-
Notifications
You must be signed in to change notification settings - Fork 189
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
28 changed files
with
3,734 additions
and
0 deletions.
There are no files selected for viewing
52 changes: 52 additions & 0 deletions
52
deployments/continuous-deployment-config/oc10_ocis_parallel/latest.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,52 @@ | ||
--- | ||
- name: continuous-deployment-oc10-ocis-parallel | ||
server: | ||
server_type: cx21 | ||
image: ubuntu-20.04 | ||
location: nbg1 | ||
initial_ssh_key_names: | ||
- owncloud-ocis@drone.owncloud.com | ||
labels: | ||
owner: wkloucek | ||
for: oCIS-continuous-deployment-examples | ||
rebuild: $REBUILD | ||
rebuild_carry_paths: | ||
- /var/lib/docker/volumes/ocis_certs | ||
|
||
domains: | ||
- "*.oc10-ocis-parallel.latest.owncloud.works" | ||
|
||
vars: | ||
ssh_authorized_keys: | ||
- https://github.com/butonic.keys | ||
- https://github.com/C0rby.keys | ||
- https://github.com/fschade.keys | ||
- https://github.com/kulmann.keys | ||
- https://github.com/micbar.keys | ||
- https://github.com/pascalwengerter.keys | ||
- https://github.com/paulcod3.keys | ||
- https://github.com/refs.keys | ||
- https://github.com/wkloucek.keys | ||
docker_compose_projects: | ||
- name: ocis | ||
git_url: https://github.com/owncloud/ocis.git | ||
ref: master | ||
docker_compose_path: deployments/examples/oc10_ocis_parallel | ||
env: | ||
INSECURE: "false" | ||
TRAEFIK_ACME_MAIL: wkloucek@owncloud.com | ||
OCIS_DOCKER_TAG: latest | ||
CLOUD_DOMAIN: cloud.oc10-ocis-parallel.latest.owncloud.works | ||
KEYCLOAK_DOMAIN: keycloak.oc10-ocis-parallel.latest.owncloud.works | ||
LDAP_MANAGER_DOMAIN: ldap.oc10-ocis-parallel.latest.owncloud.works | ||
COMPOSE_FILE: docker-compose.yml:monitoring_tracing/docker-compose-additions.yml | ||
- name: monitoring | ||
git_url: https://github.com/owncloud-devops/monitoring-tracing-client.git | ||
ref: master | ||
env: | ||
NETWORK_NAME: ocis-net | ||
TELEMETRY_SERVE_DOMAIN: telemetry.oc10-ocis-parallel.latest.owncloud.works | ||
JAEGER_COLLECTOR: jaeger-collector.infra.owncloud.works:443 | ||
TELEGRAF_SPECIFIC_CONFIG: ocis_single_container | ||
OCIS_URL: cloud.oc10-ocis-parallel.latest.owncloud.works | ||
OCIS_DEPLOYMENT_ID: continuous-deployment-oc10-ocis-parallel-latest |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,58 @@ | ||
# If you're on a internet facing server please comment out following line. | ||
# It skips certificate validation for various parts of oCIS and is needed if you use self signed certificates. | ||
INSECURE=true | ||
|
||
### Traefik settings ### | ||
TRAEFIK_LOG_LEVEL= | ||
# Serve Treafik dashboard. Defaults to "false". | ||
TRAEFIK_DASHBOARD= | ||
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test" | ||
TRAEFIK_DOMAIN= | ||
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin" | ||
TRAEFIK_BASIC_AUTH_USERS= | ||
# Email address for obtaining LetsEncrypt certificates, needs only be changed if this is a public facing server | ||
TRAEFIK_ACME_MAIL= | ||
|
||
### shared oCIS / oC10 settings ### | ||
# Domain of oCIS / oC10, where you can find the frontend. Defaults to "cloud.owncloud.test" | ||
CLOUD_DOMAIN= | ||
|
||
### oCIS settings ### | ||
# oCIS version. Defaults to "latest" | ||
OCIS_DOCKER_TAG= | ||
# JWT secret which is used for the storage provider. Must be changed in order to have a secure oCIS. Defaults to "Pive-Fumkiu4" | ||
OCIS_JWT_SECRET= | ||
# JWT secret which is used for uploads to create transfer tokens. Must be changed in order to have a secure oCIS. Defaults to "replace-me-with-a-transfer-secret" | ||
STORAGE_TRANSFER_SECRET= | ||
|
||
### oCIS settings ### | ||
# oC10 version. Defaults to "latest" | ||
OC10_DOCKER_TAG= | ||
# client secret which the openidconnect app uses to authenticate to Keycloak. Defaults to "oc10-oidc-secret" | ||
OC10_OIDC_CLIENT_SECRET= | ||
# app which will be shown when opening the ownCloud 10 UI. Defaults to "files" but also could be set to "web" | ||
OWNCLOUD_DEFAULT_APP= | ||
# if set to "false" (default) links will be opened in the classic UI, if set to "true" ownCloud Web is used | ||
OWNCLOUD_WEB_REWRITE_LINKS= | ||
|
||
### LDAP settings ### | ||
# password for the LDAP admin user "cn=admin,dc=owncloud,dc=com", defaults to "admin" | ||
LDAP_ADMIN_PASSWORD= | ||
# Domain of the LDAP management frontend. Defaults to "ldap.owncloud.test" | ||
LDAP_MANAGER_DOMAIN= | ||
|
||
### Keycloak ### | ||
# Domain of Keycloak, where you can find the managment and authentication frontend. Defaults to "keycloak.owncloud.test" | ||
KEYCLOAK_DOMAIN= | ||
# Realm which to be used with oCIS. Defaults to "oCIS" | ||
KEYCLOAK_REALM= | ||
# Admin user login name. Defaults to "admin" | ||
KEYCLOAK_ADMIN_USER= | ||
# Admin user login password. Defaults to "admin" | ||
KEYCLOAK_ADMIN_PASSWORD= | ||
|
||
|
||
# If you want to use debugging and tracing with this stack, | ||
# you need uncomment following line. Please see documentation at | ||
# https://owncloud.dev/ocis/deployment/monitoring-tracing/ | ||
#COMPOSE_FILE=docker-compose.yml:monitoring_tracing/docker-compose-additions.yml |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
--- | ||
document this deployment example in docs/ocis/deployment/oc10_ocis_parallel.md | ||
--- | ||
|
||
Please refer to [our documentation](https://owncloud.dev/ocis/deployment/oc10_ocis_parallel/) | ||
for instructions on how to deploy this scenario. |
63 changes: 63 additions & 0 deletions
63
deployments/examples/oc10_ocis_parallel/config/keycloak/clients/android_app.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,63 @@ | ||
{ | ||
"clientId": "e4rAsNUSIUs0lF4nbv9FmCeUkTlV9GdgTLDH1b5uie7syb90SzEVrbN7HIpmWJeD", | ||
"name": "ownCloud Android app", | ||
"surrogateAuthRequired": false, | ||
"enabled": true, | ||
"alwaysDisplayInConsole": false, | ||
"clientAuthenticatorType": "client-secret", | ||
"secret" : "dInFYGV33xKzhbRmpqQltYNdfLdJIfJ9L5ISoKhNoT9qZftpdWSP71VrpGR9pmoD", | ||
"redirectUris": [ | ||
"oc://android.owncloud.com" | ||
], | ||
"webOrigins": [], | ||
"notBefore": 0, | ||
"bearerOnly": false, | ||
"consentRequired": false, | ||
"standardFlowEnabled": true, | ||
"implicitFlowEnabled": false, | ||
"directAccessGrantsEnabled": true, | ||
"serviceAccountsEnabled": false, | ||
"publicClient": false, | ||
"frontchannelLogout": false, | ||
"protocol": "openid-connect", | ||
"attributes": { | ||
"saml.assertion.signature": "false", | ||
"saml.force.post.binding": "false", | ||
"saml.multivalued.roles": "false", | ||
"saml.encrypt": "false", | ||
"backchannel.logout.revoke.offline.tokens": "false", | ||
"saml.server.signature": "false", | ||
"saml.server.signature.keyinfo.ext": "false", | ||
"exclude.session.state.from.auth.response": "false", | ||
"backchannel.logout.session.required": "true", | ||
"client_credentials.use_refresh_token": "false", | ||
"saml_force_name_id_format": "false", | ||
"saml.client.signature": "false", | ||
"tls.client.certificate.bound.access.tokens": "false", | ||
"saml.authnstatement": "false", | ||
"display.on.consent.screen": "false", | ||
"saml.onetimeuse.condition": "false" | ||
}, | ||
"authenticationFlowBindingOverrides": {}, | ||
"fullScopeAllowed": true, | ||
"nodeReRegistrationTimeout": -1, | ||
"defaultClientScopes": [ | ||
"web-origins", | ||
"role_list", | ||
"profile", | ||
"roles", | ||
"owncloud", | ||
"email" | ||
], | ||
"optionalClientScopes": [ | ||
"address", | ||
"phone", | ||
"offline_access", | ||
"microprofile-jwt" | ||
], | ||
"access": { | ||
"view": true, | ||
"configure": true, | ||
"manage": true | ||
} | ||
} |
64 changes: 64 additions & 0 deletions
64
deployments/examples/oc10_ocis_parallel/config/keycloak/clients/desktop_client.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,64 @@ | ||
{ | ||
"clientId": "xdXOt13JKxym1B1QcEncf2XDkLAexMBFwiT9j6EfhhHFJhs2KM9jbjTmf8JBXE69", | ||
"name": "ownCloud desktop client", | ||
"surrogateAuthRequired": false, | ||
"enabled": true, | ||
"alwaysDisplayInConsole": false, | ||
"clientAuthenticatorType": "client-secret", | ||
"secret" : "UBntmLjC2yYCeHwsyj73Uwo9TAaecAetRwMw0xYcvNL9yRdLSUi0hUAHfvCHFeFh", | ||
"redirectUris": [ | ||
"http://127.0.0.1:*", | ||
"http://localhost:*" | ||
], | ||
"webOrigins": [], | ||
"notBefore": 0, | ||
"bearerOnly": false, | ||
"consentRequired": false, | ||
"standardFlowEnabled": true, | ||
"implicitFlowEnabled": false, | ||
"directAccessGrantsEnabled": true, | ||
"serviceAccountsEnabled": false, | ||
"publicClient": false, | ||
"frontchannelLogout": false, | ||
"protocol": "openid-connect", | ||
"attributes": { | ||
"saml.assertion.signature": "false", | ||
"saml.force.post.binding": "false", | ||
"saml.multivalued.roles": "false", | ||
"saml.encrypt": "false", | ||
"backchannel.logout.revoke.offline.tokens": "false", | ||
"saml.server.signature": "false", | ||
"saml.server.signature.keyinfo.ext": "false", | ||
"exclude.session.state.from.auth.response": "false", | ||
"backchannel.logout.session.required": "true", | ||
"client_credentials.use_refresh_token": "false", | ||
"saml_force_name_id_format": "false", | ||
"saml.client.signature": "false", | ||
"tls.client.certificate.bound.access.tokens": "false", | ||
"saml.authnstatement": "false", | ||
"display.on.consent.screen": "false", | ||
"saml.onetimeuse.condition": "false" | ||
}, | ||
"authenticationFlowBindingOverrides": {}, | ||
"fullScopeAllowed": true, | ||
"nodeReRegistrationTimeout": -1, | ||
"defaultClientScopes": [ | ||
"web-origins", | ||
"role_list", | ||
"profile", | ||
"roles", | ||
"owncloud", | ||
"email" | ||
], | ||
"optionalClientScopes": [ | ||
"address", | ||
"phone", | ||
"offline_access", | ||
"microprofile-jwt" | ||
], | ||
"access": { | ||
"view": true, | ||
"configure": true, | ||
"manage": true | ||
} | ||
} |
64 changes: 64 additions & 0 deletions
64
deployments/examples/oc10_ocis_parallel/config/keycloak/clients/ios_app.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,64 @@ | ||
{ | ||
"clientId": "mxd5OQDk6es5LzOzRvidJNfXLUZS2oN3oUFeXPP8LpPrhx3UroJFduGEYIBOxkY1", | ||
"name": "ownCloud iOS app", | ||
"surrogateAuthRequired": false, | ||
"enabled": true, | ||
"alwaysDisplayInConsole": false, | ||
"clientAuthenticatorType": "client-secret", | ||
"secret" : "KFeFWWEZO9TkisIQzR3fo7hfiMXlOpaqP8CFuTbSHzV1TUuGECglPxpiVKJfOXIx", | ||
"redirectUris": [ | ||
"oc://ios.owncloud.com", | ||
"oc.ios://ios.owncloud.com" | ||
], | ||
"webOrigins": [], | ||
"notBefore": 0, | ||
"bearerOnly": false, | ||
"consentRequired": false, | ||
"standardFlowEnabled": true, | ||
"implicitFlowEnabled": false, | ||
"directAccessGrantsEnabled": true, | ||
"serviceAccountsEnabled": false, | ||
"publicClient": false, | ||
"frontchannelLogout": false, | ||
