Try adding forward_auth with webdav

authelia
Jonathan Dahan 2 years ago
parent 1ddc1ac083
commit 1781cb4c50

@ -15,6 +15,8 @@ secrets:
file: ../secrets/smtp/SMTP_HOST file: ../secrets/smtp/SMTP_HOST
SMTP_PORT: SMTP_PORT:
file: ../secrets/smtp/SMTP_PORT file: ../secrets/smtp/SMTP_PORT
SMTP_USERNAME:
file: ../secrets/smtp/SMTP_USERNAME
services: services:
authelia: authelia:
@ -25,11 +27,11 @@ services:
- postgres - postgres
- secrets - secrets
- caddy - caddy
- smtp #- smtp
restart: unless-stopped restart: unless-stopped
expose: expose:
- 9091 - 9091
secrets: [JWT_SECRET, SESSION_SECRET, STORAGE_PASSWORD, STORAGE_ENCRYPTION_KEY, SMTP_PASSWORD, SMTP_HOST, SMTP_PORT] secrets: [JWT_SECRET, SESSION_SECRET, STORAGE_PASSWORD, STORAGE_ENCRYPTION_KEY, SMTP_PASSWORD, SMTP_HOST, SMTP_PORT, SMTP_USERNAME]
environment: environment:
AUTHELIA_JWT_SECRET_FILE: /run/secrets/JWT_SECRET AUTHELIA_JWT_SECRET_FILE: /run/secrets/JWT_SECRET
AUTHELIA_SESSION_SECRET_FILE: /run/secrets/SESSION_SECRET AUTHELIA_SESSION_SECRET_FILE: /run/secrets/SESSION_SECRET
@ -37,7 +39,7 @@ services:
AUTHELIA_STORAGE_POSTGRES_DATABASE: authelia AUTHELIA_STORAGE_POSTGRES_DATABASE: authelia
AUTHELIA_STORAGE_POSTGRES_ADDRESS: postgres AUTHELIA_STORAGE_POSTGRES_ADDRESS: postgres
AUTHELIA_STORAGE_POSTGRES_USERNAME: authelia AUTHELIA_STORAGE_POSTGRES_USERNAME_FILE: /run/secrets/SMTP_USERNAME
AUTHELIA_STORAGE_POSTGRES_PASSWORD_FILE: /run/secrets/STORAGE_PASSWORD AUTHELIA_STORAGE_POSTGRES_PASSWORD_FILE: /run/secrets/STORAGE_PASSWORD
AUTHELIA_DEFAULT_REDIRECTION_URL: https://${DOMAIN} AUTHELIA_DEFAULT_REDIRECTION_URL: https://${DOMAIN}
@ -80,14 +82,14 @@ services:
- ../data/authelia/config:/mnt/backup/src/authelia/config:ro - ../data/authelia/config:/mnt/backup/src/authelia/config:ro
# backup the postgres database # backup the postgres database
backup-postgres: #backup-postgres:
volumes: # volumes:
- ../secrets/authelia/STORAGE_PASSWORD:/run/secrets/AUTHELIA_PGPASSWORD # - ../secrets/authelia/STORAGE_PASSWORD:/run/secrets/AUTHELIA_PGPASSWORD
environment: # environment:
- AUTHELIA_PGHOST: authelia # - AUTHELIA_PGHOST: authelia
- AUTHELIA_PGUSER: authelia # - AUTHELIA_PGUSER: authelia
- AUTHELIA_DBS_TO_INCLUDE: authelia # - AUTHELIA_DBS_TO_INCLUDE: authelia
- AUTHELIA_PGPASSWORD_FILE: /run/secrets/AUTHELIA_PGPASSWORD # - AUTHELIA_PGPASSWORD_FILE: /run/secrets/AUTHELIA_PGPASSWORD
# generate all these secrets if they are empty on start # generate all these secrets if they are empty on start
secrets: secrets:

@ -20,22 +20,22 @@ services:
environment: environment:
HOSTNAME: ${DOMAIN} HOSTNAME: ${DOMAIN}
TZ: America/New_York TZ: America/New_York
entrypoint: ["/run"]
volumes: volumes:
- ./backup/run:/run:ro - ./backup/backup-files:/backup-files:ro
entrypoint: ["/backup-files"]
backup-postgres: # backup-postgres:
container_name: backup-postgres # container_name: backup-postgres
image: tecnativa/docker-duplicity-postgres:latest # image: tecnativa/docker-duplicity-postgres:latest
restart: unless-stopped # restart: unless-stopped
depends_on: [secrets] # depends_on: [secrets]
secrets: [B2_APPLICATION_KEY, B2_APPLICATION_KEY_ID, BUCKET_NAME, PASSPHRASE] # secrets: [B2_APPLICATION_KEY, B2_APPLICATION_KEY_ID, BUCKET_NAME, PASSPHRASE]
environment: # environment:
HOSTNAME: ${DOMAIN} # HOSTNAME: ${DOMAIN}
TZ: America/New_York # TZ: America/New_York
entrypoint: ["/run-postgres"] # entrypoint: ["/backup-databases"]
volumes: # volumes:
- ./backup/run-postgres:/run-postgres:ro # - ./backup/backup-databases:/backup-databases:ro
secrets: secrets:
volumes: volumes:

@ -1,3 +1,9 @@
web.{$DOMAIN} { web.{$DOMAIN} {
forward_auth authelia:9091 {
uri /api/verify?rd=https://login.{$DOMAIN}/
copy_headers Remote-User Remote-Groups Remote-Name Remote-Email
}
reverse_proxy web:4431 reverse_proxy web:4431
} }

Loading…
Cancel
Save