This project is a ActiveMQ Artemis Self Provisioning Plugin to the Administrator perspective in OpenShift console. It requires at least OpenShift 4.18 to use and is compatible with OpenShift 4.19.
- Local Development
- PKI Setup and Cleanup Scripts
- E2E Tests
- Docker Image
- Deployment on Cluster
- Token Review Configuration
- Additional Documentation
To run the local development environment you need:
- Access to a local or remote OpenShift cluster
- The ArkMq Broker operator installed on the cluster
- The cert-manager operator installed on the cluster
- The plugin running
- The console running
Follow the documentation: https://access.redhat.com/documentation/en-us/red_hat_openshift_local/2.34/html-single/getting_started_guide/index#introducing
Warning
If you're encountering an issue where crc gets stuck in the step Waiting for kube-apiserver availability or Waiting until the user's pull secret is written to the instance disk... you might need to configure the network as local: crc config set network-mode user
Once your environment is set up you simply need to crc start your cluster.
Depending on the remote or local env:
- Remote:
oc login -u kubeadmin https://api.ci-ln-x671mxk-76ef8.origin-ci-int-aws.dev.rhcloud.com:6443(adapt to your cluster address) - Local:
oc login -u kubeadmin https://api.crc.testing:6443
The plugin requires having access to the operator to function. You can either get the operator from the operatorHub or from the upstream repo.
Navigate to the operatorHub on the console and search for: Red Hat Integration - AMQ Broker for RHEL 8 (Multiarch). After installation wait for the operator container to be up and running.
Warning
If you're running into an issue where the operatorHub is not accessible, try to force its redeployment: oc delete pods --all -n openshift-marketplace (see crc-org/crc#4109 for reference)
Clone the operator repository then run ./deploy/install_opr.sh to install the operator onto your cluster.
git clone [email protected]:arkmq-org/activemq-artemis-operator.git
cd activemq-artemis-operator
./deploy/install_opr.shTip
If you need to redeploy the operator, first call ./deploy/undeploy_all.sh
Important
The script install_opr.sh will try to deploy on OpenShift with the oc command. If it's not available it will fallback to kubectl. Make sure your OpenShift cluster is up and running and that oc is connected to it before running the install.
The plugin requires having access to the cert-manager operator for certain of its functionalities.
Navigate to the operatorHub on the console and search for Cert-manager.
First, add the Jetstack Helm repository:
helm repo add jetstack https://charts.jetstack.io --force-updateNow, install trust-manager. This will be configured to sync trust Bundles to Secrets in all namespaces:
helm upgrade trust-manager jetstack/trust-manager \
--install \
--namespace cert-manager \
--set secretTargets.enabled=true \
--set secretTargets.authorizedSecretsAll=true \
--waitFor testing the SPP, you need a complete PKI infrastructure including trust-manager to distribute CA certificates.
Run the setup script to create all necessary resources:
yarn chain-of-trust setupFor detailed options, cleanup procedures, and manual commands, see the PKI Setup and Cleanup Scripts section.
For HTTP:
cd bridge-auth-http
./setup.sh
cd ..For HTTPS:
cd bridge-auth-https
./setup.sh
cd ..In one terminal window, run:
yarn install
yarn startNote: yarn start starts the plugin in HTTP mode. For HTTPS mode, run:
yarn start-tlsIn another terminal window, run:
oc login
yarn start-consoleThis requires Docker, podman, or another OCI compatible container runtime.
This will run the OpenShift console in a container connected to the cluster you've logged into. The plugin HTTP server runs on port 9001 with CORS enabled. Navigate to http://localhost:9000 to see the running plugin.
To view our plugin on OpenShift, navigate to the Workloads section. The plugin will be listed as Brokers.
For HTTPS mode:
yarn start-console-tlsThis command will run the console in HTTPS mode on port 9442. The console URL is https://localhost:9442
Note: Running console in HTTPS mode requires the plugin running in HTTPS mode too.
By default, the console will start with the latest version image. You can specify a different version by passing it as an argument:
yarn start-console 4.16
# Or with TLS
yarn start-console-tls 4.16Supported versions can be found in the CI configuration file.
The console in HTTPS mode requires a private key and server certificate generated with openssl. They are located under console-cert directory:
domain.key- Private keydomain.crt- Server certificaterootCA.crt- Root CA certificate
How they are generated:
# 1. Generate private key
openssl genrsa -out domain.key 4096
# 2. Generate certificate signing request (CSR)
openssl req -key domain.key -new -out domain.csr
# 3. Generate self-signed certificate
openssl x509 -signkey domain.key -in domain.csr -req -days 3650 -out domain.crt
# 4. Generate root CA certificate and key
openssl req -x509 -nodes -sha256 -days 3650 -newkey rsa:4096 -keyout rootCA.key -out rootCA.crt
# 5. Sign domain certificate with root CA
openssl x509 -req -CA rootCA.crt -CAkey rootCA.key -in domain.csr -out domain.crt -days 3650 -CAcreateserial -extfile domain.extThe signed domain.crt and domain.key are mounted to the docker container and passed to the console using BRIDGE_TLS_CERT_FILE and BRIDGE_TLS_KEY_FILE environment variables. See start-console-tls.sh for details.
When running the plugin in HTTPS mode with yarn start-tls, the webpack dev server uses self-signed certificates for both HTTP and WebSocket connections. While your browser may accept the certificate for regular HTTP requests, WebSocket connections require explicit certificate trust.
If you see WebSocket connection errors in the browser console (e.g., Firefox can't establish a connection to the server at wss://localhost:9444/ws), follow these steps:
- Open a new browser tab
- Navigate directly to:
https://localhost:9444 - Accept the security warning:
- Firefox: Click "Advanced" → "Accept the Risk and Continue"
- Chrome: Click "Advanced" → "Proceed to localhost (unsafe)"
- Return to your OpenShift console tab and refresh the page
The WebSocket connection should now work, and hot reloading will function correctly.
The webpack.config.tls.ts file includes the following configuration to enable secure WebSocket connections for hot module replacement:
devServer: {
port: 9444,
host: '0.0.0.0',
https: {
key: path.resolve(__dirname, 'console-cert/domain.key'),
cert: path.resolve(__dirname, 'console-cert/domain.crt'),
ca: path.resolve(__dirname, 'console-cert/rootCA.crt'),
},
hot: true,
compress: true,
client: {
webSocketTransport: 'ws',
webSocketURL: {
hostname: 'localhost',
pathname: '/ws',
port: 9444,
protocol: 'wss',
},
},
}The scripts directory contains scripts for setting up and cleaning up PKI resources for ActiveMQ Artemis restricted mode testing.
All scripts use centralized modules in the scripts/ directory to ensure consistency:
scripts/setup-pki.js- Shared PKI setup functions (used by setup scripts and Playwright tests)scripts/cleanup-config.js- Shared cleanup configuration (used by cleanup scripts and Playwright tests)
This eliminates code duplication and ensures consistent behavior across development and test environments. Both TypeScript and JavaScript code import from these shared JavaScript modules.
Manages PKI infrastructure for local development and testing with a single unified script.
Commands:
setup- Creates a complete PKI infrastructurecleanup- Removes PKI infrastructure
Options:
--namespace <name>- Target namespace for operator cert (default: "default")--prefix <name>- Prefix for resource names (default: "dev")--help- Show help message
What setup creates:
- Self-signed root ClusterIssuer (
{prefix}-selfsigned-root-issuer) - Root CA Certificate (
{prefix}-root-cain cert-manager namespace) - CA-signed ClusterIssuer (
{prefix}-ca-issuer) - Trust Bundle (
activemq-artemis-manager-ca, distributed to all namespaces) - Operator Certificate (
activemq-artemis-manager-certin specified namespace)
What cleanup removes:
- Trust bundles
- Operator certificates and secrets
- ClusterIssuers (root and CA)
- Root CA certificates
- All broker certificates (both generic
broker-certand CR-specific{name}-broker-cert)
Examples:
# Setup with defaults (prefix: "dev", namespace: "default")
yarn chain-of-trust setup
# Setup in custom namespace
yarn chain-of-trust setup --namespace my-namespace
# Setup with custom prefix
yarn chain-of-trust setup --prefix test
# Cleanup with defaults
yarn chain-of-trust cleanup
# Cleanup with custom namespace and prefix
yarn chain-of-trust cleanup --namespace my-namespace --prefix testCleans up leftover e2e test resources including namespaces.
What it cleans:
- E2E test namespaces (patterns:
e2e-test-*,e2e-restricted-*) - Test ClusterIssuers (patterns:
artemis-*,e2e-*,dev-*) - Test certificates containing "artemis"
- All broker certificates (pattern:
*broker-cert*) - All broker certificate secrets (pattern:
*broker-cert*) - Test bundles (activemq-artemis-manager-ca)
All scripts now properly clean up broker certificates in all their forms:
- Generic certificates:
broker-cert - CR-specific certificates:
{broker-name}-broker-cert(e.g.,ex-aao-broker-cert)
The cleanup uses pattern matching (*broker-cert*) to catch all variations, regardless of the specific broker name.
If you need to clean up manually:
# Delete all broker certificates
kubectl get certificates -A -o json | \
jq -r '.items[] | select(.metadata.name | contains("broker-cert")) | "\(.metadata.namespace) \(.metadata.name)"' | \
xargs -r -L1 sh -c 'kubectl delete certificate $1 -n $0' || true
# Delete all broker certificate secrets
kubectl get secrets -A -o json | \
jq -r '.items[] | select(.metadata.name | contains("broker-cert")) | "\(.metadata.namespace) \(.metadata.name)"' | \
xargs -r -L1 sh -c 'kubectl delete secret $1 -n $0' || true
# Delete all test namespaces
kubectl get namespaces -o name | grep -E 'e2e-test-|e2e-restricted-' | xargs kubectl delete
# Delete all test ClusterIssuers
kubectl get clusterissuers -o name | grep -E 'e2e-|dev-|artemis-' | xargs kubectl deleteThe project includes an end-to-end (E2E) test suite using Playwright to automate and validate its functionality in a realistic environment.
Before running the E2E tests, ensure you have the following set up:
- Running OpenShift Cluster: You must have a local or remote OpenShift cluster running. See Setting up an OpenShift cluster.
- Operators Installed: The
AMQ Brokerandcert-manageroperators must be installed on the cluster. - Authenticated
ocCLI: You must be logged into your cluster via theoccommand line. - Bridge Authentication: The bridge authentication must be set up for HTTP (non-TLS):
cd bridge-auth-http && ./setup.sh && cd ..
- Webpack Server: The plugin's webpack server must be running in a terminal (non-TLS):
yarn start
Important
The test suite requires the kubeadmin password to be set as an environment variable. You can retrieve the password for your local CRC cluster by running:
crc console --credentialsThen, export the variable:
export KUBEADMIN_PASSWORD="<your-password>"Note
Alternatively, you can set your CRC kubeadmin password to the default value kubeadmin so you don't have to export the environment variable:
crc config set kubeadmin-password kubeadminWith all prerequisites in place and the webpack server running:
-
Start the Console: In a second terminal, start the OpenShift console:
yarn start-console
-
Run Tests: In a third terminal, choose one of the following options:
Interactive Mode with UI (recommended for development and debugging):
KUBEADMIN_PASSWORD=kubeadmin yarn pw:uiOpens Playwright's UI Mode with a visual timeline, DOM snapshots, network inspection, and step-by-step debugging capabilities.
Headed Mode (browser visible, without UI):
KUBEADMIN_PASSWORD=kubeadmin yarn pw:headedRuns tests with a visible browser window but without the interactive debugger.
Headless Mode (for CI or quick runs):
KUBEADMIN_PASSWORD=kubeadmin yarn pw:testRuns tests in the terminal without opening a browser window.
Full end-to-end test for restricted mode broker creation:
- Creates a unique namespace
- Generates a ClusterIssuer chain of trust
- Generates operator certificate
- Generates broker certificate via UI
- Generates trust bundle (CA)
- Creates a restricted broker
- Waits for broker to be ready
- Deletes the broker
- Cleans up all resources
Basic smoke tests for non-restricted mode broker creation and deletion.
