|
| 1 | +# configures the platform to run just the entity resolution service and the well-known service |
| 2 | +# primarily to be used for testing and development of external ERS connections |
| 3 | +mode: entityresolution |
| 4 | +logger: |
| 5 | + level: debug |
| 6 | + type: text |
| 7 | + output: stdout |
| 8 | +services: |
| 9 | + entityresolution: |
| 10 | + log_level: info |
| 11 | + url: http://localhost:8888/auth |
| 12 | + clientid: 'tdf-entity-resolution' |
| 13 | + clientsecret: 'secret' |
| 14 | + realm: 'opentdf' |
| 15 | + legacykeycloak: true |
| 16 | + inferid: |
| 17 | + from: |
| 18 | + email: true |
| 19 | + username: true |
| 20 | +server: |
| 21 | + auth: |
| 22 | + enabled: true |
| 23 | + enforceDPoP: false |
| 24 | + public_client_id: 'opentdf-public' |
| 25 | + audience: 'http://localhost:8080' |
| 26 | + issuer: http://localhost:8888/auth/realms/opentdf |
| 27 | + policy: |
| 28 | + ## Default policy for all requests |
| 29 | + default: #"role:standard" |
| 30 | + ## Dot notation is used to access nested claims (i.e. realm_access.roles) |
| 31 | + claim: # realm_access.roles |
| 32 | + ## Maps the external role to the opentdf role |
| 33 | + ## Note: left side is used in the policy, right side is the external role |
| 34 | + map: |
| 35 | + # standard: opentdf-standard |
| 36 | + # admin: opentdf-admin |
| 37 | + # org-admin: opentdf-org-admin |
| 38 | + |
| 39 | + ## Custom policy (see examples https://github.com/casbin/casbin/tree/master/examples) |
| 40 | + csv: #| |
| 41 | + # p, role:org-admin, policy:attributes, *, *, allow |
| 42 | + # p, role:org-admin, policy:subject-mappings, *, *, allow |
| 43 | + # p, role:org-admin, policy:resource-mappings, *, *, allow |
| 44 | + # p, role:org-admin, policy:kas-registry, *, *, allow |
| 45 | + # p, role:org-admin, policy:unsafe, *, *, allow |
| 46 | + |
| 47 | + ## Custom model (see https://casbin.org/docs/syntax-for-models/) |
| 48 | + model: #| |
| 49 | + # [request_definition] |
| 50 | + # r = sub, res, act, obj |
| 51 | + # |
| 52 | + # [policy_definition] |
| 53 | + # p = sub, res, act, obj, eft |
| 54 | + # |
| 55 | + # [role_definition] |
| 56 | + # g = _, _ |
| 57 | + # |
| 58 | + # [policy_effect] |
| 59 | + # e = some(where (p.eft == allow)) && !some(where (p.eft == deny)) |
| 60 | + # |
| 61 | + # [matchers] |
| 62 | + # m = g(r.sub, p.sub) && globOrRegexMatch(r.res, p.res) && globOrRegexMatch(r.act, p.act) && globOrRegexMatch(r.obj, p.obj) |
| 63 | + cors: |
| 64 | + enabled: false |
| 65 | + # "*" to allow any origin or a specific domain like "https://yourdomain.com" |
| 66 | + allowedorigins: |
| 67 | + - '*' |
| 68 | + # List of methods. Examples: "GET,POST,PUT" |
| 69 | + allowedmethods: |
| 70 | + - GET |
| 71 | + - POST |
| 72 | + - PATCH |
| 73 | + - PUT |
| 74 | + - DELETE |
| 75 | + - OPTIONS |
| 76 | + # List of headers that are allowed in a request |
| 77 | + allowedheaders: |
| 78 | + - ACCEPT |
| 79 | + - Authorization |
| 80 | + - Content-Type |
| 81 | + - X-CSRF-Token |
| 82 | + - X-Request-ID |
| 83 | + # List of response headers that browsers are allowed to access |
| 84 | + exposedheaders: |
| 85 | + - Link |
| 86 | + # Sets whether credentials are included in the CORS request |
| 87 | + allowcredentials: true |
| 88 | + # Sets the maximum age (in seconds) of a specific CORS preflight request |
| 89 | + maxage: 3600 |
| 90 | + grpc: |
| 91 | + reflectionEnabled: true # Default is false |
| 92 | + port: 8282 |
0 commit comments