-
Notifications
You must be signed in to change notification settings - Fork 190
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #1008 from owncloud/streamline_example_deployments
[docs-only] streamline example deployments
- Loading branch information
Showing
39 changed files
with
956 additions
and
1,200 deletions.
There are no files selected for viewing
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
18 changes: 0 additions & 18 deletions
18
deployments/examples/ocis_external_konnectd/idpnode/config/identifier-registration.yml
This file was deleted.
Oops, something went wrong.
67 changes: 0 additions & 67 deletions
67
deployments/examples/ocis_external_konnectd/idpnode/docker-compose.yml
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
68 changes: 0 additions & 68 deletions
68
deployments/examples/ocis_external_konnectd/ocisnode/docker-compose.yml
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
# If you're on a internet facing server please comment out following line. | ||
# It skips certificate validation for various parts of oCIS and is needed if you use self signed certificates. | ||
INSECURE=true | ||
|
||
### Traefik settings ### | ||
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test" | ||
TRAEFIK_DOMAIN= | ||
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin" | ||
TRAEFIK_BASIC_AUTH_USERS= | ||
# Email address for obtaining LetsEncrypt certificates, needs only be changed if this is a public facing server | ||
TRAEFIK_ACME_MAIL= | ||
|
||
### oCIS settings ### | ||
# oCIS version. Defaults to "latest" | ||
OCIS_DOCKER_TAG= | ||
# Domain of oCIS, where you can find the frontend. Defaults to "ocis.owncloud.test" | ||
OCIS_DOMAIN= | ||
# owncloud Web openid connect client id. Defaults to "ocis-phoenix" | ||
OCIS_OIDC_CLIENT_ID= | ||
|
||
### Keycloak ### | ||
# Domain of Keycloak, where you can find the managment and authentication frontend. Defaults to "keycloak.owncloud.test" | ||
KEYCLOAK_DOMAIN= | ||
# Realm which to be used with oCIS. Defaults to "master" | ||
KEYCLOAK_REALM= | ||
# Admin user login name. Defaults to "admin" | ||
KEYCLOAK_ADMIN_USER= | ||
# Admin user login password. Defaults to "admin" | ||
KEYCLOAK_ADMIN_PASSWORD= |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
--- | ||
document this deployment example in docs/ocis/deployment/ocis_keycloak.md | ||
--- | ||
|
||
Please refer to [our documentation](https://owncloud.github.io/ocis/deployment/ocis_keycloak/) | ||
for instructions on how to deploy this scenario. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,136 @@ | ||
--- | ||
version: "3.7" | ||
|
||
services: | ||
traefik: | ||
image: "traefik:v2.3" | ||
networks: | ||
default: | ||
aliases: | ||
- ${OCIS_DOMAIN:-ocis.owncloud.test} | ||
- ${KEYCLOAK_DOMAIN:-keycloak.owncloud.test} | ||
command: | ||
#- "--log.level=DEBUG" | ||
- "--certificatesResolvers.http.acme.email=${TRAEFIK_ACME_MAIL:-'example@example.org'}" | ||
- "--certificatesResolvers.http.acme.storage=/certs/acme.json" | ||
- "--certificatesResolvers.http.acme.httpChallenge.entryPoint=http" | ||
- "--api.dashboard=true" | ||
- "--entryPoints.http.address=:80" | ||
- "--entryPoints.https.address=:443" | ||
- "--providers.docker.endpoint=unix:///var/run/docker.sock" | ||
- "--providers.docker.exposedByDefault=false" | ||
ports: | ||
- "80:80" | ||
- "443:443" | ||
volumes: | ||
- "/var/run/docker.sock:/var/run/docker.sock:ro" | ||
- "certs:/certs" | ||
labels: | ||
- "traefik.enable=true" | ||
- "traefik.http.routers.traefik.entrypoints=http" | ||
- "traefik.http.routers.traefik.rule=Host(`${TRAEFIK_DOMAIN:-traefik.owncloud.test}`)" | ||
- "traefik.http.middlewares.traefik-auth.basicauth.users=${TRAEFIK_BASIC_AUTH_USERS:-admin:$apr1$4vqie50r$YQAmQdtmz5n9rEALhxJ4l.}" # defaults to admin:admin | ||
- "traefik.http.middlewares.traefik-https-redirect.redirectscheme.scheme=https" | ||
- "traefik.http.routers.traefik.middlewares=traefik-https-redirect" | ||
- "traefik.http.routers.traefik-secure.entrypoints=https" | ||
- "traefik.http.routers.traefik-secure.rule=Host(`${TRAEFIK_DOMAIN:-traefik.owncloud.test}`)" | ||
- "traefik.http.routers.traefik-secure.middlewares=traefik-auth" | ||
- "traefik.http.routers.traefik-secure.tls=true" | ||
