Compare commits

..

No commits in common. "main" and "2.7.1+0.80.2" have entirely different histories.

4 changed files with 17 additions and 18 deletions

View File

@ -38,7 +38,7 @@ steps:
from_secret: drone_abra-bot_token from_secret: drone_abra-bot_token
fork: true fork: true
repositories: repositories:
- toolshed/auto-recipes-catalogue-json - coop-cloud/auto-recipes-catalogue-json
trigger: trigger:
event: tag event: tag

View File

@ -71,11 +71,12 @@ revisions to (instead of deleting them).
- `abra app deploy <domain> -f` - `abra app deploy <domain> -f`
- enjoy getting rid of S3 🥳 - enjoy getting rid of S3 🥳
## Single Sign On with Keycloak/Authentik ## Single Sign On with Keycloak
- Create an OIDC client in Keycloak (in Authentik this is called a provider and application) `abra app config YOURAPPNAME`, then uncomment everything in the `OIDC_` section.
- Run `abra app config YOURAPPNAME`, then uncomment everything in the `OIDC_` section.
- **Valid Redirect URIs**: `https://YOURAPPDOMAIN/auth/oidc.callback` Create a new client in Keycloak:
- Reference the client/provider info to populate the `_AUTH_URI` `_TOKEN_URI` and `_USERINFO_URI` values
- Set the OIDC secret using the value from the client/provider `abra app secret insert YOURAPPNAME oidc_client_secret v1 SECRETVALUE` - **Valid Redirect URIs**: `https://YOURAPPDOMAIN/auth/oidc.callback`
- `abra app deploy YOURAPPDOMAIN`
`abra app deploy YOURAPPDOMAIN`

View File

@ -6,7 +6,7 @@ services:
networks: networks:
- backend - backend
- proxy - proxy
image: outlinewiki/outline:0.84.0 image: outlinewiki/outline:0.80.2
secrets: secrets:
- db_password - db_password
- secret_key - secret_key
@ -34,20 +34,19 @@ services:
- "traefik.http.routers.${STACK_NAME}.rule=Host(`${DOMAIN}`${EXTRA_DOMAINS})" - "traefik.http.routers.${STACK_NAME}.rule=Host(`${DOMAIN}`${EXTRA_DOMAINS})"
- "traefik.http.routers.${STACK_NAME}.entrypoints=web-secure" - "traefik.http.routers.${STACK_NAME}.entrypoints=web-secure"
- "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}" - "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}"
- "coop-cloud.${STACK_NAME}.version=2.10.0+0.84.0" - "coop-cloud.${STACK_NAME}.version=2.7.1+0.80.2"
# Redirect from EXTRA_DOMAINS to DOMAIN ## Redirect from EXTRA_DOMAINS to DOMAIN
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect" #- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true" #- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}" #- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-80}"
cache: cache:
image: redis:8.0.2 image: redis:7.4.1
networks: networks:
- backend - backend
db: db:
image: postgres:17.5 image: postgres:17.0
networks: networks:
- backend - backend
secrets: secrets:

View File

@ -1 +0,0 @@
Fixes a problem where deployments were consistently giving a timeout response even though they were successful