Compare commits
10 Commits
0.2.3+0.20
...
cr_local_a
Author | SHA1 | Date | |
---|---|---|---|
964662d7f7 | |||
1669d64a5a | |||
8be72aa8df | |||
e501cc662d | |||
8050d24c7c | |||
d3c98de025 | |||
365448458c | |||
4bbec31d8a | |||
1ce54b1fe3 | |||
fe83250372 |
18
.env.sample
18
.env.sample
@ -1,4 +1,6 @@
|
||||
TYPE=vikunja
|
||||
TIMEOUT=300
|
||||
ENABLE_AUTO_UPDATE=true
|
||||
|
||||
DOMAIN=vikunja.example.com
|
||||
|
||||
@ -14,14 +16,22 @@ LOG_LEVEL=INFO
|
||||
|
||||
COMPOSE_FILE=compose.yml
|
||||
|
||||
#VIKUNJA_RATELIMIT_NOAUTHLIMIT=10
|
||||
|
||||
# uncomment to enable local authentication
|
||||
# LOCAL_AUTH_ENABLED=true
|
||||
# uncomment to enable self-registration (if disabled, can be done via
|
||||
# command line in the api container with vikunja user command)
|
||||
# LOCAL_REGISTRATION_ENABLED=true
|
||||
|
||||
# SSO OAUTH
|
||||
# e.g. see https://goauthentik.io/integrations/services/vikunja/
|
||||
# COMPOSE_FILE="${COMPOSE_FILE}:compose.oauth.yml"
|
||||
# OAUTH_ENABLED=true
|
||||
# OAUTH_NAME
|
||||
# OAUTH_URL
|
||||
# OAUTH_CLIENT_ID
|
||||
# OAUTH_LOGOUT_URL
|
||||
# OAUTH_NAME=authentik
|
||||
# OAUTH_URL=https://login.example.com/application/o/vikunja/
|
||||
# OAUTH_CLIENT_ID=vikunja
|
||||
# OAUTH_LOGOUT_URL=https://login.example.com/application/o/vikunja/end-session/
|
||||
# SECRET_OAUTH_SECRET_VERSION=v1
|
||||
|
||||
# E-MAIL
|
||||
|
24
compose.yml
24
compose.yml
@ -3,10 +3,13 @@ version: "3.8"
|
||||
|
||||
services:
|
||||
api:
|
||||
image: vikunja/api:0.20.2
|
||||
image: vikunja/api:0.22.1
|
||||
environment:
|
||||
- DOMAIN
|
||||
- LOG_LEVEL
|
||||
- VIKUNJA_RATELIMIT_NOAUTHLIMIT
|
||||
- LOCAL_AUTH_ENABLED
|
||||
- LOCAL_REGISTRATION_ENABLED
|
||||
volumes:
|
||||
- files:/app/vikunja/files
|
||||
networks:
|
||||
@ -17,10 +20,8 @@ services:
|
||||
- db_password
|
||||
configs:
|
||||
- source: config_yml
|
||||
target: /app/vikunja/config.yml
|
||||
target: /etc/vikunja/config.yml
|
||||
deploy:
|
||||
restart_policy:
|
||||
condition: on-failure
|
||||
labels:
|
||||
- "traefik.enable=true"
|
||||
- "traefik.http.services.${STACK_NAME}_api.loadbalancer.server.port=3456"
|
||||
@ -29,19 +30,18 @@ services:
|
||||
- "traefik.http.routers.${STACK_NAME}_api.tls.certresolver=${LETS_ENCRYPT_ENV}"
|
||||
|
||||
app:
|
||||
image: vikunja/frontend:0.20.3
|
||||
image: vikunja/frontend:0.22.1
|
||||
networks:
|
||||
- proxy
|
||||
deploy:
|
||||
restart_policy:
|
||||
condition: on-failure
|
||||
labels:
|
||||
- "traefik.enable=true"
|
||||
- "traefik.http.services.${STACK_NAME}.loadbalancer.server.port=80"
|
||||
- "traefik.http.routers.${STACK_NAME}.rule=Host(`${DOMAIN}`)"
|
||||
- "traefik.http.routers.${STACK_NAME}.entrypoints=web-secure"
|
||||
- "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}"
|
||||
- "coop-cloud.${STACK_NAME}.version=0.2.3+0.20.3"
|
||||
- "coop-cloud.${STACK_NAME}.version=0.4.0+0.22.1"
|
||||
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
|
||||
healthcheck:
|
||||
test: [ "CMD", "curl", "-f", "http://localhost" ]
|
||||
interval: 30s
|
||||
@ -69,13 +69,11 @@ services:
|
||||
secrets:
|
||||
- db_password
|
||||
deploy:
|
||||
restart_policy:
|
||||
condition: on-failure
|
||||
labels:
|
||||
backupbot.backup: "true"
|
||||
backupbot.backup.pre-hook: "mkdir -p /tmp/backup/ && PGPASSWORD=$$(cat $${POSTGRES_PASSWORD_FILE}) pg_dump -U $${POSTGRES_USER} $${POSTGRES_DB} > /tmp/backup/backup.sql"
|
||||
backupbot.backup.post-hook: "rm -rf /tmp/backup"
|
||||
backupbot.backup.path: "/tmp/backup/"
|
||||
backupbot.backup.pre-hook: "PGPASSWORD=$$(cat $${POSTGRES_PASSWORD_FILE}) pg_dump -U $${POSTGRES_USER} $${POSTGRES_DB} > /var/lib/postgresql/data/backup.sql"
|
||||
backupbot.backup.post-hook: "rm -rf /var/lib/postgresql/data/backup.sql"
|
||||
backupbot.backup.path: "/var/lib/postgresql/data/backup.sql"
|
||||
|
||||
volumes:
|
||||
files:
|
||||
|
@ -33,7 +33,11 @@ service:
|
||||
# # Enable sharing of lists via a link
|
||||
# enablelinksharing: true
|
||||
# # Whether to let new users registering themselves or not
|
||||
# enableregistration: true
|
||||
{{ if eq (env "LOCAL_REGISTRATION_ENABLED") "true" }}
|
||||
enableregistration: true
|
||||
{{ else }}
|
||||
enableregistration: false
|
||||
{{ end }}
|
||||
# # Whether to enable task attachments or not
|
||||
# enabletaskattachments: true
|
||||
# # The time zone all timestamps are in. Please note that time zones have to use [the official tz database names](https://en.wikipedia.org/wiki/List_of_tz_database_time_zones). UTC or GMT offsets won't work.
|
||||
@ -290,7 +294,11 @@ auth:
|
||||
# This is the default auth mechanism and does not require any additional configuration.
|
||||
local:
|
||||
# Enable or disable local authentication
|
||||
{{ if eq (env "LOCAL_AUTH_ENABLED") "true" }}
|
||||
enabled: true
|
||||
{{ else }}
|
||||
enabled: false
|
||||
{{ end }}
|
||||
# OpenID configuration will allow users to authenticate through a third-party OpenID Connect compatible provider.<br/>
|
||||
# The provider needs to support the `openid`, `profile` and `email` scopes.<br/>
|
||||
# **Note:** Some openid providers (like gitlab) only make the email of the user available through openid claims if they have set it to be publicly visible.
|
||||
|
Reference in New Issue
Block a user