Skip to content

Commit

Permalink
- Remove password auth from elastic/kibana
Browse files Browse the repository at this point in the history
  • Loading branch information
elipe17 committed Dec 7, 2023
1 parent acfb697 commit 522ca38
Show file tree
Hide file tree
Showing 6 changed files with 1 addition and 410 deletions.
45 changes: 1 addition & 44 deletions tdrs-backend/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -58,55 +58,12 @@ services:
depends_on:
- elastic

# This task only needs to be performed once, during the *initial* startup of
# the stack. Any subsequent run will reset the passwords of existing users to
# the values defined inside the '.env' file, and the built-in roles to their
# default permissions.
#
# By default, it is excluded from the services started by 'docker compose up'
# due to the non-default profile it belongs to. To run it, either provide the
# '--profile=elastic_setup' CLI flag to Compose commands, or "up" the service by name
# such as 'docker compose up elastic_setup'.
elastic_setup:
profiles:
- elastic_setup
build:
context: elastic_setup/
args:
ELASTIC_VERSION: "7.17.6"
init: true
environment:
ELASTIC_PASSWORD: ${ELASTIC_PASSWORD:-}
KIBANA_SYSTEM_PASSWORD: ${KIBANA_SYSTEM_PASSWORD:-}
DATA_ANALYST_PASSWORD: ${DATA_ANALYST_PASSWORD:-}
OFA_SYS_ADMIN_PASSWORD: ${OFA_SYS_ADMIN_PASSWORD:-}
ELASTICSEARCH_HOST: ${ELASTICSEARCH_HOST:-}
depends_on:
- elastic
network_mode: "host"

elastic:
image: elasticsearch:7.17.6
environment:
- discovery.type=single-node
- logger.discovery.level=debug
- xpack.security.enabled=true
# - xpack.security.authc.realms.oidc.hhsams # The name of our realm
# - xpack.security.authc.realms.oidc.hhsams.order=2 # Should be highest in the realm chain
# - xpack.security.authc.realms.oidc.hhsams.rp.client_id="the_client_id" # assigned to the Elastic Stack RP by the OP upon registration.
# - xpack.security.authc.realms.oidc.hhsams.rp.response_type=code # controls which OpenID Connect authentication flow this RP supports: code, token, id_token
# - xpack.security.authc.realms.oidc.hhsams.rp.redirect_uri="https://kibana.example.org:5601/api/security/oidc/callback"
# - xpack.security.authc.realms.oidc.hhsams.op.issuer="https://op.example.org" # Issuer Identifier is usually a case sensitive UR
# - xpack.security.authc.realms.oidc.hhsams.op.authorization_endpoint="https://op.example.org/oauth2/v1/authorize" # The URL for the Authorization Endpoint in the OP
# - xpack.security.authc.realms.oidc.hhsams.op.token_endpoint="https://op.example.org/oauth2/v1/token" # The URL for the Token Endpoint in the OpenID Connect Provider
# - xpack.security.authc.realms.oidc.hhsams.op.jwkset_path=oidc/jwkset.json # The path to a file or a URL containing a JSON Web Key Set with the key material that the OpenID Connect Provider uses for signing tokens and claims responses. OP should provide this.
# - xpack.security.authc.realms.oidc.hhsams.op.userinfo_endpoint="https://op.example.org/oauth2/v1/userinfo" # (Optional) The URL for the UserInfo Endpoint in the OpenID Connect Provider.
# - xpack.security.authc.realms.oidc.hhsams.op.endsession_endpoint="https://op.example.org/oauth2/v1/logout" # (Optional) The URL to the End Session Endpoint in the OpenID Connect Provider.
# - xpack.security.authc.realms.oidc.hhsams.rp.post_logout_redirect_uri="https://kibana.example.org:5601/security/logged_out" # (Optional) The Redirect URL where the OpenID Connect Provider should redirect the user after a successful Single Logout (assuming op.endsession_endpoint above is also set).
# - xpack.security.authc.realms.oidc.hhsams.claims.principal=sub
# - xpack.security.authc.realms.oidc.hhsams.claims.groups="http://example.info/claims/groups"
- ELASTIC_PASSWORD=${ELASTIC_PASSWORD:-}
- KIBANA_SYSTEM_PASSWORD=${KIBANA_SYSTEM_PASSWORD:-}
- xpack.security.enabled=false
ports:
- 9200:9200
- 9300:9300
Expand Down
10 changes: 0 additions & 10 deletions tdrs-backend/elastic_setup/Dockerfile

This file was deleted.

112 changes: 0 additions & 112 deletions tdrs-backend/elastic_setup/entrypoint.sh

This file was deleted.

Loading

0 comments on commit 522ca38

Please sign in to comment.