From 39d1265623d6c87644f9062e91cba8a460ad3cc4 Mon Sep 17 00:00:00 2001 From: Michael Barz Date: Wed, 23 Oct 2024 16:40:09 +0200 Subject: [PATCH 1/5] chore: prepare release, bump version --- changelog/{unreleased => 6.6.1_2024-10-24}/antivirus-workers.md | 0 .../{unreleased => 6.6.1_2024-10-24}/fix-activitylog-issues.md | 0 .../fix-disable-download-activity.md | 2 +- changelog/{unreleased => 6.6.1_2024-10-24}/fix-panic-nats.md | 0 changelog/{unreleased => 6.6.1_2024-10-24}/fix_deprecations.md | 0 .../{unreleased => 6.6.1_2024-10-24}/postprocessing-events.md | 0 changelog/{unreleased => 6.6.1_2024-10-24}/security-fixes.md | 0 .../ocis_full/onlyoffice-rolling.yml | 2 +- deployments/continuous-deployment-config/ocis_full/rolling.yml | 2 +- .../continuous-deployment-config/ocis_full/s3-rolling.yml | 2 +- .../continuous-deployment-config/ocis_keycloak/rolling.yml | 2 +- deployments/continuous-deployment-config/ocis_ldap/rolling.yml | 2 +- docs/ocis/release_roadmap.md | 1 + ocis-pkg/version/version.go | 2 +- sonar-project.properties | 2 +- 15 files changed, 9 insertions(+), 8 deletions(-) rename changelog/{unreleased => 6.6.1_2024-10-24}/antivirus-workers.md (100%) rename changelog/{unreleased => 6.6.1_2024-10-24}/fix-activitylog-issues.md (100%) rename changelog/{unreleased => 6.6.1_2024-10-24}/fix-disable-download-activity.md (77%) rename changelog/{unreleased => 6.6.1_2024-10-24}/fix-panic-nats.md (100%) rename changelog/{unreleased => 6.6.1_2024-10-24}/fix_deprecations.md (100%) rename changelog/{unreleased => 6.6.1_2024-10-24}/postprocessing-events.md (100%) rename changelog/{unreleased => 6.6.1_2024-10-24}/security-fixes.md (100%) diff --git a/changelog/unreleased/antivirus-workers.md b/changelog/6.6.1_2024-10-24/antivirus-workers.md similarity index 100% rename from changelog/unreleased/antivirus-workers.md rename to changelog/6.6.1_2024-10-24/antivirus-workers.md diff --git a/changelog/unreleased/fix-activitylog-issues.md b/changelog/6.6.1_2024-10-24/fix-activitylog-issues.md similarity index 100% rename from changelog/unreleased/fix-activitylog-issues.md rename to changelog/6.6.1_2024-10-24/fix-activitylog-issues.md diff --git a/changelog/unreleased/fix-disable-download-activity.md b/changelog/6.6.1_2024-10-24/fix-disable-download-activity.md similarity index 77% rename from changelog/unreleased/fix-disable-download-activity.md rename to changelog/6.6.1_2024-10-24/fix-disable-download-activity.md index f253036355d..4ae29228e0f 100644 --- a/changelog/unreleased/fix-disable-download-activity.md +++ b/changelog/6.6.1_2024-10-24/fix-disable-download-activity.md @@ -2,5 +2,5 @@ Bugfix: Disable download activity We disable the download activity until we have a proper solution for it. -https://github.com/owncloud/ocis/pull/10367 +https://github.com/owncloud/ocis/pull/10368 https://github.com/owncloud/ocis/issues/10293 diff --git a/changelog/unreleased/fix-panic-nats.md b/changelog/6.6.1_2024-10-24/fix-panic-nats.md similarity index 100% rename from changelog/unreleased/fix-panic-nats.md rename to changelog/6.6.1_2024-10-24/fix-panic-nats.md diff --git a/changelog/unreleased/fix_deprecations.md b/changelog/6.6.1_2024-10-24/fix_deprecations.md similarity index 100% rename from changelog/unreleased/fix_deprecations.md rename to changelog/6.6.1_2024-10-24/fix_deprecations.md diff --git a/changelog/unreleased/postprocessing-events.md b/changelog/6.6.1_2024-10-24/postprocessing-events.md