cleaned up folders
This commit is contained in:
@@ -1,9 +0,0 @@
|
||||
services:
|
||||
app:
|
||||
image: wardy784/caddygen:latest
|
||||
ports:
|
||||
- "8189:80"
|
||||
restart: unless-stopped
|
||||
container_name: caddygen
|
||||
|
||||
|
||||
@@ -1,8 +0,0 @@
|
||||
FROM caddy:builder AS builder
|
||||
|
||||
RUN caddy-builder \
|
||||
github.com/caddy-dns/cloudflare
|
||||
|
||||
FROM caddy:latest
|
||||
|
||||
COPY --from=builder /usr/bin/caddy /usr/bin/caddy
|
||||
@@ -1,46 +0,0 @@
|
||||
# Miscellaneous https://www.authelia.com/configuration/miscellaneous/introduction/
|
||||
# Set also AUTHELIA_JWT_SECRET_FILE
|
||||
theme: auto
|
||||
default_redirection_url: https://auth.akanealw.com/
|
||||
|
||||
# First Factor https://www.authelia.com/configuration/first-factor/file/
|
||||
authentication_backend:
|
||||
file:
|
||||
path: /config/users_database.yml
|
||||
|
||||
# Second Factor https://www.authelia.com/configuration/second-factor/introduction/
|
||||
totp:
|
||||
issuer: akanealw.com
|
||||
|
||||
# Security https://www.authelia.com/configuration/security/access-control/
|
||||
access_control:
|
||||
default_policy: two_factor
|
||||
|
||||
# Session https://www.authelia.com/configuration/session/introduction/
|
||||
# Set also AUTHELIA_SESSION_SECRET_FILE
|
||||
session:
|
||||
domain: akanealw.com
|
||||
|
||||
# https://www.authelia.com/configuration/session/redis/
|
||||
# Set also AUTHELIA_SESSION_REDIS_PASSWORD_FILE if appropriate
|
||||
redis:
|
||||
host: redis
|
||||
port: 6379
|
||||
|
||||
# Storage https://www.authelia.com/configuration/storage/postgres/
|
||||
# Set also AUTHELIA_STORAGE_POSTGRES_PASSWORD_FILE
|
||||
# Set also AUTHELIA_STORAGE_ENCRYPTION_KEY_FILE
|
||||
storage:
|
||||
postgres:
|
||||
host: postgres
|
||||
database: authelia
|
||||
username: authelia
|
||||
|
||||
# SMTP Notifier https://www.authelia.com/configuration/notifications/smtp/
|
||||
# Set also AUTHELIA_NOTIFIER_SMTP_PASSWORD_FILE
|
||||
notifier:
|
||||
smtp:
|
||||
host: smtp.gmail.com
|
||||
port: 587
|
||||
username: akanealw@gmail.com
|
||||
sender: "Authelia <akanealw@gmail.com>"
|
||||
@@ -1 +0,0 @@
|
||||
4zCkp6VWUWwY4PDDN5olunCT98xWIl2RoVEnUjdKcM18GtcKDmjY8fRD795H8oxo
|
||||
@@ -1 +0,0 @@
|
||||
t7SxQuf48cUu1XLBNKLbWGBJzEUSMnaWMd9a1QRqoXyhajcPQObfX0so9M2Mklxn
|
||||
@@ -1 +0,0 @@
|
||||
eht7lOozIpqlshLWpVuSkrV6mDn71qGTmzZSRplCTLC5oXrfvOna9vNJYcYgDeRV
|
||||
@@ -1 +0,0 @@
|
||||
ifisridbjcnsrgat
|
||||
@@ -1 +0,0 @@
|
||||
P2zLfIArLigGjJkCmM9SBtt8I4xwNdJJrVK8eVU1D8eNzhLcaw4yNLiRGyYaGOha
|
||||
@@ -1 +0,0 @@
|
||||
8RXS4KPhejCw7OaqrtOhdgaUN4k9rPOcK4sUDBvIQ6q8BDNFWo4l47RXtY7Itkic
|
||||
@@ -1,8 +0,0 @@
|
||||
# User file database https://www.authelia.com/reference/guides/passwords/#yaml-format
|
||||
# Generate passwords https://www.authelia.com/reference/guides/passwords/#passwords
|
||||
# docker run --rm -it authelia/authelia:latest authelia crypto hash generate argon2
|
||||
users:
|
||||
akanealw:
|
||||
password: $argon2id$v=19$m=65536,t=3,p=4$qZQtuOoVQp0+M0NHWarIxQ$tdAdmJK6KB0Z5ngDyoCPu2YD/wDFlHgBSbgt/5WqVYY
|
||||
displayname: "akanealw"
|
||||
email: akanealw@gmail.com
|
||||
@@ -1,38 +0,0 @@
|
||||
(trusted_proxy_list) {
|
||||
trusted_proxies 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 fc00::/7
|
||||
}
|
||||
|
||||
(secure_site) {
|
||||
forward_auth {args[0]} auth.akanealw.com:9091 {
|
||||
uri /api/verify?rd=https://auth.akanealw.com
|
||||
copy_headers Remote-User Remote-Groups Remote-Name Remote-Email
|
||||
import trusted_proxy_list
|
||||
header_up Host {upstream_hostport}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
# Authelia Portal.
|
||||
auth.akanealw.com {
|
||||
reverse_proxy auth.akanealw.com:9091 {
|
||||
import trusted_proxy_list
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
# Protected Endpoint.
|
||||
gitea.akanealw.com {
|
||||
import secure_site *
|
||||
reverse_proxy 192.168.1.50:3000 {
|
||||
import trusted_proxy_list
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
# Protected Endpoint.
|
||||
codeserver.akanealw.com {
|
||||
import secure_site *
|
||||
reverse_proxy 192.168.1.50:3001 {
|
||||
import trusted_proxy_list
|
||||
}
|
||||
}
|
||||
@@ -1,64 +0,0 @@
|
||||
networks:
|
||||
authelia:
|
||||
name: authelia
|
||||
reverseproxy:
|
||||
name: reverseproxy
|
||||
external: true
|
||||
|
||||
services:
|
||||
authelia:
|
||||
container_name: authelia
|
||||
image: authelia/authelia:latest
|
||||
restart: unless-stopped
|
||||
depends_on:
|
||||
- postgres
|
||||
- redis
|
||||
volumes:
|
||||
- ./authelia/config:/config
|
||||
networks:
|
||||
- authelia
|
||||
- reverseproxy
|
||||
environment:
|
||||
AUTHELIA_JWT_SECRET_FILE: /authelia/config/secrets/JWT_SECRET
|
||||
AUTHELIA_SESSION_SECRET_FILE: /authelia/config/secrets/SESSION_SECRET
|
||||
AUTHELIA_NOTIFIER_SMTP_PASSWORD_FILE: /authelia/config/secrets/SMTP_PASSWORD
|
||||
AUTHELIA_STORAGE_ENCRYPTION_KEY_FILE: /authelia/config/secrets/STORAGE_ENCRYPTION_KEY
|
||||
AUTHELIA_STORAGE_POSTGRES_PASSWORD_FILE: /authelia/config/secrets/STORAGE_PASSWORD
|
||||
AUTHELIA_SESSION_REDIS_PASSWORD_FILE: /authelia/config/secrets/REDIS_PASSWORD
|
||||
|
||||
caddy:
|
||||
container_name: caddy
|
||||
build: .
|
||||
# image: caddy:latest
|
||||
#restart: unless-stopped
|
||||
ports:
|
||||
- "80:80"
|
||||
- "443:443"
|
||||
networks:
|
||||
- reverseproxy
|
||||
volumes:
|
||||
- ./caddy/data:/data
|
||||
- ./caddy/Caddyfile:/etc/caddy/Caddyfile
|
||||
|
||||
postgres:
|
||||
container_name: postgres
|
||||
image: postgres:15
|
||||
restart: unless-stopped
|
||||
volumes:
|
||||
- ./postgres:/var/lib/postgresql/data
|
||||
networks:
|
||||
- authelia
|
||||
environment:
|
||||
POSTGRES_USER: "authelia"
|
||||
POSTGRES_PASSWORD: "8RXS4KPhejCw7OaqrtOhdgaUN4k9rPOcK4sUDBvIQ6q8BDNFWo4l47RXtY7Itkic"
|
||||
|
||||
redis:
|
||||
container_name: redis
|
||||
image: redis:7
|
||||
networks:
|
||||
- authelia
|
||||
restart: unless-stopped
|
||||
command: "redis-server --save 60 1 --loglevel warning --requirepass t7SxQuf48cUu1XLBNKLbWGBJzEUSMnaWMd9a1QRqoXyhajcPQObfX0so9M2Mklxn"
|
||||
volumes:
|
||||
- ./redis:/data
|
||||
|
||||
Reference in New Issue
Block a user