Skip to content

Commit

Permalink
feat(cloud-native): allow pulling SSL cert from FQDN (#8320)
Browse files Browse the repository at this point in the history
Signed-off-by: iromli <isman.firmansyah@gmail.com>
Former-commit-id: 750192f
  • Loading branch information
iromli authored Apr 17, 2024
1 parent 94774d3 commit 788c216
Show file tree
Hide file tree
Showing 29 changed files with 78 additions and 21 deletions.
3 changes: 2 additions & 1 deletion docker-jans-auth-server/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -247,7 +247,8 @@ ENV CN_MAX_RAM_PERCENTAGE=75.0 \
CN_AUTH_JETTY_HOST=0.0.0.0 \
CN_SHARE_AUTH_CONF=true \
CN_LOCK_ENABLED=false \
CN_OPA_URL=http://localhost:8181/v1
CN_OPA_URL=http://localhost:8181/v1 \
CN_SSL_CERT_FROM_SECRETS=true

# @TODO: revisit the usage (if any)
ENV ADMIN_UI_JWKS=http://${CN_AUTH_JETTY_HOST}:${CN_AUTH_JETTY_PORT}/jans-auth/restv1/jwks
Expand Down
1 change: 1 addition & 0 deletions docker-jans-auth-server/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -99,6 +99,7 @@ The following environment variables are supported by the container:
- `AWS_PROFILE`: The default profile to use, if any.
- `CN_LOCK_ENABLED`: Enable `jans-lock` as part of `jans-auth`.
- `CN_OPA_URL`: URL to OPA server (default to `http://localhost:8181/v1`).
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `true`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.

### Configure app loggers

Expand Down
8 changes: 7 additions & 1 deletion docker-jans-auth-server/scripts/bootstrap.py
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@
from jans.pycloudlib.persistence.utils import PersistenceMapper
from jans.pycloudlib.utils import cert_to_truststore
from jans.pycloudlib.utils import as_boolean
from jans.pycloudlib.utils import get_server_certificate

from settings import LOGGING_CONFIG
from hooks import get_auth_keys_hook
Expand Down Expand Up @@ -78,7 +79,12 @@ def main():
)

if not os.path.isfile("/etc/certs/web_https.crt"):
manager.secret.to_file("ssl_cert", "/etc/certs/web_https.crt")
if as_boolean(os.environ.get("CN_SSL_CERT_FROM_SECRETS", "true")):
manager.secret.to_file("ssl_cert", "/etc/certs/web_https.crt")
else:
hostname = manager.config.get("hostname")
logger.info(f"Pulling SSL certificate from {hostname}")
get_server_certificate(hostname, 443, "/etc/certs/web_https.crt")

cert_to_truststore(
"web_https",
Expand Down
4 changes: 2 additions & 2 deletions docker-jans-casa/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -189,7 +189,6 @@ ENV CN_MAX_RAM_PERCENTAGE=75.0 \
CN_JACKRABBIT_ADMIN_ID=admin \
CN_JACKRABBIT_ADMIN_PASSWORD_FILE=/etc/jans/conf/jackrabbit_admin_password \
CN_CASA_JAVA_OPTIONS="" \
CN_SSL_CERT_FROM_SECRETS=false \
GOOGLE_PROJECT_ID="" \
CN_GOOGLE_SECRET_MANAGER_PASSPHRASE=secret \
CN_GOOGLE_SECRET_VERSION_ID=latest \
Expand All @@ -203,7 +202,8 @@ ENV CN_MAX_RAM_PERCENTAGE=75.0 \
CN_CASA_JETTY_PORT=8080 \
CN_CASA_JETTY_HOST=0.0.0.0 \
CN_SHARE_AUTH_CONF=true \
CN_JETTY_ARGS=""
CN_JETTY_ARGS="" \
CN_SSL_CERT_FROM_SECRETS=true