"protocol": "openid-connect", | ||
"attributes": { | ||
"saml.assertion.signature": "false", | ||
"saml.force.post.binding": "false", | ||
"saml.multivalued.roles": "false", | ||
"saml.encrypt": "false", | ||
"backchannel.logout.revoke.offline.tokens": "false", | ||
"saml.server.signature": "false", | ||
"saml.server.signature.keyinfo.ext": "false", | ||
"exclude.session.state.from.auth.response": "false", | ||
"backchannel.logout.session.required": "true", | ||
"client_credentials.use_refresh_token": "false", | ||
"saml_force_name_id_format": "false", | ||
"saml.client.signature": "false", | ||
"tls.client.certificate.bound.access.tokens": "false", | ||
"saml.authnstatement": "false", | ||
"display.on.consent.screen": "false", | ||
"saml.onetimeuse.condition": "false" | ||
}, | ||
"authenticationFlowBindingOverrides": {}, | ||
"fullScopeAllowed": true, | ||
"nodeReRegistrationTimeout": -1, | ||
"defaultClientScopes": [ | ||
"web-origins", | ||
"role_list", | ||
"profile", | ||
"roles", | ||
"owncloud", | ||
"email" | ||
], | ||
"optionalClientScopes": [ | ||
"address", | ||
"phone", | ||
"offline_access", | ||
"microprofile-jwt" | ||
], | ||
"access": { | ||
"view": true, | ||
"configure": true, | ||
"manage": true | ||
} | ||
} |
69 changes: 69 additions & 0 deletions
69
deployments/examples/oc10_ocis_parallel/config/keycloak/clients/oc10-web.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,69 @@ | ||
{ | ||
"clientId": "oc10-web", | ||
"rootUrl": "https://cloud.owncloud.test", | ||
"adminUrl": "https://cloud.owncloud.test", | ||
"surrogateAuthRequired": false, | ||
"enabled": true, | ||
"alwaysDisplayInConsole": false, | ||
"clientAuthenticatorType": "client-secret", | ||
"redirectUris": [ | ||
"https://cloud.owncloud.test/*" | ||
], | ||
"webOrigins": [ | ||
"https://cloud.owncloud.test" | ||
], | ||
"notBefore": 0, | ||
"bearerOnly": false, | ||
"consentRequired": false, | ||
"standardFlowEnabled": true, | ||
"implicitFlowEnabled": false, | ||
"directAccessGrantsEnabled": true, | ||
"serviceAccountsEnabled": false, | ||
"publicClient": true, | ||
"frontchannelLogout": false, | ||
"protocol": "openid-connect", | ||
"attributes": { | ||
"saml.assertion.signature": "false", | ||
"id.token.as.detached.signature": "false", | ||
"saml.force.post.binding": "false", | ||
"saml.multivalued.roles": "false", | ||
"saml.encrypt": "false", | ||
"oauth2.device.authorization.grant.enabled": "false", | ||
"backchannel.logout.revoke.offline.tokens": "false", | ||
"saml.server.signature": "false", | ||
"saml.server.signature.keyinfo.ext": "false", | ||
"use.refresh.tokens": "true", | ||
"exclude.session.state.from.auth.response": "false", | ||
"oidc.ciba.grant.enabled": "false", | ||
"saml.artifact.binding": "false", | ||
"backchannel.logout.session.required": "true", | ||
"client_credentials.use_refresh_token": "false", | ||
"saml_force_name_id_format": "false", | ||
"saml.client.signature": "false", | ||
"tls.client.certificate.bound.access.tokens": "false", | ||
"saml.authnstatement": "false", | ||
"display.on.consent.screen": "false", | ||
"saml.onetimeuse.condition": "false" | ||
}, | ||
"authenticationFlowBindingOverrides": {}, | ||
"fullScopeAllowed": true, | ||
"nodeReRegistrationTimeout": -1, | ||
"defaultClientScopes": [ | ||
"web-origins", | ||
"profile", | ||
"roles", | ||
"owncloud", | ||
"email" | ||
], | ||
"optionalClientScopes": [ | ||
"address", | ||
"phone", | ||
"offline_access", | ||
"microprofile-jwt" | ||
], | ||
"access": { | ||
"view": true, | ||
"configure": true, | ||
"manage": true | ||
} | ||
} |
Oops, something went wrong.