Playwright provides excellent debugging capabilities:
-
UI Mode (Recommended): Use
yarn pw:uito get:- Click on any action to see that exact state
- "Pick locator" tool to test selectors
- DOM snapshots, network, and console logs at each step
- Speed slider to slow down test execution
-
Inspector Mode: Add
await page.pause()in your test code, then run withyarn pw:headedto open the Playwright Inspector with step-over controls. -
VSCode Debugging: Set breakpoints in test files and use VSCode's debugger with the Playwright extension.
E2E tests create Kubernetes resources (namespaces, ClusterIssuers, Certificates, Bundles). These are automatically cleaned up after tests, but if tests fail or are interrupted, you may need to manually clean up:
# Clean up leftover e2e test resources
yarn pw:cleanupTests fail with "already exists" errors:
yarn pw:cleanup
yarn pw:testTests timeout:
- Check that cert-manager and trust-manager are installed in the cluster
- Verify cluster resources are healthy:
kubectl get pods -n cert-manager - Increase timeout in
playwright.config.tsif needed
Resources not cleaned up:
The afterAll hook should clean up resources even on test failure. If not:
yarn pw:cleanup-
Build the image:
docker build -t quay.io/arkmq-org/activemq-artemis-self-provisioning-plugin:latest . -
Run the image:
docker run -it --rm -d -p 9001:80 quay.io/arkmq-org/activemq-artemis-self-provisioning-plugin:latest
-
Push the image to image registry:
docker push quay.io/arkmq-org/activemq-artemis-self-provisioning-plugin:latest
You can deploy the plugin to a cluster by running:
./deploy-plugin.sh [-i <image> -n]Without any arguments, the plugin will run in HTTPS mode on port 9443.
Options:
-
-i <image>or--image <image>: Specify the plugin image. Default:quay.io/arkmq-org/activemq-artemis-self-provisioning-plugin:latest./deploy-plugin.sh -i quay.io/<repo-username>/activemq-artemis-self-provisioning-plugin:1.0.1
-
-nor--nossl: Disable HTTPS and make the plugin run in HTTP mode on port 9001../deploy-plugin.sh -n
The deploy-plugin.sh script uses oc kustomize (built-in kustomize) to configure and deploy the plugin using resources and patches defined under the ./deploy directory.
Deployment Structure:
deploy/base/- Default resources for deploying the plugin in HTTPS modedeploy/http/- Patch files for deploying the plugin in HTTP mode
Undeploy:
./undeploy-plugin.shIf you want to have a broker that is able to perform a token review, you will need to have access to a service account with enough rights. To create one, execute the following YAML on your environment:
apiVersion: v1
kind: ServiceAccount
metadata:
name: ex-aao-sa
namespace: default
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: ex-aao-sa-crb
subjects:
- kind: ServiceAccount
name: ex-aao-sa
namespace: default
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: 'system:auth-delegator'Important:
- The service account must reside in the same namespace as the broker you want to deploy.
- The role binding to
system:auth-delegatorhas to be cluster-wide otherwise the broker won't be allowed to perform token reviews.
While we wait for the 7.13 broker to get available, any broker that intends to perform a token review should have the following env in its spec:
env:
- name: KUBERNETES_CA_PATH
value: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
- name: KUBERNETES_SERVICE_HOST
value: 'api.crc.testing'
- name: KUBERNETES_SERVICE_PORT
value: '6443'Assuming you have the service account ex-aao-sa available in the same namespace as the broker you want to deploy and that you have created with the UI a custom JAAS config allowing your username to have admin access to the broker, your YAML should look like this:
apiVersion: broker.amq.io/v1beta1
kind: ActiveMQArtemis
metadata:
name: ex-aao
namespace: default
spec:
env:
- name: KUBERNETES_CA_PATH
value: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
- name: KUBERNETES_SERVICE_HOST
value: 'api.crc.testing'
- name: KUBERNETES_SERVICE_PORT
value: '6443'
ingressDomain: apps-crc.testing
console:
expose: true
deploymentPlan:
image: placeholder
requireLogin: false
size: 1
podSecurity:
serviceAccountName: ex-aao-sa
extraMounts:
secrets:
- custom-jaas-configFor more detailed information about specific components:
- PKI Setup Details: See the
scripts/directory for setup-pki.js and cleanup-config.js source code - Playwright Fixtures: See
playwright/fixtures/for test helper functions and shared setup code - Deployment Configuration: See
deploy/directory for kustomize resources and patches