen-server/install/vm-install/suse.md b/docs/janssen-server/install/vm-install/suse.md index 4f08242ea54..6857f9b32be 100644 --- a/docs/janssen-server/install/vm-install/suse.md +++ b/docs/janssen-server/install/vm-install/suse.md @@ -53,7 +53,7 @@ sudo rpm -import automation-jans-public-gpg.asc [Releases](https://github.com/JanssenProject/jans/releases) ```shell -wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans-replace-janssen-version.suse15.x86_64.rpm +wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans-replace-janssen-version-stable.suse15.x86_64.rpm ``` - Verify integrity of the downloaded package using published `sha256sum`. @@ -61,14 +61,14 @@ wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-v Download `sha256sum` file for the package ```shell -wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans-replace-janssen-version.suse15.x86_64.rpm.sha256sum +wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans-replace-janssen-version-stable.suse15.x86_64.rpm.sha256sum ``` Check the hash if it is matching. You may need to change your working directory to where both the rpm and sha256sum file are located. ```shell -sha256sum -c jans-replace-janssen-version.suse15.x86_64.rpm.sha256sum +sha256sum -c jans-replace-janssen-version-stable.suse15.x86_64.rpm.sha256sum ``` Output similar to below should confirm the integrity of the downloaded package. @@ -80,7 +80,7 @@ Output similar to below should confirm the integrity of the downloaded package. - Install the package ``` -sudo zypper install ~/jans-replace-janssen-version.suse15.x86_64.rpm +sudo zypper install ~/jans-replace-janssen-version-stable.suse15.x86_64.rpm ``` ## Run the setup script diff --git a/docs/janssen-server/install/vm-install/ubuntu.md b/docs/janssen-server/install/vm-install/ubuntu.md index 1db461aa491..91d02b7de80 100644 --- a/docs/janssen-server/install/vm-install/ubuntu.md +++ b/docs/janssen-server/install/vm-install/ubuntu.md @@ -38,7 +38,7 @@ sudo gpg --import automation-jans-public-gpg.asc; [Releases](https://github.com/JanssenProject/jans/releases) ``` -wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans_replace-janssen-version.ubuntu22.04_amd64.deb -P /tmp +wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans_replace-janssen-version-stable.ubuntu22.04_amd64.deb -P /tmp ``` - Verify integrity of the downloaded package by verifying published `sha256sum`. @@ -46,26 +46,26 @@ wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-v Download `sha256sum` file for the package ```shell - wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans_replace-janssen-version.ubuntu22.04_amd64.deb.sha256sum -P /tmp + wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans_replace-janssen-version-stable.ubuntu22.04_amd64.deb.sha256sum -P /tmp ``` Check the hash if it is matching. ```shell cd /tmp - sha256sum -c jans_replace-janssen-version.ubuntu22.04_amd64.deb.sha256sum + sha256sum -c jans_replace-janssen-version-stable.ubuntu22.04_amd64.deb.sha256sum ``` Output similar to below should confirm the integrity of the downloaded package. ```text - jans_replace-janssen-version.ubuntu22.04_amd64.deb.sha256sum: OK + jans_replace-janssen-version-stable.ubuntu22.04_amd64.deb.sha256sum: OK ``` - Install the package ``` -sudo apt install ./jans_replace-janssen-version.ubuntu22.04_amd64.deb +sudo apt install ./jans_replace-janssen-version-stable.ubuntu22.04_amd64.deb ``` ### Ubuntu 20.04 @@ -74,7 +74,7 @@ sudo apt install ./jans_replace-janssen-version.ubuntu22.04_amd64.deb [Releases](https://github.com/JanssenProject/jans/releases) ``` -wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans_replace-janssen-version.ubuntu20.04_amd64.deb -P /tmp +wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans_replace-janssen-version-stable.ubuntu20.04_amd64.deb -P /tmp ``` - Verify integrity of the downloaded package by verifying published `sha256sum`. @@ -82,26 +82,26 @@ wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-v Download `sha256sum` file for the package ```shell - wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans_replace-janssen-version.ubuntu20.04_amd64.deb.sha256sum -P /tmp + wget https://github.com/JanssenProject/jans/releases/download/vreplace-janssen-version/jans_replace-janssen-version-stable.ubuntu20.04_amd64.deb.sha256sum -P /tmp ``` Check the hash if it is matching. ```shell cd /tmp - sha256sum -c jans_replace-janssen-version.ubuntu20.04_amd64.deb.sha256sum + sha256sum -c jans_replace-janssen-version-stable.ubuntu20.04_amd64.deb.sha256sum ``` Output similar to below should confirm the integrity of the downloaded package. ```text - jans_replace-janssen-version.ubuntu20.04_amd64.deb.sha256sum: OK + jans_replace-janssen-version-stable.ubuntu20.04_amd64.deb.sha256sum: OK ``` - Install the package ``` -sudo apt install ./jans_replace-janssen-version.ubuntu20.04_amd64.deb +sudo apt install ./jans_replace-janssen-version-stable.ubuntu20.04_amd64.deb ``` ## Run the setup script From 86966df52d45d4963e04dcdbfc39a09dc9f81a4b Mon Sep 17 00:00:00 2001 From: Devrim Date: Wed, 22 Jan 2025 13:05:41 +0300 Subject: [PATCH 3/4] fix(jans-linux-setup): Store fido2 authenticator_cert in DB (#10697) Signed-off-by: Mustafa Baser Co-authored-by: Mohammad Abudayyeh <47318409+moabu@users.noreply.github.com> --- .../jans_setup/setup_app/installers/fido.py | 25 ++++----- .../templates/jans-fido2/docuemts.ldif | 53 +++++++++++++++++++ 2 files changed, 64 insertions(+), 14 deletions(-) diff --git a/jans-linux-setup/jans_setup/setup_app/installers/fido.py b/jans-linux-setup/jans_setup/setup_app/installers/fido.py index 66f5557fb80..c814e886857 100644 --- a/jans-linux-setup/jans_setup/setup_app/installers/fido.py +++ b/jans-linux-setup/jans_setup/setup_app/installers/fido.py @@ -57,6 +57,7 @@ def install(self): def generate_configuration(self): Config.fido_document_certs_inum = str(uuid.uuid4()) Config.fido_document_tocs_inum = str(uuid.uuid4()) + Config.Apple_WebAuthn_Root_CA_inum = str(uuid.uuid4()) self.fido_document_creation_date = self.get_ldap_time() def render_import_templates(self): @@ -74,6 +75,15 @@ def render_import_templates(self): Config.templateRenderingDict['fido_document_tocs_base64'] = self.generate_base64_file(self.source_files[2][0], 1) Config.templateRenderingDict['fido_document_certs_base64'] = self.generate_base64_file(self.source_files[3][0], 1) + Config.templateRenderingDict['Apple_WebAuthn_Root_CA_base64'] = self.generate_base64_file(self.source_files[1][0], 1) + + for f in ('yubico-u2f-ca-cert.crt', 'HyperFIDO_CA_Cert_V1.pem', 'HyperFIDO_CA_Cert_V2.pem'): + src = os.path.join(Config.install_dir, 'static/fido2/authenticator_cert/', f) + doc_var, _ = os.path.splitext(f) + doc_var = doc_var.replace('-','_') + setattr(Config, doc_var + '_inum', str(uuid.uuid4())) + Config.templateRenderingDict[doc_var + '_base64'] = self.generate_base64_file(src, 1) + for tmp_ in (self.ldif_fido2, self.ldif_fido2_documents): self.renderTemplateInOut(tmp_, self.template_folder, self.output_folder) @@ -83,29 +93,16 @@ def render_import_templates(self): def create_folders(self): - for d in ('authenticator_cert', 'mds/cert', 'mds/toc', 'server_metadata'): + for d in ('mds/cert', 'mds/toc', 'server_metadata'): dpath = os.path.join(self.fido2ConfigFolder, d) self.run([paths.cmd_mkdir, '-p', dpath]) def copy_static(self): - # Fido2 authenticator certs - target_dir = os.path.join(self.fido2ConfigFolder, 'authenticator_cert') - for f in ('yubico-u2f-ca-cert.crt', 'HyperFIDO_CA_Cert_V1.pem', 'HyperFIDO_CA_Cert_V2.pem'): - src = os.path.join(Config.install_dir, 'static/fido2/authenticator_cert/', f) - self.copyFile(src, target_dir) - #copy