start-wekan.bat 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345
  1. REM ------------------------------------------------------------
  2. REM NOTE: THIS .BAT DOES NOT WORK !!
  3. REM Use instead this webpage instructions to build on Windows:
  4. REM https://github.com/wekan/wekan/wiki/Install-Wekan-from-source-on-Windows
  5. REM Please add fix PRs, like config of MongoDB etc.
  6. REM ------------------------------------------------------------
  7. REM # Debug OIDC OAuth2 etc.
  8. REM SET DEBUG=true
  9. REM ------------------------------------------------------------
  10. SET MONGO_URL=mongodb://127.0.0.1:27017/wekan
  11. SET ROOT_URL=http://127.0.0.1:2000/
  12. SET MAIL_URL=smtp://user:pass@mailserver.example.com:25/
  13. SET MAIL_FROM=admin@example.com
  14. SET PORT=2000
  15. REM # If you disable Wekan API with false, Export Board does not work.
  16. SET WITH_API=true
  17. REM # ==== PASSWORD BRUTE FORCE PROTECTION ====
  18. REM #https://atmospherejs.com/lucasantoniassi/accounts-lockout
  19. REM #Defaults below. Uncomment to change. wekan/server/accounts-lockout.js
  20. REM SET ACCOUNTS_LOCKOUT_KNOWN_USERS_FAILURES_BEFORE=3
  21. REM SET ACCOUNTS_LOCKOUT_KNOWN_USERS_PERIOD=60
  22. REM SET ACCOUNTS_LOCKOUT_KNOWN_USERS_FAILURE_WINDOW=15
  23. REM SET ACCOUNTS_LOCKOUT_UNKNOWN_USERS_FAILURES_BERORE=3
  24. REM SET ACCOUNTS_LOCKOUT_UNKNOWN_USERS_LOCKOUT_PERIOD=60
  25. REM SET ACCOUNTS_LOCKOUT_UNKNOWN_USERS_FAILURE_WINDOW=15
  26. REM # ==== EMAIL DUE DATE NOTIFICATION =====
  27. REM # https://github.com/wekan/wekan/pull/2536
  28. REM # System timelines will be showing any user modification for
  29. REM # dueat startat endat receivedat, also notification to
  30. REM # the watchers and if any card is due, about due or past due.
  31. REM # Notify due days, default 2 days before and after. 0 = due notifications disabled. Default: 2
  32. REM SET NOTIFY_DUE_DAYS_BEFORE_AND_AFTER=2
  33. REM # Notify due at hour of day. Default every morning at 8am. Can be 0-23.
  34. REM # If env variable has parsing error, use default. Notification sent to watchers.
  35. REM SET NOTIFY_DUE_AT_HOUR_OF_DAY=8
  36. REM # ==== EMAIL NOTIFICATION TIMEOUT, ms =====
  37. REM # Defaut: 30000 ms = 30s
  38. REM SET EMAIL_NOTIFICATION_TIMEOUT=30000
  39. REM # CORS: Set Access-Control-Allow-Origin header. Example: *
  40. REM SET CORS=*
  41. REM # To enable the Set Access-Control-Allow-Headers header. "Authorization,Content-Type" is required for cross-origin use of the API.
  42. REM SET CORS_ALLOW_HEADERS=Authorization,Content-Type
  43. REM # To enable the Set Access-Control-Expose-Headers header. This is not needed for typical CORS situations. Example: *
