-
Notifications
You must be signed in to change notification settings - Fork 4
Expand file tree
/
Copy path.env.example
More file actions
64 lines (56 loc) · 2.52 KB
/
.env.example
File metadata and controls
64 lines (56 loc) · 2.52 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
# Local AAT-backed startup template for rpx-xui-manage-organisations.
# Copy to .env or populate tagged secrets from Azure Key Vault:
# yarn env:populate:aat
# yarn env:populate:demo
#
# If adding a new secret value, ensure Key Vault is updated and tagged with:
# e2e=ENV_VAR_NAME
#
# Keep placeholders only in this file. Do not commit live secret values.
# Node/API local defaults
NODE_CONFIG_DIR=../config
NODE_CONFIG_ENV=local-development
ALLOW_CONFIG_MUTATIONS=1
FEATURE_APP_INSIGHTS_ENABLED=false
# Local callback into the Angular dev server on port 3000.
OAUTH_CALLBACK_URL=/oauth2/callback
# OIDC / IDAM
IDAM_CLIENT=xuimowebapp
CLIENT_ID=xuimowebapp
IDAM_SECRET=
IDAM_WEB_SERVICE=https://idam-web-public.aat.platform.hmcts.net
IDAM_API_SERVICE=https://idam-api.aat.platform.hmcts.net
SERVICES_IDAM_ISS_URL=https://forgerock-am.service.core-compute-idam-aat2.internal:8443/openam/oauth2/realms/root/realms/hmcts
IDAM_TESTING_SUPPORT_USERS_URL=
IDAM_TESTING_SUPPORT_URL=
IDAM_CITIZEN_USER_PASSWORD=
IDAM_OAUTH2_SCOPE=openid profile roles
IDAM_RETURN_URL=
SESSION_SECRET=
# Core AAT-backed services used by manage-org.
SERVICES_CCD_COMPONENT_API=https://gateway-ccd.aat.platform.hmcts.net
SERVICES_CCD_DATA_STORE_API=http://ccd-data-store-api-aat.service.core-compute-aat.internal
SERVICES_MCA_PROXY_API=http://aac-manage-case-assignment-aat.service.core-compute-aat.internal
SERVICES_ROLE_ASSIGNMENT_API=http://am-role-assignment-service-aat.service.core-compute-aat.internal
SERVICES_PRD_COMMONDATA_API=http://rd-commondata-api-aat.service.core-compute-aat.internal
RD_PROFESSIONAL_API_SERVICE=http://rd-professional-api-aat.service.core-compute-aat.internal
FEE_AND_PAY_API=http://payment-api-aat.service.core-compute-aat.internal
SERVICES_TERMS_AND_CONDITIONS_API_SERVICE=http://xui-terms-and-conditions-aat.service.core-compute-aat.internal
# Service-to-service auth.
S2S_SERVICE=http://rpe-service-auth-provider-aat.service.core-compute-aat.internal
S2S_SECRET=
MICROSERVICE=xui_webapp
# Cross-app navigation links shown in the UI.
MANAGE_CASE_LINK=https://manage-case.aat.platform.hmcts.net/cases
MANAGE_ORG_LINK=https://manage-org.aat.platform.hmcts.net/
# Dynamic org-user-assignment account used as the default Manage Org user when populated from Key Vault.
XUI_DYNAMIC_ORG_USER_ASSIGNMENT_UI_USER=
XUI_DYNAMIC_ORG_USER_ASSIGNMENT_PASSWORD=
# Optional local test users.
TEST_USER1_EMAIL=
TEST_USER1_PASSWORD=
TEST_ROO_EMAIL=
TEST_ROO_PASSWORD=
TEST_URL=https://manage-org.aat.platform.hmcts.net/
MANAGE_ORG_TEST_USER_ROLE=base
MANAGE_ORG_STORAGE_STATE=