forked from workadventure/workadventure
-
Notifications
You must be signed in to change notification settings - Fork 0
/
docker-compose-oidc.yaml
91 lines (88 loc) · 2.58 KB
/
docker-compose-oidc.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
version: "3.6"
services:
front:
environment:
ENABLE_OPENID: 1
chat:
environment:
ENABLE_OPENID: 1
pusher:
environment:
#OPID_CLIENT_ID: authorization-code-with-pkce-client-id
#OPID_CLIENT_SECRET: authorization-code-with-pkce-client-secret
OPID_CLIENT_ID: authorization-code-client-id
OPID_CLIENT_SECRET: authorization-code-client-secret
OPID_CLIENT_ISSUER: http://oidc.workadventure.localhost
OPID_CLIENT_REDIRECT_URL: http://pusher.workadventure.localhost/openid-callback
# A mock server to test OpenID connect connectivity
oidc-server-mock:
image: ghcr.io/soluto/oidc-server-mock:0.7.0
environment:
ASPNETCORE_ENVIRONMENT: Development
SERVER_OPTIONS_INLINE: |
{
"AccessTokenJwtType": "JWT",
"Discovery": {
"ShowKeySet": true
},
"Authentication": {
"CookieSameSiteMode": "Lax",
"CheckSessionCookieSameSiteMode": "Lax"
}
}
LOGIN_OPTIONS_INLINE: |
{
"AllowRememberLogin": false
}
LOGOUT_OPTIONS_INLINE: |
{
"AutomaticRedirectAfterSignOut": true
}
API_SCOPES_INLINE: |
- Name: some-app-scope-1
- Name: some-app-scope-2
API_RESOURCES_INLINE: |
- Name: some-app
Scopes:
- some-app-scope-1
- some-app-scope-2
USERS_CONFIGURATION_INLINE: |
[
{
"SubjectId":"1",
"Username":"User1",
"Password":"pwd",
"Claims": [
{
"Type": "name",
"Value": "John Doe"
},
{
"Type": "email",
"Value": "[email protected]"
},
{
"Type": "some-api-resource-claim",
"Value": "Sam's Api Resource Custom Claim"
},
{
"Type": "some-api-scope-claim",
"Value": "Sam's Api Scope Custom Claim"
},
{
"Type": "some-identity-resource-claim",
"Value": "Sam's Identity Resource Custom Claim"
}
]
}
]
CLIENTS_CONFIGURATION_PATH: /tmp/config/clients-config.json
volumes:
- ./contrib/oidc-server-mock:/tmp/config:ro
labels:
- "traefik.enable=true"
- "traefik.http.routers.oidc.rule=Host(`oidc.workadventure.localhost`)"
- "traefik.http.routers.oidc.entryPoints=web"
healthcheck:
#disable: true
timeout: 5s