Tracking issue for this repo's part of the admin-bootstrap work.
See the main issue in protegeproject/webprotege-authorization-service#36.
What changes here
Once the authorization service supports a config-driven initial admin:
- Add
INITIAL_ADMIN_USERNAME= to .env.example with documentation explaining when to set it.
- Pass it to the
webprotege-authorization-service environment in docker-compose.yml:
webprotege-authorization-service:
environment:
WEBPROTEGE_AUTH_INITIALADMINUSERNAME: ${INITIAL_ADMIN_USERNAME:-}
- Mention the bootstrap flow in the README (register first user → set
INITIAL_ADMIN_USERNAME in .env to their username → restart the auth service → that user is now admin).
When to act
Do nothing until protegeproject/webprotege-authorization-service#36 is implemented and a new version of the auth service image is published.
Tracking issue for this repo's part of the admin-bootstrap work.
See the main issue in protegeproject/webprotege-authorization-service#36.
What changes here
Once the authorization service supports a config-driven initial admin:
INITIAL_ADMIN_USERNAME=to.env.examplewith documentation explaining when to set it.webprotege-authorization-serviceenvironment indocker-compose.yml:INITIAL_ADMIN_USERNAMEin.envto their username → restart the auth service → that user is now admin).When to act
Do nothing until protegeproject/webprotege-authorization-service#36 is implemented and a new version of the auth service image is published.