core_vault_sunbird_api_auth_token: # Take the jwt token of api-admin consumer from Jenkins job console output after running OnboardConsumers - Use the same value in DP secrets.yml also for the variable sunbird_api_auth_token
# Keycloak client secret uuids
# You can generate unique ids using the below command
core_vault_sunbird_keycloak_user_federation_provider_id: "" # Keycloak cassandra federation id
core_vault_sunbird_sso_publickey: # Public key of keycloak sunbird realm, update this post keycloak deployment. See below for steps
# SSH tunnel to the keycloak VM by running ssh -L 8080:localhost:8080 deployer@Keycloak-VM-IP
# If you cannot tunnel directly to Keycloak VM, then tunnel to Jenkins first and then tunnel to Keycloak VM from jenkins
...
...
@@ -96,10 +112,10 @@ core_vault_kibana_google_client_secret: # You can use the same
vault_core_url_shortner_access_token: "" # Url shortner access token if you want to shorten urls like forgot password link etc using an external service like bit.ly
### IMPORTANT! IMPORTANT! IMPORTANT! ###
### IMPORTANT! ###
### NOTE: FOR A REAL ENVIRONMENT YOU MUST CHANGE THE BELOW VALUES TO SOMETHING VERY SECRET WHICH ONLY YOU WILL KNOW! DO NOT USE THE DEFAULTS FOR REAL ENVIRONMENTS! ###
# Sensible defaults which you need not change if you are just trying Sunbird- You should change these to something unique for real environments and not use the defaults
# Sensible defaults which you need not change if you are just trying Sunbird- You should change these to something unique for real environments and not use the defaults