@@ -17,7 +17,7 @@ TEST_ENVIRONMENT = TRUE
1717
1818#  Absolute path to the directory where log files are saved. If not given, no
1919#  log file will be created
20- LOG_DIR  =
20+ LOG_DIR  = /qiita/ 
2121
2222#  Whether studies require admin approval to be made available
2323REQUIRE_APPROVAL  = True
@@ -201,8 +201,8 @@ QIIMP = https://localhost:8898/
201201#  --------------------- External Identity Provider settings --------------------
202202#  user authentication happens per default within Qiita, i.e. when a user logs in,
203203#  the stored password hash and email address is compared against what a user
204- #  just provided. You might however, use an external identity provider (IdP) to  
205- #  authenticate the user like  
204+ #  just provided. You might however, use an external identity provider (IdP) to
205+ #  authenticate the user like
206206#     google: https://developers.google.com/identity/protocols/oauth2 or
207207#     github: https://docs.github.com/en/apps/oauth-apps/building-oauth-apps/authorizing-oauth-apps or
208208#     self hosted keycloak: https://www.keycloak.org/
@@ -226,33 +226,40 @@ QIIMP = https://localhost:8898/
226226#  3) you obtain information about the user for the obtaines user token
227227#  Typically, each step is implemented as a separate URL endpoint
228228# 
229- #  To activate IdP: remove comments from the following config section
230- 
231- # [oidc_localkeycloak]
229+ #  To activate IdP: comment out the following config section
232230
231+ #  [oidc_localkeycloak]
232+ # 
233233# # client ID for Qiita as registered at your Identity Provider of choice
234- # CLIENT_ID = qiita
235- 
234+ #   CLIENT_ID = qiita
235+ # 
236236# # client secret to verify Qiita as the correct client. Not all IdPs require
237237# # a client secret!
238- # # ADD CLIENT SECRET FROM YOUR LOCAL KEYCLOAK
239- # CLIENT_SECRET = 
238+ #  CLIENT_SECRET = supersecretString
240239
241- # # redirect URL (end point in your Qiita instance), to which the IdP redirects 
242- # # after user types in his/her credentials. If you don't want to change code in 
240+ # 
241+ # # redirect URL (end point in your Qiita instance), to which the IdP redirects
242+ # # after user types in his/her credentials. If you don't want to change code in
243243# # qiita_pet/webserver.py the URL must follow the pattern:
244- # # base_URL/auth/login_OIDC/foo where foo is the name of this config section  
244+ # # base_URL/auth/login_OIDC/foo where foo is the name of this config section
245245# # without the oidc_ prefix!
246- # REDIRECT_ENDPOINT = /auth/login_OIDC/localkeycloak
247- 
248- # # URL for step 1: obtain code
249- # AUTHORIZE_URL = http://localhost:8080/realms/qiita_realm/protocol/openid-connect/auth
250- 
251- # # URL for step 2: obtain user token
252- # ACCESS_TOKEN_URL = http://localhost:8080/realms/qiita_realm/protocol/openid-connect/token
253- 
254- # # URL for step 3: obtain user infos
255- # USERINFO_URL = http://localhost:8080/realms/qiita_realm/protocol/openid-connect/userinfo
256- 
246+ #  REDIRECT_ENDPOINT = /auth/login_OIDC/localkeycloak
247+ # 
248+ # # The URL of the well-known json document, specifying how API end points
249+ # # like 'authorize', 'token' or 'userinfo' are defined. See e.g.
250+ # # https://swagger.io/docs/specification/authentication/
251+ # #    openid-connect-discovery/
252+ #  WELLKNOWN_URI = http://localhost:9999/realms/qiita_realm/.well-known/openid-configuration
253+ # 
257254# # a speaking label for the Identity Provider. Section name is used if empty.
258- # LABEL = localhost
255+ #  LABEL = localkeycloak
256+ # 
257+ # # The scope, i.e. fields about a user, which Qiita requests from the
258+ # # Identity Provider, e.g. "profile email eduperson_orcid".
259+ # # Will be automatically extended by the scope "openid", to enable the
260+ # # "authorize_code" OIDC flow.
261+ #  SCOPE = openid
262+ # 
263+ # #Optional. Name of a file in qiita_pet/static/img that shall be
264+ # #displayed for login through Service Provider, instead of a plain button
265+ #  LOGO =
0 commit comments