mirror of
https://github.com/Haxxnet/Compose-Examples
synced 2024-11-27 22:11:12 +00:00
61 lines
2.3 KiB
YAML
61 lines
2.3 KiB
YAML
services:
|
|
|
|
vouchervault:
|
|
image: l4rm4nd/vouchervault:1.6.x
|
|
container_name: vouchervault
|
|
environment:
|
|
# your FQDN or IP; used to define ALLOWED_HOSTS and CSRF_TRUSTED_ORIGINS
|
|
- DOMAIN=vouchervault.example.com
|
|
# set to True if you use a reverse proxy with tls; enables secure cookie flag and hsts
|
|
- SECURE_COOKIES=False
|
|
# send notifications xx days prior expiry
|
|
- EXPIRY_THRESHOLD_DAYS=90
|
|
# define the timezone
|
|
- TZ=Europe/Berlin
|
|
# ------- OPTIONAL OIDC AUTH --------
|
|
# Set to 'True' to enable OIDC authentication
|
|
#- OIDC_ENABLED=True
|
|
# Set to 'True' to allow the creation of new users through OIDC
|
|
#- OIDC_CREATE_USER=True
|
|
# The signing algorithm used by the OIDC provider (e.g., RS256, HS256)
|
|
#- OIDC_RP_SIGN_ALGO=RS256
|
|
# URL of the JWKS endpoint for the OIDC provider
|
|
#- OIDC_OP_JWKS_ENDPOINT=https://authentik.example.com/application/o/vouchervault/jwks/
|
|
# Client ID for your OIDC RP
|
|
#- OIDC_RP_CLIENT_ID=vouchervault
|
|
# Client secret for your OIDC RP
|
|
#- OIDC_RP_CLIENT_SECRET=super-secure-secret-key
|
|
# Authorization endpoint URL of the OIDC provider
|
|
#- OIDC_OP_AUTHORIZATION_ENDPOINT=https://authentik.example.com/application/o/authorize/
|
|
# Token endpoint URL of the OIDC provider
|
|
#- OIDC_OP_TOKEN_ENDPOINT=https://authentik.example.com/application/o/token/
|
|
# User info endpoint URL of the OIDC provider
|
|
#- OIDC_OP_USER_ENDPOINT=https://authentik.example.com/application/o/userinfo/
|
|
restart: unless-stopped
|
|
expose:
|
|
- 8000
|
|
ports:
|
|
- 8000:8000
|
|
volumes:
|
|
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/vouchervault/database:/opt/app/database
|
|
#networks:
|
|
# - proxy
|
|
#labels:
|
|
# - traefik.enable=true
|
|
# - traefik.docker.network=proxy
|
|
# - traefik.http.routers.vouchervault.rule=Host(`vouchervault.example.com`)
|
|
# - traefik.http.services.vouchervault.loadbalancer.server.port=8000
|
|
# # Optional part for traefik middlewares
|
|
# - traefik.http.routers.vouchervault.middlewares=local-ipwhitelist@file
|
|
|
|
redis:
|
|
container_name: vouchervault-redis
|
|
image: redis:7-alpine
|
|
restart: unless-stopped
|
|
#networks:
|
|
# - proxy
|
|
|
|
#networks:
|
|
# proxy:
|
|
# external: true
|