fido2 server metadata src_dir = os.path.join(Config.install_dir, 'static/fido2/server_metadata') trgt_dir = os.path.join(self.fido2ConfigFolder, 'server_metadata') self.copy_tree(src_dir, trgt_dir, ignore='.dontdelete') - # copy Apple_WebAuthn_Root_CA - if os.path.exists(self.source_files[1][0]): - target_dir = os.path.join(self.fido2ConfigFolder, 'authenticator_cert') - self.run([paths.cmd_mkdir, '-p', target_dir]) - self.copyFile(self.source_files[1][0], target_dir) - - # copy external files def service_post_install_tasks(self): base.current_app.ConfigApiInstaller.install_plugin('fido2') diff --git a/jans-linux-setup/jans_setup/templates/jans-fido2/docuemts.ldif b/jans-linux-setup/jans_setup/templates/jans-fido2/docuemts.ldif index dd8fc65322b..08a9f84f9ec 100644 --- a/jans-linux-setup/jans_setup/templates/jans-fido2/docuemts.ldif +++ b/jans-linux-setup/jans_setup/templates/jans-fido2/docuemts.ldif @@ -23,3 +23,56 @@ jansEnabled: true jansFilePath: %(fido_document_tocs_dir)s jansLevel: 0 jansService: Fido2 MDS + +dn: inum=%(yubico_u2f_ca_cert_inum)s,ou=document,o=jans +objectClass: top +objectClass: jansDocument +creationDate: %(fido_document_creation_date)s +description: yubico-u2f-ca-cert.crt +displayName: yubico-u2f-ca-cert.crt +document: %(yubico_u2f_ca_cert_base64)s +inum: %(yubico_u2f_ca_cert_inum)s +jansEnabled: true +jansFilePath: %(fido_document_tocs_dir)s +jansLevel: 0 +jansService: Fido2 MDS + +dn: inum=%(HyperFIDO_CA_Cert_V1_inum)s,ou=document,o=jans +objectClass: top +objectClass: jansDocument +creationDate: %(fido_document_creation_date)s +description: HyperFIDO_CA_Cert_V1.pem +displayName: HyperFIDO_CA_Cert_V1.pem +document: %(HyperFIDO_CA_Cert_V1_base64)s +inum: %(HyperFIDO_CA_Cert_V1_inum)s +jansEnabled: true +jansFilePath: %(fido_document_tocs_dir)s +jansLevel: 0 +jansService: Fido2 MDS + +dn: inum=%(HyperFIDO_CA_Cert_V2_inum)s,ou=document,o=jans +objectClass: top +objectClass: jansDocument +creationDate: %(fido_document_creation_date)s +description: HyperFIDO_CA_Cert_V2.pem +displayName: HyperFIDO_CA_Cert_V2.pem +document: %(HyperFIDO_CA_Cert_V2_base64)s +inum: %(HyperFIDO_CA_Cert_V2_inum)s +jansEnabled: true +jansFilePath: %(fido_document_tocs_dir)s +jansLevel: 0 +jansService: Fido2 MDS + +dn: inum=%(Apple_WebAuthn_Root_CA_inum)s,ou=document,o=jans +objectClass: top +objectClass: jansDocument +creationDate: %(fido_document_creation_date)s +description: Apple_WebAuthn_Root_CA.pem +displayName: Apple_WebAuthn_Root_CA.pem +document: %(Apple_WebAuthn_Root_CA_base64)s +inum: %(Apple_WebAuthn_Root_CA_inum)s +jansEnabled: true +jansFilePath: %(fido_document_tocs_dir)s +jansLevel: 0 +jansService: Fido2 MDS + From 3b2540e3e1f94e10794e78ca09e552de3022bd30 Mon Sep 17 00:00:00 2001 From: Yuriy Movchan Date: Wed, 22 Jan 2025 13:59:16 +0300 Subject: [PATCH 4/4] Lock update (#10701) * feat(jans-lock): deprecate OPA parts, reffactor audit token reuse Signed-off-by: Yuriy Movchan * feat(jans-lock): update conf Signed-off-by: Yuriy Movchan * fix(jans-linux-setup): remove OPA installation Signed-off-by: Mustafa Baser * fix(jans-linux-setup): set lockMessageConfig.enableTokenMessages=False in auth server for all db Signed-off-by: Mustafa Baser --------- Signed-off-by: Yuriy Movchan Signed-off-by: Mustafa Baser Co-authored-by: Mustafa Baser --- jans-cli-tui/cli_tui/plugins/120_lock/main.py | 30 +- .../setup_app/installers/jans_lock.py | 24 +- .../setup_app/utils/properties_utils.py | 4 - .../static/system/systemd/opa.service | 15 - .../templates/jans-lock/dynamic-conf.json | 10 +- .../lock/model/config/AppConfiguration.java | 97 +++--- .../lock/model/config/OpaConfiguration.java | 58 ---- .../lock/service/TokenEndpointService.java | 24 +- .../jans/lock/service/audit/AuditService.java | 94 ++---- .../message/MessageConsumerFactory.java | 2 +- .../message/generic/NullMessageConsumer.java | 3 + .../message/opa/OpaMessageConsumer.java | 275 ------------------ .../policy/PolicyConsumerFactory.java | 2 +- .../policy/opa/OpaPolicyConsumer.java | 245 ---------------- .../metric/MetricProducerFactory.java | 69 ----- .../provider/metric/MetricProvider.java | 28 -- .../metric/MetricProviderInterface.java | 26 -- .../provider/metric/NullMetricProvider.java | 44 --- .../ws/rs/audit/AuditRestWebServiceImpl.java | 33 ++- .../java/io/jans/lock/util/Constants.java | 4 +- 20 files changed, 102 insertions(+), 985 deletions(-) delete mode 100644 jans-linux-setup/jans_setup/static/system/systemd/opa.service delete mode 100644 jans-lock/lock-server/model/src/main/java/io/jans/lock/model/config/OpaConfiguration.java delete mode 100644 jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/message/opa/OpaMessageConsumer.java delete mode 100644 jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/policy/opa/OpaPolicyConsumer.java delete mode 100644 jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/MetricProducerFactory.java delete mode 100644 jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/MetricProvider.java delete mode 100644 jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/MetricProviderInterface.java delete mode 100644 jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/NullMetricProvider.java diff --git a/jans-cli-tui/cli_tui/plugins/120_lock/main.py b/jans-cli-tui/cli_tui/plugins/120_lock/main.py index 7dca1fd176b..83a6f8c97bd 100644 --- a/jans-cli-tui/cli_tui/plugins/120_lock/main.py +++ b/jans-cli-tui/cli_tui/plugins/120_lock/main.py @@ -46,25 +46,6 @@ def init_plugin(self) -> None: def create_widgets(self): self.schema = self.app.cli_object.get_schema_from_reference('Lock', '#/components/schemas/AppConfiguration') - - self.opa_config_base_url = common_data.app.getTitledText( - title=_("Base URL"), - name='baseUrl', - value=self.data.get('opaConfiguration', {}).get('baseUrl', ''), - style=cli_style.edit_text, - jans_help=_("Base URL for OPA"), - widget_style=cli_style.black_bg_widget - ) - - self.opa_config_accessToken = common_data.app.getTitledText( - title=_("Access Token"), - name='accessToken', - value=self.data.get('opaConfiguration', {}).get('accessToken', ''), - style=cli_style.edit_text, - jans_help=_("Access token for OPA"), - widget_style=cli_style.black_bg_widget - ) - self.working_container = HSplit([ common_data.app.getTitledText( @@ -160,16 +141,11 @@ def create_widgets(self): common_data.app.getTitledText( title=_("PDP Type"), name='pdpType', - value=self.data.get('pdpType', 'OPA'), + value=self.data.get('pdpType', ''), style=cli_style.edit_text, widget_style=cli_style.black_bg_widget ), - Frame( - title=_("OPA Configuration"), - body=HSplit([self.opa_config_base_url, self.opa_config_accessToken]), - ), - common_data.app.getTitledText( title=_("Policies JSON URIs Authorization Token"), name='policiesJsonUrisAuthorizationToken', @@ -242,10 +218,6 @@ def save(self): async def lock_config_coroutine(): lock_config = self.make_data_from_dialog(tabs={'lock_config': self.working_container}) - lock_config['opaConfiguration'] = { - 'baseUrl': self.opa_config_base_url.me.text, - 'accessToken': self.opa_config_accessToken.me.text, - } cli_args = {'operation_id': 'put-lock-properties', 'data': lock_config} common_data.app.start_progressing(_("Saving Lock configuration")) diff --git a/jans-linux-setup/jans_setup/setup_app/installers/jans_lock.py b/jans-linux-setup/jans_setup/setup_app/installers/jans_lock.py index 13c07268ddb..8e0771547bf 100644 --- a/jans-linux-setup/jans_setup/setup_app/installers/jans_lock.py +++ b/jans-linux-setup/jans_setup/setup_app/installers/jans_lock.py @@ -11,8 +11,6 @@ from setup_app.utils.ldif_utils import myLdifParser, create_client_ldif Config.jans_lock_port = '8076' -Config.jans_opa_host = 'localhost' -Config.jans_opa_port = '8181' Config.lock_message_provider_type = 'DISABLED' Config.lock_redis_host = 'localhost' Config.lock_redis_port = '6379' @@ -23,7 +21,7 @@ class JansLockInstaller(JettyInstaller): source_files = [ (os.path.join(Config.dist_jans_dir, 'jans-lock.war'), os.path.join(base.current_app.app_info['JANS_MAVEN'], 'maven/io/jans/jans-lock-server/{0}/jans-lock-server-{0}.war').format(base.current_app.app_info['jans_version'])), (os.path.join(Config.dist_jans_dir, 'jans-lock-service.jar'), os.path.join(base.current_app.app_info['JANS_MAVEN'], 'maven/io/jans/jans-lock-service/{0}/jans-lock-service-{0}.jar').format(base.current_app.app_info['jans_version'])), - (os.path.join(Config.dist_app_dir, 'opa'), 'https://openpolicyagent.org/downloads/{}/opa_linux_amd64_static'.format(base.current_app.app_info['OPA_VERSION'])), + (os.path.join(Config.dist_jans_dir, 'lock-plugin.jar'), os.path.join(base.current_app.app_info['JANS_MAVEN'], 'maven/io/jans/jans-config-api/plugins/lock-plugin/{0}/lock-plugin-{0}-distribution.jar').format(base.current_app.app_info['jans_version'])), (os.path.join(Config.dist_jans_dir, 'jans-lock-model.jar'), os.path.join(base.current_app.app_info['JANS_MAVEN'], 'maven/io/jans/jans-lock-model/{0}/jans-lock-model-{0}.jar'.format(base.current_app.app_info['jans_version']))), ] @@ -46,9 +44,6 @@ def __init__(self): self.static_conf_json = os.path.join(self.output_dir, 'static-conf.json') self.message_conf_json = os.path.join(self.output_dir, 'jans_message_conf.json') self.config_ldif = os.path.join(self.output_dir, 'config.ldif') - self.opa_dir = os.path.join(Config.opt_dir, 'opa') - self.opa_bin_dir = os.path.join(self.opa_dir, 'bin') - self.opa_log_dir = os.path.join(self.opa_dir, 'logs') self.base_endpoint = 'jans-lock' if Config.get('install_jans_lock_as_server') else 'jans-auth' self.clients_ldif_fn = os.path.join(self.output_dir, 'clients.ldif') @@ -59,16 +54,11 @@ def install(self): else: self.install_as_service() - if Config.get('install_opa'): - self.install_opa() - self.create_client() if Config.persistence_type == 'sql' and Config.rdbm_type == 'pgsql': - self.dbUtils.set_jans_auth_conf_dynamic({'lockMessageConfig': {'enableTokenMessages': True, 'tokenMessagesChannel': 'jans_token'}}) Config.lock_message_provider_type = 'POSTGRES' - self.apache_lock_config() def create_client(self): @@ -110,7 +100,7 @@ def install_as_server(self): self.enable() def install_as_service(self): - for plugin in (self.source_files[1][0], self.source_files[4][0]): + for plugin in (self.source_files[1][0], self.source_files[3][0]): plugin_name = os.path.basename(plugin) self.logIt(f"Adding plugin {plugin_name} to jans-auth") self.copyFile(plugin, base.current_app.JansAuthInstaller.custom_lib_dir) @@ -163,16 +153,6 @@ def apache_lock_config(self): self.writeFile(base.current_app.HttpdInstaller.https_jans_fn, '\n'.join(apache_config), backup=False) - def install_opa(self): - opa_fn = 'opa' - self.systemd_units.append(opa_fn) - self.createDirs(self.opa_bin_dir) - self.createDirs(self.opa_log_dir) - self.copyFile(self.source_files[2][0], self.opa_bin_dir) - self.run([paths.cmd_chmod, '755', os.path.join(self.opa_bin_dir, opa_fn)]) - self.chown(self.opa_dir, Config.jetty_user, Config.jetty_group, recursive=True) - self.enable(opa_fn) - def installed(self): return os.path.exists(self.jetty_service_webapps) or os.path.exists(os.path.join(base.current_app.JansAuthInstaller.custom_lib_dir, os.path.basename(self.source_files[1][0]))) diff --git a/jans-linux-setup/jans_setup/setup_app/utils/properties_utils.py b/jans-linux-setup/jans_setup/setup_app/utils/properties_utils.py index a6b1e8707d3..d7461b731b0 100644 --- a/jans-linux-setup/jans_setup/setup_app/utils/properties_utils.py +++ b/jans-linux-setup/jans_setup/setup_app/utils/properties_utils.py @@ -351,10 +351,6 @@ def pompt_for_jans_lock(self): if prompt == 'y': Config.install_jans_lock = True - if Config.install_jans_lock: - prompt = self.getPrompt(" Install OPA?", self.getDefaultOption(Config.install_opa))[0].lower() - Config.install_opa = prompt == 'y' - if Config.installed_instance and Config.install_jans_lock: Config.addPostSetupService.append('install_jans_lock') diff --git a/jans-linux-setup/jans_setup/static/system/systemd/opa.service b/jans-linux-setup/jans_setup/static/system/systemd/opa.service deleted file mode 100644 index ce72333f53d..00000000000 --- a/jans-linux-setup/jans_setup/static/system/systemd/opa.service +++ /dev/null @@ -1,15 +0,0 @@ -[Unit] -Description=Open Policy Agent Server -After=network.target - -[Service] -Type=simple -ExecStart=%(opa_bin_dir)s/opa run --server --addr %(jans_opa_host)s:%(jans_opa_port)s -StandardOutput=file:%(opa_log_dir)s/stdout.log -StandardError=file:%(opa_log_dir)s/stderr.log - -User=jetty -Group=jetty - -[Install] -WantedBy=multi-user.target diff --git a/jans-linux-setup/jans_setup/templates/jans-lock/dynamic-conf.json b/jans-linux-setup/jans_setup/templates/jans-lock/dynamic-conf.json index 81f47b5119c..7ffead6c2d1 100644 --- a/jans-linux-setup/jans_setup/templates/jans-lock/dynamic-conf.json +++ b/jans-linux-setup/jans_setup/templates/jans-lock/dynamic-conf.json @@ -7,7 +7,6 @@ "clientId": "%(lock_client_id)s", "clientPassword": "%(lock_client_encoded_pw)s", "tokenUrl": "%(jans_auth_token_endpoint)s", - "groupScopeEnabled": true, "endpointGroups": { "audit": [ "telemetry", @@ -52,14 +51,11 @@ "metricReporterKeepDataDays": 15, "metricReporterEnabled": true, "statEnabled": true, - "errorReasonEnabled": false, - "opaConfiguration": { - "baseUrl": "http://%(jans_opa_host)s:%(jans_opa_port)s/v1/", - "accessToken": "" - }, "policiesJsonUris": [], "policiesJsonUrisAuthorizationToken": "", "policiesZipUris": [], "policiesZipUrisAuthorizationToken": "", - "pdpType": "OPA" + "messageConsumerType" : "DISABLED", + "policyConsumerType" : "DISABLED", + "errorReasonEnabled": false } diff --git a/jans-lock/lock-server/model/src/main/java/io/jans/lock/model/config/AppConfiguration.java b/jans-lock/lock-server/model/src/main/java/io/jans/lock/model/config/AppConfiguration.java index 042ee8849b1..73aa99495ef 100644 --- a/jans-lock/lock-server/model/src/main/java/io/jans/lock/model/config/AppConfiguration.java +++ b/jans-lock/lock-server/model/src/main/java/io/jans/lock/model/config/AppConfiguration.java @@ -16,7 +16,6 @@ package io.jans.lock.model.config; -import java.util.ArrayList; import java.util.List; import java.util.Map; @@ -70,10 +69,6 @@ public class AppConfiguration implements Configuration { @DocProperty(description = "Jans URL of the OpenID Connect Provider's OAuth 2.0 Token Endpoint") @Schema(description = "Jans URL of the OpenID Connect Provider's OAuth 2.0 Token Endpoint") private String tokenUrl; - - @DocProperty(description = "Group scope enabled") - @Schema(description = "Group scope enabled") - private boolean groupScopeEnabled; @DocProperty(description = "Endpoint groups") @Schema(description = "Endpoint groups") @@ -99,10 +94,6 @@ public class AppConfiguration implements Configuration { @Schema(description = "The path to the external log4j2 logging configuration") private String externalLoggerConfiguration; - @DocProperty(description = "Channel for metric reports", defaultValue = "jans_pdp_metric") - @Schema(description = "Channel for metric reports") - private String metricChannel; - @DocProperty(description = "The interval for metric reporter in seconds") @Schema(description = "The interval for metric reporter in seconds") private int metricReporterInterval; @@ -120,13 +111,6 @@ public class AppConfiguration implements Configuration { @Schema(description = "Time interval for the Clean Service in seconds") private int cleanServiceInterval; - @Schema(description = "Opa Configuration") - private OpaConfiguration opaConfiguration; - - @DocProperty(description = "PDP type") - @Schema(description = "PDP type") - private String pdpType; - @DocProperty(description = "Authorization token to access Json Uris") @Schema(description = "Authorization token to access Json Uris") private String policiesJsonUrisAuthorizationToken; @@ -143,6 +127,14 @@ public class AppConfiguration implements Configuration { @Schema(description = "List of Zip Uris with policies") private List policiesZipUris; + @DocProperty(description = "PubSub consumer service") + @Schema(description = "PubSub consumer service") + private String messageConsumerType; + + @DocProperty(description = "Policy consumer service") + @Schema(description = "Policy consumer service") + private String policyConsumerType; + @DocProperty(description = "Boolean value specifying whether to return detailed reason of the error from AS. Default value is false", defaultValue = "false") private Boolean errorReasonEnabled = false; @@ -217,14 +209,6 @@ public String getTokenUrl() { public void setTokenUrl(String tokenUrl) { this.tokenUrl = tokenUrl; } - - public boolean isGroupScopeEnabled() { - return groupScopeEnabled; - } - - public void setGroupScopeEnabled(boolean groupScopeEnabled) { - this.groupScopeEnabled = groupScopeEnabled; - } public Map> getEndpointGroups() { return endpointGroups; @@ -274,14 +258,6 @@ public void setExternalLoggerConfiguration(String externalLoggerConfiguration) { this.externalLoggerConfiguration = externalLoggerConfiguration; } - public String getMetricChannel() { - return metricChannel; - } - - public void setMetricChannel(String metricChannel) { - this.metricChannel = metricChannel; - } - public int getMetricReporterInterval() { return metricReporterInterval; } @@ -314,22 +290,6 @@ public void setCleanServiceInterval(int cleanServiceInterval) { this.cleanServiceInterval = cleanServiceInterval; } - public OpaConfiguration getOpaConfiguration() { - return opaConfiguration; - } - - public void setOpaConfiguration(OpaConfiguration opaConfiguration) { - this.opaConfiguration = opaConfiguration; - } - - public String getPdpType() { - return pdpType; - } - - public void setPdpType(String pdpType) { - this.pdpType = pdpType; - } - public String getPoliciesJsonUrisAuthorizationToken() { return policiesJsonUrisAuthorizationToken; } @@ -362,7 +322,25 @@ public void setPoliciesZipUris(List policiesZipUris) { this.policiesZipUris = policiesZipUris; } - public Boolean getErrorReasonEnabled() { + public String getMessageConsumerType() { + if (messageConsumerType == null) messageConsumerType = "DISABLED"; + return messageConsumerType; + } + + public void setMessageConsumerType(String messageConsumerType) { + this.messageConsumerType = messageConsumerType; + } + + public String getPolicyConsumerType() { + if (policyConsumerType == null) policyConsumerType = "DISABLED"; + return policyConsumerType; + } + + public void setPolicyConsumerType(String policyConsumerType) { + this.policyConsumerType = policyConsumerType; + } + + public Boolean getErrorReasonEnabled() { if (errorReasonEnabled == null) errorReasonEnabled = false; return errorReasonEnabled; } @@ -376,17 +354,16 @@ public String toString() { return "AppConfiguration [baseDN=" + baseDN + ", baseEndpoint=" + baseEndpoint + ", openIdIssuer=" + openIdIssuer + ", statEnabled=" + statEnabled + ", statTimerIntervalInSeconds=" + statTimerIntervalInSeconds + ", tokenChannels=" + tokenChannels + ", clientId=" + clientId - + ", clientPassword=" + clientPassword + ", tokenUrl=" + tokenUrl + ", groupScopeEnabled=" - + groupScopeEnabled + ", endpointGroups=" + endpointGroups + ", endpointDetails=" + endpointDetails - + ", disableJdkLogger=" + disableJdkLogger + ", loggingLevel=" + loggingLevel + ", loggingLayout=" - + loggingLayout + ", externalLoggerConfiguration=" + externalLoggerConfiguration + ", metricChannel=" - + metricChannel + ", metricReporterInterval=" + metricReporterInterval + ", metricReporterKeepDataDays=" - + metricReporterKeepDataDays + ", metricReporterEnabled=" + metricReporterEnabled - + ", cleanServiceInterval=" + cleanServiceInterval + ", opaConfiguration=" + opaConfiguration - + ", pdpType=" + pdpType + ", policiesJsonUrisAuthorizationToken=" + policiesJsonUrisAuthorizationToken - + ", policiesJsonUris=" + policiesJsonUris + ", policiesZipUrisAuthorizationToken=" - + policiesZipUrisAuthorizationToken + ", policiesZipUris=" + policiesZipUris + ", errorReasonEnabled=" - + errorReasonEnabled + "]"; + + ", clientPassword=" + clientPassword + ", tokenUrl=" + tokenUrl + ", endpointGroups=" + endpointGroups + + ", endpointDetails=" + endpointDetails + ", disableJdkLogger=" + disableJdkLogger + ", loggingLevel=" + + loggingLevel + ", loggingLayout=" + loggingLayout + ", externalLoggerConfiguration=" + + externalLoggerConfiguration + ", metricReporterInterval=" + metricReporterInterval + + ", metricReporterKeepDataDays=" + metricReporterKeepDataDays + ", metricReporterEnabled=" + + metricReporterEnabled + ", cleanServiceInterval=" + cleanServiceInterval + + ", policiesJsonUrisAuthorizationToken=" + policiesJsonUrisAuthorizationToken + ", policiesJsonUris=" + + policiesJsonUris + ", policiesZipUrisAuthorizationToken=" + policiesZipUrisAuthorizationToken + + ", policiesZipUris=" + policiesZipUris + ", messageConsumerType=" + messageConsumerType + + ", policyConsumerType=" + policyConsumerType + ", errorReasonEnabled=" + errorReasonEnabled + "]"; } } diff --git a/jans-lock/lock-server/model/src/main/java/io/jans/lock/model/config/OpaConfiguration.java b/jans-lock/lock-server/model/src/main/java/io/jans/lock/model/config/OpaConfiguration.java deleted file mode 100644 index a2ec77dc44d..00000000000 --- a/jans-lock/lock-server/model/src/main/java/io/jans/lock/model/config/OpaConfiguration.java +++ /dev/null @@ -1,58 +0,0 @@ -/* - * Copyright [2024] [Janssen Project] - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -package io.jans.lock.model.config; - -import com.fasterxml.jackson.annotation.JsonIgnoreProperties; - -import io.jans.doc.annotation.DocProperty; -import jakarta.enterprise.inject.Vetoed; - -import io.swagger.v3.oas.annotations.media.Schema; - -/** - * - * @author Yuriy Movchan Date: 12/12/2023 - */ -@Vetoed -@JsonIgnoreProperties(ignoreUnknown = true) -public class OpaConfiguration implements Configuration { - - @Schema(description = "Base OPA URL") - @DocProperty(description = "Base OPA URL") - private String baseUrl; - - @Schema(description = "OPA access token") - @DocProperty(description = "OPA access token") - private String accessToken; - - public String getBaseUrl() { - return baseUrl; - } - - public void setBaseUrl(String baseUrl) { - this.baseUrl = baseUrl; - } - - public String getAccessToken() { - return accessToken; - } - - public void setAccessToken(String accessToken) { - this.accessToken = accessToken; - } - -} diff --git a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/TokenEndpointService.java b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/TokenEndpointService.java index 0505a5e5add..28048212503 100644 --- a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/TokenEndpointService.java +++ b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/TokenEndpointService.java @@ -1,6 +1,5 @@ package io.jans.lock.service; -import java.util.Date; import java.util.HashMap; import java.util.HashSet; import java.util.List; @@ -9,7 +8,6 @@ import java.util.Set; import org.apache.commons.lang3.StringUtils; -import