  44. REM SET CORS_EXPOSE_HEADERS=*
  45. REM # Optional: Integration with Matomo https://matomo.org that is installed to your server
  46. REM # The address of the server where Matomo is hosted.
  47. REM # example: - MATOMO_ADDRESS=https://example.com/matomo
  48. REM SET MATOMO_ADDRESS=
  49. REM # The value of the site ID given in Matomo server for Wekan
  50. REM # example: - MATOMO_SITE_ID=12345
  51. REM SET MATOMO_SITE_ID=
  52. REM # The option do not track which enables users to not be tracked by matomo
  53. REM # example: - MATOMO_DO_NOT_TRACK=false
  54. REM SET MATOMO_DO_NOT_TRACK=
  55. REM # The option that allows matomo to retrieve the username:
  56. REM # example: MATOMO_WITH_USERNAME=true
  57. REM SET MATOMO_WITH_USERNAME=false
  58. REM # Enable browser policy and allow one trusted URL that can have iframe that has Wekan embedded inside.
  59. REM # Setting this to false is not recommended, it also disables all other browser policy protections
  60. REM # and allows all iframing etc. See wekan/server/policy.js
  61. SET BROWSER_POLICY_ENABLED=true
  62. REM # When browser policy is enabled, HTML code at this Trusted URL can have iframe that embeds Wekan inside.
  63. REM SET TRUSTED_URL=
  64. REM # What to send to Outgoing Webhook, or leave out. Example, that includes all that are default: cardId,listId,oldListId,boardId,comment,user,card,commentId .
  65. REM # example: WEBHOOKS_ATTRIBUTES=cardId,listId,oldListId,boardId,comment,user,card,commentId
  66. REM SET WEBHOOKS_ATTRIBUTES=
  67. REM ------------------------------------------------------------
  68. REM # Enable the OAuth2 connection
  69. REM # OAuth2 docs: https://github.com/wekan/wekan/wiki/OAuth2
  70. REM # example: OAUTH2_ENABLED=true
  71. REM SET OAUTH2_ENABLED=false
  72. REM # OAuth2 Client ID, for example from Rocket.Chat. Example: abcde12345
  73. REM # example: OAUTH2_CLIENT_ID=abcde12345
  74. REM SET OAUTH2_CLIENT_ID=
  75. REM # OAuth2 Secret, for example from Rocket.Chat: Example: 54321abcde
  76. REM # example: OAUTH2_SECRET=54321abcde
  77. REM SET OAUTH2_SECRET=
  78. REM # OAuth2 Server URL, for example Rocket.Chat. Example: https://chat.example.com
  79. REM # example: OAUTH2_SERVER_URL=https://chat.example.com
  80. REM SET OAUTH2_SERVER_URL=
  81. REM # OAuth2 Authorization Endpoint. Example: /oauth/authorize
  82. REM # example: OAUTH2_AUTH_ENDPOINT=/oauth/authorize
  83. REM SET OAUTH2_AUTH_ENDPOINT=
  84. REM # OAuth2 Userinfo Endpoint. Example: /oauth/userinfo
  85. REM # example: OAUTH2_USERINFO_ENDPOINT=/oauth/userinfo
  86. REM SET OAUTH2_USERINFO_ENDPOINT=
  87. REM # OAuth2 Token Endpoint. Example: /oauth/token
  88. REM # example: OAUTH2_TOKEN_ENDPOINT=/oauth/token
  89. REM SET OAUTH2_TOKEN_ENDPOINT=
  90. REM # OAUTH2 ID Token Whitelist Fields.
  91. REM SET OAUTH2_ID_TOKEN_WHITELIST_FIELDS=[]
  92. REM # OAUTH2 Request Permissions.
  93. REM SET OAUTH2_REQUEST_PERMISSIONS='openid profile email'
  94. REM # OAuth2 ID Mapping
  95. REM SET OAUTH2_ID_MAP=
  96. REM # OAuth2 Username Mapping
  97. REM SET OAUTH2_USERNAME_MAP=
  98. REM # OAuth2 Fullname Mapping
  99. REM SET OAUTH2_FULLNAME_MAP=
  100. REM # OAuth2 Email Mapping
  101. REM SET OAUTH2_EMAIL_MAP=
  102. REM ------------------------------------------------------------
  103. REM # LDAP_ENABLE : Enable or not the connection by the LDAP
  104. REM # example : LDAP_ENABLE=true
  105. REM SET LDAP_ENABLE=false
  106. REM # LDAP_PORT : The port of the LDAP server
  107. REM # example : LDAP_PORT=389
  108. REM SET LDAP_PORT=389
  109. REM # LDAP_HOST : The host server for the LDAP server
  110. REM # example : LDAP_HOST=localhost
  111. REM SET LDAP_HOST=
  112. REM # LDAP_BASEDN : The base DN for the LDAP Tree
  113. REM # example : LDAP_BASEDN=ou=user,dc=example,dc=org
  114. REM SET LDAP_BASEDN=
  115. REM # LDAP_LOGIN_FALLBACK : Fallback on the default authentication method
  116. REM # example : LDAP_LOGIN_FALLBACK=true
  117. REM SET LDAP_LOGIN_FALLBACK=false
  118. REM # LDAP_RECONNECT : Reconnect to the server if the connection is lost
  119. REM # example : LDAP_RECONNECT=false
  120. REM SET LDAP_RECONNECT=true
  121. REM # LDAP_TIMEOUT : Overall timeout, in milliseconds
  122. REM # example : LDAP_TIMEOUT=12345
  123. REM SET LDAP_TIMEOUT=10000
  124. REM # LDAP_IDLE_TIMEOUT : Specifies the timeout for idle LDAP connections in milliseconds
  125. REM # example : LDAP_IDLE_TIMEOUT=12345
  126. REM SET LDAP_IDLE_TIMEOUT=10000
  127. REM # LDAP_CONNECT_TIMEOUT : Connection timeout, in milliseconds
  128. REM # example : LDAP_CONNECT_TIMEOUT=12345
  129. REM SET LDAP_CONNECT_TIMEOUT=10000
  130. REM # LDAP_AUTHENTIFICATION : If the LDAP needs a user account to search
  131. REM # example : LDAP_AUTHENTIFICATION=true
  132. REM SET LDAP_AUTHENTIFICATION=false
  133. REM # LDAP_AUTHENTIFICATION_USERDN : The search user DN
  134. REM # example: LDAP_AUTHENTIFICATION_USERDN=cn=admin,dc=example,dc=org
  135. REM SET LDAP_AUTHENTIFICATION_USERDN=
  136. REM # LDAP_AUTHENTIFICATION_PASSWORD : The password for the search user
  137. REM # example : AUTHENTIFICATION_PASSWORD=admin
  138. REM SET LDAP_AUTHENTIFICATION_PASSWORD=
  139. REM # LDAP_LOG_ENABLED : Enable logs for the module
  140. REM # example : LDAP_LOG_ENABLED=true
  141. REM SET LDAP_LOG_ENABLED=false
  142. REM # LDAP_BACKGROUND_SYNC : If the sync of the users should be done in the background
  143. REM # example : LDAP_BACKGROUND_SYNC=true
  144. REM SET LDAP_BACKGROUND_SYNC=false
  145. REM # LDAP_BACKGROUND_SYNC_INTERVAL : At which interval does the background task sync in milliseconds
  146. REM # example : LDAP_BACKGROUND_SYNC_INTERVAL=12345
  147. REM SET LDAP_BACKGROUND_SYNC_INTERVAL=100
  148. REM # LDAP_BACKGROUND_SYNC_KEEP_EXISTANT_USERS_UPDATED :
  149. REM # example : LDAP_BACKGROUND_SYNC_KEEP_EXISTANT_USERS_UPDATED=true
  150. REM SET LDAP_BACKGROUND_SYNC_KEEP_EXISTANT_USERS_UPDATED=false
  151. REM # LDAP_BACKGROUND_SYNC_IMPORT_NEW_USERS :
  152. REM # example : LDAP_BACKGROUND_SYNC_IMPORT_NEW_USERS=true
  153. REM SET LDAP_BACKGROUND_SYNC_IMPORT_NEW_USERS=false
  154. REM # LDAP_ENCRYPTION : If using LDAPS
  155. REM # example : LDAP_ENCRYPTION=ssl
  156. REM SET LDAP_ENCRYPTION=false
  157. REM # LDAP_CA_CERT : The certification for the LDAPS server. Certificate needs to be included in this docker-compose.yml file.
  158. REM # example : LDAP_CA_CERT=-----BEGIN CERTIFICATE-----MIIE+zCCA+OgAwIBAgIkAhwR/6TVLmdRY6hHxvUFWc0+Enmu/Hu6cj+G2FIdAgIC...-----END CERTIFICATE-----
  159. REM SET LDAP_CA_CERT=
  160. REM # LDAP_REJECT_UNAUTHORIZED : Reject Unauthorized Certificate
  161. REM # example : LDAP_REJECT_UNAUTHORIZED=true
  162. REM SET LDAP_REJECT_UNAUTHORIZED=false
  163. REM # Option to login to the LDAP server with the user's own username and password, instead of an administrator key. Default: false (use administrator key).
  164. REM SET LDAP_USER_AUTHENTICATION=true
  165. REM # LDAP_USER_SEARCH_FILTER : Optional extra LDAP filters. Don't forget the outmost enclosing parentheses if needed
  166. REM # example : LDAP_USER_SEARCH_FILTER=
  167. REM SET LDAP_USER_SEARCH_FILTER=
  168. REM # LDAP_USER_SEARCH_SCOPE : base (search only in the provided DN), one (search only in the provided DN and one level deep), or sub (search the whole subtree)
  169. REM # example : LDAP_USER_SEARCH_SCOPE=one
  170. REM SET LDAP_USER_SEARCH_SCOPE=
  171. REM # LDAP_USER_SEARCH_FIELD : Which field is used to find the user
  172. REM # example : LDAP_USER_SEARCH_FIELD=uid
  173. REM SET LDAP_USER_SEARCH_FIELD=
  174. REM # LDAP_SEARCH_PAGE_SIZE : Used for pagination (0=unlimited)
  175. REM # example : LDAP_SEARCH_PAGE_SIZE=12345
  176. REM SET LDAP_SEARCH_PAGE_SIZE=0
  177. REM # LDAP_SEARCH_SIZE_LIMIT : The limit number of entries (0=unlimited)
  178. REM #33 example : LDAP_SEARCH_SIZE_LIMIT=12345
  179. REM SET LDAP_SEARCH_SIZE_LIMIT=0
  180. REM # LDAP_GROUP_FILTER_ENABLE : Enable group filtering
  181. REM # example : LDAP_GROUP_FILTER_ENABLE=true
  182. REM SET LDAP_GROUP_FILTER_ENABLE=false
  183. REM # LDAP_GROUP_FILTER_OBJECTCLASS : The object class for filtering
  184. REM # example : LDAP_GROUP_FILTER_OBJECTCLASS=group
  185. REM SET LDAP_GROUP_FILTER_OBJECTCLASS=
  186. REM # LDAP_GROUP_FILTER_GROUP_ID_ATTRIBUTE :
  187. REM # example :
  188. REM SET LDAP_GROUP_FILTER_GROUP_ID_ATTRIBUTE=
  189. REM # LDAP_GROUP_FILTER_GROUP_MEMBER_ATTRIBUTE :
  190. REM # example :
  191. REM SET LDAP_GROUP_FILTER_GROUP_MEMBER_ATTRIBUTE=
  192. REM # LDAP_GROUP_FILTER_GROUP_MEMBER_FORMAT :
  193. REM # example :
  194. REM SET LDAP_GROUP_FILTER_GROUP_MEMBER_FORMAT=
  195. REM # LDAP_GROUP_FILTER_GROUP_NAME :
  196. REM # example :
  197. REM SET LDAP_GROUP_FILTER_GROUP_NAME=
  198. REM # LDAP_UNIQUE_IDENTIFIER_FIELD : This field is sometimes class GUID (Globally Unique Identifier)
  199. REM # example : LDAP_UNIQUE_IDENTIFIER_FIELD=guid
  200. REM SET LDAP_UNIQUE_IDENTIFIER_FIELD=
  201. REM # LDAP_UTF8_NAMES_SLUGIFY : Convert the username to utf8
  202. REM # example : LDAP_UTF8_NAMES_SLUGIFY=false
  203. REM SET LDAP_UTF8_NAMES_SLUGIFY=true
  204. REM # LDAP_USERNAME_FIELD : Which field contains the ldap username