similarity index 100% rename from changelog/unreleased/postprocessing-events.md rename to changelog/6.6.1_2024-10-24/postprocessing-events.md diff --git a/changelog/unreleased/security-fixes.md b/changelog/6.6.1_2024-10-24/security-fixes.md similarity index 100% rename from changelog/unreleased/security-fixes.md rename to changelog/6.6.1_2024-10-24/security-fixes.md diff --git a/deployments/continuous-deployment-config/ocis_full/onlyoffice-rolling.yml b/deployments/continuous-deployment-config/ocis_full/onlyoffice-rolling.yml index e94458f55d9..06776b3b4a9 100644 --- a/deployments/continuous-deployment-config/ocis_full/onlyoffice-rolling.yml +++ b/deployments/continuous-deployment-config/ocis_full/onlyoffice-rolling.yml @@ -32,7 +32,7 @@ env: INSECURE: "false" TRAEFIK_ACME_MAIL: mbarz@owncloud.com - OCIS_DOCKER_TAG: 6.6.0 + OCIS_DOCKER_TAG: 6.6.1 OCIS_DOCKER_IMAGE: owncloud/ocis-rolling OCIS_DOMAIN: ocis.ocis-onlyoffice.rolling.owncloud.works COMPANION_DOMAIN: companion.ocis-onlyoffice.rolling.owncloud.works diff --git a/deployments/continuous-deployment-config/ocis_full/rolling.yml b/deployments/continuous-deployment-config/ocis_full/rolling.yml index f68bb5ea3a6..2dd14f1c537 100644 --- a/deployments/continuous-deployment-config/ocis_full/rolling.yml +++ b/deployments/continuous-deployment-config/ocis_full/rolling.yml @@ -32,7 +32,7 @@ env: INSECURE: "false" TRAEFIK_ACME_MAIL: mbarz@owncloud.com - OCIS_DOCKER_TAG: 6.6.0 + OCIS_DOCKER_TAG: 6.6.1 OCIS_DOCKER_IMAGE: owncloud/ocis-rolling OCIS_DOMAIN: ocis.ocis.rolling.owncloud.works COMPANION_DOMAIN: companion.ocis.rolling.owncloud.works diff --git a/deployments/continuous-deployment-config/ocis_full/s3-rolling.yml b/deployments/continuous-deployment-config/ocis_full/s3-rolling.yml index 0ead6d66bc2..7fd9a6168f3 100644 --- a/deployments/continuous-deployment-config/ocis_full/s3-rolling.yml +++ b/deployments/continuous-deployment-config/ocis_full/s3-rolling.yml @@ -32,7 +32,7 @@ env: INSECURE: "false" TRAEFIK_ACME_MAIL: mbarz@owncloud.com - OCIS_DOCKER_TAG: 6.6.0 + OCIS_DOCKER_TAG: 6.6.1 OCIS_DOCKER_IMAGE: owncloud/ocis-rolling OCIS_DOMAIN: ocis.ocis-s3.rolling.owncloud.works COMPANION_DOMAIN: companion.ocis-s3.rolling.owncloud.works diff --git a/deployments/continuous-deployment-config/ocis_keycloak/rolling.yml b/deployments/continuous-deployment-config/ocis_keycloak/rolling.yml index c2ab806b1e0..e51ba5d37e0 100644 --- a/deployments/continuous-deployment-config/ocis_keycloak/rolling.yml +++ b/deployments/continuous-deployment-config/ocis_keycloak/rolling.yml @@ -32,7 +32,7 @@ env: INSECURE: "false" TRAEFIK_ACME_MAIL: mbarz@owncloud.com - OCIS_DOCKER_TAG: 6.6.0 + OCIS_DOCKER_TAG: 6.6.1 OCIS_DOCKER_IMAGE: owncloud/ocis-rolling OCIS_DOMAIN: ocis.ocis-keycloak.rolling.owncloud.works KEYCLOAK_DOMAIN: keycloak.ocis-keycloak.rolling.owncloud.works diff --git a/deployments/continuous-deployment-config/ocis_ldap/rolling.yml b/deployments/continuous-deployment-config/ocis_ldap/rolling.yml index 902a0a336b1..f5776d66dce 100644 --- a/deployments/continuous-deployment-config/ocis_ldap/rolling.yml +++ b/deployments/continuous-deployment-config/ocis_ldap/rolling.yml @@ -32,7 +32,7 @@ env: INSECURE: "false" TRAEFIK_ACME_MAIL: mbarz@owncloud.com - OCIS_DOCKER_TAG: 6.6.0 + OCIS_DOCKER_TAG: 6.6.1 OCIS_DOCKER_IMAGE: owncloud/ocis-rolling OCIS_DOMAIN: ocis.ocis-ldap.rolling.owncloud.works LDAP_MANAGER_DOMAIN: ldap.ocis-ldap.rolling.owncloud.works