Prequisite: Generate tls-certs for localhost using mkcert
Caddyfile.example
0.0.0.0:7777 {
errors stderr
log stdout
LDAP_URI=ldap://localhost:9125 | |
LDAP_BINDDN=cn\=admin,dc\=example,dc\=org | |
LDAP_BINDPW=admin | |
LDAP_BASEDN=ou\=users,dc\=example,dc\=org | |
LDAP_SCOPE=sub | |
LDAP_LOGIN_ATTRIBUTE=uid | |
LDAP_EMAIL_ATTRIBUTE=mail | |
LDAP_NAME_ATTRIBUTE=cn | |
LDAP_UUID_ATTRIBUTE=customuid | |
LDAP_UUID_ATTRIBUTE_TYPE=text |
KONNECTD_ISS=https://localhost:9200
REVA_OIDC_ISSUER=https://localhost:9200
PHOENIX_OIDC_AUTHORITY=https://localhost:9200
PHOENIX_WEB_CONFIG_SERVER=https://localhost:9200
KONNECTD_VALIDATION_KEYS_PATH=/home/ilja/code/ocis/bin
KONNECTD_ENCRYPTION_SECRET=/home/ilja/code/ocis/bin/encryption.key
KONNECTD_SIGNING_PRIVATE_KEY=/home/ilja/code/ocis/bin/private-key.pem ./ocis-konnectd server
for _, v := range serverWConf {
switch x:= v.(type) {
case *cli.BoolFlag:
str := fmt.Sprintf("\n--%v\n: %v", x.Name, x.Usage)
if x.Value == true {
str = strings.TrimRight(str, ".") + ", defaults to `true`\n"
} else {
str = str + "\n"
package oidc | |
import ( | |
"context" | |
"crypto/tls" | |
"errors" | |
"github.com/coreos/go-oidc" | |
ocisoidc "github.com/owncloud/ocis-pkg/v2/oidc" | |
"golang.org/x/oauth2" | |
"net/http" |
module github.com/owncloud/ocis | |
go 1.13 | |
require ( | |
contrib.go.opencensus.io/exporter/jaeger v0.2.0 | |
contrib.go.opencensus.io/exporter/ocagent v0.6.0 | |
contrib.go.opencensus.io/exporter/zipkin v0.1.1 | |
github.com/chzyer/logex v1.1.10 // indirect | |
github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1 // indirect |
Index: pkg/auth/manager/oidc/oidc.go | |
IDEA additional info: | |
Subsystem: com.intellij.openapi.diff.impl.patch.CharsetEP | |
<+>UTF-8 | |
=================================================================== | |
--- pkg/auth/manager/oidc/oidc.go (revision 7871829e64492ad498a2ffecda31c9e0e5796d33) | |
+++ pkg/auth/manager/oidc/oidc.go (date 1584712513800) | |
@@ -33,7 +33,6 @@ | |
"github.com/cs3org/reva/pkg/auth/manager/registry" | |
"github.com/mitchellh/mapstructure" |
Tell all the relevant ocis-components to use your IDP: | |
PHOENIX_OIDC_METADATA_URL=https://${OIDC_DOMAIN}/.well-known/openid-configuration | |
PHOENIX_OIDC_AUTHORITY=https://${OIDC_DOMAIN} | |
GRAPH_OIDC_ENDPOINT=http://${OIDC_DOMAIN} | |
REVA_OIDC_ISSUER=https://${OIDC_DOMAIN} |
func loadMiddlewares(ctx context.Context, l log.Logger, cfg *config.Config) alice.Chain { | |
r := reg.NewRegistry(registry.Addrs("localhost:2379")) | |
err := r.Init() | |
if err != nil { | |
fmt.Print(err) | |
} | |
err = mclient.DefaultClient.Init(mclient.Registry(r)) |
version: '2' | |
networks: | |
app-tier: | |
driver: bridge | |
services: | |
etcd: | |
image: 'bitnami/etcd:latest' | |
environment: |