mirror of
https://github.com/Haxxnet/Compose-Examples
synced 2024-11-30 15:31:12 +00:00
add ownCloud oCIS
This commit is contained in:
parent
58529a0280
commit
95705816d7
|
@ -142,6 +142,7 @@ docker compose up
|
||||||
- [Hemmelig](examples/hemmelig) - Keep your sensitive information out of chat logs, emails, and more with encrypted secrets. Free encrypted secret sharing for everyone!
|
- [Hemmelig](examples/hemmelig) - Keep your sensitive information out of chat logs, emails, and more with encrypted secrets. Free encrypted secret sharing for everyone!
|
||||||
|
|
||||||
### File Sharing / Storage
|
### File Sharing / Storage
|
||||||
|
- [ownCloud OCIS](examples/owncloud-ocis) - ownCloud Infinite Scale (oCIS) is the new file sync & share platform written in Golang that will be the foundation of your data management platform.
|
||||||
- [Nextcloud](examples/nextcloud) - Access and share your files, calendars, contacts, mail and more from any device, on your terms.
|
- [Nextcloud](examples/nextcloud) - Access and share your files, calendars, contacts, mail and more from any device, on your terms.
|
||||||
- [Seafile](examples/seafile) - File hosting and sharing solution primary for teams and organizations.
|
- [Seafile](examples/seafile) - File hosting and sharing solution primary for teams and organizations.
|
||||||
- [SFTPGo](examples/sftpgo) - Fully featured and highly configurable SFTP server with optional HTTP/S, FTP/S and WebDAV support - S3, Google Cloud Storage, Azure Blob.
|
- [SFTPGo](examples/sftpgo) - Fully featured and highly configurable SFTP server with optional HTTP/S, FTP/S and WebDAV support - S3, Google Cloud Storage, Azure Blob.
|
||||||
|
|
12
examples/owncloud-ocis/README.md
Normal file
12
examples/owncloud-ocis/README.md
Normal file
|
@ -0,0 +1,12 @@
|
||||||
|
# References
|
||||||
|
|
||||||
|
- https://github.com/owncloud/ocis/tree/master/deployments/examples
|
||||||
|
- https://github.com/owncloud/ocis/tree/master/deployments/examples/ocis_traefik
|
||||||
|
|
||||||
|
# Notes
|
||||||
|
|
||||||
|
After spawning up the docker container, a new admin password will be generated automatically. You can obtain the admin password either via the container logs or by inspecting the created `ocis.yaml` file within your volume mounts.
|
||||||
|
|
||||||
|
It is recommended to use Owncloud OCIS behind a reverse proxy (e.g. Traefik). If you already run a Traefik reverse proxy, just uncomment and adjust the labels.
|
||||||
|
|
||||||
|
Note: The docker volume mounts must be writable by the container. OCIS does not support UID/GUID mappings yet. So 0777 linux permissions likely required.
|
44
examples/owncloud-ocis/docker-compose.yml
Normal file
44
examples/owncloud-ocis/docker-compose.yml
Normal file
|
@ -0,0 +1,44 @@
|
||||||
|
---
|
||||||
|
version: "3.7"
|
||||||
|
|
||||||
|
services:
|
||||||
|
|
||||||
|
ocis:
|
||||||
|
image: owncloud/ocis:latest
|
||||||
|
container_name: owncloud-ocis
|
||||||
|
hostname: owncloud-ocis
|
||||||
|
restart: unless-stopped
|
||||||
|
entrypoint:
|
||||||
|
- /bin/sh
|
||||||
|
# run ocis init to initialize a configuration file with random secrets
|
||||||
|
# it will fail on subsequent runs, because the config file already exists
|
||||||
|
# therefore we ignore the error and then start the ocis server
|
||||||
|
command: ["-c", "ocis init || true; ocis server"]
|
||||||
|
environment:
|
||||||
|
OCIS_URL: https://cloud.example.com # adjust to your domain
|
||||||
|
PROXY_TLS: "false" # do not use SSL; required if you use a reverse proxy with SSL support in front
|
||||||
|
OCIS_INSECURE: "true" # required if you use a reverse proxy with SSL support in front
|
||||||
|
volumes:
|
||||||
|
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/owncloud-ocis/config:/etc/ocis
|
||||||
|
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/owncloud-ocis/data:/var/lib/ocis
|
||||||
|
ports:
|
||||||
|
- 9200:9200/tcp
|
||||||
|
#expose:
|
||||||
|
# - 9200
|
||||||
|
#labels:
|
||||||
|
# - traefik.enable=true
|
||||||
|
# - traefik.http.routers.ocis.rule=Host(`cloud.example.com`)
|
||||||
|
# - traefik.http.services.ocis.loadbalancer.server.port=9200
|
||||||
|
# - traefik.http.middlewares.limit.buffering.maxRequestBodyBytes=50000000 # optional, only necessary for enabled file uploads
|
||||||
|
# - traefik.http.middlewares.limit.buffering.maxResponseBodyBytes=50000000 # optional, only necessary for enabled file uploads
|
||||||
|
# - traefik.http.middlewares.limit.buffering.memRequestBodyBytes=50000000 # optional, only necessary for enabled file uploads
|
||||||
|
# - traefik.http.middlewares.limit.buffering.memResponseBodyBytes=50000000 # optional, only necessary for enabled file uploads
|
||||||
|
# - traefik.docker.network=dev
|
||||||
|
# # Part for optional traefik middlewares
|
||||||
|
# - traefik.http.routers.ocis.middlewares=local-ipwhitelist@file
|
||||||
|
#networks:
|
||||||
|
# - dev
|
||||||
|
|
||||||
|
#networks:
|
||||||
|
# dev:
|
||||||
|
# external: true
|
Loading…
Reference in New Issue
Block a user