ci/woodpecker/push/woodpecker Pipeline failed
Details
|
5 months ago | |
---|---|---|
rootfs | 11 months ago | |
.gitignore | 4 years ago | |
.woodpecker.yml | 5 months ago | |
Dockerfile | 6 months ago | |
README.md | 5 months ago |
README.md
NO LONGER MAINTAINED
This behemoth is a pita to maintain, do not go there.
Gitlab CE server with postgres backend.
Prerequisites
The pg_trgm
must be enabled on the database (something like this:
CREATE EXTENSION pg_trgm;
).
Volumes
/home/git/gitlab/shared
/home/git/.ssh/
/home/git/repositories/
/home/git/gitlab/shared/pages
/home/git/gitlab/public/uploads/
/var/lib/redis/
Ports
- 8181 (webserver)
- 2222 (ssh)
Environment Variables
FQDN
Fully qualified name of the gitlab server.
SSH_PORT
- default: 22
The ssh port to use when generating links.
SMTP_DISPLAY_NAME
- default: Gitlab
Display name for email sending.
SMTP_REPLY_TO
Reply to addrss for email sending.
SMTP_FROM
Mail from address.
SMTP_HOST
Smtp host used to send emails.
SMTP_PORT
- default: 587
Smtp port used on the smtp server.
SMTP_USER
User for smtp authentication.
SMTP_PASSWORD
Password for the smtp user.
SMTP_AUTH
- default: plain
One of:
- plain
- login
- cram_md5
BLOCK_AUTO_CREATED_USERS
- default: false
WHether to keep new users blocked until they have been cleared by the admin.
DATABASE_HOST
Database hostname. Only relevant if not using sqlite.
DATABASE_NAME
Database name.
DATABASE_USER
Database username.
DATABASE_PASSWORD
Password for the database user.
DATABASE_KEY
Used to encrypt variables in the database.
Must be random and at least 30 characters.
SECRET_KEY
Secret key for sessions and such.
OTP_KEY
Private key for OTP.
OPENID_KEY
OpenID signing key. Can be created like this: openssl genrsa 2048 | awk '{print " " $0}'
.
PAGES_DOMAIN
Domain for gitlab pages.
OMNIAUTH_ENABLED
- default: false
Whether to allow login with omniauth.
SYNC_PROFILE_PROVIDERS
Sync user's profile from the specified Omniauth providers every time the user logs in.
For example:
SYNC_PROFILE_PROVIDERS='"Nextcloud"'
ALLOW_SSO_PROVIDERS
Allowed omniauth providers. Right now it is limited to one because you can configure only one ;)
OMNIAUTH_PROVIDER
Configuration for the omniauth provider.
Example for Nextcloud:
{
name: "oauth2_generic",
app_id: "mylongappid",
app_secret: "mylongappsecret",
args:
{
name: "Nextcloud",
strategy_class: "OmniAuth::Strategies::OAuth2Generic",
access_type: "offline",
approval_prompt: "",
client_options:
{
site: "https://cloud.host.example",
authorize_url: "/apps/oauth2/authorize",
token_url: "/apps/oauth2/api/v1/token",
user_info_url: "/ocs/v2.php/cloud/user?format=json"
},
user_response_structure:
{
root_path: ["ocs", "data"],
attributes:
{
nickname: "id",
name: "display-name",
email: "email"
}
}
}
}
The name defines what your callback URI looks like.
With the above configuration it would look like this: https://cloud.host.example/users/auth/Nextcloud/callback