# ==========
# misc stuff
Expand Down
2 changes: 1 addition & 1 deletion docker-jans-casa/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,6 @@ The following environment variables are supported by the container:
- `CN_JACKRABBIT_SYNC_INTERVAL`: Interval between files sync (default to `300` seconds).
- `CN_JACKRABBIT_ADMIN_ID`: Admin username (default to `admin`).
- `CN_JACKRABBIT_ADMIN_PASSWORD_FILE`: Absolute path to file contains password for admin user (default to `/etc/jans/conf/jackrabbit_admin_password`).
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `false`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.
- `CN_SQL_DB_DIALECT`: Dialect name of SQL backend (one of `mysql`, `pgsql`; default to `mysql`).
- `CN_SQL_DB_HOST`: Host of SQL backend (default to `localhost`).
- `CN_SQL_DB_PORT`: Port of SQL backend (default to `3306`).
Expand All @@ -78,6 +77,7 @@ The following environment variables are supported by the container:
- `CN_CASA_ADMIN_LOCK_FILE`: Path to lock file to enable/disable administration feature (default to `/opt/jans/jetty/jans-casa/.administrable`). If file is not exist, the feature is disabled.
- `CN_PROMETHEUS_PORT`: Port used by Prometheus JMX agent (default to empty string). To enable Prometheus JMX agent, set the value to a number. See [Exposing metrics](#exposing-metrics) for details.
- `CN_CASA_JWKS_SIZE_LIMIT`: Default HTTP size limit (in bytes) when retrieving remote JWKS (default to `100000`).
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `true`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.

### Configure app loggers

Expand Down
8 changes: 7 additions & 1 deletion docker-jans-casa/scripts/bootstrap.py
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@
from jans.pycloudlib.utils import encode_text
from jans.pycloudlib.utils import generate_base64_contents
from jans.pycloudlib.utils import as_boolean
from jans.pycloudlib.utils import get_server_certificate

from settings import LOGGING_CONFIG

Expand Down Expand Up @@ -155,7 +156,12 @@ def main():
)

if not os.path.isfile("/etc/certs/web_https.crt"):
manager.secret.to_file("ssl_cert", "/etc/certs/web_https.crt")
if as_boolean(os.environ.get("CN_SSL_CERT_FROM_SECRETS", "true")):
manager.secret.to_file("ssl_cert", "/etc/certs/web_https.crt")
else:
hostname = manager.config.get("hostname")
logger.info(f"Pulling SSL certificate from {hostname}")
get_server_certificate(hostname, 443, "/etc/certs/web_https.crt")

cert_to_truststore(
"web_https",
Expand Down
3 changes: 2 additions & 1 deletion docker-jans-config-api/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -222,7 +222,8 @@ ENV CN_MAX_RAM_PERCENTAGE=75.0 \
CN_CONFIG_API_CREATE_SCOPES=true \
CN_CONFIG_API_JETTY_PORT=8074 \
CN_CONFIG_API_JETTY_HOST=0.0.0.0 \
CN_JETTY_ARGS=""
CN_JETTY_ARGS="" \
CN_SSL_CERT_FROM_SECRETS=true

# ==========
# misc stuff
Expand Down
1 change: 1 addition & 0 deletions docker-jans-config-api/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -94,6 +94,7 @@ The following environment variables are supported by the container:
- `AWS_SHARED_CREDENTIALS_FILE`: The location of the shared credentials file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_CONFIG_FILE`: The location of the config file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_PROFILE`: The default profile to use, if any.
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `true`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.

### Configure app loggers

Expand Down
14 changes: 8 additions & 6 deletions docker-jans-config-api/scripts/bootstrap.py
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,7 @@
from jans.pycloudlib.utils import get_random_chars
from jans.pycloudlib.utils import encode_text
from jans.pycloudlib.utils import as_boolean
from jans.pycloudlib.utils import get_server_certificate

from settings import LOGGING_CONFIG
from plugins import AdminUiPlugin
Expand Down Expand Up @@ -89,12 +90,13 @@ def main():
"/etc/jans/conf/jans-spanner.properties",
)

if not all([
os.path.isfile("/etc/certs/web_https.crt"),
os.path.isfile("/etc/certs/web_https.key"),
]):
manager.secret.to_file("ssl_cert", "/etc/certs/web_https.crt")
manager.secret.to_file("ssl_key", "/etc/certs/web_https.key")
if not os.path.isfile("/etc/certs/web_https.crt"):
if as_boolean(os.environ.get("CN_SSL_CERT_FROM_SECRETS", "true")):
manager.secret.to_file("ssl_cert", "/etc/certs/web_https.crt")
else:
hostname = manager.config.get("hostname")
logger.info(f"Pulling SSL certificate from {hostname}")
get_server_certificate(hostname, 443, "/etc/certs/web_https.crt")

cert_to_truststore(
"web_https",
Expand Down
1 change: 1 addition & 0 deletions docker-jans-fido2/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,7 @@ The following environment variables are supported by the container:
- `AWS_SHARED_CREDENTIALS_FILE`: The location of the shared credentials file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_CONFIG_FILE`: The location of the config file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_PROFILE`: The default profile to use, if any.
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `true`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.

### Configure app loggers

Expand Down
8 changes: 7 additions & 1 deletion docker-jans-fido2/scripts/bootstrap.py
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,7 @@
from jans.pycloudlib.utils import cert_to_truststore
from jans.pycloudlib.utils import generate_base64_contents
from jans.pycloudlib.utils import as_boolean
from jans.pycloudlib.utils import get_server_certificate

from settings import LOGGING_CONFIG

Expand Down Expand Up @@ -79,7 +80,12 @@ def main():
)

if not os.path.isfile("/etc/certs/web_https.crt"):
manager.secret.to_file("ssl_cert", "/etc/certs/web_https.crt")
if as_boolean(os.environ.get("CN_SSL_CERT_FROM_SECRETS", "true")):
manager.secret.to_file("ssl_cert", "/etc/certs/web_https.crt")
else:
hostname = manager.config.get("hostname")
logger.info(f"Pulling SSL certificate from {hostname}")
get_server_certificate(hostname, 443, "/etc/certs/web_https.crt")

cert_to_truststore(
"web_https",
Expand Down
3 changes: 2 additions & 1 deletion docker-jans-keycloak-link/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -196,7 +196,8 @@ ENV CN_MAX_RAM_PERCENTAGE=75.0 \
CN_AWS_SECRETS_REPLICA_FILE="" \
CN_KEYCLOAK_LINK_JETTY_PORT=9092 \
CN_KEYCLOAK_LINK_JETTY_HOST=0.0.0.0 \
CN_JETTY_ARGS=""
CN_JETTY_ARGS="" \
CN_SSL_CERT_FROM_SECRETS=true

# ==========
# misc stuff
Expand Down
1 change: 1 addition & 0 deletions docker-jans-keycloak-link/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,7 @@ The following environment variables are supported by the container:
- `AWS_SHARED_CREDENTIALS_FILE`: The location of the shared credentials file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_CONFIG_FILE`: The location of the config file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_PROFILE`: The default profile to use, if any.
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `true`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.

### Configure app loggers

Expand Down
8 changes: 7 additions & 1 deletion docker-jans-keycloak-link/scripts/bootstrap.py
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,7 @@
from jans.pycloudlib.utils import cert_to_truststore
from jans.pycloudlib.utils import generate_base64_contents
from jans.pycloudlib.utils import as_boolean
from jans.pycloudlib.utils import get_server_certificate

from settings import LOGGING_CONFIG

Expand Down Expand Up @@ -87,7 +88,12 @@ def main():
)

if not os.path.isfile("/etc/certs/web_https.crt"):
manager.secret.to_file("ssl_cert", "/etc/certs/web_https.crt")
if as_boolean(os.environ.get("CN_SSL_CERT_FROM_SECRETS", "true")):
manager.secret.to_file("ssl_cert", "/etc/certs/web_https.crt")
else:
hostname = manager.config.get("hostname")
logger.info(f"Pulling SSL certificate from {hostname}")
get_server_certificate(hostname, 443, "/etc/certs/web_https.crt")

cert_to_truststore(
"web_https",
Expand Down
3 changes: 2 additions & 1 deletion docker-jans-link/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -196,7 +196,8 @@ ENV CN_MAX_RAM_PERCENTAGE=75.0 \
CN_AWS_SECRETS_REPLICA_FILE="" \
CN_LINK_JETTY_PORT=9091 \
CN_LINK_JETTY_HOST=0.0.0.0 \
CN_JETTY_ARGS=""
CN_JETTY_ARGS="" \
CN_SSL_CERT_FROM_SECRETS=true

# ==========
# misc stuff
Expand Down
1 change: 1 addition & 0 deletions docker-jans-link/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,7 @@ The following environment variables are supported by the container:
- `AWS_SHARED_CREDENTIALS_FILE`: The location of the shared credentials file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_CONFIG_FILE`: The location of the config file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_PROFILE`: The default profile to use, if any.
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `true`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.

