diff --git a/deployments/examples/README.md b/deployments/examples/README.md index ed4aca441c..57c1beb4e8 100644 --- a/deployments/examples/README.md +++ b/deployments/examples/README.md @@ -1,3 +1,3 @@ # Deployment Examples -These docker-compose deployment examples are referenced in the documentation on [doc.owncloud.com](https://doc.owncloud.com/ocis/next/). Therefore please create a issue on the documentation [issue tracker](https://github.com/owncloud/docs-ocis/issues) prior to major changes like moving, renaming or massively changing deployment examples. +These docker-compose deployment examples are referenced in the documentation on [doc.owncloud.com](https://doc.owncloud.com/ocis/next/). Therefore, please create an issue on the documentation [issue tracker](https://github.com/owncloud/docs-ocis/issues) prior to major changes like moving, renaming or massively changing deployment examples. diff --git a/deployments/examples/oc10_ocis_parallel/docker-compose.yml b/deployments/examples/oc10_ocis_parallel/docker-compose.yml index eb48b0e9ae..9e9339c428 100644 --- a/deployments/examples/oc10_ocis_parallel/docker-compose.yml +++ b/deployments/examples/oc10_ocis_parallel/docker-compose.yml @@ -15,7 +15,7 @@ services: - "--certificatesResolvers.http.acme.email=${TRAEFIK_ACME_MAIL:-example@example.org}" - "--certificatesResolvers.http.acme.storage=/certs/acme.json" - "--certificatesResolvers.http.acme.httpChallenge.entryPoint=http" - # enable dasbhoard + # enable dashboard - "--api.dashboard=true" # define entrypoints - "--entryPoints.http.address=:80" @@ -77,7 +77,7 @@ services: PROXY_OIDC_REWRITE_WELLKNOWN: "true" WEB_OIDC_CLIENT_ID: ocis-web WEB_OIDC_SCOPE: openid profile email owncloud - # external ldap is supposed to be read only + # external ldap is supposed to be read-only GRAPH_IDENTITY_BACKEND: ldap GRAPH_LDAP_SERVER_WRITE_ENABLED: "false" # LDAP bind @@ -122,7 +122,7 @@ services: PROXY_TLS: "false" # do not use SSL between Traefik and oCIS # INSECURE: needed if oCIS / Traefik is using self generated certificates OCIS_INSECURE: "${INSECURE:-false}" - # basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect) + # basic auth (not recommended, but needed for e.g., WebDav clients that do not support OpenID Connect) PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}" # password policies OCIS_PASSWORD_POLICY_BANNED_PASSWORDS_LIST: "banned-password-list.txt" diff --git a/deployments/examples/ocis_hello/docker-compose.yml b/deployments/examples/ocis_hello/docker-compose.yml index 587b48fed5..5cde3042c7 100644 --- a/deployments/examples/ocis_hello/docker-compose.yml +++ b/deployments/examples/ocis_hello/docker-compose.yml @@ -65,7 +65,7 @@ services: SETTINGS_GRPC_ADDR: 0.0.0.0:9191 # INSECURE: needed if oCIS / Traefik is using self generated certificates OCIS_INSECURE: "${INSECURE:-false}" - # basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect) + # basic auth (not recommended, but needed for e.g., WebDav clients that do not support OpenID Connect) PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}" # admin user password IDM_ADMIN_PASSWORD: "${ADMIN_PASSWORD:-admin}" # this overrides the admin password from the configuration file diff --git a/deployments/examples/ocis_ldap/docker-compose.yml b/deployments/examples/ocis_ldap/docker-compose.yml index a67299bb4b..bfc794062b 100644 --- a/deployments/examples/ocis_ldap/docker-compose.yml +++ b/deployments/examples/ocis_ldap/docker-compose.yml @@ -59,7 +59,7 @@ services: # therefore we ignore the error and then start the ocis server command: [ "-c", "ocis init || true; ocis server" ] environment: - # users/gropups from ldap + # users/groups from ldap OCIS_LDAP_URI: ldaps://ldap-server:1636 OCIS_LDAP_INSECURE: "true" OCIS_LDAP_BIND_DN: "cn=admin,dc=owncloud,dc=com" @@ -86,7 +86,7 @@ services: PROXY_TLS: "false" # do not use SSL between Traefik and oCIS # INSECURE: needed if oCIS / Traefik is using self generated certificates OCIS_INSECURE: "${INSECURE:-false}" - # basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect) + # basic auth (not recommended, but needed for e.g., WebDav clients that do not support OpenID Connect) PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}" # password policies OCIS_PASSWORD_POLICY_BANNED_PASSWORDS_LIST: "banned-password-list.txt" diff --git a/deployments/examples/ocis_s3/docker-compose.yml b/deployments/examples/ocis_s3/docker-compose.yml index a8d187b5ba..4bc9ec126b 100644 --- a/deployments/examples/ocis_s3/docker-compose.yml +++ b/deployments/examples/ocis_s3/docker-compose.yml @@ -72,7 +72,7 @@ services: STORAGE_USERS_S3NG_BUCKET: ${MINIO_BUCKET:-ocis-bucket} # INSECURE: needed if oCIS / Traefik is using self generated certificates OCIS_INSECURE: "${INSECURE:-false}" - # basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect) + # basic auth (not recommended, but needed for e.g., WebDav clients that do not support OpenID Connect) PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}" # admin user password IDM_ADMIN_PASSWORD: "${ADMIN_PASSWORD:-admin}" # this overrides the admin password from the configuration file diff --git a/deployments/examples/ocis_traefik/docker-compose.yml b/deployments/examples/ocis_traefik/docker-compose.yml index 10ef857021..31c0d38196 100644 --- a/deployments/examples/ocis_traefik/docker-compose.yml +++ b/deployments/examples/ocis_traefik/docker-compose.yml @@ -62,7 +62,7 @@ services: PROXY_TLS: "false" # do not use SSL between Traefik and oCIS # INSECURE: needed if oCIS / Traefik is using self generated certificates OCIS_INSECURE: "${INSECURE:-false}" - # basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect) + # basic auth (not recommended, but needed for e.g., WebDav clients that do not support OpenID Connect) PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}" # admin user password IDM_ADMIN_PASSWORD: "${ADMIN_PASSWORD:-admin}" # this overrides the admin password from the configuration file @@ -73,7 +73,7 @@ services: NOTIFICATIONS_SMTP_PORT: 2500 NOTIFICATIONS_SMTP_SENDER: oCIS notifications NOTIFICATIONS_SMTP_USERNAME: notifications@${OCIS_DOMAIN:-ocis.owncloud.test} - NOTIFICATIONS_SMTP_INSECURE: "true" # the mail catcher uses self signed certificates + NOTIFICATIONS_SMTP_INSECURE: "true" # the mail catcher uses self-signed certificates # password policies OCIS_PASSWORD_POLICY_BANNED_PASSWORDS_LIST: "banned-password-list.txt" volumes: