From dfe43105ca1135a74765dc7d21c0b5daa4e52439 Mon Sep 17 00:00:00 2001 From: pedro Date: Fri, 8 Mar 2024 13:29:07 +0100 Subject: [PATCH] pair instances: bugfix missing ADMIN/PASSWORD - it was missing for the corresponding idhub2 from the pairs - also remove old RESPONSE_URI env var --- docker-compose__instance-autotest-pair.yml | 5 ++--- docker-compose__instance-nightly-pair.yml | 5 ++--- 2 files changed, 4 insertions(+), 6 deletions(-) diff --git a/docker-compose__instance-autotest-pair.yml b/docker-compose__instance-autotest-pair.yml index 6899638..88b1375 100644 --- a/docker-compose__instance-autotest-pair.yml +++ b/docker-compose__instance-autotest-pair.yml @@ -23,7 +23,6 @@ services: - EMAIL_PORT=${IDHUB_EMAIL_PORT} - EMAIL_USE_TLS=${IDHUB_EMAIL_USE_TLS} - EMAIL_BACKEND=${IDHUB_EMAIL_BACKEND} - - RESPONSE_URI=https://idhub1-autotest.demo.pangea.org/oidc4vp/ - SUPPORTED_CREDENTIALS=['CourseCredential', 'EOperatorClaim', 'FederationMembership', 'FinancialVulnerabilityCredential', 'MembershipCard'] - SYNC_ORG_DEV=${IDHUB_SYNC_ORG_DEV} - OIDC_ORGS=examples/organizations__instance_autotest-pair.csv @@ -38,7 +37,8 @@ services: image: dkr-dsg.ac.upc.edu/trustchain-oc1-orchestral/idhub:latest environment: - DEBUG=true - - ADMIN_EMAIL=${IDHUB_PILOT_TEST__ADMIN_EMAIL} + - INITIAL_ADMIN_EMAIL=${IDHUB_PILOT_TEST__ADMIN_EMAIL} + - INITIAL_ADMIN_PASSWORD=${IDHUB_PILOT_TEST__ADMIN_PASSWORD} - CREATE_TEST_USERS=true - ENABLE_EMAIL=false - ENABLE_2FACTOR_AUTH=false @@ -54,7 +54,6 @@ services: - EMAIL_PORT=${IDHUB_EMAIL_PORT} - EMAIL_USE_TLS=${IDHUB_EMAIL_USE_TLS} - EMAIL_BACKEND=${IDHUB_EMAIL_BACKEND} - - RESPONSE_URI=https://idhub2-autotest.demo.pangea.org/oidc4vp/ # only the one we support for OIDC flow, if we add more, it reaches a UX bug - SUPPORTED_CREDENTIALS=['FinancialVulnerabilityCredential'] - SYNC_ORG_DEV=${IDHUB_SYNC_ORG_DEV} diff --git a/docker-compose__instance-nightly-pair.yml b/docker-compose__instance-nightly-pair.yml index ba824d1..602bd5c 100644 --- a/docker-compose__instance-nightly-pair.yml +++ b/docker-compose__instance-nightly-pair.yml @@ -23,7 +23,6 @@ services: - EMAIL_PORT=${IDHUB_EMAIL_PORT} - EMAIL_USE_TLS=${IDHUB_EMAIL_USE_TLS} - EMAIL_BACKEND=${IDHUB_EMAIL_BACKEND} - - RESPONSE_URI=https://idhub1-nightly.demo.pangea.org/oidc4vp/ - SUPPORTED_CREDENTIALS=['CourseCredential', 'EOperatorClaim', 'FederationMembership', 'FinancialVulnerabilityCredential', 'MembershipCard'] - SYNC_ORG_DEV=${IDHUB_SYNC_ORG_DEV} - OIDC_ORGS=examples/organizations__instance_nightly-pair.csv @@ -38,7 +37,8 @@ services: image: dkr-dsg.ac.upc.edu/trustchain-oc1-orchestral/idhub:latest environment: - DEBUG=true - - ADMIN_EMAIL=${IDHUB_PILOT_TEST__ADMIN_EMAIL} + - INITIAL_ADMIN_EMAIL=${IDHUB_PILOT_TEST__ADMIN_EMAIL} + - INITIAL_ADMIN_PASSWORD=${IDHUB_PILOT_TEST__ADMIN_PASSWORD} - CREATE_TEST_USERS=true - ENABLE_EMAIL=false - ENABLE_2FACTOR_AUTH=false @@ -54,7 +54,6 @@ services: - EMAIL_PORT=${IDHUB_EMAIL_PORT} - EMAIL_USE_TLS=${IDHUB_EMAIL_USE_TLS} - EMAIL_BACKEND=${IDHUB_EMAIL_BACKEND} - - RESPONSE_URI=https://idhub2-nightly.demo.pangea.org/oidc4vp/ # only the one we support for OIDC flow, if we add more, it reaches a UX bug - SUPPORTED_CREDENTIALS=['FinancialVulnerabilityCredential'] - SYNC_ORG_DEV=${IDHUB_SYNC_ORG_DEV}