### Configure app loggers

Expand Down
8 changes: 7 additions & 1 deletion docker-jans-link/scripts/bootstrap.py
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,7 @@
from jans.pycloudlib.utils import generate_base64_contents
from jans.pycloudlib.utils import as_boolean
from jans.pycloudlib.utils import encode_text
from jans.pycloudlib.utils import get_server_certificate

from settings import LOGGING_CONFIG

Expand Down Expand Up @@ -88,7 +89,12 @@ def main():
)

if not os.path.isfile("/etc/certs/web_https.crt"):
manager.secret.to_file("ssl_cert", "/etc/certs/web_https.crt")
if as_boolean(os.environ.get("CN_SSL_CERT_FROM_SECRETS", "true")):
manager.secret.to_file("ssl_cert", "/etc/certs/web_https.crt")
else:
hostname = manager.config.get("hostname")
logger.info(f"Pulling SSL certificate from {hostname}")
get_server_certificate(hostname, 443, "/etc/certs/web_https.crt")

cert_to_truststore(
"web_https",
Expand Down
1 change: 1 addition & 0 deletions docker-jans-saml/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -167,6 +167,7 @@ ENV CN_MAX_RAM_PERCENTAGE=75.0 \
CN_SAML_JAVA_OPTIONS="" \
CN_SAML_KC_ADMIN_CREDENTIALS_FILE=/etc/jans/conf/kc_admin_creds \
CN_SAML_KC_DB_PASSWORD_FILE=/etc/jans/conf/kc_db_password \
CN_SSL_CERT_FROM_SECRETS=true \
KC_HEALTH_ENABLED=true \
KC_METRICS_ENABLED=true \
KC_LOG_LEVEL=INFO \
Expand Down
1 change: 1 addition & 0 deletions docker-jans-saml/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,7 @@ The following environment variables are supported by the container:
- `AWS_SHARED_CREDENTIALS_FILE`: The location of the shared credentials file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_CONFIG_FILE`: The location of the config file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_PROFILE`: The default profile to use, if any.
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `true`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.

### Configure app loggers

Expand Down
3 changes: 2 additions & 1 deletion docker-jans-scim/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -199,7 +199,8 @@ ENV CN_MAX_RAM_PERCENTAGE=75.0 \
CN_AWS_SECRETS_REPLICA_FILE="" \
CN_SCIM_JETTY_PORT=8080 \
CN_SCIM_JETTY_HOST=0.0.0.0 \
CN_JETTY_ARGS=""
CN_JETTY_ARGS="" \
CN_SSL_CERT_FROM_SECRETS=true

# ==========
# misc stuff
Expand Down
1 change: 1 addition & 0 deletions docker-jans-scim/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,7 @@ The following environment variables are supported by the container:
- `AWS_SHARED_CREDENTIALS_FILE`: The location of the shared credentials file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_CONFIG_FILE`: The location of the config file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_PROFILE`: The default profile to use, if any.
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `true`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.

### Configure app loggers

Expand Down
8 changes: 7 additions & 1 deletion docker-jans-scim/scripts/bootstrap.py
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,7 @@
from jans.pycloudlib.utils import generate_base64_contents
from jans.pycloudlib.utils import get_random_chars
from jans.pycloudlib.utils import as_boolean
from jans.pycloudlib.utils import get_server_certificate

from settings import LOGGING_CONFIG
from utils import parse_swagger_file
Expand Down Expand Up @@ -93,7 +94,12 @@ def main():
)

if not os.path.isfile("/etc/certs/web_https.crt"):
manager.secret.to_file("ssl_cert", "/etc/certs/web_https.crt")
if as_boolean(os.environ.get("CN_SSL_CERT_FROM_SECRETS", "true")):
manager.secret.to_file("ssl_cert", "/etc/certs/web_https.crt")
else:
hostname = manager.config.get("hostname")
logger.info(f"Pulling SSL certificate from {hostname}")
get_server_certificate(hostname, 443, "/etc/certs/web_https.crt")

cert_to_truststore(
"web_https",
Expand Down
1 change: 1 addition & 0 deletions docs/admin/reference/kubernetes/docker-jans-auth-server.md
Original file line number Diff line number Diff line change
Expand Up @@ -99,6 +99,7 @@ The following environment variables are supported by the container:
- `AWS_PROFILE`: The default profile to use, if any.
- `CN_LOCK_ENABLED`: Enable `jans-lock` as part of `jans-auth`.
- `CN_OPA_URL`: URL to OPA server (default to `http://localhost:8181/v1`).
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `true`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.