- "traefik.http.routers.traefik-secure.tls.certresolver=http" | ||
- "traefik.http.routers.traefik-secure.service=api@internal" | ||
restart: always | ||
|
||
ocis: | ||
image: owncloud/ocis:${OCIS_DOCKER_TAG:-latest} | ||
networks: | ||
default: | ||
environment: | ||
# general config | ||
OCIS_DOMAIN: ${OCIS_DOMAIN:-ocis.owncloud.test} | ||
OCIS_LOG_LEVEL: error | ||
# proxy config | ||
PROXY_AUTOPROVISION_ACCOUNTS: "true" | ||
PROXY_OIDC_INSECURE: "${INSECURE:-false}" | ||
PROXY_OIDC_ISSUER: https://${KEYCLOAK_DOMAIN:-keycloak.owncloud.test}/auth/realms/${KEYCLOAK_REALM:-master} | ||
PROXY_TLS: "false" | ||
# phoenix config | ||
PHOENIX_OIDC_AUTHORITY: https://${KEYCLOAK_DOMAIN:-keycloak.owncloud.test}/auth/realms/${KEYCLOAK_REALM:-master} | ||
PHOENIX_OIDC_CLIENT_ID: ${OCIS_OIDC_CLIENT_ID:-ocis-phoenix} | ||
PHOENIX_OIDC_METADATA_URL: https://${KEYCLOAK_DOMAIN:-keycloak.owncloud.test}/auth/realms/${KEYCLOAK_REALM:-master}/.well-known/openid-configuration | ||
PHOENIX_WEB_CONFIG_APPS: files,draw-io,markdown-editor,media-viewer | ||
PHOENIX_WEB_CONFIG_SERVER: https://${OCIS_DOMAIN:-ocis.owncloud.test} | ||
# storage config | ||
STORAGE_DATAGATEWAY_PUBLIC_URL: https://${OCIS_DOMAIN:-ocis.owncloud.test}/data | ||
STORAGE_FRONTEND_PUBLIC_URL: https://${OCIS_DOMAIN:-ocis.owncloud.test}/ | ||
STORAGE_OIDC_ISSUER: https://${KEYCLOAK_DOMAIN:-keycloak.owncloud.test} | ||
STORAGE_METADATA_ROOT: /opt/ocis-metadata | ||
STORAGE_DRIVER_OCIS_ROOT: /opt/ocis-storage | ||
# store config | ||
STORE_DATA_PATH: /opt/ocis-store | ||
# settings config | ||
SETTINGS_DATA_PATH: /opt/ocis-settings | ||
volumes: | ||
- ocis-storage:/opt/ocis-storage | ||
- ocis-metadata:/opt/ocis-metadata | ||
- ocis-store:/opt/ocis-store | ||
- ocis-settings:/opt/ocis-settings | ||
labels: | ||
- "traefik.enable=true" | ||
- "traefik.http.routers.ocis.entrypoints=http" | ||
- "traefik.http.routers.ocis.rule=Host(`${OCIS_DOMAIN:-ocis.owncloud.test}`)" | ||
- "traefik.http.middlewares.ocis-https-redirect.redirectscheme.scheme=https" | ||
- "traefik.http.routers.ocis.middlewares=ocis-https-redirect" | ||
- "traefik.http.routers.ocis-secure.entrypoints=https" | ||
- "traefik.http.routers.ocis-secure.rule=Host(`${OCIS_DOMAIN:-ocis.owncloud.test}`)" | ||
- "traefik.http.routers.ocis-secure.tls=true" | ||
- "traefik.http.routers.ocis-secure.tls.certresolver=http" | ||
- "traefik.http.routers.ocis-secure.service=ocis" | ||
- "traefik.http.services.ocis.loadbalancer.server.port=9200" | ||
restart: always | ||
|
||
postgres: | ||
image: postgres:alpine | ||
volumes: | ||
- keycloak_postgres_data:/var/lib/postgresql/data | ||
environment: | ||
POSTGRES_DB: keycloak | ||
POSTGRES_USER: keycloak | ||
POSTGRES_PASSWORD: keycloak | ||
restart: always | ||
|
||
keycloak: | ||
image: quay.io/keycloak/keycloak:latest | ||
environment: | ||
DB_VENDOR: POSTGRES | ||
DB_ADDR: postgres | ||
DB_DATABASE: keycloak | ||
DB_USER: keycloak | ||
DB_SCHEMA: public | ||
DB_PASSWORD: keycloak | ||
KEYCLOAK_USER: ${KEYCLOAK_ADMIN_USER:-admin} | ||
KEYCLOAK_PASSWORD: ${KEYCLOAK_ADMIN_PASSWORD:-admin} | ||
PROXY_ADDRESS_FORWARDING: "true" | ||
labels: | ||
- "traefik.enable=true" | ||
- "traefik.http.routers.keycloak.entrypoints=http" | ||
- "traefik.http.routers.keycloak.rule=Host(`${KEYCLOAK_DOMAIN:-keycloak.owncloud.test}`)" | ||
- "traefik.http.middlewares.keycloak-https-redirect.redirectscheme.scheme=https" | ||
- "traefik.http.routers.keycloak.middlewares=keycloak-https-redirect" | ||
- "traefik.http.routers.keycloak-secure.entrypoints=https" | ||
- "traefik.http.routers.keycloak-secure.rule=Host(`${KEYCLOAK_DOMAIN:-keycloak.owncloud.test}`)" | ||
- "traefik.http.routers.keycloak-secure.tls=true" | ||
- "traefik.http.routers.keycloak-secure.tls.certresolver=http" | ||
- "traefik.http.routers.keycloak-secure.service=keycloak" | ||
- "traefik.http.services.keycloak.loadbalancer.server.port=8080" | ||
- "traefik.http.services.keycloak.loadbalancer.server.scheme=http" | ||
depends_on: | ||
- postgres | ||
restart: always | ||
|
||
volumes: | ||
certs: | ||
ocis-storage: | ||
ocis-metadata: | ||
ocis-store: | ||
ocis-settings: | ||
keycloak_postgres_data: |
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
Oops, something went wrong.