Compare commits
1 Commits
3.5.0+v3.4
...
basic-auth
| Author | SHA1 | Date | |
|---|---|---|---|
| 07d47e087b |
11
.env.sample
11
.env.sample
@ -58,17 +58,6 @@ COMPOSE_FILE="compose.yml"
|
|||||||
#DIGITALOCEAN_ENABLED=1
|
#DIGITALOCEAN_ENABLED=1
|
||||||
#SECRET_DIGITALOCEAN_AUTH_TOKEN_VERSION=v1
|
#SECRET_DIGITALOCEAN_AUTH_TOKEN_VERSION=v1
|
||||||
|
|
||||||
## Azure, https://azure.com
|
|
||||||
## To insert your Azure client secret:
|
|
||||||
## abra app secret insert {myapp.example.coop} azure_secret v1 "<CLIENT_SECRET>"
|
|
||||||
#COMPOSE_FILE="$COMPOSE_FILE:compose.azure.yml"
|
|
||||||
#AZURE_ENABLED=1
|
|
||||||
#AZURE_TENANT_ID=
|
|
||||||
#AZURE_CLIENT_ID=
|
|
||||||
#AZURE_SUBSCRIPTION_ID=
|
|
||||||
#AZURE_RESOURCE_GROUP=
|
|
||||||
#SECRET_AZURE_SECRET_VERSION=v1
|
|
||||||
|
|
||||||
#####################################################################
|
#####################################################################
|
||||||
# Manual wildcard certificate insertion #
|
# Manual wildcard certificate insertion #
|
||||||
#####################################################################
|
#####################################################################
|
||||||
|
|||||||
@ -23,6 +23,13 @@
|
|||||||
your Docker swarm box
|
your Docker swarm box
|
||||||
4. `abra app deploy YOURAPPDOMAIN`
|
4. `abra app deploy YOURAPPDOMAIN`
|
||||||
|
|
||||||
|
## Configuring basic auth
|
||||||
|
|
||||||
|
1. Create the usersfile locally: `htpasswd -c usersfile <username>`
|
||||||
|
2. Uncomment the Basic Auth section in your .env file
|
||||||
|
3. Insert the secret: `abra app secret insert <domain> usersfile v1 -f usersfile
|
||||||
|
4. Redploy you app: `abra app deploy -f <domain>`
|
||||||
|
|
||||||
## Configuring wildcard SSL using DNS
|
## Configuring wildcard SSL using DNS
|
||||||
|
|
||||||
Automatic certificate generation will Just Work™ for most recipes which use a fixed
|
Automatic certificate generation will Just Work™ for most recipes which use a fixed
|
||||||
|
|||||||
@ -1,17 +0,0 @@
|
|||||||
version: "3.8"
|
|
||||||
|
|
||||||
services:
|
|
||||||
app:
|
|
||||||
environment:
|
|
||||||
- AZURE_TENANT_ID
|
|
||||||
- AZURE_CLIENT_ID
|
|
||||||
- AZURE_SUBSCRIPTION_ID
|
|
||||||
- AZURE_RESOURCE_GROUP
|
|
||||||
- AZURE_CLIENT_SECRET_FILE=/run/secrets/azure_secret
|
|
||||||
secrets:
|
|
||||||
- azure_secret
|
|
||||||
|
|
||||||
secrets:
|
|
||||||
azure_secret:
|
|
||||||
name: ${STACK_NAME}_azure_secret_${SECRET_AZURE_CLIENT_SECRET_VERSION}
|
|
||||||
external: true
|
|
||||||
@ -47,7 +47,7 @@ services:
|
|||||||
- "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}"
|
- "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}"
|
||||||
- "traefik.http.routers.${STACK_NAME}.service=api@internal"
|
- "traefik.http.routers.${STACK_NAME}.service=api@internal"
|
||||||
- "traefik.http.routers.${STACK_NAME}.middlewares=security@file"
|
- "traefik.http.routers.${STACK_NAME}.middlewares=security@file"
|
||||||
- "coop-cloud.${STACK_NAME}.version=3.5.0+v3.4.5"
|
- "coop-cloud.${STACK_NAME}.version=3.4.2+v3.4.5"
|
||||||
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
|
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
|
||||||
- "backupbot.backup=${ENABLE_BACKUPS:-true}"
|
- "backupbot.backup=${ENABLE_BACKUPS:-true}"
|
||||||
|
|
||||||
|
|||||||
@ -11,8 +11,4 @@ export OVH_APPLICATION_SECRET=$(cat "$OVH_APPLICATION_SECRET_FILE")
|
|||||||
export DO_AUTH_TOKEN=$(cat "$DO_AUTH_TOKEN_FILE")
|
export DO_AUTH_TOKEN=$(cat "$DO_AUTH_TOKEN_FILE")
|
||||||
{{ end }}
|
{{ end }}
|
||||||
|
|
||||||
{{ if eq (env "AZURE_ENABLED") "1" }}
|
|
||||||
export AZURE_CLIENT_SECRET=$(cat "$AZURE_CLIENT_SECRET_FILE")
|
|
||||||
{{ end }}
|
|
||||||
|
|
||||||
/entrypoint.sh "$@"
|
/entrypoint.sh "$@"
|
||||||
|
|||||||
@ -1 +0,0 @@
|
|||||||
Add support to azure DNS-01 acme challenge
|
|
||||||
Reference in New Issue
Block a user