Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(images): conform to new couchbase persistence configuration #2188

Merged
merged 1 commit into from
Aug 22, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
fix(images): conform to new couchbase persistence configuration
  • Loading branch information
iromli committed Aug 20, 2022
commit d434ff2fcc11fe82f8136ee8dabc35c5891a30ec
2 changes: 1 addition & 1 deletion docker-jans-auth-server/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ RUN /opt/jython/bin/pip uninstall -y pip
# ===========

ENV CN_VERSION=1.0.2-SNAPSHOT
ENV CN_BUILD_DATE='2022-08-03 12:37'
ENV CN_BUILD_DATE='2022-08-18 17:16'
ENV CN_SOURCE_URL=https://jenkins.jans.io/maven/io/jans/jans-auth-server/${CN_VERSION}/jans-auth-server-${CN_VERSION}.war

# Install Jans Auth
Expand Down
40 changes: 24 additions & 16 deletions docker-jans-auth-server/conf/jans-couchbase.properties.tmpl
Original file line number Diff line number Diff line change
Expand Up @@ -6,30 +6,36 @@ servers: %(hostname)s
# Default SDK connectTimeout is 10s
connection.connect-timeout: %(couchbase_conn_timeout)s

# Enable/disable DNS SRV lookup for the bootstrap nodes
# Default dnsSrvEnabled is true
connection.dns.use-lookup: false

# Key/value timeout
# Default SDK kvTimeout is 2500ms
connection.kv-timeout: 5000

# Query timeout
# Default SDK queryTimeout is 75s
connection.query-timeout: 75000

# Configures whether mutation tokens will be returned from the server for all mutation operations
# Default mutationTokensEnabled is true
# connection.mutation-tokens-enabled: false

# At startup when connection error is occurred persistence layer can make another attempt to open buckets.
# Before make next try it pause process for 5 second. If after that total connection time is less than specified
# in property above new attempt will be executed
connection.connection-max-wait-time: %(couchbase_conn_max_wait)s
connection.operation-tracing-enabled: false

# If mutation tokens are enabled, they can be used for advanced durability requirements,
# as well as optimized RYOW consistency.
connection.mutation-tokens-enabled: false

# Sets the pool size (number of threads to use) for all non blocking operations in the core and clients
# (default value is the number of CPUs).
#connection.computation-pool-size: 5

# Default scan consistency. Possible values are: not_bounded, request_plus, statement_plus
connection.scan-consistency: %(couchbase_scan_consistency)s

# Sets the time of inactivity, in milliseconds, after which some services
# will issue a form of keep-alive request to their corresponding server/nodes
# (default is 30s, values <= 0 deactivate the idle check).
connection.keep-alive-interval: %(couchbase_keepalive_interval)s
# Disable scan consistency in queries. Default value: false
# connection.ignore-attribute-scan-consistency: true

# Customize the timeout used for keepalive operations
connection.keep-alive-timeout: %(couchbase_keepalive_timeout)s
# Try to execute query with scan consitency specified in connection.scan-consistency first.
# On failure execute query again with scan consistency specified in attributes defintions. Default value: true
# connection.attempt-without-attribute-scan-consistency: false

# Enable scopes support. Default value: false
# connection.enable-scope-support: true
Expand All @@ -50,7 +56,9 @@ password.encryption.method: %(encryption_method)s
ssl.trustStore.enable: %(ssl_enabled)s
ssl.trustStore.file: %(couchbaseTrustStoreFn)s
ssl.trustStore.pin: %(encoded_couchbaseTrustStorePass)s
ssl.trustStore.format: pkcs12
ssl.trustStore.type: pkcs12

tls.enable: false

binaryAttributes=objectGUID
certificateAttributes=userCertificate
2 changes: 1 addition & 1 deletion docker-jans-client-api/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ RUN wget -q https://maven.jans.io/maven/io/jans/jython-installer//${JYTHON_VERSI
# ==========

ENV CN_VERSION=1.0.2-SNAPSHOT
ENV CN_BUILD_DATE='2022-08-03 12:40'
ENV CN_BUILD_DATE='2022-08-18 17:19'
ENV CN_SOURCE_URL=https://jenkins.jans.io/maven/io/jans/jans-client-api-server/${CN_VERSION}/jans-client-api-server-${CN_VERSION}.war

COPY jetty/jetty-env.xml /tmp/WEB-INF/jetty-env.xml
Expand Down
40 changes: 24 additions & 16 deletions docker-jans-client-api/conf/jans-couchbase.properties.tmpl
Original file line number Diff line number Diff line change
Expand Up @@ -6,30 +6,36 @@ servers: %(hostname)s
# Default SDK connectTimeout is 10s
connection.connect-timeout: %(couchbase_conn_timeout)s

# Enable/disable DNS SRV lookup for the bootstrap nodes
# Default dnsSrvEnabled is true
connection.dns.use-lookup: false

# Key/value timeout
# Default SDK kvTimeout is 2500ms
connection.kv-timeout: 5000

# Query timeout
# Default SDK queryTimeout is 75s
connection.query-timeout: 75000

# Configures whether mutation tokens will be returned from the server for all mutation operations
# Default mutationTokensEnabled is true
# connection.mutation-tokens-enabled: false

# At startup when connection error is occurred persistence layer can make another attempt to open buckets.
# Before make next try it pause process for 5 second. If after that total connection time is less than specified
# in property above new attempt will be executed
connection.connection-max-wait-time: %(couchbase_conn_max_wait)s
connection.operation-tracing-enabled: false

# If mutation tokens are enabled, they can be used for advanced durability requirements,
# as well as optimized RYOW consistency.
connection.mutation-tokens-enabled: false

# Sets the pool size (number of threads to use) for all non blocking operations in the core and clients
# (default value is the number of CPUs).
#connection.computation-pool-size: 5

# Default scan consistency. Possible values are: not_bounded, request_plus, statement_plus
connection.scan-consistency: %(couchbase_scan_consistency)s

# Sets the time of inactivity, in milliseconds, after which some services
# will issue a form of keep-alive request to their corresponding server/nodes
# (default is 30s, values <= 0 deactivate the idle check).
connection.keep-alive-interval: %(couchbase_keepalive_interval)s
# Disable scan consistency in queries. Default value: false
# connection.ignore-attribute-scan-consistency: true

# Customize the timeout used for keepalive operations
connection.keep-alive-timeout: %(couchbase_keepalive_timeout)s
# Try to execute query with scan consitency specified in connection.scan-consistency first.
# On failure execute query again with scan consistency specified in attributes defintions. Default value: true
# connection.attempt-without-attribute-scan-consistency: false

# Enable scopes support. Default value: false
# connection.enable-scope-support: true
Expand All @@ -50,7 +56,9 @@ password.encryption.method: %(encryption_method)s
ssl.trustStore.enable: %(ssl_enabled)s
ssl.trustStore.file: %(couchbaseTrustStoreFn)s
ssl.trustStore.pin: %(encoded_couchbaseTrustStorePass)s
ssl.trustStore.format: pkcs12
ssl.trustStore.type: pkcs12

tls.enable: false

binaryAttributes=objectGUID
certificateAttributes=userCertificate
2 changes: 1 addition & 1 deletion docker-jans-config-api/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ RUN wget -q https://repo1.maven.org/maven2/org/eclipse/jetty/jetty-home/${JETTY_
# ==========

ENV CN_VERSION=1.0.2-SNAPSHOT
ENV CN_BUILD_DATE='2022-08-11 14:58'
ENV CN_BUILD_DATE='2022-08-18 18:11'
ENV CN_SOURCE_URL=https://jenkins.jans.io/maven/io/jans/jans-config-api-server/${CN_VERSION}/jans-config-api-server-${CN_VERSION}.war

# Install Jans Config API
Expand Down
40 changes: 24 additions & 16 deletions docker-jans-config-api/conf/jans-couchbase.properties.tmpl
Original file line number Diff line number Diff line change
Expand Up @@ -6,30 +6,36 @@ servers: %(hostname)s
# Default SDK connectTimeout is 10s
connection.connect-timeout: %(couchbase_conn_timeout)s

# Enable/disable DNS SRV lookup for the bootstrap nodes
# Default dnsSrvEnabled is true
connection.dns.use-lookup: false

# Key/value timeout
# Default SDK kvTimeout is 2500ms
connection.kv-timeout: 5000

# Query timeout
# Default SDK queryTimeout is 75s
connection.query-timeout: 75000

# Configures whether mutation tokens will be returned from the server for all mutation operations
# Default mutationTokensEnabled is true
# connection.mutation-tokens-enabled: false

# At startup when connection error is occurred persistence layer can make another attempt to open buckets.
# Before make next try it pause process for 5 second. If after that total connection time is less than specified
# in property above new attempt will be executed
connection.connection-max-wait-time: %(couchbase_conn_max_wait)s
connection.operation-tracing-enabled: false

# If mutation tokens are enabled, they can be used for advanced durability requirements,
# as well as optimized RYOW consistency.
connection.mutation-tokens-enabled: false

# Sets the pool size (number of threads to use) for all non blocking operations in the core and clients
# (default value is the number of CPUs).
#connection.computation-pool-size: 5

# Default scan consistency. Possible values are: not_bounded, request_plus, statement_plus
connection.scan-consistency: %(couchbase_scan_consistency)s

# Sets the time of inactivity, in milliseconds, after which some services
# will issue a form of keep-alive request to their corresponding server/nodes
# (default is 30s, values <= 0 deactivate the idle check).
connection.keep-alive-interval: %(couchbase_keepalive_interval)s
# Disable scan consistency in queries. Default value: false
# connection.ignore-attribute-scan-consistency: true

# Customize the timeout used for keepalive operations
connection.keep-alive-timeout: %(couchbase_keepalive_timeout)s
# Try to execute query with scan consitency specified in connection.scan-consistency first.
# On failure execute query again with scan consistency specified in attributes defintions. Default value: true
# connection.attempt-without-attribute-scan-consistency: false

# Enable scopes support. Default value: false
# connection.enable-scope-support: true
Expand All @@ -50,7 +56,9 @@ password.encryption.method: %(encryption_method)s
ssl.trustStore.enable: %(ssl_enabled)s
ssl.trustStore.file: %(couchbaseTrustStoreFn)s
ssl.trustStore.pin: %(encoded_couchbaseTrustStorePass)s
ssl.trustStore.format: pkcs12
ssl.trustStore.type: pkcs12

tls.enable: false

binaryAttributes=objectGUID
certificateAttributes=userCertificate
2 changes: 1 addition & 1 deletion docker-jans-fido2/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ EXPOSE 8080
# =====

ENV CN_VERSION=1.0.2-SNAPSHOT
ENV CN_BUILD_DATE='2022-08-03 12:37'
ENV CN_BUILD_DATE='2022-08-18 17:17'
ENV CN_SOURCE_URL=https://jenkins.jans.io/maven/io/jans/jans-fido2-server/${CN_VERSION}/jans-fido2-server-${CN_VERSION}.war

# Install FIDO2
Expand Down
40 changes: 24 additions & 16 deletions docker-jans-fido2/conf/jans-couchbase.properties.tmpl
Original file line number Diff line number Diff line change
Expand Up @@ -6,30 +6,36 @@ servers: %(hostname)s
# Default SDK connectTimeout is 10s
connection.connect-timeout: %(couchbase_conn_timeout)s

# Enable/disable DNS SRV lookup for the bootstrap nodes
# Default dnsSrvEnabled is true
connection.dns.use-lookup: false

# Key/value timeout
# Default SDK kvTimeout is 2500ms
connection.kv-timeout: 5000

# Query timeout
# Default SDK queryTimeout is 75s
connection.query-timeout: 75000

# Configures whether mutation tokens will be returned from the server for all mutation operations
# Default mutationTokensEnabled is true
# connection.mutation-tokens-enabled: false

# At startup when connection error is occurred persistence layer can make another attempt to open buckets.
# Before make next try it pause process for 5 second. If after that total connection time is less than specified
# in property above new attempt will be executed
connection.connection-max-wait-time: %(couchbase_conn_max_wait)s
connection.operation-tracing-enabled: false

# If mutation tokens are enabled, they can be used for advanced durability requirements,
# as well as optimized RYOW consistency.
connection.mutation-tokens-enabled: false

# Sets the pool size (number of threads to use) for all non blocking operations in the core and clients
# (default value is the number of CPUs).
#connection.computation-pool-size: 5

# Default scan consistency. Possible values are: not_bounded, request_plus, statement_plus
connection.scan-consistency: %(couchbase_scan_consistency)s

# Sets the time of inactivity, in milliseconds, after which some services
# will issue a form of keep-alive request to their corresponding server/nodes
# (default is 30s, values <= 0 deactivate the idle check).
connection.keep-alive-interval: %(couchbase_keepalive_interval)s
# Disable scan consistency in queries. Default value: false
# connection.ignore-attribute-scan-consistency: true

# Customize the timeout used for keepalive operations
connection.keep-alive-timeout: %(couchbase_keepalive_timeout)s
# Try to execute query with scan consitency specified in connection.scan-consistency first.
# On failure execute query again with scan consistency specified in attributes defintions. Default value: true
# connection.attempt-without-attribute-scan-consistency: false

# Enable scopes support. Default value: false
# connection.enable-scope-support: true
Expand All @@ -50,7 +56,9 @@ password.encryption.method: %(encryption_method)s
ssl.trustStore.enable: %(ssl_enabled)s
ssl.trustStore.file: %(couchbaseTrustStoreFn)s
ssl.trustStore.pin: %(encoded_couchbaseTrustStorePass)s
ssl.trustStore.format: pkcs12
ssl.trustStore.type: pkcs12

tls.enable: false

binaryAttributes=objectGUID
certificateAttributes=userCertificate
2 changes: 1 addition & 1 deletion docker-jans-scim/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ RUN wget -q https://maven.jans.io/maven/io/jans/jython-installer/${JYTHON_VERSIO
# ====

