notplants 9922390ce3
Some checks failed
continuous-integration/drone/push Build is failing
bump to 0.5.2+v2026.2.0
2026-03-01 19:50:02 -05:00
2025-01-08 10:09:12 -08:00
2026-03-01 19:47:47 -05:00
2026-01-12 15:45:15 -05:00
2026-02-28 22:05:44 -05:00
2026-03-01 19:50:02 -05:00
2026-01-12 16:17:42 -05:00
2026-03-01 19:47:47 -05:00
2026-03-01 02:54:27 +00:00

cryptpad

Build Status

  • Category: Apps
  • Status: 3
  • Image: cryptpad/cryptpad
  • Healthcheck: Yes
  • Backups: Yes
  • Email: No
  • Tests: No
  • SSO: Yes

Basic usage

  1. Set up Docker Swarm and abra
  2. Deploy coop-cloud/traefik
  3. abra app new cryptpad --secrets (optionally with --pass if you'd like to save secrets in pass)
  4. abra app config YOURAPPDOMAIN - be sure to change $DOMAIN to something that resolves to your Docker swarm box
  5. abra app deploy YOURAPPDOMAIN
  6. Open the configured domain in your browser to finish set-up

At this point, anyone with this domain can register new users with this cryptpad instance.

After you have registered a first user, here is how you can make this user into an admin. After logging in as your user, go to: https://cryptpad.cctest.autonomic.zone/profile/

Click "Copy Public Key". This will copy your public key into your clipboard. Then run abra app config YOURAPPDOMAIN and set the value of CRYPTPAD_ADMIN_KEYS to include your public key. The example in .env.sample shows the required format.

Then redeploy with abra app deploy YOURAPPDOMAIN --force.

Now when you login as your user, and visit https://cryptpad.cctest.autonomic.zone/admin/, you should be able to access the admin interface for this cryptpad instance.

SSO

SSO support is provided by compose.sso.yml. To enable it, add the SSO compose file and set the SSO variables in your app config:

COMPOSE_FILE="compose.yml:compose.sso.yml"
SSO_ENABLED=true

On the next deploy, the CryptPad SSO plugin will be installed automatically.

You also need to configure the remaining SSO environment variables for your OIDC provider:

  • SSO_PROVIDER_NAME — display name shown on the login button (e.g. Keycloak, Authentik)
  • SSO_OIDC_URL — OIDC discovery URL for your provider
  • SSO_CLIENT_ID — OAuth2 client ID
  • SSO_JWT_ALG — JWT signing algorithm (e.g. RS256)

The client secret is stored as a Docker secret. Insert it with:

abra app secret insert YOURAPPDOMAIN sso_client_s v1 YOUR_CLIENT_SECRET

Then deploy (or redeploy) to apply: abra app deploy YOURAPPDOMAIN --force.

Description
No description provided
Readme 109 KiB
Languages
Shell 100%