github.com/arunkumar7540/cli@v6.45.0+incompatible/ci/local-integration-env/operations/add-oidc-provider.yml (about) 1 --- 2 - type: replace 3 path: /instance_groups/name=uaa/jobs/name=uaa/properties/login/oauth?/providers? 4 value: 5 cli-oidc-provider: 6 type: oidc1.0 7 discoveryUrl: https://uaa-oidc.service.cf.internal:8443/.well-known/openid-configuration 8 scopes: 9 - openid 10 linkText: My other uaa Oauth Provider 11 showLinkText: true 12 addShadowUserOnLogin: true 13 relyingPartyId: rp_oidc_admin 14 relyingPartySecret: adminsecret 15 skipSslValidation: true 16 storeCustomAttributes: true 17 passwordGrantEnabled: true 18 attributeMappings: 19 given_name: given_name 20 family_name: family_name 21 user_name: user_name 22 23 - type: replace 24 path: /instance_groups/- 25 value: 26 name: uaa-oidc 27 instances: 1 28 azs: [z1, z2, z3] 29 vm_type: default 30 stemcell: default 31 persistent_disk: 500 32 networks: 33 - name: default 34 jobs: 35 - name: uaa 36 release: uaa 37 properties: 38 encryption: 39 active_key_label: 'key-1' 40 encryption_keys: 41 - label: 'key-1' 42 passphrase: 'MY-PASSPHRASE' 43 uaadb: 44 databases: 45 - name: uaa_oidc 46 tag: uaa 47 db_scheme: postgresql 48 port: 5524 49 roles: 50 - name: uaa-oidc 51 password: ((uaa_oidc_database_password)) 52 tag: admin 53 uaa: 54 url: https://uaa-oidc.service.cf.internal:8443 55 jwt: 56 policy: 57 active_key_id: key-1 58 keys: 59 key-1: 60 signingKey: ((uaa-oidc-key1.private_key)) 61 sslCertificate: ((uaa-oidc_tls.certificate)) 62 sslPrivateKey: ((uaa-oidc_tls.private_key)) 63 clients: 64 rp_oidc_admin: 65 authorized-grant-types: authorization_code,client_credentials,refresh_token,user_token,password,urn:ietf:params:oauth:grant-type:saml2-bearer,implicit 66 redirect-uri: https://uaa.service.cf.internal:8443/login/callback/cli-oidc-provider 67 scope: openid,uaa.admin,clients.read,clients.write,clients.secret,scim.read,scim.write,clients.admin,uaa.user 68 authorities: uaa.admin,clients.admin 69 secret: adminsecret 70 scim: 71 user: 72 override: true 73 users: 74 - name: admin_oidc 75 password: admin 76 groups: 77 - uaa.admin 78 login: 79 protocol: https 80 saml: 81 activeKeyId: key1 82 keys: 83 key1: 84 key: ((saml_oidc-key1.private_key)) 85 passphrase: '' 86 certificate: ((saml_oidc-key1.certificate)) 87 88 - type: replace 89 path: /addons/name=bosh-dns-aliases/jobs/name=bosh-dns-aliases/properties/aliases/- 90 value: 91 domain: uaa-oidc.service.cf.internal 92 targets: 93 - query: '*' 94 instance_group: uaa-oidc 95 deployment: cf 96 network: default 97 domain: bosh 98 99 - type: replace 100 path: /instance_groups/name=database/jobs/name=postgres/properties/databases/databases?/- 101 value: 102 name: uaa_oidc 103 citext: true 104 tag: uaa 105 106 - type: replace 107 path: /instance_groups/name=database/jobs/name=postgres/properties/databases/roles?/- 108 value: 109 name: uaa-oidc 110 password: "((uaa_oidc_database_password))" 111 tag: admin 112 113 - type: replace 114 path: /variables?/- 115 value: 116 name: uaa_oidc_database_password 117 type: password 118 119 - type: replace 120 path: /variables?/- 121 value: 122 name: uaa-oidc-key1 123 type: rsa 124 125 - type: replace 126 path: /variables?/- 127 value: 128 name: uaa-oidc_ca 129 type: certificate 130 options: 131 is_ca: true 132 common_name: uaa-oidc 133 alternative_names: ["*.uaa-oidc.service.cf.internal"] 134 extended_key_usage: 135 - server_auth 136 137 - type: replace 138 path: /variables?/- 139 value: 140 name: saml_oidc-key1 141 type: certificate 142 options: 143 ca: uaa-oidc_ca 144 145 - type: replace 146 path: /variables?/- 147 value: 148 name: uaa-oidc_tls 149 type: certificate 150 options: 151 ca: uaa-oidc_ca 152 common_name: uaa-oidc.service.cf.internal