-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy path.env.example
More file actions
36 lines (29 loc) · 1.8 KB
/
.env.example
File metadata and controls
36 lines (29 loc) · 1.8 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
# Copy this file to .env and replace the values with your own
PORT=3000
DATABASE_URL=postgres://postgres:postgres@localhost:5432/postgres
# ───────────────────────────────────────────────────────────────────────────────
# AUTHENTICATION (OIDC)
# ───────────────────────────────────────────────────────────────────────────────
# Supports any OpenID Connect provider (recommended: Logto — https://logto.io/)
#
# Logto Setup:
# 1. Create a "Traditional Web" application in Logto Console
# 2. Set the redirect URI to: <your-domain>/auth/login-callback
# 3. Copy the App ID → PUBLIC_OIDC_CLIENT_ID
# 4. Copy the App Secret → OIDC_CLIENT_SECRET
# [REQUIRED] OIDC Discovery URL
# Local mock: http://localhost:8080/default/.well-known/openid-configuration
# Logto: https://<your-tenant>.logto.app/oidc/.well-known/openid-configuration
PUBLIC_OIDC_AUTHORITY=http://localhost:8080/default/.well-known/openid-configuration
# [REQUIRED] OAuth2 Client ID from your OIDC provider
PUBLIC_OIDC_CLIENT_ID=default
# [REQUIRED for Logto] OAuth2 Client Secret
# OIDC_CLIENT_SECRET=your-client-secret
# [OPTIONAL] JWT claim path for user roles
# Logto: roles (requires custom JWT claims setup)
OIDC_ROLE_CLAIM=roles
# Contact email displayed on the landing page for conference organizers
# PUBLIC_CONTACT_EMAIL=chase@dmun.de
# Please see https://svelte.dev/docs/kit/adapter-node#Environment-variables for details
# on what vars are available. Especially if you plan on using the app behind a reverse proxy
# like traefik or caddy