1
0
mirror of https://github.com/Haxxnet/Compose-Examples synced 2024-12-24 19:20:20 +00:00
Compose-Examples/examples/vouchervault/docker-compose.yml

61 lines
2.3 KiB
YAML
Raw Normal View History

2024-07-08 21:44:40 +00:00
services:
vouchervault:
2024-11-28 12:39:10 +00:00
image: l4rm4nd/vouchervault:1.7.x
2024-07-08 21:44:40 +00:00
container_name: vouchervault
environment:
2024-08-05 08:28:47 +00:00
# your FQDN or IP; used to define ALLOWED_HOSTS and CSRF_TRUSTED_ORIGINS
- DOMAIN=vouchervault.example.com
# set to True if you use a reverse proxy with tls; enables secure cookie flag and hsts
- SECURE_COOKIES=False
# send notifications xx days prior expiry
- EXPIRY_THRESHOLD_DAYS=90
# define the timezone
- TZ=Europe/Berlin
2024-07-29 02:23:34 +00:00
# ------- OPTIONAL OIDC AUTH --------
# Set to 'True' to enable OIDC authentication
#- OIDC_ENABLED=True
# Set to 'True' to allow the creation of new users through OIDC
#- OIDC_CREATE_USER=True
# The signing algorithm used by the OIDC provider (e.g., RS256, HS256)
#- OIDC_RP_SIGN_ALGO=RS256
# URL of the JWKS endpoint for the OIDC provider
#- OIDC_OP_JWKS_ENDPOINT=https://authentik.example.com/application/o/vouchervault/jwks/
# Client ID for your OIDC RP
#- OIDC_RP_CLIENT_ID=vouchervault
# Client secret for your OIDC RP
#- OIDC_RP_CLIENT_SECRET=super-secure-secret-key
# Authorization endpoint URL of the OIDC provider
#- OIDC_OP_AUTHORIZATION_ENDPOINT=https://authentik.example.com/application/o/authorize/
# Token endpoint URL of the OIDC provider
#- OIDC_OP_TOKEN_ENDPOINT=https://authentik.example.com/application/o/token/
# User info endpoint URL of the OIDC provider
#- OIDC_OP_USER_ENDPOINT=https://authentik.example.com/application/o/userinfo/
2024-07-08 21:44:40 +00:00
restart: unless-stopped
expose:
- 8000
ports:
2024-07-28 00:27:30 +00:00
- 8000:8000
2024-07-08 21:44:40 +00:00
volumes:
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/vouchervault/database:/opt/app/database
#networks:
# - proxy
#labels:
# - traefik.enable=true
# - traefik.docker.network=proxy
# - traefik.http.routers.vouchervault.rule=Host(`vouchervault.example.com`)
# - traefik.http.services.vouchervault.loadbalancer.server.port=8000
# # Optional part for traefik middlewares
# - traefik.http.routers.vouchervault.middlewares=local-ipwhitelist@file
redis:
2024-10-01 08:55:17 +00:00
image: redis:7-alpine
2024-11-23 14:08:26 +00:00
container_name: vouchervault-redis
2024-07-08 21:44:40 +00:00
restart: unless-stopped
#networks:
# - proxy
#networks:
# proxy:
# external: true