Compare commits

..

No commits in common. "4190225f5a00e9c9eef1dc4491eab419a1acf23f" and "cd4c8ceabe0d770740b56236d02b1a8eac6453e5" have entirely different histories.

7 changed files with 1 additions and 26 deletions

View File

@ -84,36 +84,18 @@ hydra_saml_app_description: Authentification via SAML
hydra_saml_app_icon_url: hydra_saml_app_icon_url:
hydra_saml_idp_entity_id: https://samltest.id/saml/idp hydra_saml_idp_entity_id: https://samltest.id/saml/idp
hydra_saml_idp_metadata_url: https://samltest.id/saml/idp hydra_saml_idp_metadata_url: https://samltest.id/saml/idp
# Liste des URLs autorisées pour la redirection post-login/logout sur le service shibboleth-sp
hydra_saml_allowed_redirects: [] hydra_saml_allowed_redirects: []
# Chemin associé au cookie du service hydra-remote-user
hydra_saml_cookie_path: "{{ haproxy_hydra_saml_base_path }}" hydra_saml_cookie_path: "{{ haproxy_hydra_saml_base_path }}"
# Activer/désactiver le mode "debug" du service shibboleth-sp
hydra_saml_debug: no hydra_saml_debug: no
# Niveau de verbosité du service shibboleth-sp
hydra_saml_sp_log_level: WARN hydra_saml_sp_log_level: WARN
# Inclure les règles de cartographie des attributs SAML fournis par défaut par le projet hydra-shibboleth-sp-v3
hydra_saml_include_sp_default_attributes_mapping: "yes" hydra_saml_include_sp_default_attributes_mapping: "yes"
# Inclure les règles de filtrages des attributs SAML fournis par défaut par le projet hydra-shibboleth-sp-v3
hydra_saml_include_sp_default_attributes_policy: "yes" hydra_saml_include_sp_default_attributes_policy: "yes"
# Règles de sélection et réécritures des attributs du jeton OIDC
# en provenance de la login-app sélectionnée
hydra_saml_attributes_rewrite_rules: hydra_saml_attributes_rewrite_rules:
email: email:
- consent.session.id_token.email - consent.session.id_token.email
# Entête HTTP utilisée pour identifier l'utilisateur connecté
hydra_saml_subject_header: subject-id
# Liste des entêtes HTTP utilisées et transformées en attributs hydra_saml_subject_header: REMOTE_USER
# pour le jeton OIDC
hydra_saml_headers_attributes_mapping: hydra_saml_headers_attributes_mapping:
- header: mail - header: mail
attribute: email attribute: email

View File

@ -21,9 +21,7 @@
image: docker.io/bornholm/oidc-test:v0.0.0-4-gd786d3a image: docker.io/bornholm/oidc-test:v0.0.0-4-gd786d3a
state: started state: started
network: host network: host
restart_policy: on-failure
recreate: yes recreate: yes
timezone: local
env: env:
OIDC_CLIENT_ID: "{{ oidc_test_app_client_id }}" OIDC_CLIENT_ID: "{{ oidc_test_app_client_id }}"
OIDC_CLIENT_SECRET: "{{ oidc_test_app_client_secret }}" OIDC_CLIENT_SECRET: "{{ oidc_test_app_client_secret }}"

View File

@ -2,7 +2,6 @@ PODMAN_ARGS="\
--name 'cadoles-pod-hydra-dispatcher-v1' \ --name 'cadoles-pod-hydra-dispatcher-v1' \
--replace \ --replace \
--network=slirp4netns:allow_host_loopback=true \ --network=slirp4netns:allow_host_loopback=true \
--tz=local \
-p 127.0.0.1:3000:80 \ -p 127.0.0.1:3000:80 \
-v /etc/hydra-dispatcher/conf.d:/var/www/config/hydra \ -v /etc/hydra-dispatcher/conf.d:/var/www/config/hydra \
-e APP_ENV=prod \ -e APP_ENV=prod \

View File

@ -2,7 +2,6 @@ PODMAN_ARGS="\
-p 127.0.0.1:3001:3000 \ -p 127.0.0.1:3001:3000 \
--network=slirp4netns:allow_host_loopback=true \ --network=slirp4netns:allow_host_loopback=true \
--replace --name 'cadoles-pod-hydra-passwordless-v1' \ --replace --name 'cadoles-pod-hydra-passwordless-v1' \
--tz=local \
-e HTTP_BASE_URL={{ haproxy_public_base_url }}/auth/passwordless \ -e HTTP_BASE_URL={{ haproxy_public_base_url }}/auth/passwordless \
-e 'SMTP_HOST={{ hydra_passwordless_smtp_host }}' \ -e 'SMTP_HOST={{ hydra_passwordless_smtp_host }}' \
-e 'SMTP_PORT={{ hydra_passwordless_smtp_port }}' \ -e 'SMTP_PORT={{ hydra_passwordless_smtp_port }}' \

View File

@ -2,7 +2,6 @@ PODMAN_ARGS="\
-p 127.0.0.1:3003:80 \ -p 127.0.0.1:3003:80 \
--network=slirp4netns:allow_host_loopback=true \ --network=slirp4netns:allow_host_loopback=true \
--replace --name 'cadoles-pod-hydra-remote-user-v1' \ --replace --name 'cadoles-pod-hydra-remote-user-v1' \
--tz=local \
-v /etc/hydra-remote-user/conf.d:/var/www/config/remote_user \ -v /etc/hydra-remote-user/conf.d:/var/www/config/remote_user \
-v /etc/hydra-remote-user/apache.conf:/etc/apache2/sites-available/000-default.conf \ -v /etc/hydra-remote-user/apache.conf:/etc/apache2/sites-available/000-default.conf \
-v /etc/hosts:/etc/hosts:ro \ -v /etc/hosts:/etc/hosts:ro \

View File

@ -5,7 +5,6 @@ PODMAN_ARGS="\
-p 127.0.0.1:4444:4444 \ -p 127.0.0.1:4444:4444 \
-p 127.0.0.1:4445:4445 \ -p 127.0.0.1:4445:4445 \
--tmpfs /tmp \ --tmpfs /tmp \
--tz=local \
-e 'HYDRA_DSN=mysql://{{ hydra_database_user }}:{{ hydra_database_password }}@tcp({{ hydra_database_host }}:{{ hydra_database_port }})/{{ hydra_database_name }}?parseTime=true' \ -e 'HYDRA_DSN=mysql://{{ hydra_database_user }}:{{ hydra_database_password }}@tcp({{ hydra_database_host }}:{{ hydra_database_port }})/{{ hydra_database_name }}?parseTime=true' \
-e 'LOG_LEVEL={{ hydra_log_level }}' \ -e 'LOG_LEVEL={{ hydra_log_level }}' \
-e 'LOG_LEAK_SENSITIVE_VALUES={{ hydra_log_leak_sensitive_values }}' \ -e 'LOG_LEAK_SENSITIVE_VALUES={{ hydra_log_leak_sensitive_values }}' \

View File

@ -2,7 +2,6 @@ PODMAN_ARGS="\
-p 127.0.0.1:3002:80 \ -p 127.0.0.1:3002:80 \
--network=slirp4netns:allow_host_loopback=true \ --network=slirp4netns:allow_host_loopback=true \
--replace --name 'cadoles-pod-shibboleth-sp-v3' \ --replace --name 'cadoles-pod-shibboleth-sp-v3' \
--tz=local \
-e 'SP_ENTITY_ID={{ haproxy_public_base_url }}{{ haproxy_hydra_saml_base_path }}' \ -e 'SP_ENTITY_ID={{ haproxy_public_base_url }}{{ haproxy_hydra_saml_base_path }}' \
-e 'SP_LOG_LEVEL={{ hydra_saml_sp_log_level }}' \ -e 'SP_LOG_LEVEL={{ hydra_saml_sp_log_level }}' \
-e 'IDP_ENTITY_ID={{ hydra_saml_idp_entity_id }}' \ -e 'IDP_ENTITY_ID={{ hydra_saml_idp_entity_id }}' \