This repository contains template configuration files to protect sensitive information from being committed to the public repository.
The following types of files are automatically excluded via .gitignore:
*.p12- Certificate keystores*.pem,*.key,*.crt- SSL certificates and keys*.wallet- Oracle wallet files*.env*- Environment variable filesapplication.yaml- Spring configuration with potential secrets*.properties- Properties files that may contain credentials
- Copy
latest-version/src/main/resources/application-template.yamltoapplication.yamlin the same directory - Replace placeholder values with your actual configuration:
${SECURITY_USER_NAME:oracleai}→ your security username${SECURITY_USER_PASSWORD:changeme}→ your security password${SSL_KEYSTORE_PASSWORD:changeme}→ your keystore password- Configure any database connection strings as needed
- Copy
older-versions/java-version/src/main/resources/application-template.yamltoapplication.yamlin the same directory - Follow the same configuration steps as above
If you need SSL certificates:
- Generate or obtain your certificates
- Place them in the appropriate resources directory
- Update the application configuration to reference them
- Ensure certificate files are included in
.gitignorepatterns
You can also use environment variables to override configuration:
SECURITY_USER_NAME- Security usernameSECURITY_USER_PASSWORD- Security passwordSERVER_PORT- Server port (defaults to 8080)SSL_KEYSTORE_PATH- Path to SSL keystoreSSL_KEYSTORE_PASSWORD- SSL keystore passwordSSL_KEY_ALIAS- SSL key alias
- Actual
application.yamlfiles with real credentials - Certificate files (
.p12,.pem,.key, etc.) - Oracle wallet directories or files
- Any files containing real passwords, API keys, or connection strings
✅ Safe to commit:
- Template files (
application-template.yaml) - Documentation and README files
- Source code without embedded credentials
- Build scripts and configuration (without secrets)
If you accidentally commit sensitive information, immediately:
- Remove it from the repository
- Rotate any compromised credentials
- Consider the information as potentially exposed