ENV CN_VERSION=1.0.2-SNAPSHOT
ENV CN_BUILD_DATE='2022-08-04 15:32'
ENV CN_BUILD_DATE='2022-08-18 18:09'
ENV CN_SOURCE_URL=https://jenkins.jans.io/maven/io/jans/jans-scim-server/${CN_VERSION}/jans-scim-server-${CN_VERSION}.war

# Install SCIM
Expand Down
40 changes: 24 additions & 16 deletions docker-jans-scim/conf/jans-couchbase.properties.tmpl
Original file line number Diff line number Diff line change
Expand Up @@ -6,30 +6,36 @@ servers: %(hostname)s
# Default SDK connectTimeout is 10s
connection.connect-timeout: %(couchbase_conn_timeout)s

# Enable/disable DNS SRV lookup for the bootstrap nodes
# Default dnsSrvEnabled is true
connection.dns.use-lookup: false

# Key/value timeout
# Default SDK kvTimeout is 2500ms
connection.kv-timeout: 5000

# Query timeout
# Default SDK queryTimeout is 75s
connection.query-timeout: 75000

# Configures whether mutation tokens will be returned from the server for all mutation operations
# Default mutationTokensEnabled is true
# connection.mutation-tokens-enabled: false

# At startup when connection error is occurred persistence layer can make another attempt to open buckets.
# Before make next try it pause process for 5 second. If after that total connection time is less than specified
# in property above new attempt will be executed
connection.connection-max-wait-time: %(couchbase_conn_max_wait)s
connection.operation-tracing-enabled: false

# If mutation tokens are enabled, they can be used for advanced durability requirements,
# as well as optimized RYOW consistency.
connection.mutation-tokens-enabled: false

# Sets the pool size (number of threads to use) for all non blocking operations in the core and clients
# (default value is the number of CPUs).
#connection.computation-pool-size: 5

# Default scan consistency. Possible values are: not_bounded, request_plus, statement_plus
connection.scan-consistency: %(couchbase_scan_consistency)s

# Sets the time of inactivity, in milliseconds, after which some services
# will issue a form of keep-alive request to their corresponding server/nodes
# (default is 30s, values <= 0 deactivate the idle check).
connection.keep-alive-interval: %(couchbase_keepalive_interval)s
# Disable scan consistency in queries. Default value: false
# connection.ignore-attribute-scan-consistency: true

# Customize the timeout used for keepalive operations
connection.keep-alive-timeout: %(couchbase_keepalive_timeout)s
# Try to execute query with scan consitency specified in connection.scan-consistency first.
# On failure execute query again with scan consistency specified in attributes defintions. Default value: true
# connection.attempt-without-attribute-scan-consistency: false

# Enable scopes support. Default value: false
# connection.enable-scope-support: true
Expand All @@ -50,7 +56,9 @@ password.encryption.method: %(encryption_method)s
ssl.trustStore.enable: %(ssl_enabled)s
ssl.trustStore.file: %(couchbaseTrustStoreFn)s
ssl.trustStore.pin: %(encoded_couchbaseTrustStorePass)s
ssl.trustStore.format: pkcs12
ssl.trustStore.type: pkcs12

tls.enable: false

binaryAttributes=objectGUID
certificateAttributes=userCertificate
18 changes: 18 additions & 0 deletions jans-pycloudlib/Makefile
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
.PHONY: test clean all develop install uninstall

.DEFAULT_GOAL := develop

develop:
pip install -r requirements-dev.txt

install:
pip install .

uninstall:
pip uninstall -y jans-pycloudlib

serve-docs:
mkdocs serve -w jans

build-docs:
mkdocs build
4 changes: 2 additions & 2 deletions jans-pycloudlib/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,12 +31,12 @@ We are adding more typehints into the `jans.pycloudlib` sourcecode, gradually.

### Building internal docs

Internal docs are generated from sphinx-based docs at `docs` directory.
Internal docs are generated from mkdocs-based docs at `docs` directory.
To generate/preview docs, run the following steps:

1. Run `pip install -r requirements-dev.txt` to install required libraries.
1. Preview docs by running `mkdocs serve -w jans`
1. Visit http://localhost:8000 to see the generated docs (they are reloaded automatically when sourcecode is modified)
1. Visit http://localhost:8000 to see the generated docs (they are reloaded automatically when source code is modified)

## Refs

Expand Down
Loading