diff --git a/assets/operator/ocp-ppc64le/sso/imagestreams/sso74-openj9-openshift-rhel8.json b/assets/operator/ocp-ppc64le/sso/imagestreams/sso74-openj9-openshift-rhel8.json index e0759ad66..037727583 100755 --- a/assets/operator/ocp-ppc64le/sso/imagestreams/sso74-openj9-openshift-rhel8.json +++ b/assets/operator/ocp-ppc64le/sso/imagestreams/sso74-openj9-openshift-rhel8.json @@ -8,7 +8,7 @@ "description": "Red Hat Single Sign-On 7.4 on OpenJ9", "openshift.io/display-name": "Red Hat Single Sign-On 7.4 on OpenJ9", "openshift.io/provider-display-name": "Red Hat, Inc.", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "spec": { diff --git a/assets/operator/ocp-ppc64le/sso/imagestreams/sso75-openj9-openshift-rhel8.json b/assets/operator/ocp-ppc64le/sso/imagestreams/sso75-openj9-openshift-rhel8.json index d19e103f1..03dfcbf96 100755 --- a/assets/operator/ocp-ppc64le/sso/imagestreams/sso75-openj9-openshift-rhel8.json +++ b/assets/operator/ocp-ppc64le/sso/imagestreams/sso75-openj9-openshift-rhel8.json @@ -8,7 +8,7 @@ "description": "Red Hat Single Sign-On 7.5 on OpenJ9", "openshift.io/display-name": "Red Hat Single Sign-On 7.5 on OpenJ9", "openshift.io/provider-display-name": "Red Hat, Inc.", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "spec": { diff --git a/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-https.json b/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-https.json index fd4fdbe6f..754e8f2c4 100755 --- a/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-https.json +++ b/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-https.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJ9 server based deployment, securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -539,7 +539,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-openj9-https" } } \ No newline at end of file diff --git a/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-ocp4-x509-https.json b/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-ocp4-x509-https.json index 20f1d3d4f..fc2860890 100755 --- a/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-ocp4-x509-https.json +++ b/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-ocp4-x509-https.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJ9 server based deployment, securing RH-SSO communication using re-encrypt TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.", @@ -387,7 +387,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-openj9-ocp4-x509-https" } } \ No newline at end of file diff --git a/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-ocp4-x509-postgresql-persistent.json b/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-ocp4-x509-postgresql-persistent.json index 660a98865..c5b67095d 100755 --- a/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-ocp4-x509-postgresql-persistent.json +++ b/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-ocp4-x509-postgresql-persistent.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJ9 server based deployment, deployment configuration for PostgreSQL using persistence, and securing RH-SSO communication using re-encrypt TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new persistent RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.", @@ -635,7 +635,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-openj9-ocp4-x509-postgresql-persistent" } } \ No newline at end of file diff --git a/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-postgresql-persistent.json b/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-postgresql-persistent.json index 729834de8..840fa2b5c 100755 --- a/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-postgresql-persistent.json +++ b/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-postgresql-persistent.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJ9 server based deployment, deployment configuration for PostgreSQL using persistence, and securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new persistent RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -788,7 +788,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-openj9-postgresql-persistent" } } \ No newline at end of file diff --git a/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-postgresql.json b/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-postgresql.json index 02844e87e..235ab8e6c 100755 --- a/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-postgresql.json +++ b/assets/operator/ocp-ppc64le/sso/templates/sso74-openj9-postgresql.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJ9 server based deployment, deployment configuration for PostgreSQL using ephemeral (temporary) storage, and securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -766,7 +766,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-openj9-postgresql" } } \ No newline at end of file diff --git a/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-https.json b/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-https.json index 2d49622e2..5e5555f5c 100755 --- a/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-https.json +++ b/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-https.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJ9 server based deployment, securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -539,7 +539,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-openj9-https" } } \ No newline at end of file diff --git a/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-ocp4-x509-https.json b/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-ocp4-x509-https.json index 0197bbf2b..890de5d7f 100755 --- a/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-ocp4-x509-https.json +++ b/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-ocp4-x509-https.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJ9 server based deployment, securing RH-SSO communication using re-encrypt TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.", @@ -387,7 +387,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-openj9-ocp4-x509-https" } } \ No newline at end of file diff --git a/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-ocp4-x509-postgresql-persistent.json b/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-ocp4-x509-postgresql-persistent.json index d145b502f..bc1a255f9 100755 --- a/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-ocp4-x509-postgresql-persistent.json +++ b/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-ocp4-x509-postgresql-persistent.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJ9 server based deployment, deployment configuration for PostgreSQL using persistence, and securing RH-SSO communication using re-encrypt TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new persistent RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.", @@ -635,7 +635,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-openj9-ocp4-x509-postgresql-persistent" } } \ No newline at end of file diff --git a/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-postgresql-persistent.json b/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-postgresql-persistent.json index ae68a8786..c1027294c 100755 --- a/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-postgresql-persistent.json +++ b/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-postgresql-persistent.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJ9 server based deployment, deployment configuration for PostgreSQL using persistence, and securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new persistent RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -788,7 +788,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-openj9-postgresql-persistent" } } \ No newline at end of file diff --git a/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-postgresql.json b/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-postgresql.json index eaf111fb3..8245223b1 100755 --- a/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-postgresql.json +++ b/assets/operator/ocp-ppc64le/sso/templates/sso75-openj9-postgresql.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJ9 server based deployment, deployment configuration for PostgreSQL using ephemeral (temporary) storage, and securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -766,7 +766,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-openj9-postgresql" } } \ No newline at end of file diff --git a/assets/operator/ocp-s390x/sso/imagestreams/sso74-openj9-openshift-rhel8.json b/assets/operator/ocp-s390x/sso/imagestreams/sso74-openj9-openshift-rhel8.json index e0759ad66..037727583 100755 --- a/assets/operator/ocp-s390x/sso/imagestreams/sso74-openj9-openshift-rhel8.json +++ b/assets/operator/ocp-s390x/sso/imagestreams/sso74-openj9-openshift-rhel8.json @@ -8,7 +8,7 @@ "description": "Red Hat Single Sign-On 7.4 on OpenJ9", "openshift.io/display-name": "Red Hat Single Sign-On 7.4 on OpenJ9", "openshift.io/provider-display-name": "Red Hat, Inc.", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "spec": { diff --git a/assets/operator/ocp-s390x/sso/imagestreams/sso75-openj9-openshift-rhel8.json b/assets/operator/ocp-s390x/sso/imagestreams/sso75-openj9-openshift-rhel8.json index d19e103f1..03dfcbf96 100755 --- a/assets/operator/ocp-s390x/sso/imagestreams/sso75-openj9-openshift-rhel8.json +++ b/assets/operator/ocp-s390x/sso/imagestreams/sso75-openj9-openshift-rhel8.json @@ -8,7 +8,7 @@ "description": "Red Hat Single Sign-On 7.5 on OpenJ9", "openshift.io/display-name": "Red Hat Single Sign-On 7.5 on OpenJ9", "openshift.io/provider-display-name": "Red Hat, Inc.", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "spec": { diff --git a/assets/operator/ocp-s390x/sso/templates/sso74-openj9-https.json b/assets/operator/ocp-s390x/sso/templates/sso74-openj9-https.json index fd4fdbe6f..754e8f2c4 100755 --- a/assets/operator/ocp-s390x/sso/templates/sso74-openj9-https.json +++ b/assets/operator/ocp-s390x/sso/templates/sso74-openj9-https.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJ9 server based deployment, securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -539,7 +539,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-openj9-https" } } \ No newline at end of file diff --git a/assets/operator/ocp-s390x/sso/templates/sso74-openj9-ocp4-x509-https.json b/assets/operator/ocp-s390x/sso/templates/sso74-openj9-ocp4-x509-https.json index 20f1d3d4f..fc2860890 100755 --- a/assets/operator/ocp-s390x/sso/templates/sso74-openj9-ocp4-x509-https.json +++ b/assets/operator/ocp-s390x/sso/templates/sso74-openj9-ocp4-x509-https.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJ9 server based deployment, securing RH-SSO communication using re-encrypt TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.", @@ -387,7 +387,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-openj9-ocp4-x509-https" } } \ No newline at end of file diff --git a/assets/operator/ocp-s390x/sso/templates/sso74-openj9-ocp4-x509-postgresql-persistent.json b/assets/operator/ocp-s390x/sso/templates/sso74-openj9-ocp4-x509-postgresql-persistent.json index 660a98865..c5b67095d 100755 --- a/assets/operator/ocp-s390x/sso/templates/sso74-openj9-ocp4-x509-postgresql-persistent.json +++ b/assets/operator/ocp-s390x/sso/templates/sso74-openj9-ocp4-x509-postgresql-persistent.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJ9 server based deployment, deployment configuration for PostgreSQL using persistence, and securing RH-SSO communication using re-encrypt TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new persistent RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.", @@ -635,7 +635,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-openj9-ocp4-x509-postgresql-persistent" } } \ No newline at end of file diff --git a/assets/operator/ocp-s390x/sso/templates/sso74-openj9-postgresql-persistent.json b/assets/operator/ocp-s390x/sso/templates/sso74-openj9-postgresql-persistent.json index 729834de8..840fa2b5c 100755 --- a/assets/operator/ocp-s390x/sso/templates/sso74-openj9-postgresql-persistent.json +++ b/assets/operator/ocp-s390x/sso/templates/sso74-openj9-postgresql-persistent.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJ9 server based deployment, deployment configuration for PostgreSQL using persistence, and securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new persistent RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -788,7 +788,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-openj9-postgresql-persistent" } } \ No newline at end of file diff --git a/assets/operator/ocp-s390x/sso/templates/sso74-openj9-postgresql.json b/assets/operator/ocp-s390x/sso/templates/sso74-openj9-postgresql.json index 02844e87e..235ab8e6c 100755 --- a/assets/operator/ocp-s390x/sso/templates/sso74-openj9-postgresql.json +++ b/assets/operator/ocp-s390x/sso/templates/sso74-openj9-postgresql.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJ9 server based deployment, deployment configuration for PostgreSQL using ephemeral (temporary) storage, and securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -766,7 +766,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-openj9-postgresql" } } \ No newline at end of file diff --git a/assets/operator/ocp-s390x/sso/templates/sso75-openj9-https.json b/assets/operator/ocp-s390x/sso/templates/sso75-openj9-https.json index 2d49622e2..5e5555f5c 100755 --- a/assets/operator/ocp-s390x/sso/templates/sso75-openj9-https.json +++ b/assets/operator/ocp-s390x/sso/templates/sso75-openj9-https.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJ9 server based deployment, securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -539,7 +539,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-openj9-https" } } \ No newline at end of file diff --git a/assets/operator/ocp-s390x/sso/templates/sso75-openj9-ocp4-x509-https.json b/assets/operator/ocp-s390x/sso/templates/sso75-openj9-ocp4-x509-https.json index 0197bbf2b..890de5d7f 100755 --- a/assets/operator/ocp-s390x/sso/templates/sso75-openj9-ocp4-x509-https.json +++ b/assets/operator/ocp-s390x/sso/templates/sso75-openj9-ocp4-x509-https.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJ9 server based deployment, securing RH-SSO communication using re-encrypt TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.", @@ -387,7 +387,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-openj9-ocp4-x509-https" } } \ No newline at end of file diff --git a/assets/operator/ocp-s390x/sso/templates/sso75-openj9-ocp4-x509-postgresql-persistent.json b/assets/operator/ocp-s390x/sso/templates/sso75-openj9-ocp4-x509-postgresql-persistent.json index d145b502f..bc1a255f9 100755 --- a/assets/operator/ocp-s390x/sso/templates/sso75-openj9-ocp4-x509-postgresql-persistent.json +++ b/assets/operator/ocp-s390x/sso/templates/sso75-openj9-ocp4-x509-postgresql-persistent.