Compare commits
3 Commits
0.1.2+1.21
...
0.2.0+1.21
Author | SHA1 | Date | |
---|---|---|---|
b1fd18de3f | |||
63b2fda7d3 | |||
da39891d71 |
15
.env.sample
15
.env.sample
@ -2,7 +2,22 @@ TYPE=baserow
|
|||||||
|
|
||||||
DOMAIN=baserow.example.com
|
DOMAIN=baserow.example.com
|
||||||
|
|
||||||
|
COMPOSE_FILE="compose.yml"
|
||||||
|
|
||||||
## Domain aliases
|
## Domain aliases
|
||||||
#EXTRA_DOMAINS=', `www.baserow.example.com`'
|
#EXTRA_DOMAINS=', `www.baserow.example.com`'
|
||||||
|
|
||||||
LETS_ENCRYPT_ENV=production
|
LETS_ENCRYPT_ENV=production
|
||||||
|
|
||||||
|
# COMPOSE_FILE="$COMPOSE_FILE:compose.email.yml"
|
||||||
|
# FROM_EMAIL="No Reply <noreply@example.com>"
|
||||||
|
# EMAIL_SMTP_USE_TLS=true
|
||||||
|
# EMAIL_SMTP_HOST=mail.exampl.com
|
||||||
|
# EMAIL_SMTP_PORT=497
|
||||||
|
# EMAIL_SMTP_USER=noreply@example.com
|
||||||
|
# SECRET_EMAIL_SMTP_PASSWORD_VERSION=v1
|
||||||
|
#
|
||||||
|
|
||||||
|
SECRET_SECRET_KEY_VERSION=v1
|
||||||
|
SECRET_BASEROW_JWT_SIGNING_KEY_VERSION=v1
|
||||||
|
|
||||||
|
21
compose.email.yml
Normal file
21
compose.email.yml
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
---
|
||||||
|
version: "3.8"
|
||||||
|
|
||||||
|
services:
|
||||||
|
app:
|
||||||
|
environment:
|
||||||
|
- EMAIL_SMTP=true
|
||||||
|
- EMAIL_SMTP_PASSWORD_FILE=/run/secrets/email_smtp_password
|
||||||
|
- FROM_EMAIL
|
||||||
|
- EMAIL_SMTP_USE_TLS
|
||||||
|
- EMAIL_SMTP_HOST
|
||||||
|
- EMAIL_SMTP_PORT
|
||||||
|
- EMAIL_SMTP_USER
|
||||||
|
secrets:
|
||||||
|
- email_smtp_password
|
||||||
|
|
||||||
|
secrets:
|
||||||
|
email_smtp_password:
|
||||||
|
external: true
|
||||||
|
name: ${STACK_NAME}_email_smtp_password_${SECRET_EMAIL_SMTP_PASSWORD_VERSION}
|
||||||
|
|
15
compose.yml
15
compose.yml
@ -8,6 +8,11 @@ services:
|
|||||||
- proxy
|
- proxy
|
||||||
environment:
|
environment:
|
||||||
- BASEROW_PUBLIC_URL=https://${DOMAIN}
|
- BASEROW_PUBLIC_URL=https://${DOMAIN}
|
||||||
|
- SECRET_KEY_FILE=/run/secrets/secret_key
|
||||||
|
- BASEROW_JWT_SIGNING_KEY_FILE=/run/secrets/baserow_jwt_signing_key
|
||||||
|
secrets:
|
||||||
|
- secret_key
|
||||||
|
- baserow_jwt_signing_key
|
||||||
deploy:
|
deploy:
|
||||||
restart_policy:
|
restart_policy:
|
||||||
condition: on-failure
|
condition: on-failure
|
||||||
@ -21,7 +26,7 @@ services:
|
|||||||
#- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
#- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
||||||
#- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
#- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
||||||
#- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
#- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
||||||
- "coop-cloud.${STACK_NAME}.version=0.1.2+1.21.2"
|
- "coop-cloud.${STACK_NAME}.version=0.2.0+1.21.2"
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: ["CMD", "curl", "-f", "http://localhost"]
|
test: ["CMD", "curl", "-f", "http://localhost"]
|
||||||
interval: 30s
|
interval: 30s
|
||||||
@ -38,3 +43,11 @@ volumes:
|
|||||||
networks:
|
networks:
|
||||||
proxy:
|
proxy:
|
||||||
external: true
|
external: true
|
||||||
|
|
||||||
|
secrets:
|
||||||
|
secret_key:
|
||||||
|
external: true
|
||||||
|
name: ${STACK_NAME}_secret_key_${SECRET_SECRET_KEY_VERSION}
|
||||||
|
baserow_jwt_signing_key:
|
||||||
|
external: true
|
||||||
|
name: ${STACK_NAME}_baserow_jwt_signing_key_${SECRET_BASEROW_JWT_SIGNING_KEY_VERSION}
|
||||||
|
1
release/0.2.0+1.21.2
Normal file
1
release/0.2.0+1.21.2
Normal file
@ -0,0 +1 @@
|
|||||||
|
Fix compose file
|
Reference in New Issue
Block a user