Releases: JeffersonLab/wildfly
v1.6.2
- Use container-workflows v2 (Don't override CUSTOM_CRT_URL so we get both JLabCA.crt and acc-ca.crt)
Full Changelog: v1.6.1...v1.6.2
v1.6.1
- compose.override.yaml container name was incorrect
- container-entrypoint.sh and container-healthcheck.sh needed UNIX execute permissions
Full Changelog: v1.6.0...v1.6.1
v1.6.0
What's Changed
- Add config_oracle_client_dynamic by @slominskir in #8
- Container updates by @slominskir in #9
- GitHub Action workflow updates
Full Changelog: v1.5.0...v1.6.0
v1.5.0
Overview
This release incorporates support for MariaDB databases in a similar fashion as Oracle databases. Users can now define environment variables and have a the app server setup drivers, configure datasources, and wait for the database to respond to queries prior to fully starting the container.
v1.4.0
- KEYCLOAK_WAR env is no longer dynamic as it was ignored (cannot be an expression)
- Created a separate function for config_keycloak_client_dynamic so runtime configuration is optional
Full Changelog: v1.3.0...v1.4.0
v1.3.0
- Allow runtime configuration of Keycloak config (#2)
- Added default PKS12 keystore explicitly such that it is easy to mount a replacement keystore
Full Changelog: v1.2.0...v1.3.0
v1.2.0
- app-setup.sh config_oracle_client is now optional
Full Changelog: v1.1.2...v1.2.0
v1.1.2
GitHub Workflow Updated
Old workflow included a Docker BUILDARG (CUSTOM_CRT_URL) that took precedent over the values included in Dockerfile. Since v1.1.0 was created to update that ARG to include multiple certificates, this presented a problem. The work flow now does not specify that build arg and the resulting image should include all of the certificates listed in the Dockerfile.
v1.1.1
- Added CI
- Fixed execute permissions on new scripts
- Update Dockerfile to use ace.jlab.org/acc-ca.crt (this itself is over https, with godaddy cert, but disto trust store has it)
Full Changelog: v1.1.0...v1.1.1
v1.1.0
Overview
Add support Dockerfile for CUSTOM_CRT_URL to contain multiple URLs to trusted CA certificates. These are trusted by OS and default Java installation/Wildfly.
By default, we trust the JLab root CA certificate and the JLab Accelerator intermediate CA certificate.
What's Changed
New Contributors
Full Changelog: v1.0.0...v1.1.0