generated from coop-cloud/example
Compare commits
10 Commits
2.8.0+0.81
...
main
Author | SHA1 | Date | |
---|---|---|---|
6c4fb2c70b | |||
ca0eebcc64 | |||
400445f8f5 | |||
73ed83f5bf | |||
91e73387bf | |||
4005524b7b | |||
ab70b3c4ca | |||
59fdc6481a | |||
fbcdc57b9d | |||
37c8cf8141 |
@ -38,7 +38,7 @@ steps:
|
||||
from_secret: drone_abra-bot_token
|
||||
fork: true
|
||||
repositories:
|
||||
- coop-cloud/auto-recipes-catalogue-json
|
||||
- toolshed/auto-recipes-catalogue-json
|
||||
|
||||
trigger:
|
||||
event: tag
|
||||
|
15
README.md
15
README.md
@ -71,12 +71,11 @@ revisions to (instead of deleting them).
|
||||
- `abra app deploy <domain> -f`
|
||||
- enjoy getting rid of S3 🥳
|
||||
|
||||
## Single Sign On with Keycloak
|
||||
## Single Sign On with Keycloak/Authentik
|
||||
|
||||
`abra app config YOURAPPNAME`, then uncomment everything in the `OIDC_` section.
|
||||
|
||||
Create a new client in Keycloak:
|
||||
|
||||
- **Valid Redirect URIs**: `https://YOURAPPDOMAIN/auth/oidc.callback`
|
||||
|
||||
`abra app deploy YOURAPPDOMAIN`
|
||||
- Create an OIDC client in Keycloak (in Authentik this is called a provider and application)
|
||||
- Run `abra app config YOURAPPNAME`, then uncomment everything in the `OIDC_` section.
|
||||
- **Valid Redirect URIs**: `https://YOURAPPDOMAIN/auth/oidc.callback`
|
||||
- Reference the client/provider info to populate the `_AUTH_URI` `_TOKEN_URI` and `_USERINFO_URI` values
|
||||
- Set the OIDC secret using the value from the client/provider `abra app secret insert YOURAPPNAME oidc_client_secret v1 SECRETVALUE`
|
||||
- `abra app deploy YOURAPPDOMAIN`
|
@ -6,7 +6,7 @@ services:
|
||||
networks:
|
||||
- backend
|
||||
- proxy
|
||||
image: outlinewiki/outline:0.81.1
|
||||
image: outlinewiki/outline:0.82.0
|
||||
secrets:
|
||||
- db_password
|
||||
- secret_key
|
||||
@ -34,19 +34,20 @@ services:
|
||||
- "traefik.http.routers.${STACK_NAME}.rule=Host(`${DOMAIN}`${EXTRA_DOMAINS})"
|
||||
- "traefik.http.routers.${STACK_NAME}.entrypoints=web-secure"
|
||||
- "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}"
|
||||
- "coop-cloud.${STACK_NAME}.version=2.8.0+0.81.1"
|
||||
- "coop-cloud.${STACK_NAME}.version=2.9.0+0.82.0"
|
||||
# Redirect from EXTRA_DOMAINS to DOMAIN
|
||||
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
||||
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
||||
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
||||
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-80}"
|
||||
|
||||
cache:
|
||||
image: redis:7.4.1
|
||||
image: redis:7.4.2
|
||||
networks:
|
||||
- backend
|
||||
|
||||
db:
|
||||
image: postgres:17.0
|
||||
image: postgres:17.3
|
||||
networks:
|
||||
- backend
|
||||
secrets:
|
||||
|
1
release/2.9.1+0.82.0
Normal file
1
release/2.9.1+0.82.0
Normal file
@ -0,0 +1 @@
|
||||
Fixes a problem where deployments were consistently giving a timeout response even though they were successful
|
Loading…
x
Reference in New Issue
Block a user