Compare commits

...

4 Commits

@ -89,8 +89,18 @@ The caddy service expects to be able to bind to ports 80 and 443
One simple way is to allow unprivileged users access to these low ports One simple way is to allow unprivileged users access to these low ports
echo 'net.ipv4.ip_unprivileged_port_start=80' | sudo tee -a /etc/sysctl.conf If you are on linux, you can run
sudo sysctl -w net.ipv4.ip_unprivileged_port_start=80
$ sudo sysctl -w net.ipv4.ip_unprivileged_port_start=80
$ echo 'net.ipv4.ip_unprivileged_port_start=80' | sudo tee -a /etc/sysctl.conf
The first command will set privileges until reboot. The second will make those privileges permanent.
If you are on macOS, using podman, you will want to run those commands in the linux virtual machine
$ podman machine ssh
core@localhost:~$ echo 'net.ipv4.ip_unprivileged_port_start=80' | sudo tee -a /etc/systctl.conf
core@localhost:~$ sudo sysctl -w net.ipv4.ip_unprivileged_port_start=80
--- ---
@ -110,15 +120,14 @@ See [the services readme](./services/readme.md) for a guide on adding a new serv
### alpha ### alpha
- [x] identity provider (zitadel) - [ ] decide on single postgres instance or multiple
- [ ] postgres backup (duplicity)
- [ ] single sign-on for webdav (one user per folder) - [ ] single sign-on for webdav (one user per folder)
- [ ] single sign-on for one more service - [ ] single sign-on for one more service
- [x] identity provider (zitadel)
- [x] file backup (duplicity) - [x] file backup (duplicity)
- [ ] postgres backup (duplicity)
- [ ] decide on single postgres instance or multiple
- [x] reverse proxy (caddy) - [x] reverse proxy (caddy)
- [x] personal home pages (caddy-webdav) - [x] personal home pages (caddy-webdav)
- [x] migrate from yaml to env for authelia config
- [x] setup notifications via smtp - [x] setup notifications via smtp
### beta ### beta

@ -1,5 +1,3 @@
version: "3.8"
secrets: secrets:
MASTER_KEY: MASTER_KEY:
file: ../secrets/auth/zitadel/MASTER_KEY file: ../secrets/auth/zitadel/MASTER_KEY
@ -15,7 +13,7 @@ services:
zitadel: zitadel:
restart: 'unless-stopped' restart: 'unless-stopped'
image: 'ghcr.io/zitadel/zitadel:v2.42.10' image: 'ghcr.io/zitadel/zitadel:v2.48.3'
environment: environment:
ZITADEL_DATABASE_COCKROACH_HOST: crdb ZITADEL_DATABASE_COCKROACH_HOST: crdb
ZITADEL_EXTERNALSECURE: true ZITADEL_EXTERNALSECURE: true

@ -1,5 +1,3 @@
version: "3.8"
secrets: secrets:
B2_APPLICATION_KEY: B2_APPLICATION_KEY:
file: ../secrets/backup/duplicity/B2_APPLICATION_KEY file: ../secrets/backup/duplicity/B2_APPLICATION_KEY
@ -12,7 +10,7 @@ secrets:
services: services:
backup: backup:
image: tecnativa/docker-duplicity:latest image: ghcr.io/tecnativa/docker-duplicity:3.3.1
restart: unless-stopped restart: unless-stopped
depends_on: depends_on:
generate-secrets: generate-secrets:

@ -1,5 +1,3 @@
version: "3.8"
secrets: secrets:
DB_PASSWD: DB_PASSWD:
file: ../secrets/git/gitea/DB_PASSWD file: ../secrets/git/gitea/DB_PASSWD

@ -1,5 +1,3 @@
version: "3.8"
secrets: secrets:
SMTP_PASSWORD: SMTP_PASSWORD:
file: ../secrets/mail/SMTP_PASSWORD file: ../secrets/mail/SMTP_PASSWORD

@ -1,5 +1,3 @@
version: "3.8"
services: services:
caddy: caddy:
image: caddy image: caddy

@ -1,5 +1,3 @@
version: "3.8"
services: services:
generate-secrets: generate-secrets:
image: alpine/openssl image: alpine/openssl

@ -1,5 +1,3 @@
version: "3.8"
services: services:
web: web:
build: build:

Loading…
Cancel
Save