diff --git a/docs/ocis/release_roadmap.md b/docs/ocis/release_roadmap.md index dc0e8d7bc67..edd1b7d6229 100644 --- a/docs/ocis/release_roadmap.md +++ b/docs/ocis/release_roadmap.md @@ -19,6 +19,7 @@ This page is designed to provide clarity and transparency regarding the scheduli | 23.12.2024 | Rolling | - | - | - | | 02.12.2024 | Rolling | - | - | - | | 11.11.2024 | Production | - | - | - | +| 24.10.2024 | Rolling | [Infinite Scale 6 (6.6.1)](https://download.owncloud.com/ocis/ocis/rolling/6.6.1/) | [Release Notes](https://doc.owncloud.com/ocis_release_notes.html#infinite-scale-6-6-1-rolling) | - | | 22.10.2024 | Rolling | [Infinite Scale 6 (6.6.0)](https://download.owncloud.com/ocis/ocis/rolling/6.6.0/) | [Release Notes](https://doc.owncloud.com/ocis_release_notes.html#infinite-scale-6-6-0-rolling) | - | | 01.10.2024 | Rolling | [Infinite Scale 6 (6.5.0)](https://download.owncloud.com/ocis/ocis/rolling/6.5.0/) | [Release Notes](https://doc.owncloud.com/ocis_release_notes.html#infinite-scale-6-5-0-rolling) | - | | **30.09.2024** | **Production** | **[Infinite Scale 5 (5.0.8)](https://download.owncloud.com/ocis/ocis/stable/5.0.8/)** | **[Release Notes](https://doc.owncloud.com/ocis_release_notes.html#infinite-scale-5-0-8-production)** | **Active Support** | diff --git a/ocis-pkg/version/version.go b/ocis-pkg/version/version.go index 7414ab03d99..713064827fc 100644 --- a/ocis-pkg/version/version.go +++ b/ocis-pkg/version/version.go @@ -16,7 +16,7 @@ var ( // LatestTag is the latest released version plus the dev meta version. // Will be overwritten by the release pipeline // Needs a manual change for every tagged release - LatestTag = "6.6.0+dev" + LatestTag = "6.6.1+dev" // Date indicates the build date. // This has been removed, it looks like you can only replace static strings with recent go versions diff --git a/sonar-project.properties b/sonar-project.properties index 5208f653611..072881751de 100644 --- a/sonar-project.properties +++ b/sonar-project.properties @@ -2,7 +2,7 @@ sonar.projectKey=owncloud_ocis sonar.organization=owncloud-1 sonar.projectName=ocis -sonar.projectVersion=6.6.0 +sonar.projectVersion=6.6.1 sonar.host.url=https://sonarcloud.io # ===================================================== From 3c6c37fbc025d4dc69af5080424c9b814e6ba27e Mon Sep 17 00:00:00 2001 From: Christian Richter Date: Thu, 24 Oct 2024 09:13:03 +0200 Subject: [PATCH 2/5] avoid 0.0.0.0 & replace by outbound ip Signed-off-by: Christian Richter --- ocis-pkg/checks/checkgrpc.go | 13 +++++++++++-- ocis-pkg/checks/checkhttp.go | 14 ++++++++++++++ ocis-pkg/handlers/checker.go | 18 ++++++++++++++++++ 3 files changed, 43 insertions(+), 2 deletions(-) diff --git a/ocis-pkg/checks/checkgrpc.go b/ocis-pkg/checks/checkgrpc.go index 5690c67def7..20007bf2862 100644 --- a/ocis-pkg/checks/checkgrpc.go +++ b/ocis-pkg/checks/checkgrpc.go @@ -3,15 +3,24 @@ package checks import ( "context" "fmt" + "strings" - "google.golang.org/grpc/credentials/insecure" - + "github.com/owncloud/ocis/v2/ocis-pkg/handlers" "google.golang.org/grpc" + "google.golang.org/grpc/credentials/insecure" ) // NewGRPCCheck checks the reachability of a grpc server. func NewGRPCCheck(address string) func(context.Context) error { return func(_ context.Context) error { + if strings.Contains(address, "0.0.0.0") { + outboundIp, err := handlers.GetOutBoundIP() + if err != nil { + return err + } + address = strings.Replace(address, "0.0.0.0", outboundIp, 1) + } + conn, err := grpc.NewClient(address, grpc.WithTransportCredentials(insecure.NewCredentials())) if err != nil { return fmt.Errorf("could not connect to grpc server: %v", err) diff --git a/ocis-pkg/checks/checkhttp.go b/ocis-pkg/checks/checkhttp.go index 462749fb87b..b0c1f5c45df 100644 --- a/ocis-pkg/checks/checkhttp.go +++ b/ocis-pkg/checks/checkhttp.go @@ -3,13 +3,27 @@ package checks import ( "context" "fmt" + "github.com/owncloud/ocis/v2/ocis-pkg/handlers" "net/http" + "strings" "time" ) // NewHTTPCheck checks the reachability of a http server. func NewHTTPCheck(url string) func(context.Context) error { return func(_ context.Context) error { + if strings.Contains(url, "0.0.0.0") { + outboundIp, err := handlers.GetOutBoundIP() + if err != nil { + return err + } + url = strings.Replace(url, "0.0.0.0", outboundIp, 1) + } + + if !strings.HasPrefix(url, "http://") && !strings.HasPrefix(url, "https://") { + url = "http://" + url + } + c := http.Client{ Timeout: 3 * time.Second, } diff --git a/ocis-pkg/handlers/checker.go b/ocis-pkg/handlers/checker.go index 48ee3b12b1e..51215f5145a 100644 --- a/ocis-pkg/handlers/checker.go +++ b/ocis-pkg/handlers/checker.go @@ -5,6 +5,7 @@ import ( "fmt" "io" "maps" + "net" "net/http" "golang.org/x/sync/errgroup" @@ -113,3 +114,20 @@ func (h *CheckHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) { h.conf.logger.Panic().Err(err).Msg("failed to write response") } } + +func GetOutBoundIP() (string, error) { + interfacesAddresses, err := net.InterfaceAddrs() + if err != nil { + return "", err + } + + for _, address := range interfacesAddresses { + if ipNet, ok := address.(*net.IPNet); ok && !ipNet.IP.IsLoopback() { + if ipNet.IP.To4() != nil { + return ipNet.IP.String(), nil + } + } + } + + return "", fmt.Errorf("no IP found") +} From 6f789f2ab9c508e8b6bb86f536fbcc68a8c11037 Mon Sep 17 00:00:00 2001 From: Christian Richter Date: Thu, 24 Oct 2024 09:56:45 +0200 Subject: [PATCH 3/5] tackle ipv6 wildcard binds Signed-off-by: Christian Richter --- ocis-pkg/checks/checkgrpc.go | 4 +++- ocis-pkg/checks/checkhttp.go | 4 +++- ocis-pkg/checks/checktcp.go | 12 ++++++++++++ 3 files changed, 18 insertions(+), 2 deletions(-) diff --git a/ocis-pkg/checks/checkgrpc.go b/ocis-pkg/checks/checkgrpc.go index 20007bf2862..ebb22fb29d5 100644 --- a/ocis-pkg/checks/checkgrpc.go +++ b/ocis-pkg/checks/checkgrpc.go @@ -13,12 +13,14 @@ import ( // NewGRPCCheck checks the reachability of a grpc server. func NewGRPCCheck(address string) func(context.Context) error { return func(_ context.Context) error { - if strings.Contains(address, "0.0.0.0") { + if strings.Contains(address, "0.0.0.0") || strings.Contains(address, "::") { outboundIp, err := handlers.GetOutBoundIP() if err != nil { return err } address = strings.Replace(address, "0.0.0.0", outboundIp, 1) + address = strings.Replace(address, "::", "["+outboundIp+"]", 1) + address = strings.Replace(address, "[::]", "["+outboundIp+"]", 1) } conn, err := grpc.NewClient(address, grpc.WithTransportCredentials(insecure.NewCredentials())) diff --git a/ocis-pkg/checks/checkhttp.go b/ocis-pkg/checks/checkhttp.go index b0c1f5c45df..1fab4e118b5 100644 --- a/ocis-pkg/checks/checkhttp.go +++ b/ocis-pkg/checks/checkhttp.go @@ -12,12 +12,14 @@ import ( // NewHTTPCheck checks the reachability of a http server. func NewHTTPCheck(url string) func(context.Context) error { return func(_ context.Context) error { - if strings.Contains(url, "0.0.0.0") { + if strings.Contains(url, "0.0.0.0") || strings.Contains(url, "::") { outboundIp, err := handlers.GetOutBoundIP() if err != nil { return err } url = strings.Replace(url, "0.0.0.0", outboundIp, 1) + url = strings.Replace(url, "::", outboundIp, 1) + url = strings.Replace(url, "[::]", "["+outboundIp+"]", 1) } if !strings.HasPrefix(url, "http://") && !strings.HasPrefix(url, "https://") { diff --git a/ocis-pkg/checks/checktcp.go b/ocis-pkg/checks/checktcp.go index 475ff50e825..d89da356c35 100644 --- a/ocis-pkg/checks/checktcp.go +++ b/ocis-pkg/checks/checktcp.go @@ -2,13 +2,25 @@ package checks import ( "context" + "github.com/owncloud/ocis/v2/ocis-pkg/handlers" "net" + "strings" "time" ) // NewTCPCheck returns a check that connects to a given tcp endpoint. func NewTCPCheck(address string) func(context.Context) error { return func(_ context.Context) error { + if strings.Contains(address, "0.0.0.0") || strings.Contains(address, "::") { + outboundIp, err := handlers.GetOutBoundIP() + if err != nil { + return err + } + address = strings.Replace(address, "0.0.0.0", outboundIp, 1) + address = strings.Replace(address, "::", outboundIp, 1) + address = strings.Replace(address, "[::]", "["+outboundIp+"]", 1) + } + conn, err := net.DialTimeout("tcp", address, 3*time.Second) if err != nil { return err From d8a12ee067fd450d1bc6731068d75384939de8d9 Mon Sep 17 00:00:00 2001 From: Christian Richter Date: Thu, 24 Oct 2024 10:45:59 +0200 Subject: [PATCH 4/5] simplify code Signed-off-by: Christian Richter --- ocis-pkg/checks/checkgrpc.go | 12 +++--------- ocis-pkg/checks/checkhttp.go | 14 +++++--------- ocis-pkg/checks/checktcp.go | 15 +++++---------- ocis-pkg/handlers/checker.go | 21 ++++++++++++++++++--- 4 files changed, 31 insertions(+), 31 deletions(-) diff --git a/ocis-pkg/checks/checkgrpc.go b/ocis-pkg/checks/checkgrpc.go index ebb22fb29d5..c10b53bbf86 100644 --- a/ocis-pkg/checks/checkgrpc.go +++ b/ocis-pkg/checks/checkgrpc.go @@ -3,7 +3,6 @@ package checks import ( "context" "fmt" - "strings" "github.com/owncloud/ocis/v2/ocis-pkg/handlers" "google.golang.org/grpc" @@ -13,14 +12,9 @@ import ( // NewGRPCCheck checks the reachability of a grpc server. func NewGRPCCheck(address string) func(context.Context) error { return func(_ context.Context) error { - if strings.Contains(address, "0.0.0.0") || strings.Contains(address, "::") { - outboundIp, err := handlers.GetOutBoundIP() - if err != nil { - return err - } - address = strings.Replace(address, "0.0.0.0", outboundIp, 1) - address = strings.Replace(address, "::", "["+outboundIp+"]", 1) - address = strings.Replace(address, "[::]", "["+outboundIp+"]", 1) + address, err := handlers.FailSaveAddress(address) + if err != nil { + return err } conn, err := grpc.NewClient(address, grpc.WithTransportCredentials(insecure.NewCredentials())) diff --git a/ocis-pkg/checks/checkhttp.go b/ocis-pkg/checks/checkhttp.go index 1fab4e118b5..48502fe6ac6 100644 --- a/ocis-pkg/checks/checkhttp.go +++ b/ocis-pkg/checks/checkhttp.go @@ -3,23 +3,19 @@ package checks import ( "context" "fmt" - "github.com/owncloud/ocis/v2/ocis-pkg/handlers" "net/http" "strings" "time" + + "github.com/owncloud/ocis/v2/ocis-pkg/handlers" ) // NewHTTPCheck checks the reachability of a http server. func NewHTTPCheck(url string) func(context.Context) error { return func(_ context.Context) error { - if strings.Contains(url, "0.0.0.0") || strings.Contains(url, "::") { - outboundIp, err := handlers.GetOutBoundIP() - if err != nil { - return err - } - url = strings.Replace(url, "0.0.0.0", outboundIp, 1) - url = strings.Replace(url, "::", outboundIp, 1) - url = strings.Replace(url, "[::]", "["+outboundIp+"]", 1) + url, err := handlers.FailSaveAddress(url) + if err != nil { + return err } if !strings.HasPrefix(url, "http://") && !strings.HasPrefix(url, "https://") { diff --git a/ocis-pkg/checks/checktcp.go b/ocis-pkg/checks/checktcp.go index d89da356c35..693ba255cee 100644 --- a/ocis-pkg/checks/checktcp.go +++ b/ocis-pkg/checks/checktcp.go @@ -2,23 +2,18 @@ package checks import ( "context" - "github.com/owncloud/ocis/v2/ocis-pkg/handlers" "net" - "strings" "time" + + "github.com/owncloud/ocis/v2/ocis-pkg/handlers" ) // NewTCPCheck returns a check that connects to a given tcp endpoint. func NewTCPCheck(address string) func(context.Context) error { return func(_ context.Context) error { - if strings.Contains(address, "0.0.0.0") || strings.Contains(address, "::") { - outboundIp, err := handlers.GetOutBoundIP() - if err != nil { - return err - } - address = strings.Replace(address, "0.0.0.0", outboundIp, 1) - address = strings.Replace(address, "::", outboundIp, 1) - address = strings.Replace(address, "[::]", "["+outboundIp+"]", 1) + address, err := handlers.FailSaveAddress(address) + if err != nil { + return err } conn, err := net.DialTimeout("tcp", address, 3*time.Second) diff --git a/ocis-pkg/handlers/checker.go b/ocis-pkg/handlers/checker.go index 51215f5145a..0326c580dcb 100644 --- a/ocis-pkg/handlers/checker.go +++ b/ocis-pkg/handlers/checker.go @@ -7,10 +7,10 @@ import ( "maps" "net" "net/http" - - "golang.org/x/sync/errgroup" + "strings" "github.com/owncloud/ocis/v2/ocis-pkg/log" + "golang.org/x/sync/errgroup" ) // check is a function that performs a check. @@ -115,7 +115,22 @@ func (h *CheckHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) { } } -func GetOutBoundIP() (string, error) { +// FailSaveAddress replaces wildcard addresses with the outbound IP. +func FailSaveAddress(address string) (string, error) { + if strings.Contains(address, "0.0.0.0") || strings.Contains(address, "::") { + outboundIp, err := getOutBoundIP() + if err != nil { + return "", err + } + address = strings.Replace(address, "0.0.0.0", outboundIp, 1) + address = strings.Replace(address, "::", "["+outboundIp+"]", 1) + address = strings.Replace(address, "[::]", "["+outboundIp+"]", 1) + } + return address, nil +} + +// getOutBoundIP returns the outbound IP address. +func getOutBoundIP() (string, error) { interfacesAddresses, err := net.InterfaceAddrs() if err != nil { return "", err From 6c2630d76050eb9e15b70d4986be410f80748082 Mon Sep 17 00:00:00 2001 From: Michael Barz Date: Thu, 24 Oct 2024 14:12:46 +0200 Subject: [PATCH 5/5] docs: add changelog --- changelog/6.6.1_2024-10-24/fix-healthchecks.md | 5 +++++ 1 file changed, 5 insertions(+) create mode 100644 changelog/6.6.1_2024-10-24/fix-healthchecks.md diff --git a/changelog/6.6.1_2024-10-24/fix-healthchecks.md b/changelog/6.6.1_2024-10-24/fix-healthchecks.md new file mode 100644 index 00000000000..ba745357437 --- /dev/null +++ b/changelog/6.6.1_2024-10-24/fix-healthchecks.md @@ -0,0 +1,5 @@ +Bugfix: Fix healthchecks + +We needed to replace 0.0.0.0 bind addresses by outbound IP addresses in the healthcheck routine. + +https://github.com/owncloud/ocis/pull/10405