org.apache.commons.lang3.time.DateUtils; import org.apache.http.HttpEntity; import org.apache.http.entity.ContentType; import org.apache.http.util.EntityUtils; @@ -263,15 +261,12 @@ private String getEndpointUrl(String endpoint) { } private String getScopeForToken(String endpoint, boolean allGroupScopes) { - log.info("Request for token for endpoint:{}, allGroupScopes:{}, appConfiguration.isGroupScopeEnabled():{}", - endpoint, allGroupScopes, appConfiguration.isGroupScopeEnabled()); + log.info("Request for token for endpoint:{}, allGroupScopes:{}", endpoint, allGroupScopes); StringBuilder sb = new StringBuilder(); sb.append(ScopeType.OPENID.getValue()); List scopeList = null; - boolean groupScopeEnabled = this.appConfiguration.isGroupScopeEnabled(); - - if (allGroupScopes && groupScopeEnabled) { + if (allGroupScopes) { scopeList = this.getAllGroupScope(endpoint); } else { scopeList = this.getScopes(endpoint); @@ -389,19 +384,4 @@ private Response post(String url, String authType, String token, Map tokenDetails = new HashMap<>(); + private ExpiringMap issuedTokens; + + @PostConstruct + public void init() { + this.issuedTokens = ExpiringMap.builder().expirationPolicy(ExpirationPolicy.CREATED).variableExpiration().build(); + } public Response post(String endpoint, String postData, ContentType contentType) { log.info("postData - endpoint:{}, postData:{}, contentType:{}", endpoint, postData, contentType); + + Token token = issuedTokens.get(endpoint); - Date tokenExpiryDate = this.getTokenExpiryDate(); - log.debug("postData - tokenExpiryDate:{}", tokenExpiryDate); - boolean isTokenValid = this.tokenEndpointService.isTokenValid(tokenExpiryDate); - log.debug(" postData - tokenDetails:{}, tokenExpiryDate:{}, isTokenValid:{}", tokenDetails, tokenExpiryDate, - isTokenValid); - String accessToken = null; - if (tokenDetails != null && !tokenDetails.isEmpty() && isTokenValid) { - log.info("Reusing token as still valid!"); - accessToken = this.getToken(); - } else { - log.info("Generating new token !"); + String accessToken; + if (token == null) { + log.info("Generating new token for endpoint '{}'", endpoint); accessToken = this.getAccessTokenForAudit(endpoint); - } - return this.tokenEndpointService.post(endpoint, postData, contentType, accessToken); - } - - public JsonNode getJsonNode(HttpServletRequest request) { - JsonNode jsonBody = null; - if (request == null) { - return jsonBody; - } - - try { - jsonBody = dataMapperService.readTree(request.getInputStream()); - log.debug(" jsonBody:{}", jsonBody); - } catch (Exception ex) { - ex.printStackTrace(); - log.error("Exception while retriving json from request is - ", ex); + } else { + accessToken = token.getAccessToken(); + log.debug("Reusing token for endpoint '{}' : {}", endpoint, accessToken); } - return jsonBody; + return this.tokenEndpointService.post(endpoint, postData, contentType, accessToken); } private String getAccessTokenForAudit(String endpoint) { @@ -85,41 +63,13 @@ private String getAccessTokenForAudit(String endpoint) { log.debug("Get Access Token For Audit endpoint:{}, token:{}", endpoint, token); if (token != null) { + issuedTokens.put(endpoint, token, ExpirationPolicy.CREATED, token.getExpiresIn(), TimeUnit.SECONDS); + accessToken = token.getAccessToken(); - Integer expiresIn = token.getExpiresIn(); log.debug("Get Access Token For Audit endpoint:{}, accessToken:{}, expiresIn", endpoint, accessToken); - - tokenDetails.put(accessToken, this.tokenEndpointService.computeTokenExpiryTime(expiresIn)); - } - return accessToken; - } - - private Date getTokenExpiryDate() { - Date tokenExpiryDate = null; - if (tokenDetails != null && !tokenDetails.isEmpty() && tokenDetails.values() != null - && !tokenDetails.values().isEmpty()) { - Optional expiryDate = tokenDetails.values().stream().findFirst(); - - if (expiryDate.isPresent()) { - tokenExpiryDate = expiryDate.get(); - } - log.debug("tokenExpiryDate:{}", tokenExpiryDate); } - return tokenExpiryDate; - } - private String getToken() { - log.debug("tokenDetails:{}", tokenDetails); - String accessToken = null; - if (tokenDetails != null && !tokenDetails.isEmpty() && tokenDetails.keySet() != null - && !tokenDetails.keySet().isEmpty()) { - Optional token = tokenDetails.keySet().stream().findFirst(); - - if (token.isPresent() && StringUtils.isNotBlank(token.get())) { - accessToken = token.get(); - } - } - log.debug("accessToken:{}", accessToken); return accessToken; } + } diff --git a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/message/MessageConsumerFactory.java b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/message/MessageConsumerFactory.java index 58ba73a3605..9d98bfa15c6 100644 --- a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/message/MessageConsumerFactory.java +++ b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/message/MessageConsumerFactory.java @@ -90,7 +90,7 @@ private void recreateMessageConsumer() { @Produces @ApplicationScoped public MessageConsumer produceMessageConsumer() { - String messageConsumerType = appConfiguration.getPdpType(); + String messageConsumerType = appConfiguration.getMessageConsumerType(); MessageConsumer messageConsumer = getMessageConsumer(messageConsumerType); return messageConsumer; diff --git a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/message/generic/NullMessageConsumer.java b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/message/generic/NullMessageConsumer.java index d66b2568531..f37d26fe22c 100644 --- a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/message/generic/NullMessageConsumer.java +++ b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/message/generic/NullMessageConsumer.java @@ -40,6 +40,9 @@ public class NullMessageConsumer extends MessageConsumer { @Inject private Logger log; + /* + * Message: {"tknTyp" : "access_token", "tknId": "UUID"} + */ @Override @Asynchronous public void onMessage(String channel, String message) { diff --git a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/message/opa/OpaMessageConsumer.java b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/message/opa/OpaMessageConsumer.java deleted file mode 100644 index 71d1e84affa..00000000000 --- a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/message/opa/OpaMessageConsumer.java +++ /dev/null @@ -1,275 +0,0 @@ -/* - * Copyright [2024] [Janssen Project] - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -package io.jans.lock.service.consumer.message.opa; - -import static java.time.format.DateTimeFormatter.ISO_INSTANT; - -import java.io.IOException; -import java.time.Duration; -import java.util.Date; -import java.util.concurrent.TimeUnit; - -import org.apache.http.HttpResponse; -import org.apache.http.HttpStatus; -import org.apache.http.client.methods.HttpDelete; -import org.apache.http.client.methods.HttpPut; -import org.apache.http.client.methods.HttpRequestBase; -import org.apache.http.entity.ContentType; -import org.apache.http.entity.StringEntity; -import org.apache.http.impl.client.CloseableHttpClient; -import org.slf4j.Logger; - -import com.fasterxml.jackson.core.JacksonException; -import com.fasterxml.jackson.databind.JsonNode; -import com.fasterxml.jackson.databind.ObjectMapper; -import com.fasterxml.jackson.databind.node.ObjectNode; - -import io.jans.lock.model.config.AppConfiguration; -import io.jans.lock.model.config.OpaConfiguration; -import io.jans.lock.service.TokenService; -import io.jans.lock.service.external.ExternalLockService; -import io.jans.lock.service.external.context.ExternalLockContext; -import io.jans.model.token.TokenEntity; -import io.jans.service.EncryptionService; -import io.jans.service.cdi.async.Asynchronous; -import io.jans.service.cdi.qualifier.Implementation; -import io.jans.service.message.consumer.MessageConsumer; -import io.jans.service.net.BaseHttpService; -import io.jans.util.StringHelper; -import jakarta.annotation.PostConstruct; -import jakarta.enterprise.context.ApplicationScoped; -import jakarta.inject.Inject; -import net.jodah.expiringmap.ExpirationListener; -import net.jodah.expiringmap.ExpirationPolicy; -import net.jodah.expiringmap.ExpiringMap; - -/** - * OPA message consumer - * - * @author Yuriy Movchan Date: 12/25/2023 - */ -@Implementation -@ApplicationScoped -public class OpaMessageConsumer extends MessageConsumer { - - public static String MESSAGE_CONSUMER_TYPE = "OPA"; - - @Inject - private Logger log; - - @Inject - private AppConfiguration appConfiguration; - - @Inject - private ExternalLockService externalLockService; - - @Inject - private BaseHttpService httpService; - - @Inject - private TokenService tokenService; - - @Inject - private EncryptionService encryptionService; - - private ObjectMapper objectMapper; - - private ExpiringMap loadedTokens; - private OpaExpirationListener expirationListener; - - @PostConstruct - public void init() { - this.objectMapper = new ObjectMapper(); - this.expirationListener = new OpaExpirationListener(); - this.loadedTokens = ExpiringMap.builder().expirationPolicy(ExpirationPolicy.CREATED).variableExpiration().expirationListener(expirationListener).build(); - } - - /* - * Message: {"tknTyp" : "access_token", "tknId": "UUID"} - */ - @Override - @Asynchronous - public void onMessage(String channel, String message) { - log.info("onMessage {} : {}", channel, message); - - try { - JsonNode messageNode = objectMapper.readTree(message); - - if (!(messageNode.hasNonNull("tknTyp") && messageNode.hasNonNull("tknId") && messageNode.hasNonNull("tknOp"))) { - log.error("Message has missing tknOp or tknTyp, or tknTyp: '{}'", message); - return; - } - - String tknOp = messageNode.get("tknOp").asText(); - if (StringHelper.equalsIgnoreCase(tknOp, "add")) { - putData(message, messageNode); - } else if (StringHelper.equalsIgnoreCase(tknOp, "del")) { - removeData(messageNode); - } else { - log.error("Message has unsupported operation: '{}'", message); - } - } catch (JacksonException ex) { - log.error("Failed to parse messge: '{}'", message, ex); - } - } - - @Override - public void onSubscribe(String channel, int subscribedChannels) { - log.debug("onSubscribe {} : {}", channel, subscribedChannels); - } - - @Override - public void onUnsubscribe(String channel, int subscribedChannels) { - log.debug("onUnsubscribe {} : {}", channel, subscribedChannels); - } - - @Override - public String getMessageConsumerType() { - return MESSAGE_CONSUMER_TYPE; - } - - @Override - public boolean putData(String message, JsonNode messageNode) { - ExternalLockContext lockContext = new ExternalLockContext(); - - String tknTyp = messageNode.get("tknTyp").asText(); - String tknId = messageNode.get("tknId").asText(); - - TokenEntity tokenEntity = tokenService.findToken(tknId); - log.debug("Token {} loaded successfully", tokenEntity); - lockContext.setTokenEntity(tokenEntity); - - ObjectNode dataNode = objectMapper.createObjectNode(); - buildBaseTokenObject(tokenEntity, dataNode); - - externalLockService.beforeDataPut(messageNode, dataNode, lockContext); - - if (lockContext.isCancelPdpOperation()) { - log.debug("DataPut was canceled by script"); - return true; - } - - // Send rest request to OPA - OpaConfiguration opaConfiguration = appConfiguration.getOpaConfiguration(); - String baseUrl = opaConfiguration.getBaseUrl(); - - HttpPut request = new HttpPut(String.format("%s/data/%s/%s", baseUrl, tknTyp, tknId)); - addAccessTokenHeader(request, opaConfiguration); - - request.addHeader("Content-Type", ContentType.APPLICATION_JSON.getMimeType()); - request.addHeader("If-None-Match", "*"); - - StringEntity stringEntity = new StringEntity(dataNode.toString(), ContentType.APPLICATION_JSON); - request.setEntity(stringEntity); - - boolean result = false; - try { - CloseableHttpClient httpClient = httpService.getHttpsClient(); - HttpResponse httpResponse = httpClient.execute(request); - - int statusCode = httpResponse.getStatusLine().getStatusCode(); - log.debug("Get OPA add data for token '{}' response with status code '{}'", tknId, statusCode); - - result = (statusCode == HttpStatus.SC_NO_CONTENT) || (statusCode == HttpStatus.SC_NOT_MODIFIED); - } catch (IOException ex) { - log.error("Failed to execute put data request", ex); - } - - if (result) { - loadedTokens.put(tknId, message, ExpirationPolicy.CREATED, getExpirationInSeconds(tokenEntity), TimeUnit.SECONDS); - } - - return result; - } - - public void buildBaseTokenObject(TokenEntity tokenEntity, ObjectNode dataNode) { - dataNode.put("scope", tokenEntity.getScope()); - dataNode.put("creationDate", ISO_INSTANT.format(tokenEntity.getCreationDate().toInstant())); - dataNode.put("expirationDate", ISO_INSTANT.format(tokenEntity.getExpirationDate().toInstant())); - dataNode.put("userId", tokenEntity.getUserId()); - dataNode.put("clientId", tokenEntity.getClientId()); - } - - protected boolean removeData(JsonNode messageNode) { - ExternalLockContext lockContext = new ExternalLockContext(); - - externalLockService.beforeDataRemoval(messageNode, lockContext); - - if (lockContext.isCancelPdpOperation()) { - log.debug("DataRemoval was canceled by script"); - return true; - } - - // Send rest request to OPA - String tknTyp = messageNode.get("tknTyp").asText(); - String tknId = messageNode.get("tknId").asText(); - - OpaConfiguration opaConfiguration = appConfiguration.getOpaConfiguration(); - String baseUrl = opaConfiguration.getBaseUrl(); - - HttpDelete request = new HttpDelete(String.format("%s/data/%s/%s", baseUrl, tknTyp, tknId)); - addAccessTokenHeader(request, opaConfiguration); - - boolean result = false; - try { - CloseableHttpClient httpClient = httpService.getHttpsClient(); - HttpResponse httpResponse = httpClient.execute(request); - - int statusCode = httpResponse.getStatusLine().getStatusCode(); - log.debug("Get OPA remove data for token '{}' response with status code '{}'", tknId, statusCode); - - result = statusCode == HttpStatus.SC_NO_CONTENT; - } catch (IOException ex) { - log.error("Failed to execute delete data request", ex); - } - - return result; - } - - protected long getExpirationInSeconds(TokenEntity tokenEntity) { - final Long duration = Duration.between(new Date().toInstant(), tokenEntity.getExpirationDate().toInstant()).getSeconds(); - - return duration; - } - - private void addAccessTokenHeader(HttpRequestBase request, OpaConfiguration opaConfiguration) { - String accessToken = encryptionService.decrypt(opaConfiguration.getAccessToken(), true); - if (StringHelper.isNotEmpty(accessToken)) { - request.setHeader("Authorization", "Bearer " + accessToken); - } - } - - protected class OpaExpirationListener implements ExpirationListener { - - public void expired(String key, String message) { - log.debug("Deleting expired token {}", key); - JsonNode messageNode; - try { - messageNode = objectMapper.readTree(message); - removeData(messageNode); - } catch (JacksonException ex) { - log.error("Failed to parse messge: '{}'", message, ex); - } - } - } - - @Override - public void destroy() { - log.debug("Destroy Messages"); - } - -} diff --git a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/policy/PolicyConsumerFactory.java b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/policy/PolicyConsumerFactory.java index e175fc65d39..a48fd5cfe25 100644 --- a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/policy/PolicyConsumerFactory.java +++ b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/policy/PolicyConsumerFactory.java @@ -78,7 +78,7 @@ private void recreatePolicyConsumer() { @Produces @ApplicationScoped public PolicyConsumer producePolicyConsumer() { - String policyConsumerType = appConfiguration.getPdpType(); + String policyConsumerType = appConfiguration.getPolicyConsumerType(); PolicyConsumer policyConsumer = buildPolicyConsumer(policyConsumerType); return policyConsumer; diff --git a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/policy/opa/OpaPolicyConsumer.java b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/policy/opa/OpaPolicyConsumer.java deleted file mode 100644 index 4559204853b..00000000000 --- a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/consumer/policy/opa/OpaPolicyConsumer.java +++ /dev/null @@ -1,245 +0,0 @@ -/* - * Copyright [2024] [Janssen Project] - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -package io.jans.lock.service.consumer.policy.opa; - -import java.io.IOException; -import java.math.BigInteger; -import java.nio.charset.StandardCharsets; -import java.security.MessageDigest; -import java.security.NoSuchAlgorithmException; -import java.security.NoSuchProviderException; -import java.util.ArrayList; -import java.util.HashMap; -import java.util.List; -import java.util.Map; -import java.util.concurrent.ConcurrentHashMap; - -import org.apache.http.HttpResponse; -import org.apache.http.HttpStatus; -import org.apache.http.client.methods.HttpDelete; -import org.apache.http.client.methods.HttpPut; -import org.apache.http.client.methods.HttpRequestBase; -import org.apache.http.entity.ContentType; -import org.apache.http.entity.StringEntity; -import org.apache.http.impl.client.CloseableHttpClient; -import org.slf4j.Logger; - -import com.unboundid.util.Base64; - -import io.jans.lock.model.config.AppConfiguration; -import io.jans.lock.model.config.OpaConfiguration; -import io.jans.lock.service.consumer.policy.PolicyConsumer; -import io.jans.lock.service.external.ExternalLockService; -import io.jans.lock.service.external.context.ExternalLockContext; -import io.jans.service.EncryptionService; -import io.jans.service.cdi.qualifier.Implementation; -import io.jans.service.net.BaseHttpService; -import io.jans.util.StringHelper; -import jakarta.annotation.PostConstruct; -import jakarta.enterprise.context.ApplicationScoped; -import jakarta.enterprise.inject.Instance; -import jakarta.inject.Inject; - -/** - * OPA policy consumer - * - * @author Yuriy Movchan Date: 12/25/2023 - */ -@Implementation -@ApplicationScoped -public class OpaPolicyConsumer extends PolicyConsumer { - - public static String POLICY_CONSUMER_TYPE = "OPA"; - - @Inject - private AppConfiguration appConfiguration; - - @Inject - private ExternalLockService externalLockService; - - @Inject - private BaseHttpService httpService; - - @Inject - private Logger log; - - @Inject - @Implementation - private Instance policyConsumerProviderInstance; - - @Inject - private EncryptionService encryptionService; - - private MessageDigest sha256Digest; - - private Map> loadedPolicies; - - @PostConstruct - public void init() { - this.loadedPolicies = new ConcurrentHashMap>(); - try { - this.sha256Digest = MessageDigest.getInstance("SHA-256", "BC"); - } catch (NoSuchAlgorithmException ex) { - } catch (NoSuchProviderException ex) { - log.error("Failed to prepare SHA256 digister", ex); - } - } - - @Override - public boolean putPolicies(String sourceUri, List policies) { - log.debug("PutPolicies from {}, count {}", sourceUri, policies.size()); - - ExternalLockContext lockContext = new ExternalLockContext(); - externalLockService.beforePolicyPut(sourceUri, policies, lockContext); - - if (lockContext.isCancelPdpOperation()) { - log.debug("PutPolicies was canceled by script"); - return true; - } - - // Send rest request to OPA - String baseId = Base64.urlEncode(sourceUri, false); - - if (!loadedPolicies.containsKey(baseId)) { - loadedPolicies.put(baseId, new ArrayList<>(policies.size())); - } - - List policyIds = loadedPolicies.get(baseId); - - boolean result = true; - List cleanPolicyIds = new ArrayList<>(policyIds); - for (String policy : policies) { - byte[] digest = sha256Digest.digest(policy.getBytes(StandardCharsets.UTF_8)); - String policyId = new BigInteger(1, digest).toString(); - - if (policyIds.contains(policyId)) { - cleanPolicyIds.remove(policyId); - log.debug("Policy with digiest '{}' is already downloaded", policyId); - continue; - } - - OpaConfiguration opaConfiguration = appConfiguration.getOpaConfiguration(); - String baseUrl = opaConfiguration.getBaseUrl(); - - HttpPut request = new HttpPut(String.format("%s/policies/%s", baseUrl, policyId)); - addAccessTokenHeader(request, opaConfiguration); - - StringEntity stringEntity = new StringEntity(policy, ContentType.TEXT_PLAIN); - request.setEntity(stringEntity); - - try { - CloseableHttpClient httpClient = httpService.getHttpsClient(); - HttpResponse httpResponse = httpClient.execute(request); - - int statusCode = httpResponse.getStatusLine().getStatusCode(); - log.debug("Get OPA add policy for policyId '{}' response with status code '{}'", policyId, statusCode); - - result &= statusCode == HttpStatus.SC_OK; - } catch (IOException ex) { - log.error("Failed to add policy to OPA", ex); - } - - policyIds.add(policyId); - } - - // Remove old policies after processing currentPoliciesDigests - for (String policyId : cleanPolicyIds) { - result &= sendRemovePolicyRequest(sourceUri, policyId); - policyIds.remove(policyId); - } - - return result; - } - - @Override - public boolean removePolicies(String sourceUri) { - log.debug("RemovePolicies from {}", sourceUri); - - // Sent rest request to OPA - String baseId = Base64.urlEncode(sourceUri, false); - List policyIds = loadedPolicies.get(baseId); - - if (policyIds == null) { - log.warn("There is no loadeed policies from sourceUri: '{}'", sourceUri); - return true; - } - - boolean result = true; - for (String policyId : policyIds) { - result &= sendRemovePolicyRequest(sourceUri, policyId); - } - - return result; - } - - @Override - public void destroy() { - Map> clonedLoadedPolicies = new HashMap<>(loadedPolicies); - loadedPolicies.clear(); - - log.debug("Destroy Policies"); - for (String sourceUri : clonedLoadedPolicies.keySet()) { - removePolicies(sourceUri); - } - } - - public boolean sendRemovePolicyRequest(String sourceUri, String policyId) { - log.debug("Remove policy '{}'", policyId); - - ExternalLockContext lockContext = new ExternalLockContext(); - externalLockService.beforePolicyRemoval(sourceUri, lockContext); - - if (lockContext.isCancelPdpOperation()) { - log.debug("RemovePolicies was canceled by script"); - return true; - } - - OpaConfiguration opaConfiguration = appConfiguration.getOpaConfiguration(); - String baseUrl = opaConfiguration.getBaseUrl(); - - HttpDelete request = new HttpDelete(String.format("%s/policies/%s", baseUrl, policyId)); - addAccessTokenHeader(request, opaConfiguration); - - boolean result = true; - try { - CloseableHttpClient httpClient = httpService.getHttpsClient(); - HttpResponse httpResponse = httpClient.execute(request); - - int statusCode = httpResponse.getStatusLine().getStatusCode(); - log.debug("Get OPA remove policy for policyId '{}' response with status code '{}'", policyId, statusCode); - - result &= statusCode == HttpStatus.SC_OK; - } catch (IOException ex) { - log.error("Failed to remove policy from OPA", ex); - } - - return result; - } - - private void addAccessTokenHeader(HttpRequestBase request, OpaConfiguration opaConfiguration) { - String accessToken = encryptionService.decrypt(opaConfiguration.getAccessToken(), true); - if (StringHelper.isNotEmpty(accessToken)) { - request.setHeader("Authorization", "Bearer " + accessToken); - } - } - - @Override - public String getPolicyConsumerType() { - return POLICY_CONSUMER_TYPE; - } - -} diff --git a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/MetricProducerFactory.java b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/MetricProducerFactory.java deleted file mode 100644 index a8751747fa9..00000000000 --- a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/MetricProducerFactory.java +++ /dev/null @@ -1,69 +0,0 @@ -/* - * Copyright [2024] [Janssen Project] - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -package io.jans.lock.service.provider.metric; - -import org.slf4j.Logger; - -import io.jans.lock.model.config.AppConfiguration; -import io.jans.service.cdi.async.Asynchronous; -import io.jans.service.cdi.event.ApplicationInitialized; -import io.jans.service.cdi.event.ConfigurationUpdate; -import io.jans.service.cdi.qualifier.Implementation; -import jakarta.enterprise.context.ApplicationScoped; -import jakarta.enterprise.event.Observes; -import jakarta.enterprise.inject.Instance; -import jakarta.enterprise.inject.Produces; -import jakarta.inject.Inject; - -/** - * Metric producer factory - * - * @author Yuriy Movchan Date: 05/03/2024 - */ -@ApplicationScoped -public class MetricProducerFactory { - - @Inject - private Logger log; - - @Inject - private AppConfiguration appConfiguration; - - @Inject - @Implementation - private Instance metricProviderInstances; - - private boolean appStarted = false; - - public void init(@Observes @ApplicationInitialized(ApplicationScoped.class) Object init) { - this.appStarted = true; - } - - @Asynchronous - public void configurationUpdateEvent(@Observes @ConfigurationUpdate AppConfiguration appConfiguration) { - if (!appStarted) { - return; - } - } - - @Produces - @ApplicationScoped - public MetricProvider produceMetricProvider() { - return new NullMetricProvider(); - } - -} diff --git a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/MetricProvider.java b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/MetricProvider.java deleted file mode 100644 index a817d99ca7f..00000000000 --- a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/MetricProvider.java +++ /dev/null @@ -1,28 +0,0 @@ -/* - * Copyright [2024] [Janssen Project] - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -package io.jans.lock.service.provider.metric; - -/** - * Base message consumer - * - * @author Yuriy Movchan Date: 12/20/2023 - */ -public abstract class MetricProvider implements MetricProviderInterface { - - public abstract void destroy(); - -} diff --git a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/MetricProviderInterface.java b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/MetricProviderInterface.java deleted file mode 100644 index 086e22d47ce..00000000000 --- a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/MetricProviderInterface.java +++ /dev/null @@ -1,26 +0,0 @@ -/* - * Copyright [2024] [Janssen Project] - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -package io.jans.lock.service.provider.metric; - -/** - * Interface for each policy consumer - * - * @author Yuriy Movchan Date: 12/20/2023 - */ -public interface MetricProviderInterface { - -} diff --git a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/NullMetricProvider.java b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/NullMetricProvider.java deleted file mode 100644 index 20ca5b26b69..00000000000 --- a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/provider/metric/NullMetricProvider.java +++ /dev/null @@ -1,44 +0,0 @@ -/* - * Copyright [2024] [Janssen Project] - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -package io.jans.lock.service.provider.metric; - -import org.slf4j.Logger; - -import io.jans.service.cdi.qualifier.Implementation; -import jakarta.enterprise.context.ApplicationScoped; -import jakarta.inject.Inject; - -/** - * Null metric provider - * - * @author Yuriy Movchan Date: 05/23/2024 - */ -@Implementation -@ApplicationScoped -public class NullMetricProvider extends MetricProvider { - - public static String METRIC_PROVIDER_TYPE = "DISABLED"; - - @Inject - private Logger log; - - @Override - public void destroy() { - log.debug("Destroy metric provider"); - } - -} diff --git a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/ws/rs/audit/AuditRestWebServiceImpl.java b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/ws/rs/audit/AuditRestWebServiceImpl.java index a3fdfc3e4ba..0e439442c5b 100644 --- a/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/ws/rs/audit/AuditRestWebServiceImpl.java +++ b/jans-lock/lock-server/service/src/main/java/io/jans/lock/service/ws/rs/audit/AuditRestWebServiceImpl.java @@ -16,13 +16,20 @@ package io.jans.lock.service.ws.rs.audit; +import static io.jans.lock.service.audit.AuditService.AUDIT_HEALTH; +import static io.jans.lock.service.audit.AuditService.AUDIT_HEALTH_BULK; +import static io.jans.lock.service.audit.AuditService.AUDIT_LOG; +import static io.jans.lock.service.audit.AuditService.AUDIT_LOG_BULK; +import static io.jans.lock.service.audit.AuditService.AUDIT_TELEMETRY; +import static io.jans.lock.service.audit.AuditService.AUDIT_TELEMETRY_BULK; + import org.apache.http.entity.ContentType; import org.slf4j.Logger; import com.fasterxml.jackson.databind.JsonNode; +import io.jans.lock.service.DataMapperService; import io.jans.lock.service.audit.AuditService; -import io.jans.lock.service.stat.StatResponseService; import io.jans.lock.service.stat.StatService; import io.jans.lock.util.ServerUtil; import jakarta.enterprise.context.Dependent; @@ -34,8 +41,6 @@ import jakarta.ws.rs.core.Response.Status; import jakarta.ws.rs.core.SecurityContext; -import static io.jans.lock.service.audit.AuditService.*; - /** * Provides interface for audit REST web services * @@ -55,6 +60,9 @@ public class AuditRestWebServiceImpl implements AuditRestWebService { @Inject private Logger log; + + @Inject + private DataMapperService dataMapperService; @Inject private AuditService auditService; @@ -112,7 +120,7 @@ private Response processAuditRequest(HttpServletRequest request, String requestT builder.cacheControl(ServerUtil.cacheControlWithNoStoreTransformAndPrivate()); builder.header(ServerUtil.PRAGMA, ServerUtil.NO_CACHE); - JsonNode json = this.auditService.getJsonNode(request); + JsonNode json = getJsonNode(request); if (reportStat) { if (bulkData) { @@ -145,6 +153,23 @@ private Response processAuditRequest(HttpServletRequest request, String requestT return builder.build(); } + public JsonNode getJsonNode(HttpServletRequest request) { + JsonNode jsonBody = null; + if (request == null) { + return jsonBody; + } + + try { + jsonBody = dataMapperService.readTree(request.getInputStream()); + log.debug(" jsonBody:{}", jsonBody); + } catch (Exception ex) { + ex.printStackTrace(); + log.error("Exception while retriving json from request is - ", ex); + } + + return jsonBody; + } + private void reportStat(JsonNode json) { boolean hasClientId = json.hasNonNull(LOG_CLIENT_ID); if (hasClientId) { diff --git a/jans-lock/lock-server/service/src/main/java/io/jans/lock/util/Constants.java b/jans-lock/lock-server/service/src/main/java/io/jans/lock/util/Constants.java index d4eac1f29cc..f8d88d43e20 100644 --- a/jans-lock/lock-server/service/src/main/java/io/jans/lock/util/Constants.java +++ b/jans-lock/lock-server/service/src/main/java/io/jans/lock/util/Constants.java @@ -12,9 +12,7 @@ */ public class Constants { - private Constants() { - } - + private Constants() {} public static final String MONTH = "month"; }