You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
** Nginx configuration file has been created at ./nginx/nginx.conf **
57
-
```
58
-
59
-
This process creates two versions of nginx.conf:
60
-
61
-
the first (nginx-cert.conf) to receive SSL certificates and the second (nginx.conf) to set up an internal proxy for mc-iam-manager and keycloak, and certbot, as well as an SSL reverse proxy
62
-
63
-
### Step four : Excute init docker-compose for SSL setup
64
-
65
-
```bash
66
-
docker-compose -f docker-compose.init.yml up
67
-
# check the log "Successfully received certificate." and "ertbot exited with code 0"
68
-
# ctrl + C to exit docker-compose and shutdown with below command
69
-
docker-compose -f docker-compose.init.yml down
70
-
```
71
-
72
-
This process creates a SSL certificate in the `~/.m-cmp/data/certbot` path through the nginx-cert.conf setting. ****If you have checked the console log (Successfully received certificate. ~~ certbot exited with code 0) as below, you have successfully issued an SSL certificate and created it at the designated location.
73
-
74
-
```bash
75
-
$ docker-compose -f docker-compose.init.yml up
76
-
....
77
-
certbot | Successfully received certificate.
78
-
certbot | Certificate is saved at: /etc/letsencrypt/live/yourdomain.com/fullchain.pem
79
-
certbot | Key is saved at: /etc/letsencrypt/live/yourdomain.com/privkey.pem
80
-
certbot | This certificate expires on 2024-09-11.
81
-
certbot | These files will be updated when the certificate renews.
82
-
certbot | NEXT STEPS:
83
-
certbot | - The certificate will need to be renewed before it expires. Certbot can automatically renew the certificate in the background, but you may need to take steps to enable that functionality. See https://certbot.org/renewal-setup for instructions.
And you don't have to consider the renewal. The next docker-compose checks the certificate every 12 hours and automatically updates it to the symbol link if it needs to be renewed. In other words, this is only the first time you need it, and it doesn't need to be applied from the next update.
55
+
This step defines the environment variables that you want to use by default or creates `./scripts/container-volume/mc-iam-manager/keycloak/data/import/realm-import.json` based on the variables defined in `./scripts/.env`. Therefore, "Keycloak" completes the initial setup based on the file, creating the first login user in the process.
94
56
95
-
### Step five : Excute docker-compose
57
+
### Step four: Excute docker-compose
96
58
97
59
```bash
98
-
docker-compose up --build -d
60
+
cd scripts
61
+
sudo docker-compose up --build -d
99
62
```
100
63
101
-
If you check the log as below, it seems that you have successfully built and deployed the mc-iam-manager without any problems.
64
+
This step is time consuming. Don't worry if the console fails. "Keycloak" is a natural error that occurs during initial installation when MC-IAM-MANAGER requests Keyclaok readiness and certification to initialize the database and import the required data.
102
65
103
-
```bash
104
-
$ docker-compose up --build -d
105
-
106
-
Creating network "scripts_mciammanagernet" with the default driver
107
-
Building mciammanager
108
-
Step 1/19 : FROM gobuffalo/buffalo:v0.18.14 as builder
109
-
---> dbcc9d3a40f5
110
-
Step 2/19 : ENV GOPROXY http://proxy.golang.org
111
-
---> Using cache
112
-
---> 05e55ac7f5eb
113
-
....
114
-
Step 10/19 : RUN buffalo build --static -o /bin/app
115
-
---> Running in 3c1d37d71384
116
-
....
117
-
Successfully built 7d0ed2aa6a89
118
-
Successfully tagged scripts_mciammanager:latest
119
-
Creating scripts_postgresdb_1 ... done
120
-
Creating certbot ... done
121
-
Creating scripts_keycloak_1 ... done
122
-
Creating scripts_mciammanager_1 ... done
123
-
Creating nginx ... done
124
-
```
66
+
Once the server completes successfully, you can access the readyz endpoint with the message that it has been loaded successfully.
125
67
126
-
### Step six : Check Alive enpoint
68
+
### Step final: Check Readyzenpoint
127
69
128
70
```bash
129
-
$ curl https://<yourdomain.com>:5000/alive
71
+
$ curl https://<yourdomain.com>:5000/readyz
130
72
# {"ststus":"ok"}
131
73
```
132
74
133
75
If `{"stststus":"ok"}` is received from the endpoint, it means that the service is being deployed normally.
134
76
135
77
### WELCOME : Now you can use MC-IAM-MANAGER
136
78
137
-
You can get tokens issued and see the default Role created through some of the built-in accounts below. For more API information, check the following swagger link.
Running this script allows you to view the menu above, using the information defined in .env to perform tasks according to the numbers you enter.
117
+
118
+
However, the first priority is to log in by entering the user's information that you entered. If you run number 1 and run numbers 2 to 6, you will be able to use MC-WEB-CONSOLE.
119
+
120
+
- initauto.sh
121
+
122
+
```
123
+
# ./scripts/init/initauto.sh
124
+
./initauto.sh
125
+
```
126
+
127
+
This script automatically performs all procedures based on the user defined in the environment variables, but it cannot define detailed role-specific menus, and it is automatically imported to the version listed in GitHub.
128
+
129
+
If you want more detailed settings, we recommend init.sh .
130
+
131
+
- add_demo_user.sh
132
+
133
+
```
134
+
# ./scripts/init/add_demo_user.sh
135
+
./add_demo_user.sh
136
+
```
137
+
138
+
This script registers the demo user defined in ./scripts/init/add_demo_user.json. The process of registering is very simple and you can automatically activate the registered user. Use MC-WEB-CONSOLE for role setup and workspace interworking.
139
+
140
+
141
+
swagger docs
181
142
182
-
### swagger docs
183
143
https://m-cmp.github.io/mc-iam-manager/
184
144
185
-
```
186
-
# https://m-cmp.github.io/mc-iam-manager/
187
-
```
188
-
189
-
### Get CB-Tumblebug namespace Data
190
-
191
-
You can run the following script to assign the configured existing data to the Default Workplace.
0 commit comments