IEEE.org     |     IEEE Xplore Digital Library     |     IEEE Standards     |     IEEE Spectrum     |     More Sites

Verified Commit bebe7704 authored by Emi Simpson's avatar Emi Simpson
Browse files

Update Docker components

parent 9b1950ad
from flask_saml2.utils import certificate_from_file, private_key_from_file
from mystic.auth.saml import SamlAuth
from mystic.auth.direct import DirectAuth
#
# Mystic Options
......@@ -16,8 +18,12 @@ ELASTIC = {
PROJECTS_FILE = "/path/to/projects.json"
COORDINATOR_SOCKET = "/path/to/mystic_coordinator.sock"
#AUTH = SamlAuth()
AUTH = DirectAuth()
#
# SAML Options
# (only needed when AUTH is SamlAuth)
#
SAML2_SP = {
'certificate': certificate_from_file('keys/sp_certificate.pem'),
......
......@@ -37,7 +37,7 @@ You'll need to swap out the <CONFIGURATION PLACEHOLDERS> (written like that) in
- Replace `<SECURE MYSQL PASSWORD HERE>` and `<MORDREDS SECURE MYSQL PASSWORD
HERE>` with two securely generated passwords
- Hang on to those passwords, because we'll need them in a bit.
- In `mordred/configs/setup-secured.cfg`:
- In `coordinator/configs/setup.cfg`:
- Replace `<MORDREDS SECURE MYSQL PASSWORD HERE>` with the password from the last step
- Scroll down and enable the sources you want to support. You'll need to
provide your API key for some of them. For more information about how to
......@@ -47,17 +47,19 @@ You'll need to swap out the <CONFIGURATION PLACEHOLDERS> (written like that) in
completely optional
- In `mystic/config.cfg`:
- Replace `<SECURE MYSQL PASSWORD HERE>` with the password from earlier
- Replace `<IDP DISPLAY NAME HERE>` with the display name of your identity
provider. That's the service that's providing your single sign on (SSO).
This doesn't need to be anything flashy, just human readable.
- Replace `<IDP ENTITY ID HERE>` with the entity ID of your IDP. The admin
of your IDP should be able to provide this for you, if you don't see it in
your IDP metadata.
- Replace `<SSO URL HERE>` with your IDP's SSO URL. Your IDP should provide
this value as well.
- Uncomment only ONE of the `Auth` modules
- Replace `<CHANGE ME TO A SECURE RANDOM STRING>` to a secure random string.
[Here's some sugguestions!][2]
- Replace `<YOUR DOMAIN HERE>` to the domain name Mystic will be running on
- If you're using SAML authentication:
- Replace `<YOUR DOMAIN HERE>` to the domain name Mystic will be running on
- Replace `<IDP DISPLAY NAME HERE>` with the display name of your identity
provider. That's the service that's providing your single sign on (SSO).
This doesn't need to be anything flashy, just human readable.
- Replace `<IDP ENTITY ID HERE>` with the entity ID of your IDP. The admin
of your IDP should be able to provide this for you, if you don't see it in
your IDP metadata.
- Replace `<SSO URL HERE>` with your IDP's SSO URL. Your IDP should provide
this value as well.
### Step 3: Generate some keys
......
......@@ -15,6 +15,7 @@ services:
volumes:
- ./mystic:/data
- ./coordinator/configs/projects.json:/data/projects.json
- ./coordinator/socket:/socket
expose:
- 80/tcp
depends_on:
......
from mystic.auth.saml import SamlAuth
from mystic.auth.direct import DirectAuth
from flask_saml2.utils import certificate_from_file, private_key_from_file
#
# Mystic Options
#
PROJECTS_FILE = "/data/projects.json"
ELASTIC = {
'HOSTNAMES': ['elasticsearch'],
'PORT': 9200,
......@@ -14,9 +15,15 @@ DATABASE = {
'password': '<SECURE MYSQL PASSWORD HERE>',
'database': 'mystic'
}
PROJECTS_FILE = "/data/projects.json"
COORDINATOR_SOCKET = "/socket/mystic_coordinator.sock"
#AUTH = SamlAuth()
#AUTH = DirectAuth()
#
# SAML Options
# (only needed when AUTH is SamlAuth)
#
SAML2_SP = {
'certificate': certificate_from_file('/data/keys/sp_certificate.pem'),
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment