6 Commits

Author SHA1 Message Date
afae302224 [mass update] fix supporting multiple domains while enforcing ssl 2025-09-08 08:12:25 -07:00
45c7b2aaef chore: publish 1.0.0+4.0.2 release
All checks were successful
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is passing
2025-06-03 14:20:59 +02:00
91e8018410 chore: publish 0.7.0+3.11.2 release
All checks were successful
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is passing
2025-01-28 18:10:14 +01:00
4a4e536125 add deploy timeout and healthcheck without curl 2025-01-28 18:09:41 +01:00
0d1bbfa99a Update .drone.yml
All checks were successful
continuous-integration/drone/push Build is passing
2025-01-08 10:09:13 -08:00
957eb45fea fix drone runner
All checks were successful
continuous-integration/drone/push Build is passing
2024-10-25 22:12:08 +02:00
5 changed files with 11 additions and 6 deletions

View File

@ -21,6 +21,7 @@ steps:
SECRET_DB_PASSWORD_VERSION: v1
SECRET_SMTP_PWD_VERSION: v1
APP_ENTRYPOINT_VERSION: v1
PG_BACKUP_VERSION: v1
trigger:
branch:
- main
@ -36,7 +37,7 @@ steps:
from_secret: drone_abra-bot_token
fork: true
repositories:
- coop-cloud/auto-recipes-catalogue-json
- toolshed/auto-recipes-catalogue-json
trigger:
event: tag

View File

@ -27,4 +27,5 @@ SMTP_USER=noreply@example.com
#OIDC_NAME= #The user-facing name of your provider as it will be shown on the login page
#OIDC_DISCOVERY_URL= #URL of the .well-known/openid-configuration endpoint for your OIDC provider
#OIDC_CLIENT_ID=
#OIDC_ISSUER_URL=
#SECRET_OIDC_CLIENT_SECRET_VERSION=v1

View File

@ -2,6 +2,7 @@ authentik:
env:
OIDC_NAME: "Authentik"
OIDC_DISCOVERY_URL: "https://authentik.example.com/application/o/rallly/.well-known/openid-configuration"
OIDC_ISSUER_URL: "https://authentik.example.com/application/o/rallly/"
OIDC_CLIENT_ID: rallly
uncomment:
- compose.oidc.yml

View File

@ -3,7 +3,7 @@ version: "3.8"
services:
app:
image: lukevella/rallly:3.10.1
image: lukevella/rallly:4.0.2
hostname: 0.0.0.0
networks:
- proxy
@ -43,11 +43,12 @@ services:
- "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}"
# Redirect from EXTRA_DOMAINS to DOMAIN
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
- "coop-cloud.${STACK_NAME}.version=0.6.1+3.10.1"
- "traefik.http.middlewares.${STACK_NAME}-redirect.redirectscheme.scheme=https"
- "traefik.http.middlewares.${STACK_NAME}-redirect.redirectscheme.permanent=true"
- "coop-cloud.${STACK_NAME}.version=1.0.0+4.0.2"
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
healthcheck:
test: ["CMD", "curl", "-f", "http://localhost:3000"]
test: "bash -c 'printf \"GET / HTTP/1.1\n\n\" > /dev/tcp/127.0.0.1/3000; exit $$?;'"
interval: 30s
timeout: 10s
retries: 10

1
release/1.0.0+4.0.2 Normal file
View File

@ -0,0 +1 @@
BREAKING CHANGE: SSO requires OIDC_ISSUER_URL env.