-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
The app_env override prevented the webtest from running in test env, as the default is now always set to PROD. I fixed this by overriding the parametesr.yaml for test. Not the best solution, but works for now. When @quartje's work is landing, and we start running the tests in a dedicated test container, this work should be reverted partially. Additionally I fixed an issue where the app-secret was set to the app_env.
- Loading branch information
Showing
4 changed files
with
30 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
parameters: | ||
app_env: test | ||
app_debug: false | ||
app_secret: [email protected] | ||
|
||
support_url: | ||
en_GB: "https://support.example.org/faq-strong-authentication" | ||
nl_NL: "https://support.example.org/faq-sterke-authenticatie" | ||
support_email: [email protected] | ||
locales: | ||
- nl_NL | ||
- en_GB | ||
default_locale: en_GB | ||
|
||
|
||
saml_idp_publickey: '/config/azuremfa/azuremfa_idp.crt' | ||
saml_idp_privatekey: '/config/azuremfa/azuremfa_idp.key' | ||
saml_metadata_publickey: '/config/azuremfa/azuremfa_idp.crt' | ||
saml_metadata_privatekey: '/config/axuremfa/azuremfa_idp.key' | ||
saml_remote_sp_entity_id: 'https://gateway.dev.openconext.local/gssp/azuremfa/metadata' | ||
saml_remote_sp_certificate: '/config/gateway/gateway_gssp_sp.crt' | ||
saml_remote_sp_acs: 'https://gateway.dev.openconext.local/gssp/azuremfa/consume-assertion' | ||
# Authentication issuers matching this regex will send ForceAuthn to the Azure MFA. The at sign is used as delimiter, be sure to escape the first sign as Symfony would see it as a reference to a service. | ||
ra_issuer_entity_id_regex: '@@^https://(?:[a-z0-9](?:[a-z0-9-]{0,61}[a-z0-9])?\.)+[a-z0-9][a-z0-9-]{0,61}[a-z0-9]/vetting-procedure/gssf/azuremfa/metadata$@' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters