Skip to content

Commit

Permalink
Merge pull request #3836 from owncloud/fix-deployment-compose
Browse files Browse the repository at this point in the history
[deployments] Enclose boolean with string in docker-compose env
  • Loading branch information
wkloucek authored May 19, 2022
2 parents 8afbb70 + ed79a20 commit 47b6904
Show file tree
Hide file tree
Showing 6 changed files with 11 additions and 9 deletions.
2 changes: 1 addition & 1 deletion deployments/examples/oc10_ocis_parallel/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -126,7 +126,7 @@ services:
PROXY_TLS: "false" # do not use SSL between Traefik and oCIS
# INSECURE: needed if oCIS / Traefik is using self generated certificates
OCIS_INSECURE: "${INSECURE:-false}"
GRAPH_LDAP_INSECURE: true # https://github.com/owncloud/ocis/issues/3812
GRAPH_LDAP_INSECURE: "true" # https://github.com/owncloud/ocis/issues/3812
# basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect)
PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}"
volumes:
Expand Down
2 changes: 1 addition & 1 deletion deployments/examples/ocis_hello/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@ services:
SETTINGS_GRPC_ADDR: 0.0.0.0:9191
# INSECURE: needed if oCIS / Traefik is using self generated certificates
OCIS_INSECURE: "${INSECURE:-false}"
GRAPH_LDAP_INSECURE: true # https://github.com/owncloud/ocis/issues/3812
GRAPH_LDAP_INSECURE: "true" # https://github.com/owncloud/ocis/issues/3812
# basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect)
PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}"
# admin user password
Expand Down
3 changes: 1 addition & 2 deletions deployments/examples/ocis_ldap/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,6 @@ services:
# therefore we ignore the error and then start the ocis server
command: ["-c", "ocis init || true; ocis server"]
environment:

# users/gropups from ldap
LDAP_URI: ldaps://ldap-server
LDAP_INSECURE: "true"
Expand All @@ -81,7 +80,7 @@ services:
PROXY_TLS: "false" # do not use SSL between Traefik and oCIS
# INSECURE: needed if oCIS / Traefik is using self generated certificates
OCIS_INSECURE: "${INSECURE:-false}"
GRAPH_LDAP_INSECURE: true # https://github.com/owncloud/ocis/issues/3812
GRAPH_LDAP_INSECURE: "true" # https://github.com/owncloud/ocis/issues/3812
# basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect)
PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}"
# admin user password
Expand Down
8 changes: 6 additions & 2 deletions deployments/examples/ocis_s3/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@ services:
STORAGE_USERS_S3NG_BUCKET: ${MINIO_BUCKET:-ocis-bucket}
# INSECURE: needed if oCIS / Traefik is using self generated certificates
OCIS_INSECURE: "${INSECURE:-false}"
GRAPH_LDAP_INSECURE: true # https://github.com/owncloud/ocis/issues/3812
GRAPH_LDAP_INSECURE: "true" # https://github.com/owncloud/ocis/issues/3812
# basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect)
PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}"
# admin user password
Expand All @@ -94,7 +94,11 @@ services:
ocis-net:
entrypoint:
- /bin/sh
command: ["-c", "mkdir -p /data/${MINIO_BUCKET:-ocis-bucket} && minio server --console-address ':9001' /data"]
command:
[
"-c",
"mkdir -p /data/${MINIO_BUCKET:-ocis-bucket} && minio server --console-address ':9001' /data",
]
volumes:
- minio-data:/data
environment:
Expand Down
3 changes: 1 addition & 2 deletions deployments/examples/ocis_traefik/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ services:
PROXY_TLS: "false" # do not use SSL between Traefik and oCIS
# INSECURE: needed if oCIS / Traefik is using self generated certificates
OCIS_INSECURE: "${INSECURE:-false}"
GRAPH_LDAP_INSECURE: true # https://github.com/owncloud/ocis/issues/3812
GRAPH_LDAP_INSECURE: "true" # https://github.com/owncloud/ocis/issues/3812
# basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect)
PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}"
# admin user password
Expand All @@ -84,6 +84,5 @@ volumes:
ocis-config:
ocis-data:


networks:
ocis-net:
2 changes: 1 addition & 1 deletion deployments/examples/ocis_wopi/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -62,7 +62,7 @@ services:
GATEWAY_GRPC_ADDR: 0.0.0.0:9142 # make the REVA gateway accessible to the app drivers
# INSECURE: needed if oCIS / Traefik is using self generated certificates
OCIS_INSECURE: "${INSECURE:-false}"
GRAPH_LDAP_INSECURE: true # https://github.com/owncloud/ocis/issues/3812
GRAPH_LDAP_INSECURE: "true" # https://github.com/owncloud/ocis/issues/3812
# basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect)
PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}"
# admin user password
Expand Down

0 comments on commit 47b6904

Please sign in to comment.