Search
K

Sonar and Canary demo apps

Evaluation Guide: Sonar & Canary Demo Apps

How to set up the Sonar and Canary demo apps to use in the Maverics evaluation.
If you cannot use your own apps to complete the Maverics evaluation and/or cannot use the publicly hosted apps, you can stand up containers of Strata’s two demo apps to use in your evaluation.

Requirements

You will need to use Docker or a docker-based container platform to run the containers.
  • Docker Desktop (Mac/Windows) OR Docker Engine v20.10.x or greater
  • Ports:
    • 8987 (Sonar demo app)
    • 8988 (Canary Bank demo app)

Pulling the images

  • docker pull strataidentity/sonar
  • docker pull strataidentity/canarybank

Running the containers for proxy app testing

You need to map ports with the docker run command when instantiating each container. Each app has a built-in user and password.

Sonar (header-based)

This app requires the SM_USER header to complete an authorization. You can also optionally set firstname and lastname headers.
  1. 1.
    From the docker CLI, run: docker run -p 8987:8987 strataidentity/sonar sonar
  2. 2.
    In your browser, go to http://localhost:8987
    • username: jdoe
    • password: password

Canary Bank

  1. 1.
    From the docker CLI, run: docker run -p 8988:8988 strataidentity/canarybank canarybank
  2. 2.
    In your browser, go to http://localhost:8988
    1. 1.
      username: jdoe
    2. 2.
      password: password

Running Sonar as an OIDC app

Requirements
  • Download the evaluation.zip here to get self-signed certs and the rootCA.pem file needed to set up Sonar.
  1. 1.
    Using your preferred text editor, create a file called sonar.env.
  2. 2.
    Copy and paste the following code in the sonar.env file and save.
TLS_CERT=/localhost.pem
TLS_KEY=/localhost-key.pem
AUTH_PROVIDERS=[ { "name": "Maverics", "type": "oidc", "config": { "clientID": "clientID", "clientSecret": "clientSecret", "issuer": "https://localhost", "redirectURL": "https://localhost:8987/auth/Maverics/callback" } } ]
  1. 3.
    In the same directory, create a new file called docker-compose.yaml and copy and paste the following code.
version: "3.8"
services:
sonar:
image: strataidentity/sonar:latest
hostname: sonar
env_file:
- ./sonar.env
ports:
- "8987:8987"
restart: unless-stopped
command: update-ca-certs
network_mode: bridge
extra_hosts:
- localhost:host-gateway
volumes:
- ./rootCA.pem:/etc/ssl/certs/rootCA.pem
- ./localhost.pem:/localhost.pem
- ./localhost-key.pem:/localhost-key.pem
  1. 4.
    In your OIDC app definition, set the following:
    • clientID: clientID
    • clientSecret: clientSecret
    • redirectURLs: https://localhost:8987/auth/Maverics/callback
  2. 5.
    You can also set the following optional definitions, replacing yourIDP.yourClaim in each field:
claimsMapping:
email: yourIDP.yourClaim
given_name: yourIDP.yourClaim
family_name: yourIDP.yourClaim
  1. 6.
    In your OIDC auth provider definition, set the following:
    • issuer: https://localhost
  2. 7.
    Start the orchestrator by running the Maverics binary file in your working directory. Important: The orchestrator must be running before you start the Sonar app.
  3. 8.
    In your terminal window or command line, run:
docker-compose up
The expected output will be as follows:
staging-eval-sonar-1 | 2023/11/15 18:31:03 Starting the server [::]:8987
  1. 9.
    Go to the Sonar app at https://localhost:8987 and click Login with Maverics to start the OIDC login flow.
  2. 10.
    To stop the services defined in the Compose file, you can run the following command:
docker-compose down
This will stop and remove all the containers created by the Compose file.