  205. REM # example : LDAP_USERNAME_FIELD=username
  206. REM SET LDAP_USERNAME_FIELD=
  207. REM # LDAP_MERGE_EXISTING_USERS :
  208. REM # example : LDAP_MERGE_EXISTING_USERS=true
  209. REM SET LDAP_MERGE_EXISTING_USERS=false
  210. REM # LDAP_EMAIL_MATCH_ENABLE : allow existing account matching by e-mail address when username does not match
  211. REM # example: LDAP_EMAIL_MATCH_ENABLE=true
  212. REM SET LDAP_EMAIL_MATCH_ENABLE=false
  213. REM # LDAP_EMAIL_MATCH_REQUIRE : require existing account matching by e-mail address when username does match
  214. REM # example: LDAP_EMAIL_MATCH_REQUIRE=true
  215. REM SET LDAP_EMAIL_MATCH_REQUIRE=false
  216. REM # LDAP_EMAIL_MATCH_VERIFIED : require existing account email address to be verified for matching
  217. REM # example: LDAP_EMAIL_MATCH_VERIFIED=true
  218. REM SET LDAP_EMAIL_MATCH_VERIFIED=false
  219. REM # LDAP_EMAIL_FIELD : which field contains the LDAP e-mail address
  220. REM # example: LDAP_EMAIL_FIELD=mail
  221. REM SET LDAP_EMAIL_FIELD=
  222. REM # LDAP_SYNC_USER_DATA :
  223. REM # example : LDAP_SYNC_USER_DATA=true
  224. REM SET LDAP_SYNC_USER_DATA=false
  225. REM # LDAP_SYNC_USER_DATA_FIELDMAP :
  226. REM # example : LDAP_SYNC_USER_DATA_FIELDMAP={"cn":"name", "mail":"email"}
  227. REM SET LDAP_SYNC_USER_DATA_FIELDMAP=
  228. REM # LDAP_SYNC_GROUP_ROLES :
  229. REM # example :
  230. REM # SET LDAP_SYNC_GROUP_ROLES=
  231. REM # LDAP_DEFAULT_DOMAIN : The default domain of the ldap it is used to create email if the field is not map correctly with the LDAP_SYNC_USER_DATA_FIELDMAP
  232. REM # example :
  233. REM SET LDAP_DEFAULT_DOMAIN=
  234. REM # Enable/Disable syncing of admin status based on ldap groups:
  235. REM SET LDAP_SYNC_ADMIN_STATUS=true
  236. REM # Comma separated list of admin group names to sync.
  237. REM SET LDAP_SYNC_ADMIN_GROUPS=group1,group2
  238. REM # Login to LDAP automatically with HTTP header.
  239. REM # In below example for siteminder, at right side of = is header name.
  240. REM SET HEADER_LOGIN_ID=HEADERUID
  241. REM SET HEADER_LOGIN_FIRSTNAME=HEADERFIRSTNAME
  242. REM SET HEADER_LOGIN_LASTNAME=HEADERLASTNAME
  243. REM SET HEADER_LOGIN_EMAIL=HEADEREMAILADDRESS
  244. REM ------------------------------------------------
  245. REM # LOGOUT_WITH_TIMER : Enables or not the option logout with timer
  246. REM # example : LOGOUT_WITH_TIMER=true
  247. REM SET LOGOUT_WITH_TIMER=
  248. REM # LOGOUT_IN : The number of days
  249. REM # example : LOGOUT_IN=1
  250. REM SET LOGOUT_IN=
  251. REM # LOGOUT_ON_HOURS : The number of hours
  252. REM # example : LOGOUT_ON_HOURS=9
  253. REM SET LOGOUT_ON_HOURS=
  254. REM # LOGOUT_ON_MINUTES : The number of minutes
  255. REM # example : LOGOUT_ON_MINUTES=55
  256. REM SET LOGOUT_ON_MINUTES=
  257. cd .build\bundle
  258. node main.js
  259. cd ..\..