This repository has been archived on 2024-05-31. You can view files and clone it, but cannot push or open issues or pull requests.
idhub-docker/docker-compose__instance-lo...

133 lines
5.5 KiB
YAML
Raw Permalink Normal View History

2024-03-18 20:10:41 +00:00
version: "3.9"
services:
idhub1:
init: true
image: dkr-dsg.ac.upc.edu/trustchain-oc1-orchestral/idhub:latest
environment:
- DOMAIN=${DOMAIN1:-localhost}
- DEBUG=true
- INITIAL_ADMIN_EMAIL=${IDHUB_PILOT_TEST__ADMIN_EMAIL}
- INITIAL_ADMIN_PASSWORD=${IDHUB_PILOT_TEST__ADMIN_PASSWORD}
- CREATE_TEST_USERS=true
- ENABLE_EMAIL=false
- ENABLE_2FACTOR_AUTH=false
- SECRET_KEY=${IDHUB_SECRET_KEY:-publicsecretisnotsecureVtmKBfxpVV47PpBCF2Nzz2H6qnbd}
- STATIC_ROOT=${IDHUB_STATIC_ROOT:-/static/}
- MEDIA_ROOT=${IDHUB_MEDIA_ROOT:-/media/}
- PORT=${IDHUB_PORT:-9001}
# only on localhost hostname did-resolve uses http endpoint
# and here we need it to very vcred of didweb
# $ docker run ghcr.io/spruceid/didkit-cli:latest did-resolve did:web:localhost:test
# Error sending HTTP request : error sending request for url (http://localhost/.well-known/did.json): error trying to connect: tcp connect error: Address not available (os error 99)
# version: 2023-04-24 10:21:58 ghcr.io/spruceid/didkit-cli@sha256:0e559663f962e2ced2fb4034e415f6b5dbdec57e85f69b546e7699ac6ba35219
- DEFAULT_FROM_EMAIL=${IDHUB_DEFAULT_FROM_EMAIL}
- EMAIL_HOST=${IDHUB_EMAIL_HOST}
- EMAIL_HOST_USER=${IDHUB_EMAIL_HOST_USER}
- EMAIL_HOST_PASSWORD=${IDHUB_EMAIL_HOST_PASSWORD}
- EMAIL_PORT=${IDHUB_EMAIL_PORT}
- EMAIL_USE_TLS=${IDHUB_EMAIL_USE_TLS}
- EMAIL_BACKEND=${IDHUB_EMAIL_BACKEND}
- SUPPORTED_CREDENTIALS=['CourseCredential', 'EOperatorClaim', 'FederationMembership', 'FinancialVulnerabilityCredential', 'MembershipCard']
- SYNC_ORG_DEV=${IDHUB_SYNC_ORG_DEV}
- OIDC_ORGS=examples/organizations__instance_localhost.csv
- OIDC_REDIRECT=true
#- OIDC_REDIRECT=false
- ALLOW_CODE_URI=http://localhost/oidc4vp/allow_code
ports:
- 9091:9001
volumes:
- ./idhub1__instance-localhost-trio:/opt/idhub
- sharedsecret:/sharedsecret:rw
# nginx manage proxypass to these docker containers
# inspired by https://stackoverflow.com/a/43541681
extra_hosts:
- 'localhost:host-gateway'
- 'idhub2:host-gateway'
- 'idhub3:host-gateway'
idhub2:
init: true
image: dkr-dsg.ac.upc.edu/trustchain-oc1-orchestral/idhub:latest
environment:
- DOMAIN=${DOMAIN2:-idhub2}
- DEBUG=true
- INITIAL_ADMIN_EMAIL=${IDHUB_PILOT_TEST__ADMIN_EMAIL}
- INITIAL_ADMIN_PASSWORD=${IDHUB_PILOT_TEST__ADMIN_PASSWORD}
- CREATE_TEST_USERS=true
- ENABLE_EMAIL=false
- ENABLE_2FACTOR_AUTH=false
- SECRET_KEY=${IDHUB_SECRET_KEY:-publicsecretisnotsecureVtmKBfxpVV47PpBCF2Nzz2H6qnbd}
- STATIC_ROOT=${IDHUB_STATIC_ROOT:-/static/}
- MEDIA_ROOT=${IDHUB_MEDIA_ROOT:-/media/}
- PORT=${IDHUB_PORT:-9001}
- DEFAULT_FROM_EMAIL=${IDHUB_DEFAULT_FROM_EMAIL}
- EMAIL_HOST=${IDHUB_EMAIL_HOST}
- EMAIL_HOST_USER=${IDHUB_EMAIL_HOST_USER}
- EMAIL_HOST_PASSWORD=${IDHUB_EMAIL_HOST_PASSWORD}
- EMAIL_PORT=${IDHUB_EMAIL_PORT}
- EMAIL_USE_TLS=${IDHUB_EMAIL_USE_TLS}
- EMAIL_BACKEND=${IDHUB_EMAIL_BACKEND}
# only the one we support for OIDC flow, if we add more, it reaches a UX bug
- SUPPORTED_CREDENTIALS=['FinancialVulnerabilityCredential']
- SYNC_ORG_DEV=${IDHUB_SYNC_ORG_DEV}
- OIDC_ORGS=examples/organizations__instance_localhost.csv
- OIDC_REDIRECT=true
#- OIDC_REDIRECT=false
- ALLOW_CODE_URI=http://idhub2/oidc4vp/allow_code
ports:
- 9092:9001
volumes:
- ./idhub2__instance-localhost-trio:/opt/idhub
- sharedsecret:/sharedsecret:rw
# nginx manage proxypass to these docker containers
# inspired by https://stackoverflow.com/a/43541681
extra_hosts:
- 'localhost:host-gateway'
- 'idhub2:host-gateway'
- 'idhub3:host-gateway'
idhub3:
init: true
image: dkr-dsg.ac.upc.edu/trustchain-oc1-orchestral/idhub:latest
environment:
- DOMAIN=${DOMAIN3:-idhub3}
- DEBUG=true
- INITIAL_ADMIN_EMAIL=${IDHUB_PILOT_TEST__ADMIN_EMAIL}
- INITIAL_ADMIN_PASSWORD=${IDHUB_PILOT_TEST__ADMIN_PASSWORD}
- CREATE_TEST_USERS=true
- ENABLE_EMAIL=false
- ENABLE_2FACTOR_AUTH=false
- SECRET_KEY=${IDHUB_SECRET_KEY:-publicsecretisnotsecureVtmKBfxpVV47PpBCF2Nzz2H6qnbd}
- STATIC_ROOT=${IDHUB_STATIC_ROOT:-/static/}
- MEDIA_ROOT=${IDHUB_MEDIA_ROOT:-/media/}
- PORT=${IDHUB_PORT:-9001}
- DEFAULT_FROM_EMAIL=${IDHUB_DEFAULT_FROM_EMAIL}
- EMAIL_HOST=${IDHUB_EMAIL_HOST}
- EMAIL_HOST_USER=${IDHUB_EMAIL_HOST_USER}
- EMAIL_HOST_PASSWORD=${IDHUB_EMAIL_HOST_PASSWORD}
- EMAIL_PORT=${IDHUB_EMAIL_PORT}
- EMAIL_USE_TLS=${IDHUB_EMAIL_USE_TLS}
- EMAIL_BACKEND=${IDHUB_EMAIL_BACKEND}
# only the one we support for OIDC flow, if we add more, it reaches a UX bug
- SUPPORTED_CREDENTIALS=['FinancialVulnerabilityCredential']
- SYNC_ORG_DEV=${IDHUB_SYNC_ORG_DEV}
- OIDC_ORGS=examples/organizations__instance_localhost.csv
- OIDC_REDIRECT=true
#- OIDC_REDIRECT=false
- ALLOW_CODE_URI=http://idhub3/oidc4vp/allow_code
ports:
- 9093:9001
volumes:
- ./idhub3__instance-localhost-trio:/opt/idhub
- sharedsecret:/sharedsecret:rw
# nginx manage proxypass to these docker containers
# inspired by https://stackoverflow.com/a/43541681
extra_hosts:
- 'localhost:host-gateway'
- 'idhub2:host-gateway'
- 'idhub3:host-gateway'
volumes:
sharedsecret: