Skip to content
This repository has been archived by the owner on May 5, 2023. It is now read-only.

feat!: support organization-specific domains for Portal backend and frontend [PORTAL-1067] #165

Draft
wants to merge 9 commits into
base: develop
Choose a base branch
from

Conversation

burnedikt
Copy link
Collaborator

  • introduced new configuration parameter portal_domain
  • allow specifying extra labels for customization, backend and frontend container

BREAKING CHANGE: Removed support for alias hostnames on the backend
BREAKING CHANGE: Removed support for alias hostnames on the frontend
BREAKING CHANGE: Removed support for alias hostnames on the customization service
BREAKING CHANGE: Dropped support for Portal Backend <10.0.0
BREAKING CHANGE: Dropped support for Portal Frontend <3.0.0
BREAKING CHANGE: Dropped support for Portal Customization <3.0.0

…rontend

- introduced new configuration parameter `portal_domain`
- allow specifying extra labels for customization, backend and frontend container

BREAKING CHANGE: Removed support for alias hostnames on the backend
BREAKING CHANGE: Removed support for alias hostnames on the frontend
BREAKING CHANGE: Removed support for alias hostnames on the customization service
BREAKING CHANGE: Dropped support for Portal Backend <10.0.0
BREAKING CHANGE: Dropped support for Portal Frontend <3.0.0
BREAKING CHANGE: Dropped support for Portal Customization <3.0.0
@burnedikt burnedikt requested a review from klyse May 10, 2022 14:35
@burnedikt burnedikt changed the title feat!: support organization-specific domains for Portal backend and frontend feat!: support organization-specific domains for Portal backend and frontend [PORTAL-1067] May 10, 2022
DJANGO_SECRET_KEY: "{{ admin_configuration.secret_key | mandatory }}"
FROM_EMAIL: "{{ admin_configuration.from_email | default('admin@' + portal_configuration.hostname, true) }}"
FROM_EMAIL: "{{ admin_configuration.from_email | default('admin@' + admin_configuration.domain, true) }}"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

so the sender is always [email protected] or something like that?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Probably the only way without new DKIM verification.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

either that, or always [email protected] which is also weird ...
But yeah, definitely affects our terraform module ...
And we don't manage the innoactive.io dns records via terraform, so it's a bit of an issue.

tasks/frontend.yml Outdated Show resolved Hide resolved
test.yml Outdated Show resolved Hide resolved
@burnedikt
Copy link
Collaborator Author

Probably main open topic right now is whether session management supports the new cors origins setting with wildcards. But other than that, the changes here should be more or less complete.

@burnedikt burnedikt marked this pull request as ready for review May 11, 2022 14:54
@burnedikt burnedikt marked this pull request as draft May 31, 2022 07:54
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants