Solved None key bugs and implemented tests to prevent it in the future

This commit is contained in:
2025-07-08 02:13:47 +02:00
parent 9159a0c7d3
commit e729706ec6
16 changed files with 68 additions and 19 deletions

View File

@@ -8,7 +8,6 @@ features:
css: true
portfolio_iframe: true
central_database: true
credentials:
domains:
canonical:
- "accounting.{{ primary_domain }}"

View File

@@ -1,7 +1,6 @@
image:
web: "attendize_web:latest"
worker: "attendize_worker:latest"
credentials:
features:
matomo: true
css: true

View File

@@ -1,6 +1,5 @@
enable_greenlight: "true"
setup: false
credentials:
database:
name: "multiple_databases"
username: "postgres2"

View File

@@ -2,7 +2,6 @@ images:
pds: "ghcr.io/bluesky-social/pds:latest"
pds:
version: "latest"
credentials:
features:
matomo: true
css: true

View File

@@ -1,7 +1,6 @@
network: "discourse_default" # Name of the docker network
container: "discourse_application" # Name of the container application
repository: "discourse_repository" # Name of the repository folder
credentials:
repository: "discourse_repository" # Name of the repository folder
features:
matomo: true
css: true

View File

@@ -24,8 +24,8 @@ oauth2_proxy:
application: "application"
port: "80"
addons:
keycloakpassword:
ldapauth:
keycloakpassword: {}
ldapauth: {}
docker:
services:
database:

View File

@@ -19,7 +19,6 @@ features:
ldap: true
central_database: true
oauth2: false # Doesn't make sense to activate it atm, because login is possible on homepage
credentials:
domains:
canonical:
- "audio.{{ primary_domain }}"

View File

@@ -1,7 +1,6 @@
images:
keycloak: "quay.io/keycloak/keycloak:latest"
import_realm: True # If True realm will be imported. If false skip.
credentials:
features:
matomo: true
css: false

View File

@@ -3,7 +3,6 @@ images:
oauth2_proxy:
application: application
port: 80
credentials:
features:
matomo: true
css: true

View File

@@ -6,6 +6,5 @@ network:
public: False # Set to true in inventory file if you want to expose the LDAP port to the internet
hostname: "ldap" # Hostname of the LDAP Server in the central_ldap network
webinterface: "lam" # The webinterface which should be used. Possible: lam and phpldapadmin
credentials:
features:
ldap: true

View File

@@ -2,8 +2,7 @@ version: "2024.06" # Docker Image Versi
oidc:
email_by_username: true # If true, then the mail is set by the username. If wrong then the OIDC user email is used
enable_user_creation: true # Users will be created if not existing
domain: "{{primary_domain}}" # The main domain from which mails will be send \ email suffix behind @
credentials:
domain: "{{primary_domain}}" # The main domain from which mails will be send \ email suffix behind @
features:
matomo: true
css: false

View File

@@ -2,8 +2,7 @@ images:
mastodon: "ghcr.io/mastodon/mastodon:latest"
streaming: "ghcr.io/mastodon/mastodon-streaming:latest"
single_user_mode: false # Set true for initial setup
setup: false # Set true in inventory file to execute the setup and initializing procedures
credentials:
setup: false # Set true in inventory file to execute the setup and initializing procedures
features:
matomo: true
css: true

View File

@@ -24,7 +24,6 @@ oidc:
# @see https://apps.nextcloud.com/apps/oidc_login
# @see https://apps.nextcloud.com/apps/sociallogin
flavor: "oidc_login" # Keeping on sociallogin because the other option is not implemented yet
credentials:
features:
matomo: true
css: false

View File

@@ -16,7 +16,7 @@ features:
central_database: false # Enable Central Database Network
recaptcha: false # Enable ReCaptcha
oauth2: false # Enable the OAuth2-Proy
csp:
csp: {}
domains:
canonical:
- "icons.{{ primary_domain }}"

View File

@@ -1,5 +1,5 @@
version: "latest"
oidc:
oidc: {}
# Taiga doesn't have a functioning oidc support at the moment
# See
# - https://community.taiga.io/t/taiga-and-oidc-plugin/4866