forked from wekan/wekan
-
Notifications
You must be signed in to change notification settings - Fork 1
/
start-wekan.bat
178 lines (171 loc) · 8.14 KB
/
start-wekan.bat
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
SET MONGO_URL=mongodb://127.0.0.1:27017/wekan
SET ROOT_URL=http://127.0.0.1:2000/
SET MAIL_URL=smtp://user:[email protected]:25/
SET PORT=2000
REM If you disable Wekan API with false, Export Board does not work.
SET WITH_API=true
REM Optional: Integration with Matomo https://matomo.org that is installed to your server
REM The address of the server where Matomo is hosted.
REM example: - MATOMO_ADDRESS=https://example.com/matomo
REM SET MATOMO_ADDRESS=
REM The value of the site ID given in Matomo server for Wekan
REM example: - MATOMO_SITE_ID=12345
REM SET MATOMO_SITE_ID=
REM The option do not track which enables users to not be tracked by matomo
REM example: - MATOMO_DO_NOT_TRACK=false
REM SET MATOMO_DO_NOT_TRACK=
REM The option that allows matomo to retrieve the username:
REM example: MATOMO_WITH_USERNAME=true
REM SET MATOMO_WITH_USERNAME=false
REM Enable browser policy and allow one trusted URL that can have iframe that has Wekan embedded inside.
REM Setting this to false is not recommended, it also disables all other browser policy protections
REM and allows all iframing etc. See wekan/server/policy.js
SET BROWSER_POLICY_ENABLED=true
REM When browser policy is enabled, HTML code at this Trusted URL can have iframe that embeds Wekan inside.
REM SET TRUSTED_URL=
REM What to send to Outgoing Webhook, or leave out. Example, that includes all that are default: cardId,listId,oldListId,boardId,comment,user,card,commentId .
REM example: WEBHOOKS_ATTRIBUTES=cardId,listId,oldListId,boardId,comment,user,card,commentId
REM SET WEBHOOKS_ATTRIBUTES=
REM Enable the OAuth2 connection
REM example: OAUTH2_ENABLED=true
REM SET OAUTH2_ENABLED=false
REM OAuth2 docs: https://github.com/wekan/wekan/wiki/OAuth2
REM OAuth2 Client ID, for example from Rocket.Chat. Example: abcde12345
REM example: OAUTH2_CLIENT_ID=abcde12345
REM SET OAUTH2_CLIENT_ID=
REM OAuth2 Secret, for example from Rocket.Chat: Example: 54321abcde
REM example: OAUTH2_SECRET=54321abcde
REM SET OAUTH2_SECRET=
REM OAuth2 Server URL, for example Rocket.Chat. Example: https://chat.example.com
REM example: OAUTH2_SERVER_URL=https://chat.example.com
REM SET OAUTH2_SERVER_URL=
REM OAuth2 Authorization Endpoint. Example: /oauth/authorize
REM example: OAUTH2_AUTH_ENDPOINT=/oauth/authorize
REM SET OAUTH2_AUTH_ENDPOINT=
REM OAuth2 Userinfo Endpoint. Example: /oauth/userinfo
REM example: OAUTH2_USERINFO_ENDPOINT=/oauth/userinfo
REM SET OAUTH2_USERINFO_ENDPOINT=
REM OAuth2 Token Endpoint. Example: /oauth/token
REM example: OAUTH2_TOKEN_ENDPOINT=/oauth/token
REM SET OAUTH2_TOKEN_ENDPOINT=
REM LDAP_ENABLE : Enable or not the connection by the LDAP
REM example : LDAP_ENABLE=true
REM SET LDAP_ENABLE=false
REM LDAP_PORT : The port of the LDAP server
REM example : LDAP_PORT=389
REM SET LDAP_PORT=389
REM LDAP_HOST : The host server for the LDAP server
REM example : LDAP_HOST=localhost
REM SET LDAP_HOST=
REM LDAP_BASEDN : The base DN for the LDAP Tree
REM example : LDAP_BASEDN=ou=user,dc=example,dc=org
REM SET LDAP_BASEDN=
REM LDAP_LOGIN_FALLBACK : Fallback on the default authentication method
REM example : LDAP_LOGIN_FALLBACK=true
REM SET LDAP_LOGIN_FALLBACK=false
REM LDAP_RECONNECT : Reconnect to the server if the connection is lost
REM example : LDAP_RECONNECT=false
REM SET LDAP_RECONNECT=true
REM LDAP_TIMEOUT : Overall timeout, in milliseconds
REM example : LDAP_TIMEOUT=12345
REM SET LDAP_TIMEOUT=10000
REM LDAP_IDLE_TIMEOUT : Specifies the timeout for idle LDAP connections in milliseconds
REM example : LDAP_IDLE_TIMEOUT=12345
REM SET LDAP_IDLE_TIMEOUT=10000
REM LDAP_CONNECT_TIMEOUT : Connection timeout, in milliseconds
REM example : LDAP_CONNECT_TIMEOUT=12345
REM SET LDAP_CONNECT_TIMEOUT=10000
REM LDAP_AUTHENTIFICATION : If the LDAP needs a user account to search
REM example : LDAP_AUTHENTIFICATION=true
REM SET LDAP_AUTHENTIFICATION=false
REM LDAP_AUTHENTIFICATION_USERDN : The search user DN
REM example : LDAP_AUTHENTIFICATION_USERDN=cn=admin,dc=example,dc=org
REM SET LDAP_AUTHENTIFICATION_USERDN=
REM LDAP_AUTHENTIFICATION_PASSWORD : The password for the search user
REM example : AUTHENTIFICATION_PASSWORD=admin
REM SET LDAP_AUTHENTIFICATION_PASSWORD=
REM LDAP_LOG_ENABLED : Enable logs for the module
REM example : LDAP_LOG_ENABLED=true
REM SET LDAP_LOG_ENABLED=false
REM LDAP_BACKGROUND_SYNC : If the sync of the users should be done in the background
REM example : LDAP_BACKGROUND_SYNC=true
REM SET LDAP_BACKGROUND_SYNC=false
REM LDAP_BACKGROUND_SYNC_INTERVAL : At which interval does the background task sync in milliseconds
REM example : LDAP_BACKGROUND_SYNC_INTERVAL=12345
REM SET LDAP_BACKGROUND_SYNC_INTERVAL=100
REM LDAP_BACKGROUND_SYNC_KEEP_EXISTANT_USERS_UPDATED :
REM example : LDAP_BACKGROUND_SYNC_KEEP_EXISTANT_USERS_UPDATED=true
REM SET LDAP_BACKGROUND_SYNC_KEEP_EXISTANT_USERS_UPDATED=false
REM LDAP_BACKGROUND_SYNC_IMPORT_NEW_USERS :
REM example : LDAP_BACKGROUND_SYNC_IMPORT_NEW_USERS=true
REM SET LDAP_BACKGROUND_SYNC_IMPORT_NEW_USERS=false
REM LDAP_ENCRYPTION : If using LDAPS
REM example : LDAP_ENCRYPTION=ssl
REM SET LDAP_ENCRYPTION=false
REM LDAP_CA_CERT : The certification for the LDAPS server. Certificate needs to be included in this docker-compose.yml file.
