github.com/arunkumar7540/cli@v6.45.0+incompatible/ci/local-integration-env/operations/add-oidc-provider.yml (about)

     1  ---
     2  - type: replace
     3    path: /instance_groups/name=uaa/jobs/name=uaa/properties/login/oauth?/providers?
     4    value:
     5      cli-oidc-provider:
     6        type: oidc1.0
     7        discoveryUrl: https://uaa-oidc.service.cf.internal:8443/.well-known/openid-configuration
     8        scopes:
     9          - openid
    10        linkText: My other uaa Oauth Provider
    11        showLinkText: true
    12        addShadowUserOnLogin: true
    13        relyingPartyId: rp_oidc_admin
    14        relyingPartySecret: adminsecret
    15        skipSslValidation: true
    16        storeCustomAttributes: true
    17        passwordGrantEnabled: true
    18        attributeMappings:
    19          given_name: given_name
    20          family_name: family_name
    21          user_name: user_name
    22  
    23  - type: replace
    24    path: /instance_groups/-
    25    value:
    26      name: uaa-oidc
    27      instances: 1
    28      azs: [z1, z2, z3]
    29      vm_type: default
    30      stemcell: default
    31      persistent_disk: 500
    32      networks:
    33      - name: default
    34      jobs:
    35      - name: uaa
    36        release: uaa
    37        properties:
    38          encryption:
    39            active_key_label: 'key-1'
    40            encryption_keys:
    41              - label: 'key-1'
    42                passphrase: 'MY-PASSPHRASE'
    43          uaadb:
    44            databases:
    45            - name: uaa_oidc
    46              tag: uaa
    47            db_scheme: postgresql
    48            port: 5524
    49            roles:
    50            - name: uaa-oidc
    51              password: ((uaa_oidc_database_password))
    52              tag: admin
    53          uaa:
    54            url: https://uaa-oidc.service.cf.internal:8443
    55            jwt:
    56              policy:
    57                active_key_id: key-1
    58                keys:
    59                  key-1:
    60                    signingKey: ((uaa-oidc-key1.private_key))
    61            sslCertificate: ((uaa-oidc_tls.certificate))
    62            sslPrivateKey: ((uaa-oidc_tls.private_key))
    63            clients:
    64              rp_oidc_admin:
    65                authorized-grant-types: authorization_code,client_credentials,refresh_token,user_token,password,urn:ietf:params:oauth:grant-type:saml2-bearer,implicit
    66                redirect-uri: https://uaa.service.cf.internal:8443/login/callback/cli-oidc-provider
    67                scope: openid,uaa.admin,clients.read,clients.write,clients.secret,scim.read,scim.write,clients.admin,uaa.user
    68                authorities: uaa.admin,clients.admin
    69                secret: adminsecret
    70            scim:
    71              user:
    72                override: true
    73              users:
    74                - name: admin_oidc
    75                  password: admin
    76                  groups:
    77                    - uaa.admin
    78          login:
    79            protocol: https
    80            saml:
    81              activeKeyId: key1
    82              keys:
    83                key1:
    84                  key: ((saml_oidc-key1.private_key))
    85                  passphrase: ''
    86                  certificate: ((saml_oidc-key1.certificate))
    87  
    88  - type: replace
    89    path: /addons/name=bosh-dns-aliases/jobs/name=bosh-dns-aliases/properties/aliases/-
    90    value:
    91      domain: uaa-oidc.service.cf.internal
    92      targets:
    93      - query: '*'
    94        instance_group: uaa-oidc
    95        deployment: cf
    96        network: default
    97        domain: bosh
    98  
    99  - type: replace
   100    path: /instance_groups/name=database/jobs/name=postgres/properties/databases/databases?/-
   101    value:
   102      name: uaa_oidc
   103      citext: true
   104      tag: uaa
   105  
   106  - type: replace
   107    path: /instance_groups/name=database/jobs/name=postgres/properties/databases/roles?/-
   108    value:
   109      name: uaa-oidc
   110      password: "((uaa_oidc_database_password))"
   111      tag: admin
   112  
   113  - type: replace
   114    path: /variables?/-
   115    value:
   116      name: uaa_oidc_database_password
   117      type: password
   118  
   119  - type: replace
   120    path: /variables?/-
   121    value:
   122      name: uaa-oidc-key1
   123      type: rsa
   124  
   125  - type: replace
   126    path: /variables?/-
   127    value:
   128      name: uaa-oidc_ca
   129      type: certificate
   130      options:
   131        is_ca: true
   132        common_name: uaa-oidc
   133        alternative_names: ["*.uaa-oidc.service.cf.internal"]
   134        extended_key_usage:
   135        - server_auth
   136  
   137  - type: replace
   138    path: /variables?/-
   139    value:
   140      name: saml_oidc-key1
   141      type: certificate
   142      options:
   143        ca: uaa-oidc_ca
   144  
   145  - type: replace
   146    path: /variables?/-
   147    value:
   148      name: uaa-oidc_tls
   149      type: certificate
   150      options:
   151        ca: uaa-oidc_ca
   152        common_name: uaa-oidc.service.cf.internal