Matthias Andreas Benkard | 761cb73 | 2020-01-25 05:52:34 +0100 | [diff] [blame] | 1 | quarkus.log.console.color = true |
| 2 | |
Matthias Andreas Benkard | 2f0b370 | 2020-01-12 15:46:34 +0100 | [diff] [blame] | 3 | quarkus.datasource.driver = org.postgresql.Driver |
| 4 | quarkus.datasource.max-size = 8 |
| 5 | quarkus.datasource.min-size = 0 |
| 6 | |
| 7 | #quarkus.flyway.migrate-at-start = true |
| 8 | #quarkus.flyway.baseline-on-migrate = true |
| 9 | #quarkus.flyway.baseline-version = 1 |
| 10 | #quarkus.flyway.schemas = public |
| 11 | |
Matthias Andreas Benkard | 9222efa | 2020-01-24 19:11:24 +0100 | [diff] [blame] | 12 | %dev.quarkus.datasource.url = jdbc:postgresql://localhost:5432/mulkcms |
Matthias Andreas Benkard | 2f0b370 | 2020-01-12 15:46:34 +0100 | [diff] [blame] | 13 | %dev.quarkus.datasource.username = mulk |
| 14 | %dev.quarkus.datasource.password = |
Matthias Andreas Benkard | 9222efa | 2020-01-24 19:11:24 +0100 | [diff] [blame] | 15 | %dev.quarkus.hibernate-orm.log.sql = true |
Matthias Andreas Benkard | 24a2514 | 2020-01-24 13:25:54 +0100 | [diff] [blame] | 16 | |
Matthias Andreas Benkard | 8b35def | 2020-01-31 19:13:01 +0100 | [diff] [blame] | 17 | %prod.quarkus.datasource.url = jdbc:postgresql://postgresql.system:5432/mulkcms |
| 18 | %prod.quarkus.datasource.username = mulkcms |
| 19 | %prod.quarkus.datasource.password = |
| 20 | %prod.quarkus.hibernate-orm.log.sql = false |
| 21 | |
Matthias Andreas Benkard | c27d1cb | 2020-01-26 11:11:24 +0100 | [diff] [blame] | 22 | # Authentication |
Matthias Andreas Benkard | 24a2514 | 2020-01-24 13:25:54 +0100 | [diff] [blame] | 23 | quarkus.oidc.auth-server-url = https://login.benkard.de/auth/realms/master |
| 24 | quarkus.oidc.client-id = mulkcms |
| 25 | quarkus.oidc.application-type = web-app |
Matthias Andreas Benkard | c27d1cb | 2020-01-26 11:11:24 +0100 | [diff] [blame] | 26 | |
| 27 | quarkus.security.users.file.enabled = false |
| 28 | quarkus.security.users.embedded.enabled = false |
| 29 | |
| 30 | # Authentication (dev) |
| 31 | %dev.quarkus.oidc.enabled = false |
| 32 | %dev.quarkus.security.users.embedded.enabled = true |
| 33 | %dev.quarkus.security.users.embedded.plain-text = true |
| 34 | %dev.quarkus.security.users.embedded.users.mulk = mulk |
| 35 | %dev.quarkus.security.users.embedded.roles.mulk = Admin |
Matthias Andreas Benkard | 8b35def | 2020-01-31 19:13:01 +0100 | [diff] [blame] | 36 | |
Matthias Andreas Benkard | 2a1383f | 2020-02-01 23:53:17 +0100 | [diff] [blame] | 37 | # Session cookies |
| 38 | quarkus.smallrye-jwt.enabled = false |
| 39 | mp.jwt.verify.publickey.location = META-INF/resources/jwt-signing-public-key.pem |
| 40 | mp.jwt.verify.issuer = https://matthias.benkard.de |
| 41 | smallrye.jwt.token.header = Cookie |
| 42 | smallrye.jwt.token.cookie = Bearer |
| 43 | smallrye.jwt.require.named-principal = true |
| 44 | %dev.mulkcms.jwt.keystore.file = example-keys.p12 |
| 45 | %prod.mulkcms.jwt.keystore.file = /secrets/keys.p12 |
| 46 | mulkcms.jwt.keystore.passphrase = 123456 |
| 47 | mulkcms.jwt.signing-key = MulkCMS-IdP |
| 48 | mulkcms.jwt.issuer = https://matthias.benkard.de |
| 49 | mulkcms.jwt.validity = P1D |
| 50 | |
Matthias Andreas Benkard | 8b35def | 2020-01-31 19:13:01 +0100 | [diff] [blame] | 51 | # Deployment |
| 52 | docker.registry = docker.benkard.de |
| 53 | |
| 54 | kubernetes.deployment.target = kubernetes |
| 55 | kubernetes.group = mulk |
| 56 | kubernetes.name = mulkcms2 |
| 57 | kubernetes.namespace = mulk |
| 58 | kubernetes.service-type = ClusterIP |
| 59 | kubernetes.image-pull-policy = Always |
| 60 | kubernetes.headless = true |
| 61 | kubernetes.service-account = default |
| 62 | kubernetes.env-vars[0].name = QUARKUS_DATASOURCE_PASSWORD |
| 63 | kubernetes.env-vars[0].secret = mulkcms2-secrets |
| 64 | kubernetes.env-vars[0].value = database-password |
Matthias Andreas Benkard | 2a1383f | 2020-02-01 23:53:17 +0100 | [diff] [blame] | 65 | kubernetes.env-vars[1].name = QUARKUS_OIDC_CREDENTIALS_SECRET |
| 66 | kubernetes.env-vars[1].secret = mulkcms2-secrets |
| 67 | kubernetes.env-vars[1].value = keycloak-secret |
| 68 | kubernetes.secret-volumes[0].volume-name = secrets |
| 69 | kubernetes.secret-volumes[0].secret-name = mulkcms2-secrets |
| 70 | kubernetes.secret-volumes[0].default-mode = 0444 |
| 71 | kubernetes.mounts[0].name = secrets |
| 72 | kubernetes.mounts[0].path = /secrets |
| 73 | kubernetes.mounts[0].read-only = true |