REM example : LDAP_CA_CERT=-----BEGIN CERTIFICATE-----MIIE+zCCA+OgAwIBAgIkAhwR/6TVLmdRY6hHxvUFWc0+Enmu/Hu6cj+G2FIdAgIC...-----END CERTIFICATE-----
REM SET LDAP_CA_CERT=
REM LDAP_REJECT_UNAUTHORIZED : Reject Unauthorized Certificate
REM example : LDAP_REJECT_UNAUTHORIZED=true
REM SET LDAP_REJECT_UNAUTHORIZED=false
REM LDAP_USER_SEARCH_FILTER : Optional extra LDAP filters. Don't forget the outmost enclosing parentheses if needed
REM example : LDAP_USER_SEARCH_FILTER=
REM SET LDAP_USER_SEARCH_FILTER=
REM LDAP_USER_SEARCH_SCOPE : base (search only in the provided DN), one (search only in the provided DN and one level deep), or sub (search the whole subtree)
REM example : LDAP_USER_SEARCH_SCOPE=one
REM SET LDAP_USER_SEARCH_SCOPE=
REM LDAP_USER_SEARCH_FIELD : Which field is used to find the user
REM example : LDAP_USER_SEARCH_FIELD=uid
REM SET LDAP_USER_SEARCH_FIELD=
REM LDAP_SEARCH_PAGE_SIZE : Used for pagination (0=unlimited)
REM example : LDAP_SEARCH_PAGE_SIZE=12345
REM SET LDAP_SEARCH_PAGE_SIZE=0
REM LDAP_SEARCH_SIZE_LIMIT : The limit number of entries (0=unlimited)
REM example : LDAP_SEARCH_SIZE_LIMIT=12345
REM SET LDAP_SEARCH_SIZE_LIMIT=0
REM LDAP_GROUP_FILTER_ENABLE : Enable group filtering
REM example : LDAP_GROUP_FILTER_ENABLE=true
REM SET LDAP_GROUP_FILTER_ENABLE=false
REM LDAP_GROUP_FILTER_OBJECTCLASS : The object class for filtering
REM example : LDAP_GROUP_FILTER_OBJECTCLASS=group
REM SET LDAP_GROUP_FILTER_OBJECTCLASS=
REM LDAP_GROUP_FILTER_GROUP_ID_ATTRIBUTE :
REM example :
REM SET LDAP_GROUP_FILTER_GROUP_ID_ATTRIBUTE=
REM LDAP_GROUP_FILTER_GROUP_MEMBER_ATTRIBUTE :
REM example :
REM SET LDAP_GROUP_FILTER_GROUP_MEMBER_ATTRIBUTE=
REM LDAP_GROUP_FILTER_GROUP_MEMBER_FORMAT :
REM example :
REM SET LDAP_GROUP_FILTER_GROUP_MEMBER_FORMAT=
REM LDAP_GROUP_FILTER_GROUP_NAME :
REM example :
REM SET LDAP_GROUP_FILTER_GROUP_NAME=
REM LDAP_UNIQUE_IDENTIFIER_FIELD : This field is sometimes class GUID (Globally Unique Identifier)
REM example : LDAP_UNIQUE_IDENTIFIER_FIELD=guid
REM SET LDAP_UNIQUE_IDENTIFIER_FIELD=
REM LDAP_UTF8_NAMES_SLUGIFY : Convert the username to utf8
REM example : LDAP_UTF8_NAMES_SLUGIFY=false
REM SET LDAP_UTF8_NAMES_SLUGIFY=true
REM LDAP_USERNAME_FIELD : Which field contains the ldap username
REM example : LDAP_USERNAME_FIELD=username
REM SET LDAP_USERNAME_FIELD=
REM LDAP_MERGE_EXISTING_USERS :
REM example : LDAP_MERGE_EXISTING_USERS=true
REM SET LDAP_MERGE_EXISTING_USERS=false
REM LDAP_SYNC_USER_DATA :
REM example : LDAP_SYNC_USER_DATA=true
REM SET LDAP_SYNC_USER_DATA=false
REM LDAP_SYNC_USER_DATA_FIELDMAP :
REM example : LDAP_SYNC_USER_DATA_FIELDMAP={"cn":"name", "mail":"email"}
REM SET LDAP_SYNC_USER_DATA_FIELDMAP=
REM LDAP_SYNC_GROUP_ROLES :
REM example :
REM SET LDAP_SYNC_GROUP_ROLES=
REM LDAP_DEFAULT_DOMAIN : The default domain of the ldap it is used to create email if the field is not map correctly with the LDAP_SYNC_USER_DATA_FIELDMAP
REM example :
REM SET LDAP_DEFAULT_DOMAIN=
cd .build\bundle
node main.js
cd ..\..