Skip to content

Commit 423e895

Browse files
committed
Change structure of config to adhere to latest implemented version of the config_manager
1 parent d52e130 commit 423e895

File tree

1 file changed

+32
-25
lines changed

1 file changed

+32
-25
lines changed

Images/qiita/config_qiita_oidc.cfg

Lines changed: 32 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ TEST_ENVIRONMENT = TRUE
1717

1818
# Absolute path to the directory where log files are saved. If not given, no
1919
# log file will be created
20-
LOG_DIR =
20+
LOG_DIR = /qiita/
2121

2222
# Whether studies require admin approval to be made available
2323
REQUIRE_APPROVAL = True
@@ -201,8 +201,8 @@ QIIMP = https://localhost:8898/
201201
# --------------------- External Identity Provider settings --------------------
202202
# user authentication happens per default within Qiita, i.e. when a user logs in,
203203
# the stored password hash and email address is compared against what a user
204-
# just provided. You might however, use an external identity provider (IdP) to
205-
# authenticate the user like
204+
# just provided. You might however, use an external identity provider (IdP) to
205+
# authenticate the user like
206206
# google: https://developers.google.com/identity/protocols/oauth2 or
207207
# github: https://docs.github.com/en/apps/oauth-apps/building-oauth-apps/authorizing-oauth-apps or
208208
# self hosted keycloak: https://www.keycloak.org/
@@ -226,33 +226,40 @@ QIIMP = https://localhost:8898/
226226
# 3) you obtain information about the user for the obtaines user token
227227
# Typically, each step is implemented as a separate URL endpoint
228228
#
229-
# To activate IdP: remove comments from the following config section
230-
231-
#[oidc_localkeycloak]
229+
# To activate IdP: comment out the following config section
232230

231+
# [oidc_localkeycloak]
232+
#
233233
## client ID for Qiita as registered at your Identity Provider of choice
234-
#CLIENT_ID = qiita
235-
234+
# CLIENT_ID = qiita
235+
#
236236
## client secret to verify Qiita as the correct client. Not all IdPs require
237237
## a client secret!
238-
## ADD CLIENT SECRET FROM YOUR LOCAL KEYCLOAK
239-
#CLIENT_SECRET =
238+
# CLIENT_SECRET = supersecretString
240239

241-
## redirect URL (end point in your Qiita instance), to which the IdP redirects
242-
## after user types in his/her credentials. If you don't want to change code in
240+
#
241+
## redirect URL (end point in your Qiita instance), to which the IdP redirects
242+
## after user types in his/her credentials. If you don't want to change code in
243243
## qiita_pet/webserver.py the URL must follow the pattern:
244-
## base_URL/auth/login_OIDC/foo where foo is the name of this config section
244+
## base_URL/auth/login_OIDC/foo where foo is the name of this config section
245245
## without the oidc_ prefix!
246-
#REDIRECT_ENDPOINT = /auth/login_OIDC/localkeycloak
247-
248-
## URL for step 1: obtain code
249-
#AUTHORIZE_URL = http://localhost:8080/realms/qiita_realm/protocol/openid-connect/auth
250-
251-
## URL for step 2: obtain user token
252-
#ACCESS_TOKEN_URL = http://localhost:8080/realms/qiita_realm/protocol/openid-connect/token
253-
254-
## URL for step 3: obtain user infos
255-
#USERINFO_URL = http://localhost:8080/realms/qiita_realm/protocol/openid-connect/userinfo
256-
246+
# REDIRECT_ENDPOINT = /auth/login_OIDC/localkeycloak
247+
#
248+
## The URL of the well-known json document, specifying how API end points
249+
## like 'authorize', 'token' or 'userinfo' are defined. See e.g.
250+
## https://swagger.io/docs/specification/authentication/
251+
## openid-connect-discovery/
252+
# WELLKNOWN_URI = http://localhost:9999/realms/qiita_realm/.well-known/openid-configuration
253+
#
257254
## a speaking label for the Identity Provider. Section name is used if empty.
258-
#LABEL = localhost
255+
# LABEL = localkeycloak
256+
#
257+
## The scope, i.e. fields about a user, which Qiita requests from the
258+
## Identity Provider, e.g. "profile email eduperson_orcid".
259+
## Will be automatically extended by the scope "openid", to enable the
260+
## "authorize_code" OIDC flow.
261+
# SCOPE = openid
262+
#
263+
##Optional. Name of a file in qiita_pet/static/img that shall be
264+
##displayed for login through Service Provider, instead of a plain button
265+
# LOGO =

0 commit comments

Comments
 (0)