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJ9 server based deployment, deployment configuration for PostgreSQL using persistence, and securing RH-SSO communication using re-encrypt TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new persistent RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.", @@ -635,7 +635,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-openj9-ocp4-x509-postgresql-persistent" } } \ No newline at end of file diff --git a/assets/operator/ocp-s390x/sso/templates/sso75-openj9-postgresql-persistent.json b/assets/operator/ocp-s390x/sso/templates/sso75-openj9-postgresql-persistent.json index ae68a8786..c1027294c 100755 --- a/assets/operator/ocp-s390x/sso/templates/sso75-openj9-postgresql-persistent.json +++ b/assets/operator/ocp-s390x/sso/templates/sso75-openj9-postgresql-persistent.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJ9 server based deployment, deployment configuration for PostgreSQL using persistence, and securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new persistent RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -788,7 +788,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-openj9-postgresql-persistent" } } \ No newline at end of file diff --git a/assets/operator/ocp-s390x/sso/templates/sso75-openj9-postgresql.json b/assets/operator/ocp-s390x/sso/templates/sso75-openj9-postgresql.json index eaf111fb3..8245223b1 100755 --- a/assets/operator/ocp-s390x/sso/templates/sso75-openj9-postgresql.json +++ b/assets/operator/ocp-s390x/sso/templates/sso75-openj9-postgresql.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJ9 server based deployment, deployment configuration for PostgreSQL using ephemeral (temporary) storage, and securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -766,7 +766,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-openj9-postgresql" } } \ No newline at end of file diff --git a/assets/operator/ocp-x86_64/sso/imagestreams/sso74-openshift-rhel8.json b/assets/operator/ocp-x86_64/sso/imagestreams/sso74-openshift-rhel8.json index 28017a733..67ca5766e 100755 --- a/assets/operator/ocp-x86_64/sso/imagestreams/sso74-openshift-rhel8.json +++ b/assets/operator/ocp-x86_64/sso/imagestreams/sso74-openshift-rhel8.json @@ -8,7 +8,7 @@ "description": "Red Hat Single Sign-On 7.4 on OpenJDK", "openshift.io/display-name": "Red Hat Single Sign-On 7.4 on OpenJDK", "openshift.io/provider-display-name": "Red Hat, Inc.", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "spec": { diff --git a/assets/operator/ocp-x86_64/sso/imagestreams/sso75-openshift-rhel8.json b/assets/operator/ocp-x86_64/sso/imagestreams/sso75-openshift-rhel8.json index e3ccd9adf..b8147e0f8 100755 --- a/assets/operator/ocp-x86_64/sso/imagestreams/sso75-openshift-rhel8.json +++ b/assets/operator/ocp-x86_64/sso/imagestreams/sso75-openshift-rhel8.json @@ -8,7 +8,7 @@ "description": "Red Hat Single Sign-On 7.5 on OpenJDK", "openshift.io/display-name": "Red Hat Single Sign-On 7.5 on OpenJDK", "openshift.io/provider-display-name": "Red Hat, Inc.", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "spec": { diff --git a/assets/operator/ocp-x86_64/sso/templates/sso74-https.json b/assets/operator/ocp-x86_64/sso/templates/sso74-https.json index fdce924e2..53128d2cb 100755 --- a/assets/operator/ocp-x86_64/sso/templates/sso74-https.json +++ b/assets/operator/ocp-x86_64/sso/templates/sso74-https.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJDK server based deployment, securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -539,7 +539,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-https" } } \ No newline at end of file diff --git a/assets/operator/ocp-x86_64/sso/templates/sso74-ocp4-x509-https.json b/assets/operator/ocp-x86_64/sso/templates/sso74-ocp4-x509-https.json index ba2c582c5..d70a15fef 100755 --- a/assets/operator/ocp-x86_64/sso/templates/sso74-ocp4-x509-https.json +++ b/assets/operator/ocp-x86_64/sso/templates/sso74-ocp4-x509-https.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJDK server based deployment, securing RH-SSO communication using re-encrypt TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.", @@ -387,7 +387,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-ocp4-x509-https" } } \ No newline at end of file diff --git a/assets/operator/ocp-x86_64/sso/templates/sso74-ocp4-x509-postgresql-persistent.json b/assets/operator/ocp-x86_64/sso/templates/sso74-ocp4-x509-postgresql-persistent.json index 2b4e11926..f0c16590a 100755 --- a/assets/operator/ocp-x86_64/sso/templates/sso74-ocp4-x509-postgresql-persistent.json +++ b/assets/operator/ocp-x86_64/sso/templates/sso74-ocp4-x509-postgresql-persistent.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJDK server based deployment, deployment configuration for PostgreSQL using persistence, and securing RH-SSO communication using re-encrypt TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new persistent RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.", @@ -635,7 +635,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-ocp4-x509-postgresql-persistent" } } \ No newline at end of file diff --git a/assets/operator/ocp-x86_64/sso/templates/sso74-postgresql-persistent.json b/assets/operator/ocp-x86_64/sso/templates/sso74-postgresql-persistent.json index ff5ba02a5..a40435323 100755 --- a/assets/operator/ocp-x86_64/sso/templates/sso74-postgresql-persistent.json +++ b/assets/operator/ocp-x86_64/sso/templates/sso74-postgresql-persistent.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJDK server based deployment, deployment configuration for PostgreSQL using persistence, and securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new persistent RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -788,7 +788,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-postgresql-persistent" } } \ No newline at end of file diff --git a/assets/operator/ocp-x86_64/sso/templates/sso74-postgresql.json b/assets/operator/ocp-x86_64/sso/templates/sso74-postgresql.json index 2dbda12b5..29f9d7543 100755 --- a/assets/operator/ocp-x86_64/sso/templates/sso74-postgresql.json +++ b/assets/operator/ocp-x86_64/sso/templates/sso74-postgresql.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.4 on OpenJDK server based deployment, deployment configuration for PostgreSQL using ephemeral (temporary) storage, and securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.4.10.GA" + "version": "7.4.9.GA" } }, "message": "A new RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -766,7 +766,7 @@ } ], "labels": { - "rhsso": "7.4.10.GA", + "rhsso": "7.4.9.GA", "template": "sso74-postgresql" } } \ No newline at end of file diff --git a/assets/operator/ocp-x86_64/sso/templates/sso75-https.json b/assets/operator/ocp-x86_64/sso/templates/sso75-https.json index 8d8cbb49d..61b4fefa6 100755 --- a/assets/operator/ocp-x86_64/sso/templates/sso75-https.json +++ b/assets/operator/ocp-x86_64/sso/templates/sso75-https.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJDK server based deployment, securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -539,7 +539,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-https" } } \ No newline at end of file diff --git a/assets/operator/ocp-x86_64/sso/templates/sso75-ocp4-x509-https.json b/assets/operator/ocp-x86_64/sso/templates/sso75-ocp4-x509-https.json index fbff735b3..5af5a0adb 100755 --- a/assets/operator/ocp-x86_64/sso/templates/sso75-ocp4-x509-https.json +++ b/assets/operator/ocp-x86_64/sso/templates/sso75-ocp4-x509-https.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJDK server based deployment, securing RH-SSO communication using re-encrypt TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.", @@ -387,7 +387,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-ocp4-x509-https" } } \ No newline at end of file diff --git a/assets/operator/ocp-x86_64/sso/templates/sso75-ocp4-x509-postgresql-persistent.json b/assets/operator/ocp-x86_64/sso/templates/sso75-ocp4-x509-postgresql-persistent.json index 386d3a105..c1b96450c 100755 --- a/assets/operator/ocp-x86_64/sso/templates/sso75-ocp4-x509-postgresql-persistent.json +++ b/assets/operator/ocp-x86_64/sso/templates/sso75-ocp4-x509-postgresql-persistent.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJDK server based deployment, deployment configuration for PostgreSQL using persistence, and securing RH-SSO communication using re-encrypt TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new persistent RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.", @@ -635,7 +635,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-ocp4-x509-postgresql-persistent" } } \ No newline at end of file diff --git a/assets/operator/ocp-x86_64/sso/templates/sso75-postgresql-persistent.json b/assets/operator/ocp-x86_64/sso/templates/sso75-postgresql-persistent.json index 4bc8ae34d..5e97967cd 100755 --- a/assets/operator/ocp-x86_64/sso/templates/sso75-postgresql-persistent.json +++ b/assets/operator/ocp-x86_64/sso/templates/sso75-postgresql-persistent.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJDK server based deployment, deployment configuration for PostgreSQL using persistence, and securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new persistent RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -788,7 +788,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-postgresql-persistent" } } \ No newline at end of file diff --git a/assets/operator/ocp-x86_64/sso/templates/sso75-postgresql.json b/assets/operator/ocp-x86_64/sso/templates/sso75-postgresql.json index 39670b8f7..9548b0591 100755 --- a/assets/operator/ocp-x86_64/sso/templates/sso75-postgresql.json +++ b/assets/operator/ocp-x86_64/sso/templates/sso75-postgresql.json @@ -13,7 +13,7 @@ "template.openshift.io/documentation-url": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/", "template.openshift.io/long-description": "This template defines resources needed to develop Red Hat Single Sign-On 7.5 on OpenJDK server based deployment, deployment configuration for PostgreSQL using ephemeral (temporary) storage, and securing RH-SSO communication using passthrough TLS.", "template.openshift.io/support-url": "https://access.redhat.com", - "version": "7.5.0.GA" + "version": "7.5.1.GA" } }, "message": "A new RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.", @@ -766,7 +766,7 @@ } ], "labels": { - "rhsso": "7.5.0.GA", + "rhsso": "7.5.1.GA", "template": "sso75-postgresql" } } \ No newline at end of file