1
|
/**
|
2
|
* This environment is used when running the microservices locally WITHOUT using Zuul edge server
|
3
|
* for all endpoints, using directly each service's dedicated url (not very practical, but meh)
|
4
|
*/
|
5
|
|
6
|
export const environment = {
|
7
|
production: false,
|
8
|
staging: false,
|
9
|
enableGlobalErrorToast: false,
|
10
|
// baseApiUrl: 'http://localhost:8011',
|
11
|
baseApiUrl: 'http://192.168.209.100:8011',
|
12
|
apiUrl: {
|
13
|
configurationWs: '/configuration-ws',
|
14
|
documentsProcessesWs: '/documents-processes-ws',
|
15
|
verificationRulesWs: '/verification-rules-ws',
|
16
|
usersWs: '/users-ws'
|
17
|
},
|
18
|
defaultLanguage: 'en',
|
19
|
languages: [
|
20
|
{
|
21
|
code: 'en',
|
22
|
name: 'English'
|
23
|
},
|
24
|
{
|
25
|
code: 'el',
|
26
|
name: 'Ελληνικά'
|
27
|
}
|
28
|
],
|
29
|
oAuth2: {
|
30
|
serverUrl: 'http://192.168.209.100:8080/openam/oauth2/realms/root/realms/',
|
31
|
issuerUrl: 'http://192.168.209.100:8080/openam/oauth2/realms/root/realms/',
|
32
|
realmName: 'PWC-RTA',
|
33
|
redirectUri: 'http://localhost:4200',
|
34
|
clientId: 'PwcRta',
|
35
|
// Scope for the permissions the client should request
|
36
|
scope: 'openid profile email auth',
|
37
|
// Set this to "true" if you want automatic redirection to OAuth2 login to happen when user visits any page as anonymous,
|
38
|
// without manually clicking 'login'.
|
39
|
autoLogin: false
|
40
|
},
|
41
|
globalRightsClientID: 'PWC',
|
42
|
dashboardSelectedIpowerClientsStorageTime: 432000000 //5 day in miliseconds
|
43
|
};
|