Compare commits
19 Commits
66da275f4c
...
main
Author | SHA1 | Date | |
---|---|---|---|
34117da151 | |||
eb43a163a6 | |||
bbf61dc0f0 | |||
a5b7aca9b7 | |||
1f9bd5ea4b | |||
e2931630c6 | |||
a0300d20d6 | |||
d9653fc215 | |||
15a13f1eff | |||
b2509bfd67 | |||
78300c3bf4 | |||
2630301d58 | |||
3f2a4b78fb | |||
342d7bfa58 | |||
fad68813ae | |||
f4d72bff12 | |||
532c0a9c7b | |||
e24754bc44 | |||
b770dfd525 |
@ -8,7 +8,7 @@ COMPOSE_FILE=${SERVICES_DIR}/lldap/docker-compose.yml:${SERVICES_DIR}/lldap/dock
|
||||
#######
|
||||
# LLDAP
|
||||
|
||||
LLDAP_DOMAIN=lldap.cool.life
|
||||
SERVICE_DOMAIN=lldap.cool.life
|
||||
LLDAP_VOLUME_NAME=lldap_cool_life
|
||||
LLDAP_CONTAINER_NAME=lldap_cool_life
|
||||
LLDAP_IMAGE=nitnelave/lldap:v0.4.3
|
||||
|
@ -10,13 +10,13 @@ services:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=${TRAEFIK_NETWORK_NAME:-traefik}
|
||||
- traefik.http.routers.${TRAEFIK_ROUTER_NAME:-lldap}.rule=Host(`${LLDAP_DOMAIN:?err}`)
|
||||
- traefik.http.routers.${TRAEFIK_ROUTER_NAME:-lldap}.rule=Host(`${SERVICE_DOMAIN:?err}`)
|
||||
- traefik.http.routers.${TRAEFIK_ROUTER_NAME:-lldap}.entrypoints=${TRAEFIK_ENTRYPOINTS:-web}
|
||||
# - traefik.http.routers.${TRAEFIK_ROUTER_NAME:-lldap}.tls.certResolver=letsencrypt
|
||||
- traefik.http.services.${TRAEFIK_ROUTER_NAME:-lldap}.loadbalancer.server.port=17170
|
||||
- traefik.http.services.${TRAEFIK_ROUTER_NAME:-lldap}.loadbalancer.server.scheme=http
|
||||
|
||||
# https://github.com/lldap/lldap/issues/247#issuecomment-1489962511
|
||||
# - traefik.tcp.routers.${TRAEFIK_ROUTER_NAME:-lldap}.rule=HostSNI(`${LLDAP_DOMAIN:?err}`)
|
||||
# - traefik.tcp.routers.${TRAEFIK_ROUTER_NAME:-lldap}.rule=HostSNI(`${SERVICE_DOMAIN:?err}`)
|
||||
# - traefik.tcp.routers.${TRAEFIK_ROUTER_NAME:-lldap}.entrypoints=${TRAEFIK_ENTRYPOINTS:-web}
|
||||
# - traefik.tcp.services.${TRAEFIK_ROUTER_NAME:-lldap}.loadbalancer.server.port=3890
|
||||
|
@ -16,7 +16,7 @@ services:
|
||||
- LLDAP_VERBOSE=${LLDAP_VERBOSE:-false}
|
||||
|
||||
- LLDAP_JWT_SECRET=${LLDAP_JWT_SECRET:?err}
|
||||
- LLDAP_HTTP_URL=https://${LLDAP_DOMAIN:?err}
|
||||
- LLDAP_HTTP_URL=https://${SERVICE_DOMAIN:?err}
|
||||
|
||||
- LLDAP_LDAP_BASE_DN=${LLDAP_LDAP_BASE_DN:?err}
|
||||
- LLDAP_LDAP_USER_DN=${LLDAP_LDAP_USER_DN:?err}
|
||||
|
@ -9,7 +9,7 @@ COMPOSE_FILE=${SERVICES_DIR}/vaultwarden/docker-compose.yml
|
||||
|
||||
#VAULTWARDEN_IMAGE=
|
||||
#VAULTWARDEN_VOLUME_NAME=
|
||||
VAULTWARDEN_DOMAIN=vaultwarden.local
|
||||
SERVICE_DOMAIN=vaultwarden.local
|
||||
|
||||
#VAULTWARDEN_LOG_LEVEL=
|
||||
#VAULTWARDEN_SIGNUPS_ALLOWED=false
|
||||
|
@ -10,6 +10,20 @@ Toutes les variables de configuration du service sont disponibles à [cette adre
|
||||
|
||||
[Les clients de Bitwarden](https://bitwarden.com/#download) sont compatibles avec le serveur.
|
||||
|
||||
## Ajout des mails en Français
|
||||
|
||||
Il est possible de [traduire les mails](https://github.com/dani-garcia/vaultwarden/wiki/Translating-the-email-templates).
|
||||
|
||||
```
|
||||
. .env
|
||||
cd /var/lib/docker/volumes/${VAULTWARDEN_VOLUME_NAME}/_data/
|
||||
mkdir templates && cd templates
|
||||
wget https://github.com/YoanSimco/vaultwarden-lang-fr/archive/refs/heads/main.zip
|
||||
unzip main.zip
|
||||
mv vaultwarden-lang-fr/email .
|
||||
rm vaultwarden-lang-fr-main/ main.zip -rf
|
||||
```
|
||||
|
||||
## Liens
|
||||
|
||||
- [Documentation][documentation]
|
||||
|
25
vaultwarden/docker-compose.sso.yml
Normal file
25
vaultwarden/docker-compose.sso.yml
Normal file
@ -0,0 +1,25 @@
|
||||
---
|
||||
|
||||
services:
|
||||
vaultwarden:
|
||||
environment:
|
||||
SSO_ENABLED: ${SSO_ENABLED:-true}
|
||||
SSO_ONLY: ${SSO_ONLY:-true}
|
||||
SSO_SIGNUPS_MATCH_EMAIL: ${SSO_SIGNUPS_MATCH_EMAIL:-true}
|
||||
SSO_AUTHORITY: ${SSO_AUTHORITY}
|
||||
SSO_SCOPES: ${SSO_SCOPES:-email groups profile offline_access}
|
||||
SSO_AUTHORIZE_EXTRA_PARAMS: ${SSO_AUTHORIZE_EXTRA_PARAMS:-}
|
||||
SSO_PKCE: ${SSO_PKCE:-false}
|
||||
SSO_CLIENT_ID: ${SSO_CLIENT_ID}
|
||||
SSO_CLIENT_SECRET: ${SSO_CLIENT_SECRET}
|
||||
# SSO_MASTER_PASSWORD_POLICY: ${SSO_MASTER_PASSWORD_POLICY:-}
|
||||
SSO_AUTH_ONLY_NOT_SESSION: ${SSO_AUTH_ONLY_NOT_SESSION:-false}
|
||||
SSO_CLIENT_CACHE_EXPIRATION: ${SSO_CLIENT_CACHE_EXPIRATION:-0}
|
||||
SSO_DEBUG_TOKENS: ${SSO_DEBUG_TOKENS:-false}
|
||||
|
||||
SSO_FRONTEND: ${SSO_FRONTEND:-override}
|
||||
# SSO_EXPERIMENTAL_NO_MASTER_PWD: ${SSO_EXPERIMENTAL_NO_MASTER_PWD:-false}
|
||||
SSO_ROLES_ENABLED: ${SSO_ROLES_ENABLED:-false}
|
||||
SSO_ROLES_DEFAULT_TO_USER: ${SSO_ROLES_DEFAULT_TO_USER:-false}
|
||||
|
||||
SSO_ORGANIZATIONS_INVITE: ${SSO_ORGANIZATIONS_INVITE:-false}
|
12
vaultwarden/docker-compose.traefik.https.yml
Normal file
12
vaultwarden/docker-compose.traefik.https.yml
Normal file
@ -0,0 +1,12 @@
|
||||
---
|
||||
|
||||
services:
|
||||
vaultwarden:
|
||||
labels:
|
||||
- traefik.http.routers.${TRAEFIK_ROUTER_NAME:-vaultwarden}.tls.certResolver=letsencrypt
|
||||
# redirect HTTP to HTTPS
|
||||
- traefik.http.routers.${TRAEFIK_ROUTER_NAME:-vaultwarden}_http.rule=Host(`${SERVICE_DOMAIN:?err}`)
|
||||
- traefik.http.routers.${TRAEFIK_ROUTER_NAME:-vaultwarden}_http.entrypoints=web
|
||||
- traefik.http.middlewares.${TRAEFIK_ROUTER_NAME:-vaultwarden}_redirect_https.redirectscheme.scheme=https
|
||||
- traefik.http.middlewares.${TRAEFIK_ROUTER_NAME:-vaultwarden}_redirect_https.redirectscheme.permanent=true
|
||||
- traefik.http.routers.${TRAEFIK_ROUTER_NAME:-vaultwarden}_http.middlewares=${TRAEFIK_ROUTER_NAME:-vaultwarden}_redirect_https
|
@ -10,5 +10,5 @@ services:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=${TRAEFIK_NETWORK_NAME:-traefik}
|
||||
- traefik.http.routers.${TRAEFIK_ROUTER_NAME:-vaultwarden}.rule=Host(`${VAULTWARDEN_DOMAIN:?err}`)
|
||||
- traefik.http.routers.${TRAEFIK_ROUTER_NAME:-vaultwarden}.rule=Host(`${SERVICE_DOMAIN:?err}`)
|
||||
- traefik.http.routers.${TRAEFIK_ROUTER_NAME:-vaultwarden}.entrypoints=${TRAEFIK_ENTRYPOINTS:-web}
|
@ -6,15 +6,21 @@ volumes:
|
||||
|
||||
services:
|
||||
vaultwarden:
|
||||
image: ${VAULTWARDEN_IMAGE:-vaultwarden/server:1.27.0-alpine}
|
||||
image: ${VAULTWARDEN_IMAGE:-vaultwarden/server:1.34.1-alpine}
|
||||
container_name: ${VAULTWARDEN_CONTAINER_NAME:-vaultwarden}
|
||||
restart: always
|
||||
environment:
|
||||
ADMIN_TOKEN: ${VAULTWARDEN_ADMIN_TOKEN:?err}
|
||||
DOMAIN: https://${VAULTWARDEN_DOMAIN:?err}
|
||||
DOMAIN: https://${SERVICE_DOMAIN:?err}
|
||||
SENDS_ALLOWED: ${SENDS_ALLOWED:-true}
|
||||
TRASH_AUTO_DELETE_DAYS: ${TRASH_AUTO_DELETE_DAYS:-}
|
||||
DISABLE_ICON_DOWNLOAD: ${DISABLE_ICON_DOWNLOAD:-false}
|
||||
SIGNUPS_ALLOWED: ${VAULTWARDEN_SIGNUPS_ALLOWED:-true}
|
||||
SIGNUPS_VERIFY: ${SIGNUPS_VERIFY:-false}
|
||||
SIGNUPS_DOMAINS_WHITELIST: ${SIGNUPS_DOMAINS_WHITELIST:-}
|
||||
INVITATION_ORG_NAME: ${VAULTWARDEN_INVITATION_ORG_NAME:-Vaultwarden}
|
||||
LOG_LEVEL: ${VAULTWARDEN_LOG_LEVEL:-Info}
|
||||
SIGNUPS_ALLOWED: ${VAULTWARDEN_SIGNUPS_ALLOWED:-true}
|
||||
ORG_GROUPS_ENABLED: ${VAULTWARDEN_ORG_GROUPS_ENABLED:-false}
|
||||
volumes:
|
||||
- vaultwarden:/data
|
||||
- /etc/timezone:/etc/timezone:ro
|
||||
|
Reference in New Issue
Block a user