This configures the settings to be able to call people as a resource server when using Keycloak deployment.
109 lines
3.8 KiB
Go Template
109 lines
3.8 KiB
Go Template
image:
|
|
repository: localhost:5001/people-backend
|
|
pullPolicy: Always
|
|
tag: "latest"
|
|
|
|
backend:
|
|
replicas: 1
|
|
envVars:
|
|
CELERY_BROKER_URL: redis://default:pass@redis-master:6379/1
|
|
DJANGO_CSRF_TRUSTED_ORIGINS: https://desk.127.0.0.1.nip.io,http://desk.127.0.0.1.nip.io
|
|
DJANGO_CONFIGURATION: Local
|
|
DJANGO_ALLOWED_HOSTS: "*"
|
|
DJANGO_SECRET_KEY: kkdsjfhkjhsfdkjhsd76kjhkjh
|
|
DJANGO_SETTINGS_MODULE: people.settings
|
|
DJANGO_SUPERUSER_PASSWORD: admin
|
|
DJANGO_SUPERUSER_EMAIL: admin@example.com
|
|
DJANGO_EMAIL_HOST_PASSWORD: changeme
|
|
DJANGO_EMAIL_HOST: "maildev"
|
|
DJANGO_EMAIL_PORT: 1025
|
|
DJANGO_EMAIL_USE_SSL: False
|
|
DJANGO_SENTRY_DSN: null
|
|
OIDC_RS_CLIENT_ID: people
|
|
OIDC_RS_CLIENT_SECRET: ThisIsAnExampleKeyForDevPurposeOnly
|
|
OIDC_RS_SIGNING_ALGO: RS256
|
|
OIDC_RS_SCOPES: "openid,siret,profile,email"
|
|
OIDC_OP_JWKS_ENDPOINT: https://keycloak.127.0.0.1.nip.io/realms/people/protocol/openid-connect/certs
|
|
OIDC_OP_AUTHORIZATION_ENDPOINT: https://keycloak.127.0.0.1.nip.io/realms/people/protocol/openid-connect/auth
|
|
OIDC_OP_TOKEN_ENDPOINT: https://keycloak.127.0.0.1.nip.io/realms/people/protocol/openid-connect/token
|
|
OIDC_OP_USER_ENDPOINT: https://keycloak.127.0.0.1.nip.io/realms/people/protocol/openid-connect/userinfo
|
|
OIDC_OP_LOGOUT_ENDPOINT: https://keycloak.127.0.0.1.nip.io/realms/people/protocol/openid-connect/logout
|
|
OIDC_OP_URL: https://keycloak.127.0.0.1.nip.io/realms/people
|
|
OIDC_OP_INTROSPECTION_ENDPOINT: https://keycloak.127.0.0.1.nip.io/realms/people/protocol/openid-connect/token/introspect
|
|
OIDC_ORGANIZATION_REGISTRATION_ID_FIELD: "siret"
|
|
OIDC_RP_CLIENT_ID: people
|
|
OIDC_RP_CLIENT_SECRET: ThisIsAnExampleKeyForDevPurposeOnly
|
|
OIDC_RP_SIGN_ALGO: RS256
|
|
OIDC_RP_SCOPES: "openid email siret"
|
|
OIDC_REDIRECT_ALLOWED_HOSTS: https://desk.127.0.0.1.nip.io
|
|
OIDC_AUTH_REQUEST_EXTRA_PARAMS: "{'acr_values': 'eidas1'}"
|
|
OAUTH2_PROVIDER_OIDC_ENABLED: True
|
|
OAUTH2_PROVIDER_VALIDATOR_CLASS: "mailbox_oauth2.validators.ProConnectValidator"
|
|
ORGANIZATION_REGISTRATION_ID_VALIDATORS: '[{"NAME": "django.core.validators.RegexValidator", "OPTIONS": {"regex": "^[0-9]{14}$"}}]'
|
|
LOGIN_REDIRECT_URL: https://desk.127.0.0.1.nip.io
|
|
LOGIN_REDIRECT_URL_FAILURE: https://desk.127.0.0.1.nip.io
|
|
LOGOUT_REDIRECT_URL: https://desk.127.0.0.1.nip.io
|
|
DB_HOST: postgres-postgresql
|
|
DB_NAME: people
|
|
DB_USER: dinum
|
|
DB_PASSWORD: pass
|
|
DB_PORT: 5432
|
|
POSTGRES_DB: people
|
|
POSTGRES_USER: dinum
|
|
POSTGRES_PASSWORD: pass
|
|
REDIS_URL: redis://default:pass@redis-master:6379/1
|
|
WEBMAIL_URL: "https://onestendev.yapasdewebmail.fr"
|
|
MAIL_PROVISIONING_API_URL: "http://dimail:8000"
|
|
MAIL_PROVISIONING_API_CREDENTIALS: changeme
|
|
command:
|
|
- "gunicorn"
|
|
- "-c"
|
|
- "/usr/local/etc/gunicorn/people.py"
|
|
- "people.wsgi:application"
|
|
- "--reload"
|
|
|
|
createsuperuser:
|
|
command:
|
|
- "/bin/sh"
|
|
- "-c"
|
|
- python manage.py createsuperuser --username ${DJANGO_SUPERUSER_EMAIL} --password ${DJANGO_SUPERUSER_PASSWORD} || echo ok
|
|
restartPolicy: Never
|
|
|
|
# Extra volume mounts to manage our local custom CA and avoid to set ssl_verify: false
|
|
extraVolumeMounts:
|
|
- name: certs
|
|
mountPath: /usr/local/lib/python3.12/site-packages/certifi/cacert.pem
|
|
subPath: cacert.pem
|
|
|
|
# Extra volumes to manage our local custom CA and avoid to set ssl_verify: false
|
|
extraVolumes:
|
|
- name: certs
|
|
configMap:
|
|
name: certifi
|
|
items:
|
|
- key: cacert.pem
|
|
path: cacert.pem
|
|
|
|
frontend:
|
|
envVars:
|
|
PORT: 8080
|
|
NEXT_PUBLIC_API_ORIGIN: https://desk.127.0.0.1.nip.io
|
|
|
|
replicas: 1
|
|
command:
|
|
- yarn
|
|
- dev
|
|
|
|
image:
|
|
repository: localhost:5001/people-frontend
|
|
pullPolicy: Always
|
|
tag: "latest"
|
|
|
|
ingress:
|
|
enabled: true
|
|
host: desk.127.0.0.1.nip.io
|
|
|
|
ingressAdmin:
|
|
enabled: true
|
|
host: desk.127.0.0.1.nip.io
|