forked from coop-cloud/nextcloud
Compare commits
11 Commits
4.0.6+26.0
...
5.0.2+27.0
Author | SHA1 | Date | |
---|---|---|---|
c54b975654 | |||
e9a602cc78 | |||
90c7b87655 | |||
3a8c203b51 | |||
634a3553b9 | |||
24e9571ba1 | |||
6546a05cf9 | |||
ad3059d518 | |||
92af4b9c01 | |||
92dca3fab7 | |||
201585bea8 |
16
.drone.yml
16
.drone.yml
@ -31,3 +31,19 @@ steps:
|
|||||||
trigger:
|
trigger:
|
||||||
branch:
|
branch:
|
||||||
- main
|
- main
|
||||||
|
---
|
||||||
|
kind: pipeline
|
||||||
|
name: generate recipe catalogue
|
||||||
|
steps:
|
||||||
|
- name: release a new version
|
||||||
|
image: plugins/downstream
|
||||||
|
settings:
|
||||||
|
server: https://build.coopcloud.tech
|
||||||
|
token:
|
||||||
|
from_secret: drone_abra-bot_token
|
||||||
|
fork: true
|
||||||
|
repositories:
|
||||||
|
- coop-cloud/auto-recipes-catalogue-json
|
||||||
|
|
||||||
|
trigger:
|
||||||
|
event: tag
|
||||||
|
12
.env.sample
12
.env.sample
@ -21,10 +21,10 @@ EXTRA_VOLUME=/dev/null:/tmp/.dummy
|
|||||||
|
|
||||||
PHP_MEMORY_LIMIT=1G
|
PHP_MEMORY_LIMIT=1G
|
||||||
# fpm-tune, see: https://spot13.com/pmcalculator/
|
# fpm-tune, see: https://spot13.com/pmcalculator/
|
||||||
FPM_MAX_CHILDREN=131
|
FPM_MAX_CHILDREN=16
|
||||||
FPM_START_SERVERS=32
|
FPM_START_SERVERS=4
|
||||||
FPM_MIN_SPARE_SERVERS=32
|
FPM_MIN_SPARE_SERVERS=4
|
||||||
FPM_MAX_SPARE_SERVERS=98
|
FPM_MAX_SPARE_SERVERS=12
|
||||||
|
|
||||||
DEFAULT_QUOTA="10 GB"
|
DEFAULT_QUOTA="10 GB"
|
||||||
|
|
||||||
@ -58,5 +58,5 @@ DEFAULT_QUOTA="10 GB"
|
|||||||
# COMPOSE_FILE="$COMPOSE_FILE:compose.authentik.yml"
|
# COMPOSE_FILE="$COMPOSE_FILE:compose.authentik.yml"
|
||||||
# AUTHENTIK_USER_PREFIX=authentik
|
# AUTHENTIK_USER_PREFIX=authentik
|
||||||
# AUTHENTIK_DOMAIN=authentik.example.com
|
# AUTHENTIK_DOMAIN=authentik.example.com
|
||||||
# AUTHENTIK_SECRET_NAME=authentik_example_com_nextcloud_secret_v1 # the same as in authentik
|
# SECRET_AUTHENTIK_SECRET_VERSION=v1
|
||||||
# AUTHENTIK_ID_NAME=authentik_example_com_nextcloud_id_v1 # the same as in authentik
|
# SECRET_AUTHENTIK_ID_VERSION=v1
|
||||||
|
4
abra.sh
4
abra.sh
@ -47,6 +47,10 @@ set_trusted_proxies() {
|
|||||||
set_system_config trusted_proxies "$trusted_proxies"
|
set_system_config trusted_proxies "$trusted_proxies"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
set_logfile_stdout() {
|
||||||
|
set_system_config logfile '/dev/stdout'
|
||||||
|
}
|
||||||
|
|
||||||
install_bbb() {
|
install_bbb() {
|
||||||
install_apps bbb
|
install_apps bbb
|
||||||
set_app_config bbb app.navigation true
|
set_app_config bbb app.navigation true
|
||||||
|
@ -8,7 +8,7 @@ services:
|
|||||||
secrets:
|
secrets:
|
||||||
authentik_secret:
|
authentik_secret:
|
||||||
external: true
|
external: true
|
||||||
name: ${AUTHENTIK_SECRET_NAME}
|
name: ${STACK_NAME}_authentik_secret_${SECRET_AUTHENTIK_SECRET_VERSION}
|
||||||
authentik_id:
|
authentik_id:
|
||||||
external: true
|
external: true
|
||||||
name: ${AUTHENTIK_ID_NAME}
|
name: ${STACK_NAME}_authentik_id_${SECRET_AUTHENTIK_ID_VERSION}
|
||||||
|
@ -28,9 +28,9 @@ services:
|
|||||||
deploy:
|
deploy:
|
||||||
labels:
|
labels:
|
||||||
backupbot.backup: "true"
|
backupbot.backup: "true"
|
||||||
backupbot.backup.pre-hook: 'mkdir -p /tmp/backup/ && mysqldump --single-transaction -u root -p"$$(cat /run/secrets/db_root_password)" nextcloud > /tmp/backup/backup.sql'
|
backupbot.backup.pre-hook: 'mysqldump --single-transaction -u root -p"$$(cat /run/secrets/db_root_password)" nextcloud > /var/lib/mysql/backup.sql'
|
||||||
backupbot.backup.post-hook: "rm -rf /tmp/backup"
|
backupbot.backup.post-hook: "rm -rf /var/lib/mysql/backup.sql"
|
||||||
backupbot.backup.path: "/tmp/backup/"
|
backupbot.backup.path: "/var/lib/mysql/backup.sql"
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: ["CMD-SHELL", 'mysqladmin -p"$$(cat /run/secrets/db_root_password)" ping']
|
test: ["CMD-SHELL", 'mysqladmin -p"$$(cat /run/secrets/db_root_password)" ping']
|
||||||
interval: 30s
|
interval: 30s
|
||||||
|
@ -29,9 +29,9 @@ services:
|
|||||||
deploy:
|
deploy:
|
||||||
labels:
|
labels:
|
||||||
backupbot.backup: "true"
|
backupbot.backup: "true"
|
||||||
backupbot.backup.pre-hook: "mkdir -p /tmp/backup/ && PGPASSWORD=$$(cat $${POSTGRES_PASSWORD_FILE}) pg_dump -U $${POSTGRES_USER} $${POSTGRES_DB} > /tmp/backup/backup.sql"
|
backupbot.backup.pre-hook: "PGPASSWORD=$$(cat $${POSTGRES_PASSWORD_FILE}) pg_dump -U $${POSTGRES_USER} $${POSTGRES_DB} > /var/lib/postgresql/data/backup.sql"
|
||||||
backupbot.backup.post-hook: "rm -rf /tmp/backup"
|
backupbot.backup.post-hook: "rm -rf /var/lib/postgresql/data/backup.sql"
|
||||||
backupbot.backup.path: "/tmp/backup/"
|
backupbot.backup.path: "/var/lib/postgresql/data/"
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
postgres:
|
postgres:
|
||||||
|
13
compose.yml
13
compose.yml
@ -1,7 +1,7 @@
|
|||||||
version: "3.8"
|
version: "3.8"
|
||||||
services:
|
services:
|
||||||
web:
|
web:
|
||||||
image: nginx:1.25.0
|
image: nginx:1.25.1
|
||||||
configs:
|
configs:
|
||||||
- source: nginx_conf
|
- source: nginx_conf
|
||||||
target: /etc/nginx/nginx.conf
|
target: /etc/nginx/nginx.conf
|
||||||
@ -33,6 +33,9 @@ services:
|
|||||||
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
||||||
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
||||||
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
||||||
|
- "caddy=${DOMAIN}"
|
||||||
|
- "caddy.reverse_proxy={{upstreams 80}}"
|
||||||
|
- "caddy.tls.on_demand="
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: ["CMD-SHELL", 'curl -s -N curl -Ns localhost/status.php | grep "installed\":true"']
|
test: ["CMD-SHELL", 'curl -s -N curl -Ns localhost/status.php | grep "installed\":true"']
|
||||||
interval: 30s
|
interval: 30s
|
||||||
@ -41,7 +44,7 @@ services:
|
|||||||
start_period: 5m
|
start_period: 5m
|
||||||
|
|
||||||
app:
|
app:
|
||||||
image: nextcloud:26.0.2-fpm
|
image: nextcloud:27.0.1-fpm
|
||||||
depends_on:
|
depends_on:
|
||||||
- db
|
- db
|
||||||
configs:
|
configs:
|
||||||
@ -86,7 +89,7 @@ services:
|
|||||||
failure_action: rollback
|
failure_action: rollback
|
||||||
order: start-first
|
order: start-first
|
||||||
labels:
|
labels:
|
||||||
- "coop-cloud.${STACK_NAME}.version=4.0.6+26.0.2-fpm"
|
- "coop-cloud.${STACK_NAME}.version=5.0.2+27.0.1-fpm"
|
||||||
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
|
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
|
||||||
- "backupbot.backup=true"
|
- "backupbot.backup=true"
|
||||||
- "backupbot.backup.path=/var/www/html/config/,/var/www/html/data/,/var/www/html/custom_apps/"
|
- "backupbot.backup.path=/var/www/html/config/,/var/www/html/data/,/var/www/html/custom_apps/"
|
||||||
@ -98,7 +101,7 @@ services:
|
|||||||
start_period: 5m
|
start_period: 5m
|
||||||
|
|
||||||
cron:
|
cron:
|
||||||
image: nextcloud:26.0.2-fpm
|
image: nextcloud:27.0.1-fpm
|
||||||
volumes:
|
volumes:
|
||||||
- nextcloud:/var/www/html/
|
- nextcloud:/var/www/html/
|
||||||
- nextapps:/var/www/html/custom_apps:cached
|
- nextapps:/var/www/html/custom_apps:cached
|
||||||
@ -110,7 +113,7 @@ services:
|
|||||||
entrypoint: /cron.sh
|
entrypoint: /cron.sh
|
||||||
|
|
||||||
cache:
|
cache:
|
||||||
image: redis:7.0.11-alpine
|
image: redis:7.0.12-alpine
|
||||||
networks:
|
networks:
|
||||||
- internal
|
- internal
|
||||||
volumes:
|
volumes:
|
||||||
|
1
release/next
Normal file
1
release/next
Normal file
@ -0,0 +1 @@
|
|||||||
|
The authentik secrets need to be inserted again, as nextcloud is not sharing the secret with authentik any more.
|
Reference in New Issue
Block a user