eid-ops/global/overlay/etc/puppet/modules/eid/templates/idm/idm.yml.erb

146 lines
4.9 KiB
Text
Raw Normal View History

2024-02-26 11:26:43 +01:00
server:
port: 8082
ssl:
bundle: infra
2024-03-18 14:09:36 +01:00
servlet:
context-path: /
2024-02-26 11:26:43 +01:00
spring:
2024-02-26 12:43:21 +01:00
application:
name: IdM-Service
2024-05-29 13:57:13 +02:00
mail:
host: relay-1.swedenconnect.se
port: 587
username: <%= scope.call_function('safe_hiera', ['smtp_user']) %>
password: <%= scope.call_function('safe_hiera', ['smtp_password']) %>
2024-02-29 13:33:09 +01:00
security:
oauth2:
resourceserver:
jwt:
2024-11-22 09:58:45 +01:00
public-key-location: classpath:connector-oauth2.pub
2024-02-29 13:33:09 +01:00
audiences:
2024-04-30 11:12:03 +02:00
- ${idm.oauth2-id}
2024-02-26 11:26:43 +01:00
ssl:
bundle:
pem:
infra:
keystore:
private-key: file:/etc/ssl/private/<%= @fqdn %>_infra.key
certificate: file:/etc/ssl/certs/<%= @fqdn %>_infra.crt
truststore:
certificate: file:/etc/ssl/certs/infra.crt
data:
redis:
2024-02-26 12:22:49 +01:00
password: '<%= scope.call_function('safe_hiera', ['redis_password']) %>'
2024-02-26 11:26:43 +01:00
cluster:
nodes:
<%- @redises.each do |host| -%>
- <%= host %>:6379
- <%= host %>:6380
<%- end -%>
ssl:
enabled: true
ssl-ext:
# redis or java require IP addresses in cert if verifcation is turned on
# Caused by: java.util.concurrent.CompletionException:
# javax.net.ssl.SSLHandshakeException: No subject alternative names
# matching IP address 89.46.20.236 found
enable-hostname-verification: false
credential:
resource: file:/etc/ssl/private/<%= @fqdn %>_infra.p12
password: qwerty123
trust:
resource: file:/etc/ssl/certs/infra.p12
password: qwerty123
2024-02-27 13:30:55 +01:00
datasource:
2024-02-27 13:36:51 +01:00
url: jdbc:mariadb:loadbalance://<%= @dbs_string %>/idm
2024-02-27 13:30:55 +01:00
username: idm
password: <%= scope.call_function('safe_hiera', ['sql_password']) %>
2024-02-27 13:41:26 +01:00
liquibase:
enabled: true # Generates database schema/tables
change-log: classpath:changelogs/changelog-master.xml
navet:
authorization-url: https://sysorgoauth2.test.skatteverket.se/oauth2/v1/sysorg/token
base-url: https://api.test.skatteverket.se/folkbokforing/folkbokforingsuppgifter-for-offentliga-aktorer/v2
bestallnings-identitet: 00000236-FO01-0001
organisationsnummer: 162021004748
secret:
2024-02-29 11:18:02 +01:00
key-store: classpath:/certificate/navet/64905004722e1.p12
key-store-password: 4729451359506045
credentials:
gateway:
client-id: d3e1d1563a504f17acb2b33a51097a99
client-secret: 9eE7A58695fc46DF9f563B058ffB36F1
authorization-server:
client-id: d34f109e3a11d02d744394423a020023e9bab0cd3ff78d63
client-secret: ebc8b00ca4b08e790b208dc0abd460273fa6c459bc2f0023e9bab0cd3ff78d63
2024-02-29 11:01:01 +01:00
idm:
# XXX fix URL replacement
# XXX fix OAUTH
mrecord:
api:
2024-06-04 14:31:32 +02:00
connector-id: <%= scope.call_function('safe_hiera', ['connector_id']) %>
2024-04-30 11:12:03 +02:00
check-scope: ${idm.oauth2-id}/idrecord_check
get-scope: ${idm.oauth2-id}/idrecord_get
2024-02-29 11:01:01 +01:00
db:
key-store-type: jceks
key-store: classpath:dbkey.jceks
key-store-password: secret
key-alias: dbkey
key-password: secret
auth:
2024-06-04 14:31:32 +02:00
destination-url: <%= scope.call_function('safe_hiera', ['destination_url']) %>
auth-return-url: <%= scope.call_function('safe_hiera', ['auth_return_url']) %>
discover-return-url: <%= scope.call_function('safe_hiera', ['discover_return_url']) %>
2024-04-29 11:20:42 +02:00
client-id: <%= scope.call_function('safe_hiera', ['client_id']) %>
2024-02-29 11:01:01 +01:00
trusted-certificates:
- classpath:idp.cert
id-strategy: STATIC
2024-03-18 09:51:03 +01:00
rate-limits:
capacity: 4
time: 86400
2024-02-29 11:01:01 +01:00
email:
enabled: true
no-reply-email: noreply@swedenconnect.se
storage:
pending-relative-sign-time-to-live-in-hours: 336
2024-06-04 14:31:32 +02:00
oauth2-id: <%= scope.call_function('safe_hiera', ['oauth2_id']) %>
2024-02-29 13:33:44 +01:00
signservice:
discovery:
metadata-cache-file: /tmp/metadata-cache.xml
allowed-entity-ids:
- http://local.dev.swedenconnect.se/idp
- https://bankid.swedenconnect.se/idp/local
- https://idp-sweden-connect-valfr-2017-sandbox.test.frejaeid.com
federation-metadata-location: https://eid.svelegtest.se/metadata/mdx/role/idp.xml
metadata-validation-certificate: classpath:certificate/metadata/sandbox-metadata.crt
config:
policy: localdev
default-sign-requester-id: https://sandbox.swedenconnect.se/idm
default-return-url: https://sandbox.swedenconnect.se/idm/frontend/common/validateSign
sign-service-id: https://sandbox.swedenconnect.se/signservice
default-destination-url: https://sandbox.swedenconnect.se/signservice/sign/idm/signreq
default-signature-algorithm: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
sign-service-certificates:
- classpath:certificate/signservice/signservice.crt
trust-anchors:
- classpath:certificate/signservice/test-ca.crt
credential:
type: JKS
resource: classpath:certificate/signservice/sign-client.jks
password: secret
alias: client
key-password: secret
response:
config:
strict-processing: false
maximum-allowed-response-age: 180000
allowed-clock-skew: 60000
require-assertion: true