### Configure app loggers

Expand Down
2 changes: 1 addition & 1 deletion docs/admin/reference/kubernetes/docker-jans-casa.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,6 @@ The following environment variables are supported by the container:
- `CN_JACKRABBIT_SYNC_INTERVAL`: Interval between files sync (default to `300` seconds).
- `CN_JACKRABBIT_ADMIN_ID`: Admin username (default to `admin`).
- `CN_JACKRABBIT_ADMIN_PASSWORD_FILE`: Absolute path to file contains password for admin user (default to `/etc/jans/conf/jackrabbit_admin_password`).
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `false`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.
- `CN_SQL_DB_DIALECT`: Dialect name of SQL backend (one of `mysql`, `pgsql`; default to `mysql`).
- `CN_SQL_DB_HOST`: Host of SQL backend (default to `localhost`).
- `CN_SQL_DB_PORT`: Port of SQL backend (default to `3306`).
Expand All @@ -78,6 +77,7 @@ The following environment variables are supported by the container:
- `CN_CASA_ADMIN_LOCK_FILE`: Path to lock file to enable/disable administration feature (default to `/opt/jans/jetty/jans-casa/.administrable`). If file is not exist, the feature is disabled.
- `CN_PROMETHEUS_PORT`: Port used by Prometheus JMX agent (default to empty string). To enable Prometheus JMX agent, set the value to a number. See [Exposing metrics](#exposing-metrics) for details.
- `CN_CASA_JWKS_SIZE_LIMIT`: Default HTTP size limit (in bytes) when retrieving remote JWKS (default to `100000`).
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `true`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.

### Configure app loggers

Expand Down
1 change: 1 addition & 0 deletions docs/admin/reference/kubernetes/docker-jans-config-api.md
Original file line number Diff line number Diff line change
Expand Up @@ -94,6 +94,7 @@ The following environment variables are supported by the container:
- `AWS_SHARED_CREDENTIALS_FILE`: The location of the shared credentials file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_CONFIG_FILE`: The location of the config file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_PROFILE`: The default profile to use, if any.
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `true`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.

### Configure app loggers

Expand Down
1 change: 1 addition & 0 deletions docs/admin/reference/kubernetes/docker-jans-fido2.md
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,7 @@ The following environment variables are supported by the container:
- `AWS_SHARED_CREDENTIALS_FILE`: The location of the shared credentials file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_CONFIG_FILE`: The location of the config file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_PROFILE`: The default profile to use, if any.
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `true`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.

### Configure app loggers

Expand Down
1 change: 1 addition & 0 deletions docs/admin/reference/kubernetes/docker-jans-link.md
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,7 @@ The following environment variables are supported by the container:
- `AWS_SHARED_CREDENTIALS_FILE`: The location of the shared credentials file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_CONFIG_FILE`: The location of the config file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_PROFILE`: The default profile to use, if any.
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `true`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.

### Configure app loggers

Expand Down
1 change: 1 addition & 0 deletions docs/admin/reference/kubernetes/docker-jans-saml.md
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,7 @@ The following environment variables are supported by the container:
- `AWS_SHARED_CREDENTIALS_FILE`: The location of the shared credentials file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_CONFIG_FILE`: The location of the config file used by the client (see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html).
- `AWS_PROFILE`: The default profile to use, if any.
- `CN_SSL_CERT_FROM_SECRETS`: Determine whether to get SSL cert from secrets backend (default to `true`). Note that the flag will take effect only if there's no mounted `/etc/certs/web_https.crt` file.

### Configure app loggers

Expand Down
Loading

0 comments on commit 788c216

Please sign in to comment.