- Usage
- Customization
- Change the URL env vars
- Raise the
CONCURRENT_JOBSenv var - Change the SMTP server env vars
- Change the initial admin username or password env vars
- Change the initial plugins env var
- Serve Strider through HTTPS
This repository includes a Dockerfile and Docker Compose file for creating a Strider CI installation.
- Compile the image:
docker build -t strider/strider .The included Docker Compose file is an example and should be customized to fit your needs, but can be used as is for a quick demo by adding strider.example.com to your hosts file as an alias for 127.0.0.1.
- Use Compose:
docker-compose up -dThe initial launch may take a moment as some plugins are installed. Once launched, the container's copy of those plugins will persist, and future launches will be faster.
The following is suggested to customize the Docker Compose installation to your needs:
Strider requires that the
SERVER_NAMEvariable be set to its base, externally reachable URL. If you were to restrict Strider to being reached only over HTTPS, you might change the URL to similarly be HTTPS.
This number is 1 by default.
As in the Strider documentation, environment variables to configure SMTP are available.
This feature is specific to this image. When the container comes up for the first time (or if you delete the
.admin_user_createdfile in the root of the image), a user with the specified name and password will be created.However, if the user already exists, it may cause the container to crash when
strider-cliasks for confirmation to force override. Create a file at/.admin_user_created, or blank theSTRIDER_ADMIN_EMAILvariable to stop the auto-creation.
The
STRIDER_PLUGINSvariable is a space separated list of plugin names to be installed when the container is run for the first time. It must include at least one task runner (simple-runneris a good starting point) or the container will crash.
As seen in the
jwilder/nginx-proxyimage documentation, put an SSL cert as<domain name>.crtand<domain name>.keyin thevolumes/ssldirectory to serve over HTTPS. You can then remove the port-forwarding of80:80in the nginx service.