mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-08-29 15:06:26 +02:00
Refactored and solved bugs
This commit is contained in:
@@ -44,7 +44,9 @@ services:
|
||||
|
||||
{% if applications[application_id].oidc.enabled and applications[application_id].oidc.flavor == 'taigaio' %}
|
||||
|
||||
- {{ docker_compose.directories.config }}taiga-local.py:/taiga-back/settings/local.py:ro
|
||||
{% for item in settings_files %}
|
||||
- {{ docker_compose.directories.config }}taiga-{{ item }}.py:/taiga-back/settings/{{ item }}.py:ro
|
||||
{% endfor %}
|
||||
|
||||
{% endif %}
|
||||
|
||||
|
@@ -53,7 +53,7 @@ ENABLE_TELEMETRY = True
|
||||
|
||||
# OIDC via taigaio official contrib
|
||||
# @See https://github.com/taigaio/taiga-contrib-oidc-auth
|
||||
ENABLE_OIDC=True
|
||||
|
||||
OIDC_RP_CLIENT_ID="{{ oidc.client.id }}"
|
||||
OIDC_RP_CLIENT_SECRET="{{ oidc.client.secret }}"
|
||||
OIDC_OP_AUTHORIZATION_ENDPOINT="{{ oidc.client.authorize_url }}"
|
||||
@@ -61,10 +61,7 @@ OIDC_OP_TOKEN_ENDPOINT="{{ oidc.client.token_url }}"
|
||||
OIDC_OP_USER_ENDPOINT="{{ oidc.client.user_info_url }}"
|
||||
OIDC_RP_SIGN_ALGO="RS256"
|
||||
OIDC_RP_SCOPES="openid profile email"
|
||||
OIDC_USE_STATE=True
|
||||
OIDC_USE_NONCE=True
|
||||
OIDC_RP_CALLBACK_URL="{{ oidc.client.redirect_uri | default('') }}"
|
||||
OIDC_OP_JWKS_ENDPOINT="{{ oidc.client.jwks_url | default('') }}"
|
||||
OIDC_OP_JWKS_ENDPOINT="{{ oidc.client.certs }}"
|
||||
|
||||
{% endif %}
|
||||
|
||||
|
@@ -9,16 +9,15 @@ AUTHENTICATION_BACKENDS = list(AUTHENTICATION_BACKENDS) + [
|
||||
|
||||
ROOT_URLCONF = "settings.urls"
|
||||
|
||||
OIDC_CALLBACK_CLASS = "taiga_contrib_oidc_auth.views.TaigaOIDCAuthenticationCallbackView"
|
||||
OIDC_RP_SCOPES = "openid profile email"
|
||||
OIDC_RP_SIGN_ALGO = "RS256"
|
||||
|
||||
OIDC_BASE_URL = "{{ oidc.base_url }}"
|
||||
OIDC_OP_JWKS_ENDPOINT = OIDC_BASE_URL + "/Jwks"
|
||||
OIDC_OP_AUTHORIZATION_ENDPOINT = OIDC_BASE_URL + "/Authorization"
|
||||
OIDC_OP_TOKEN_ENDPOINT = OIDC_BASE_URL + "/Token"
|
||||
OIDC_OP_USER_ENDPOINT = OIDC_BASE_URL + "/UserInfo"
|
||||
|
||||
import os
|
||||
|
||||
OIDC_CALLBACK_CLASS = "taiga_contrib_oidc_auth.views.TaigaOIDCAuthenticationCallbackView"
|
||||
OIDC_RP_SCOPES = os.getenv("OIDC_RP_SCOPES")
|
||||
OIDC_RP_SIGN_ALGO = os.getenv("OIDC_RP_SIGN_ALGO")
|
||||
#OIDC_BASE_URL = "" @todo remove if not needed
|
||||
OIDC_OP_JWKS_ENDPOINT = os.getenv("OIDC_OP_JWKS_ENDPOINT")
|
||||
OIDC_OP_AUTHORIZATION_ENDPOINT = os.getenv("OIDC_OP_AUTHORIZATION_ENDPOINT")
|
||||
OIDC_OP_TOKEN_ENDPOINT = os.getenv("OIDC_OP_TOKEN_ENDPOINT")
|
||||
OIDC_OP_USER_ENDPOINT = os.getenv("OIDC_OP_USER_ENDPOINT")
|
||||
OIDC_RP_CLIENT_ID = os.getenv("OIDC_RP_CLIENT_ID")
|
||||
OIDC_RP_CLIENT_SECRET = os.getenv("OIDC_RP_CLIENT_SECRET")
|
4
roles/docker-taiga/templates/oidc/urls.py
Normal file
4
roles/docker-taiga/templates/oidc/urls.py
Normal file
@@ -0,0 +1,4 @@
|
||||
from taiga.urls import *
|
||||
urlpatterns += [
|
||||
url(r"^oidc/", include("mozilla_django_oidc.urls")),
|
||||
]
|
Reference in New Issue
Block a user