DollarDollar Bill Y'all - v3.2.2 Release
We're excited to announce the release of version 3.2.2 of DollarDollar Bill Y'all, bringing enhanced authentication options and improved deployment support.
🔑 What's New
Solves the edit and delete on the /Transactions bug
OpenID Connect (OIDC) Support
- Full integration with OpenID Connect for enterprise-ready authentication
- Support for major OIDC providers including Auth0, Okta, Keycloak, and others
- Configurable options to enable/disable local logins
- Seamless single sign-on (SSO) capabilities for organizations
Unraid Integration
- Official Unraid template now available via the community templates
- One-click installation for Unraid users
- Pre-configured Docker settings optimized for Unraid environments
Documentation Updates
- Comprehensive OIDC configuration guide
- Unraid installation instructions
- Improved maintenance and troubleshooting sections
Other Improvements
- Enhanced Docker build process with optimized .dockerignore
- Fixed several typos in documentation
- General codebase maintenance and dependency updates
🔧 Installation & Upgrade
New Installations
-
Clone the repository
git clone https://github.com/yourusername/dollardollar.git cd dollardollar
-
Configure environment
cp .env.template .env # Edit .env with your configuration
-
Launch the application
docker-compose up -d
Upgrading from Previous Versions
Pull the latest changes and update your database:
git pull
docker-compose down
docker-compose up -d
flask db migrate
flask db upgrade
Unraid Users
- In the Unraid web UI, go to the Docker tab
- Click "Add Container"
- In the Template URL field, paste:
https://github.com/jordan-dalby/unraidtemplates/blob/main/my-dollardollar.xml
- Click "Apply Template"
- Configure your settings and click "Apply"
🛠️ OIDC Configuration
To enable OIDC authentication, add these parameters to your .env file:
OIDC_ENABLED=True
OIDC_CLIENT_ID=your_client_id
OIDC_CLIENT_SECRET=your_client_secret
OIDC_PROVIDER_NAME=Your Provider Name
OIDC_DISCOVERY_URL=https://your-provider/.well-known/openid-configuration
Optional settings:
# Disable password-based logins
LOCAL_LOGIN_DISABLE=True
# Disable new user registration
DISABLE_SIGNUPS=True
.