publish localhost trio
This commit is contained in:
parent
93a6f5a25e
commit
2cef5f894b
|
@ -0,0 +1,27 @@
|
|||
#!/bin/sh
|
||||
|
||||
set -e
|
||||
set -u
|
||||
# DEBUG
|
||||
set -x
|
||||
|
||||
main() {
|
||||
cd "$(dirname "${0}")"
|
||||
|
||||
# includes functions:
|
||||
# common_start
|
||||
# common_end
|
||||
. ./build__common.sh
|
||||
|
||||
# vars used in common_start and end
|
||||
target='instance-localhost-trio'
|
||||
persistence='n'
|
||||
idhubs='idhub1 idhub2 idhub3'
|
||||
idhub_branch='release'
|
||||
|
||||
common_start
|
||||
|
||||
common_end
|
||||
}
|
||||
|
||||
main "${@}"
|
|
@ -0,0 +1,132 @@
|
|||
version: "3.9"
|
||||
services:
|
||||
|
||||
idhub1:
|
||||
init: true
|
||||
image: dkr-dsg.ac.upc.edu/trustchain-oc1-orchestral/idhub:latest
|
||||
environment:
|
||||
- DOMAIN=${DOMAIN1:-localhost}
|
||||
- DEBUG=true
|
||||
- INITIAL_ADMIN_EMAIL=${IDHUB_PILOT_TEST__ADMIN_EMAIL}
|
||||
- INITIAL_ADMIN_PASSWORD=${IDHUB_PILOT_TEST__ADMIN_PASSWORD}
|
||||
- CREATE_TEST_USERS=true
|
||||
- ENABLE_EMAIL=false
|
||||
- ENABLE_2FACTOR_AUTH=false
|
||||
- SECRET_KEY=${IDHUB_SECRET_KEY:-publicsecretisnotsecureVtmKBfxpVV47PpBCF2Nzz2H6qnbd}
|
||||
- STATIC_ROOT=${IDHUB_STATIC_ROOT:-/static/}
|
||||
- MEDIA_ROOT=${IDHUB_MEDIA_ROOT:-/media/}
|
||||
- PORT=${IDHUB_PORT:-9001}
|
||||
# only on localhost hostname did-resolve uses http endpoint
|
||||
# and here we need it to very vcred of didweb
|
||||
# $ docker run ghcr.io/spruceid/didkit-cli:latest did-resolve did:web:localhost:test
|
||||
# Error sending HTTP request : error sending request for url (http://localhost/.well-known/did.json): error trying to connect: tcp connect error: Address not available (os error 99)
|
||||
# version: 2023-04-24 10:21:58 ghcr.io/spruceid/didkit-cli@sha256:0e559663f962e2ced2fb4034e415f6b5dbdec57e85f69b546e7699ac6ba35219
|
||||
- DEFAULT_FROM_EMAIL=${IDHUB_DEFAULT_FROM_EMAIL}
|
||||
- EMAIL_HOST=${IDHUB_EMAIL_HOST}
|
||||
- EMAIL_HOST_USER=${IDHUB_EMAIL_HOST_USER}
|
||||
- EMAIL_HOST_PASSWORD=${IDHUB_EMAIL_HOST_PASSWORD}
|
||||
- EMAIL_PORT=${IDHUB_EMAIL_PORT}
|
||||
- EMAIL_USE_TLS=${IDHUB_EMAIL_USE_TLS}
|
||||
- EMAIL_BACKEND=${IDHUB_EMAIL_BACKEND}
|
||||
- SUPPORTED_CREDENTIALS=['CourseCredential', 'EOperatorClaim', 'FederationMembership', 'FinancialVulnerabilityCredential', 'MembershipCard']
|
||||
- SYNC_ORG_DEV=${IDHUB_SYNC_ORG_DEV}
|
||||
- OIDC_ORGS=examples/organizations__instance_localhost.csv
|
||||
- OIDC_REDIRECT=true
|
||||
#- OIDC_REDIRECT=false
|
||||
- ALLOW_CODE_URI=http://localhost/oidc4vp/allow_code
|
||||
ports:
|
||||
- 9091:9001
|
||||
volumes:
|
||||
- ./idhub1__instance-localhost-trio:/opt/idhub
|
||||
- sharedsecret:/sharedsecret:rw
|
||||
# nginx manage proxypass to these docker containers
|
||||
# inspired by https://stackoverflow.com/a/43541681
|
||||
extra_hosts:
|
||||
- 'localhost:host-gateway'
|
||||
- 'idhub2:host-gateway'
|
||||
- 'idhub3:host-gateway'
|
||||
|
||||
idhub2:
|
||||
init: true
|
||||
image: dkr-dsg.ac.upc.edu/trustchain-oc1-orchestral/idhub:latest
|
||||
environment:
|
||||
- DOMAIN=${DOMAIN2:-idhub2}
|
||||
- DEBUG=true
|
||||
- INITIAL_ADMIN_EMAIL=${IDHUB_PILOT_TEST__ADMIN_EMAIL}
|
||||
- INITIAL_ADMIN_PASSWORD=${IDHUB_PILOT_TEST__ADMIN_PASSWORD}
|
||||
- CREATE_TEST_USERS=true
|
||||
- ENABLE_EMAIL=false
|
||||
- ENABLE_2FACTOR_AUTH=false
|
||||
- SECRET_KEY=${IDHUB_SECRET_KEY:-publicsecretisnotsecureVtmKBfxpVV47PpBCF2Nzz2H6qnbd}
|
||||
- STATIC_ROOT=${IDHUB_STATIC_ROOT:-/static/}
|
||||
- MEDIA_ROOT=${IDHUB_MEDIA_ROOT:-/media/}
|
||||
- PORT=${IDHUB_PORT:-9001}
|
||||
- DEFAULT_FROM_EMAIL=${IDHUB_DEFAULT_FROM_EMAIL}
|
||||
- EMAIL_HOST=${IDHUB_EMAIL_HOST}
|
||||
- EMAIL_HOST_USER=${IDHUB_EMAIL_HOST_USER}
|
||||
- EMAIL_HOST_PASSWORD=${IDHUB_EMAIL_HOST_PASSWORD}
|
||||
- EMAIL_PORT=${IDHUB_EMAIL_PORT}
|
||||
- EMAIL_USE_TLS=${IDHUB_EMAIL_USE_TLS}
|
||||
- EMAIL_BACKEND=${IDHUB_EMAIL_BACKEND}
|
||||
# only the one we support for OIDC flow, if we add more, it reaches a UX bug
|
||||
- SUPPORTED_CREDENTIALS=['FinancialVulnerabilityCredential']
|
||||
- SYNC_ORG_DEV=${IDHUB_SYNC_ORG_DEV}
|
||||
- OIDC_ORGS=examples/organizations__instance_localhost.csv
|
||||
- OIDC_REDIRECT=true
|
||||
#- OIDC_REDIRECT=false
|
||||
- ALLOW_CODE_URI=http://idhub2/oidc4vp/allow_code
|
||||
ports:
|
||||
- 9092:9001
|
||||
volumes:
|
||||
- ./idhub2__instance-localhost-trio:/opt/idhub
|
||||
- sharedsecret:/sharedsecret:rw
|
||||
# nginx manage proxypass to these docker containers
|
||||
# inspired by https://stackoverflow.com/a/43541681
|
||||
extra_hosts:
|
||||
- 'localhost:host-gateway'
|
||||
- 'idhub2:host-gateway'
|
||||
- 'idhub3:host-gateway'
|
||||
|
||||
idhub3:
|
||||
init: true
|
||||
image: dkr-dsg.ac.upc.edu/trustchain-oc1-orchestral/idhub:latest
|
||||
environment:
|
||||
- DOMAIN=${DOMAIN3:-idhub3}
|
||||
- DEBUG=true
|
||||
- INITIAL_ADMIN_EMAIL=${IDHUB_PILOT_TEST__ADMIN_EMAIL}
|
||||
- INITIAL_ADMIN_PASSWORD=${IDHUB_PILOT_TEST__ADMIN_PASSWORD}
|
||||
- CREATE_TEST_USERS=true
|
||||
- ENABLE_EMAIL=false
|
||||
- ENABLE_2FACTOR_AUTH=false
|
||||
- SECRET_KEY=${IDHUB_SECRET_KEY:-publicsecretisnotsecureVtmKBfxpVV47PpBCF2Nzz2H6qnbd}
|
||||
- STATIC_ROOT=${IDHUB_STATIC_ROOT:-/static/}
|
||||
- MEDIA_ROOT=${IDHUB_MEDIA_ROOT:-/media/}
|
||||
- PORT=${IDHUB_PORT:-9001}
|
||||
- DEFAULT_FROM_EMAIL=${IDHUB_DEFAULT_FROM_EMAIL}
|
||||
- EMAIL_HOST=${IDHUB_EMAIL_HOST}
|
||||
- EMAIL_HOST_USER=${IDHUB_EMAIL_HOST_USER}
|
||||
- EMAIL_HOST_PASSWORD=${IDHUB_EMAIL_HOST_PASSWORD}
|
||||
- EMAIL_PORT=${IDHUB_EMAIL_PORT}
|
||||
- EMAIL_USE_TLS=${IDHUB_EMAIL_USE_TLS}
|
||||
- EMAIL_BACKEND=${IDHUB_EMAIL_BACKEND}
|
||||
# only the one we support for OIDC flow, if we add more, it reaches a UX bug
|
||||
- SUPPORTED_CREDENTIALS=['FinancialVulnerabilityCredential']
|
||||
- SYNC_ORG_DEV=${IDHUB_SYNC_ORG_DEV}
|
||||
- OIDC_ORGS=examples/organizations__instance_localhost.csv
|
||||
- OIDC_REDIRECT=true
|
||||
#- OIDC_REDIRECT=false
|
||||
- ALLOW_CODE_URI=http://idhub3/oidc4vp/allow_code
|
||||
ports:
|
||||
- 9093:9001
|
||||
volumes:
|
||||
- ./idhub3__instance-localhost-trio:/opt/idhub
|
||||
- sharedsecret:/sharedsecret:rw
|
||||
# nginx manage proxypass to these docker containers
|
||||
# inspired by https://stackoverflow.com/a/43541681
|
||||
extra_hosts:
|
||||
- 'localhost:host-gateway'
|
||||
- 'idhub2:host-gateway'
|
||||
- 'idhub3:host-gateway'
|
||||
|
||||
volumes:
|
||||
sharedsecret:
|
Reference in New Issue