publish localhost trio
This commit is contained in:
parent
93a6f5a25e
commit
2cef5f894b
|
@ -0,0 +1,27 @@
|
||||||
|
#!/bin/sh
|
||||||
|
|
||||||
|
set -e
|
||||||
|
set -u
|
||||||
|
# DEBUG
|
||||||
|
set -x
|
||||||
|
|
||||||
|
main() {
|
||||||
|
cd "$(dirname "${0}")"
|
||||||
|
|
||||||
|
# includes functions:
|
||||||
|
# common_start
|
||||||
|
# common_end
|
||||||
|
. ./build__common.sh
|
||||||
|
|
||||||
|
# vars used in common_start and end
|
||||||
|
target='instance-localhost-trio'
|
||||||
|
persistence='n'
|
||||||
|
idhubs='idhub1 idhub2 idhub3'
|
||||||
|
idhub_branch='release'
|
||||||
|
|
||||||
|
common_start
|
||||||
|
|
||||||
|
common_end
|
||||||
|
}
|
||||||
|
|
||||||
|
main "${@}"
|
|
@ -0,0 +1,132 @@
|
||||||
|
version: "3.9"
|
||||||
|
services:
|
||||||
|
|
||||||
|
idhub1:
|
||||||
|
init: true
|
||||||
|
image: dkr-dsg.ac.upc.edu/trustchain-oc1-orchestral/idhub:latest
|
||||||
|
environment:
|
||||||
|
- DOMAIN=${DOMAIN1:-localhost}
|
||||||
|
- DEBUG=true
|
||||||
|
- INITIAL_ADMIN_EMAIL=${IDHUB_PILOT_TEST__ADMIN_EMAIL}
|
||||||
|
- INITIAL_ADMIN_PASSWORD=${IDHUB_PILOT_TEST__ADMIN_PASSWORD}
|
||||||
|
- CREATE_TEST_USERS=true
|
||||||
|
- ENABLE_EMAIL=false
|
||||||
|
- ENABLE_2FACTOR_AUTH=false
|
||||||
|
- SECRET_KEY=${IDHUB_SECRET_KEY:-publicsecretisnotsecureVtmKBfxpVV47PpBCF2Nzz2H6qnbd}
|
||||||
|
- STATIC_ROOT=${IDHUB_STATIC_ROOT:-/static/}
|
||||||
|
- MEDIA_ROOT=${IDHUB_MEDIA_ROOT:-/media/}
|
||||||
|
- PORT=${IDHUB_PORT:-9001}
|
||||||
|
# only on localhost hostname did-resolve uses http endpoint
|
||||||
|
# and here we need it to very vcred of didweb
|
||||||
|
# $ docker run ghcr.io/spruceid/didkit-cli:latest did-resolve did:web:localhost:test
|
||||||
|
# Error sending HTTP request : error sending request for url (http://localhost/.well-known/did.json): error trying to connect: tcp connect error: Address not available (os error 99)
|
||||||
|
# version: 2023-04-24 10:21:58 ghcr.io/spruceid/didkit-cli@sha256:0e559663f962e2ced2fb4034e415f6b5dbdec57e85f69b546e7699ac6ba35219
|
||||||
|
- DEFAULT_FROM_EMAIL=${IDHUB_DEFAULT_FROM_EMAIL}
|
||||||
|
- EMAIL_HOST=${IDHUB_EMAIL_HOST}
|
||||||
|
- EMAIL_HOST_USER=${IDHUB_EMAIL_HOST_USER}
|
||||||
|
- EMAIL_HOST_PASSWORD=${IDHUB_EMAIL_HOST_PASSWORD}
|
||||||
|
- EMAIL_PORT=${IDHUB_EMAIL_PORT}
|
||||||
|
- EMAIL_USE_TLS=${IDHUB_EMAIL_USE_TLS}
|
||||||
|
- EMAIL_BACKEND=${IDHUB_EMAIL_BACKEND}
|
||||||
|
- SUPPORTED_CREDENTIALS=['CourseCredential', 'EOperatorClaim', 'FederationMembership', 'FinancialVulnerabilityCredential', 'MembershipCard']
|
||||||
|
- SYNC_ORG_DEV=${IDHUB_SYNC_ORG_DEV}
|
||||||
|
- OIDC_ORGS=examples/organizations__instance_localhost.csv
|
||||||
|
- OIDC_REDIRECT=true
|
||||||
|
#- OIDC_REDIRECT=false
|
||||||
|
- ALLOW_CODE_URI=http://localhost/oidc4vp/allow_code
|
||||||
|
ports:
|
||||||
|
- 9091:9001
|
||||||
|
volumes:
|
||||||
|
- ./idhub1__instance-localhost-trio:/opt/idhub
|
||||||
|
- sharedsecret:/sharedsecret:rw
|
||||||
|
# nginx manage proxypass to these docker containers
|
||||||
|
# inspired by https://stackoverflow.com/a/43541681
|
||||||
|
extra_hosts:
|
||||||
|
- 'localhost:host-gateway'
|
||||||
|
- 'idhub2:host-gateway'
|
||||||
|
- 'idhub3:host-gateway'
|
||||||
|
|
||||||
|
idhub2:
|
||||||
|
init: true
|
||||||
|
image: dkr-dsg.ac.upc.edu/trustchain-oc1-orchestral/idhub:latest
|
||||||
|
environment:
|
||||||
|
- DOMAIN=${DOMAIN2:-idhub2}
|
||||||
|
- DEBUG=true
|
||||||
|
- INITIAL_ADMIN_EMAIL=${IDHUB_PILOT_TEST__ADMIN_EMAIL}
|
||||||
|
- INITIAL_ADMIN_PASSWORD=${IDHUB_PILOT_TEST__ADMIN_PASSWORD}
|
||||||
|
- CREATE_TEST_USERS=true
|
||||||
|
- ENABLE_EMAIL=false
|
||||||
|
- ENABLE_2FACTOR_AUTH=false
|
||||||
|
- SECRET_KEY=${IDHUB_SECRET_KEY:-publicsecretisnotsecureVtmKBfxpVV47PpBCF2Nzz2H6qnbd}
|
||||||
|
- STATIC_ROOT=${IDHUB_STATIC_ROOT:-/static/}
|
||||||
|
- MEDIA_ROOT=${IDHUB_MEDIA_ROOT:-/media/}
|
||||||
|
- PORT=${IDHUB_PORT:-9001}
|
||||||
|
- DEFAULT_FROM_EMAIL=${IDHUB_DEFAULT_FROM_EMAIL}
|
||||||
|
- EMAIL_HOST=${IDHUB_EMAIL_HOST}
|
||||||
|
- EMAIL_HOST_USER=${IDHUB_EMAIL_HOST_USER}
|
||||||
|
- EMAIL_HOST_PASSWORD=${IDHUB_EMAIL_HOST_PASSWORD}
|
||||||
|
- EMAIL_PORT=${IDHUB_EMAIL_PORT}
|
||||||
|
- EMAIL_USE_TLS=${IDHUB_EMAIL_USE_TLS}
|
||||||
|
- EMAIL_BACKEND=${IDHUB_EMAIL_BACKEND}
|
||||||
|
# only the one we support for OIDC flow, if we add more, it reaches a UX bug
|
||||||
|
- SUPPORTED_CREDENTIALS=['FinancialVulnerabilityCredential']
|
||||||
|
- SYNC_ORG_DEV=${IDHUB_SYNC_ORG_DEV}
|
||||||
|
- OIDC_ORGS=examples/organizations__instance_localhost.csv
|
||||||
|
- OIDC_REDIRECT=true
|
||||||
|
#- OIDC_REDIRECT=false
|
||||||
|
- ALLOW_CODE_URI=http://idhub2/oidc4vp/allow_code
|
||||||
|
ports:
|
||||||
|
- 9092:9001
|
||||||
|
volumes:
|
||||||
|
- ./idhub2__instance-localhost-trio:/opt/idhub
|
||||||
|
- sharedsecret:/sharedsecret:rw
|
||||||
|
# nginx manage proxypass to these docker containers
|
||||||
|
# inspired by https://stackoverflow.com/a/43541681
|
||||||
|
extra_hosts:
|
||||||
|
- 'localhost:host-gateway'
|
||||||
|
- 'idhub2:host-gateway'
|
||||||
|
- 'idhub3:host-gateway'
|
||||||
|
|
||||||
|
idhub3:
|
||||||
|
init: true
|
||||||
|
image: dkr-dsg.ac.upc.edu/trustchain-oc1-orchestral/idhub:latest
|
||||||
|
environment:
|
||||||
|
- DOMAIN=${DOMAIN3:-idhub3}
|
||||||
|
- DEBUG=true
|
||||||
|
- INITIAL_ADMIN_EMAIL=${IDHUB_PILOT_TEST__ADMIN_EMAIL}
|
||||||
|
- INITIAL_ADMIN_PASSWORD=${IDHUB_PILOT_TEST__ADMIN_PASSWORD}
|
||||||
|
- CREATE_TEST_USERS=true
|
||||||
|
- ENABLE_EMAIL=false
|
||||||
|
- ENABLE_2FACTOR_AUTH=false
|
||||||
|
- SECRET_KEY=${IDHUB_SECRET_KEY:-publicsecretisnotsecureVtmKBfxpVV47PpBCF2Nzz2H6qnbd}
|
||||||
|
- STATIC_ROOT=${IDHUB_STATIC_ROOT:-/static/}
|
||||||
|
- MEDIA_ROOT=${IDHUB_MEDIA_ROOT:-/media/}
|
||||||
|
- PORT=${IDHUB_PORT:-9001}
|
||||||
|
- DEFAULT_FROM_EMAIL=${IDHUB_DEFAULT_FROM_EMAIL}
|
||||||
|
- EMAIL_HOST=${IDHUB_EMAIL_HOST}
|
||||||
|
- EMAIL_HOST_USER=${IDHUB_EMAIL_HOST_USER}
|
||||||
|
- EMAIL_HOST_PASSWORD=${IDHUB_EMAIL_HOST_PASSWORD}
|
||||||
|
- EMAIL_PORT=${IDHUB_EMAIL_PORT}
|
||||||
|
- EMAIL_USE_TLS=${IDHUB_EMAIL_USE_TLS}
|
||||||
|
- EMAIL_BACKEND=${IDHUB_EMAIL_BACKEND}
|
||||||
|
# only the one we support for OIDC flow, if we add more, it reaches a UX bug
|
||||||
|
- SUPPORTED_CREDENTIALS=['FinancialVulnerabilityCredential']
|
||||||
|
- SYNC_ORG_DEV=${IDHUB_SYNC_ORG_DEV}
|
||||||
|
- OIDC_ORGS=examples/organizations__instance_localhost.csv
|
||||||
|
- OIDC_REDIRECT=true
|
||||||
|
#- OIDC_REDIRECT=false
|
||||||
|
- ALLOW_CODE_URI=http://idhub3/oidc4vp/allow_code
|
||||||
|
ports:
|
||||||
|
- 9093:9001
|
||||||
|
volumes:
|
||||||
|
- ./idhub3__instance-localhost-trio:/opt/idhub
|
||||||
|
- sharedsecret:/sharedsecret:rw
|
||||||
|
# nginx manage proxypass to these docker containers
|
||||||
|
# inspired by https://stackoverflow.com/a/43541681
|
||||||
|
extra_hosts:
|
||||||
|
- 'localhost:host-gateway'
|
||||||
|
- 'idhub2:host-gateway'
|
||||||
|
- 'idhub3:host-gateway'
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
sharedsecret:
|
Reference in New Issue