mirror of
https://gitlab.sectorq.eu/home/docker-compose.git
synced 2025-12-14 10:24:53 +01:00
build
This commit is contained in:
@@ -1,8 +1,3 @@
|
||||
volumes:
|
||||
bookstack_db_data:
|
||||
driver: local
|
||||
bookstack_app_data:
|
||||
driver: local
|
||||
services:
|
||||
app:
|
||||
env_file:
|
||||
@@ -14,7 +9,7 @@ services:
|
||||
protocol: tcp
|
||||
mode: ingress
|
||||
volumes:
|
||||
- bookstack_app_data:/config
|
||||
- /share/docker_data/bookstack/bookstack_app_data:/config
|
||||
deploy:
|
||||
labels:
|
||||
com.centurylinklabs.watchtower.enable: 'true'
|
||||
@@ -40,7 +35,7 @@ services:
|
||||
PUID: 0
|
||||
image: ${DOCKER_REGISTRY:-}lscr.io/linuxserver/mariadb
|
||||
volumes:
|
||||
- bookstack_db_data:/config
|
||||
- /share/docker_data/bookstack/bookstack_db_data:/config
|
||||
deploy:
|
||||
labels:
|
||||
wud.watch: 'true'
|
||||
@@ -49,3 +44,4 @@ services:
|
||||
placement:
|
||||
constraints:
|
||||
- node.role == manager
|
||||
version: '2'
|
||||
|
||||
@@ -1,16 +1,16 @@
|
||||
PUID: 1000
|
||||
PGID: 1000
|
||||
APP_URL: https://bookstack.sectorq.eu
|
||||
DB_HOST: db
|
||||
DB_PORT: 3306
|
||||
DB_USER: bookstack
|
||||
DB_PASS: l4c1j4yd33Du5lo
|
||||
DB_DATABASE: bookstackapp
|
||||
MYSQL_ROOT_PASSWORD: l4c1j4yd33Du5lo
|
||||
TZ: Europe/Bratislava
|
||||
MYSQL_DATABASE: bookstackapp
|
||||
MYSQL_USER: bookstack
|
||||
MYSQL_PASSWORD: l4c1j4yd33Du5lo
|
||||
PUID=1000
|
||||
PGID=1000
|
||||
APP_URL=https://bookstack.sectorq.eu
|
||||
DB_HOST=db
|
||||
DB_PORT=3306
|
||||
DB_USER=bookstack
|
||||
DB_PASS=l4c1j4yd33Du5lo
|
||||
DB_DATABASE=bookstackapp
|
||||
MYSQL_ROOT_PASSWORD=l4c1j4yd33Du5lo
|
||||
TZ=Europe/Bratislava
|
||||
MYSQL_DATABASE=bookstackapp
|
||||
MYSQL_USER=bookstack
|
||||
MYSQL_PASSWORD=l4c1j4yd33Du5lo
|
||||
# # Set authentication method to be saml2
|
||||
# AUTH_METHOD: saml2
|
||||
# # Control if BookStack automatically initiates login via your SAML system if it's the only authentication method.
|
||||
@@ -46,41 +46,41 @@ MYSQL_PASSWORD: l4c1j4yd33Du5lo
|
||||
|
||||
|
||||
# Set OIDC to be the authentication method
|
||||
AUTH_METHOD: oidc
|
||||
AUTH_METHOD=oidc
|
||||
#AUTH_METHOD: standard
|
||||
# Control if BookStack automatically initiates login via your OIDC system
|
||||
# if it's the only authentication method. Prevents the need for the
|
||||
# user to click the "Login with x" button on the login page.
|
||||
# Setting this to true enables auto-initiation.
|
||||
AUTH_AUTO_INITIATE: true
|
||||
AUTH_AUTO_INITIATE=true
|
||||
|
||||
# Set the display name to be shown on the login button.
|
||||
# (Login with <name>)
|
||||
OIDC_NAME: SSO
|
||||
OIDC_NAME=SSO
|
||||
|
||||
# Name of the claims(s) to use for the user's display name.
|
||||
# Can have multiple attributes listed, separated with a '|' in which
|
||||
# case those values will be joined with a space.
|
||||
# Example: OIDC_DISPLAY_NAME_CLAIMS=given_name|family_name
|
||||
OIDC_DISPLAY_NAME_CLAIMS: name
|
||||
OIDC_DISPLAY_NAME_CLAIMS=name
|
||||
|
||||
# OAuth Client ID to access the identity provider
|
||||
OIDC_CLIENT_ID: GCPj547vTmEpmsCM8jkuR222SS31yZMdp7oAU82U
|
||||
OIDC_CLIENT_ID=GCPj547vTmEpmsCM8jkuR222SS31yZMdp7oAU82U
|
||||
|
||||
# OAuth Client Secret to access the identity provider
|
||||
OIDC_CLIENT_SECRET: Nador7SOdsYgfNhRwbeRKLNPkPiASBAlTnKVi294xbOz8MM3e2RlzAaWQsQNZmBtLLZVifb1TG3OpKrVXeeW3Vu8HmJuvy8GwSAT2r0pP0241tDdEShq7UkP9G5Esdt8
|
||||
OIDC_CLIENT_SECRET=Nador7SOdsYgfNhRwbeRKLNPkPiASBAlTnKVi294xbOz8MM3e2RlzAaWQsQNZmBtLLZVifb1TG3OpKrVXeeW3Vu8HmJuvy8GwSAT2r0pP0241tDdEShq7UkP9G5Esdt8
|
||||
|
||||
# Issuer URL
|
||||
# Must start with 'https://'
|
||||
OIDC_ISSUER: https://auth.sectorq.eu/application/o/bookstack/
|
||||
OIDC_ISSUER=https://auth.sectorq.eu/application/o/bookstack/
|
||||
|
||||
# The "end session" (RP-initiated logout) URL to call during BookStack logout.
|
||||
# By default this is false which disables RP-initiated logout.
|
||||
# Setting to "true" will enable logout if found as supported by auto-discovery.
|
||||
# Otherwise, this can be set as a specific URL endpoint.
|
||||
OIDC_END_SESSION_ENDPOINT: false
|
||||
OIDC_END_SESSION_ENDPOINT=false
|
||||
|
||||
# Enable auto-discovery of endpoints and token keys.
|
||||
# As per the standard, expects the service to serve a
|
||||
# `<issuer>/.well-known/openid-configuration` endpoint.
|
||||
OIDC_ISSUER_DISCOVER: true
|
||||
OIDC_ISSUER_DISCOVER=true
|
||||
|
||||
Reference in New Issue
Block a user