enclose boolean with string in docker-compose env

This commit is contained in:
Saw-jan
2022-05-19 16:42:53 +05:45
parent 8afbb703e2
commit ed79a20905
6 changed files with 11 additions and 9 deletions

View File

@@ -126,7 +126,7 @@ services:
PROXY_TLS: "false" # do not use SSL between Traefik and oCIS
# INSECURE: needed if oCIS / Traefik is using self generated certificates
OCIS_INSECURE: "${INSECURE:-false}"
GRAPH_LDAP_INSECURE: true # https://github.com/owncloud/ocis/issues/3812
GRAPH_LDAP_INSECURE: "true" # https://github.com/owncloud/ocis/issues/3812
# basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect)
PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}"
volumes:

View File

@@ -60,7 +60,7 @@ services:
SETTINGS_GRPC_ADDR: 0.0.0.0:9191
# INSECURE: needed if oCIS / Traefik is using self generated certificates
OCIS_INSECURE: "${INSECURE:-false}"
GRAPH_LDAP_INSECURE: true # https://github.com/owncloud/ocis/issues/3812
GRAPH_LDAP_INSECURE: "true" # https://github.com/owncloud/ocis/issues/3812
# basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect)
PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}"
# admin user password

View File

@@ -55,7 +55,6 @@ services:
# therefore we ignore the error and then start the ocis server
command: ["-c", "ocis init || true; ocis server"]
environment:
# users/gropups from ldap
LDAP_URI: ldaps://ldap-server
LDAP_INSECURE: "true"
@@ -81,7 +80,7 @@ services:
PROXY_TLS: "false" # do not use SSL between Traefik and oCIS
# INSECURE: needed if oCIS / Traefik is using self generated certificates
OCIS_INSECURE: "${INSECURE:-false}"
GRAPH_LDAP_INSECURE: true # https://github.com/owncloud/ocis/issues/3812
GRAPH_LDAP_INSECURE: "true" # https://github.com/owncloud/ocis/issues/3812
# basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect)
PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}"
# admin user password

View File

@@ -67,7 +67,7 @@ services:
STORAGE_USERS_S3NG_BUCKET: ${MINIO_BUCKET:-ocis-bucket}
# INSECURE: needed if oCIS / Traefik is using self generated certificates
OCIS_INSECURE: "${INSECURE:-false}"
GRAPH_LDAP_INSECURE: true # https://github.com/owncloud/ocis/issues/3812
GRAPH_LDAP_INSECURE: "true" # https://github.com/owncloud/ocis/issues/3812
# basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect)
PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}"
# admin user password
@@ -94,7 +94,11 @@ services:
ocis-net:
entrypoint:
- /bin/sh
command: ["-c", "mkdir -p /data/${MINIO_BUCKET:-ocis-bucket} && minio server --console-address ':9001' /data"]
command:
[
"-c",
"mkdir -p /data/${MINIO_BUCKET:-ocis-bucket} && minio server --console-address ':9001' /data",
]
volumes:
- minio-data:/data
environment:

View File

@@ -58,7 +58,7 @@ services:
PROXY_TLS: "false" # do not use SSL between Traefik and oCIS
# INSECURE: needed if oCIS / Traefik is using self generated certificates
OCIS_INSECURE: "${INSECURE:-false}"
GRAPH_LDAP_INSECURE: true # https://github.com/owncloud/ocis/issues/3812
GRAPH_LDAP_INSECURE: "true" # https://github.com/owncloud/ocis/issues/3812
# basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect)
PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}"
# admin user password
@@ -84,6 +84,5 @@ volumes:
ocis-config:
ocis-data:
networks:
ocis-net:

View File

@@ -62,7 +62,7 @@ services:
GATEWAY_GRPC_ADDR: 0.0.0.0:9142 # make the REVA gateway accessible to the app drivers
# INSECURE: needed if oCIS / Traefik is using self generated certificates
OCIS_INSECURE: "${INSECURE:-false}"
GRAPH_LDAP_INSECURE: true # https://github.com/owncloud/ocis/issues/3812
GRAPH_LDAP_INSECURE: "true" # https://github.com/owncloud/ocis/issues/3812
# basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect)
PROXY_ENABLE_BASIC_AUTH: "${PROXY_ENABLE_BASIC_AUTH:-false}"
# admin user password