forked from civiform/civiform
-
Notifications
You must be signed in to change notification settings - Fork 0
/
docker-compose.yml
100 lines (95 loc) · 2.98 KB
/
docker-compose.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
# Use postgres/example user/password credentials
version: '3.4'
services:
localstack:
image: localstack/localstack
profiles: ['aws', 'emulator']
expose:
- '4566'
environment:
- SERVICES=s3,ses
azurite:
image: mcr.microsoft.com/azure-storage/azurite
profiles: ['azure', 'emulator']
expose:
- '10000'
# The dev oidc server needs to be visible to the Civiform server and web browsers
# on the same host:port. Developers need to add a localhost IP alias for this
# container name in their /etc/hosts file for the web brower to load the auth url.
# EG: 127.0.0.1 dev-oidc
dev-oidc:
image: civiform/oidc-provider
restart: always
expose:
- 3390
environment:
# Use an explicit port to not conflict with other test instances.
- OIDC_PORT=3390
db:
image: postgres:12.12
restart: always
expose:
- '5432'
environment:
POSTGRES_PASSWORD: example
civiform:
image: civiform-dev
links:
- 'db:database'
- 'dev-oidc'
expose:
- '9000'
- '8457'
environment:
- AWS_ACCESS_KEY_ID=${AWS_ACCESS_KEY_ID:-test}
- AWS_SECRET_ACCESS_KEY=${AWS_SECRET_ACCESS_KEY:-test}
- AWS_SESSION_TOKEN=${AWS_SESSION_TOKEN:-test}
- AWS_REGION
- AWS_SES_SENDER
- AWS_S3_BUCKET_NAME
- AZURE_CLIENT_ID=${AZURE_CLIENT_ID:-test}
- AZURE_LOCAL_CONNECTION_STRING
- AZURE_STORAGE_ACCOUNT_NAME
- AZURE_STORAGE_ACCOUNT_CONTAINER
- CIVIFORM_TIME_ZONE_ID
- STORAGE_SERVICE_NAME
- LOGIN_RADIUS_API_KEY
- LOGIN_RADIUS_METADATA_URI
- LOGIN_RADIUS_SAML_APP_NAME
- LOGIN_RADIUS_PRIVATE_KEY_PASS
- LOGIN_RADIUS_KEYSTORE_PASS
- LOGIN_RADIUS_KEYSTORE_NAME
- CIVIFORM_APPLICANT_IDP
- CIVIFORM_ADMIN_IDP
# Hard coded in test-support/test_oidc_provider.js
- IDCS_CLIENT_ID=foo
- IDCS_SECRET=bar
- IDCS_DISCOVERY_URI=http://dev-oidc:3390/.well-known/openid-configuration
- ADFS_CLIENT_ID
- ADFS_SECRET
- APPLICANT_OIDC_PROVIDER_LOGOUT
- APPLICANT_OIDC_POST_LOGOUT_REDIRECT_PARAM
- APPLICANT_OIDC_LOGOUT_CLIENT_PARAM
- APPLICANT_OIDC_PROVIDER_NAME
- APPLICANT_OIDC_CLIENT_ID
- APPLICANT_OIDC_CLIENT_SECRET
- APPLICANT_OIDC_DISCOVERY_URI
- APPLICANT_OIDC_RESPONSE_MODE
- APPLICANT_OIDC_RESPONSE_TYPE
- APPLICANT_OIDC_ADDITIONAL_SCOPES
- APPLICANT_OIDC_LOCALE_ATTRIBUTE
- APPLICANT_OIDC_EMAIL_ATTRIBUTE
- APPLICANT_OIDC_FIRST_NAME_ATTRIBUTE
- APPLICANT_OIDC_MIDDLE_NAME_ATTRIBUTE
- APPLICANT_OIDC_LAST_NAME_ATTRIBUTE
- LOGIN_GOV_CLIENT_ID
- LOGIN_GOV_DISCOVERY_URI
- LOGIN_GOV_ADDITIONAL_SCOPES
- LOGIN_GOV_ACR_VALUE
- CF_OPTIONAL_QUESTIONS
- WHITELABEL_SMALL_LOGO_URL
- WHITELABEL_LOGO_WITH_NAME_URL
- WHITELABEL_CIVIC_ENTITY_SHORT_NAME
- WHITELABEL_CIVIC_ENTITY_FULL_NAME
- FAVICON_URL
command: ~run -Dconfig.file=conf/application.dev.conf