119 lines
3.7 KiB
YAML
119 lines
3.7 KiB
YAML
---
|
|
|
|
volumes:
|
|
# database:
|
|
# driver: local
|
|
redis:
|
|
driver: local
|
|
|
|
networks:
|
|
authentik:
|
|
driver: overlay
|
|
attachable: true
|
|
traefik-public:
|
|
external: true
|
|
|
|
services:
|
|
# postgresql:
|
|
# image: docker.io/library/postgres:16-alpine
|
|
# restart: unless-stopped
|
|
# healthcheck:
|
|
# test: ["CMD-SHELL", "pg_isready -d $${POSTGRES_DB} -U $${POSTGRES_USER}"]
|
|
# start_period: 20s
|
|
# interval: 30s
|
|
# retries: 5
|
|
# timeout: 5s
|
|
# volumes:
|
|
# - database:/var/lib/postgresql/data
|
|
# environment:
|
|
# POSTGRES_PASSWORD: ${POSTGRES_PASSWORD:?database password required}
|
|
# POSTGRES_USER: ${POSTGRES_USER:-authentik}
|
|
# POSTGRES_DB: ${PG_DB:-authentik}
|
|
# AUTHENTIK_SECRET_KEY: ${AUTHENTIK_SECRET_KEY:?secret key required}
|
|
# # env_file:
|
|
# # - .env
|
|
# networks:
|
|
# - authentik
|
|
redis:
|
|
image: docker.io/library/redis:alpine
|
|
command: --save 60 1 --loglevel warning
|
|
restart: unless-stopped
|
|
healthcheck:
|
|
test: ["CMD-SHELL", "redis-cli ping | grep PONG"]
|
|
start_period: 20s
|
|
interval: 30s
|
|
retries: 5
|
|
timeout: 3s
|
|
volumes:
|
|
- redis:/data
|
|
networks:
|
|
- authentik
|
|
server:
|
|
image: ${AUTHENTIK_IMAGE:-ghcr.io/goauthentik/server}:${AUTHENTIK_TAG:-2024.8.1}
|
|
restart: unless-stopped
|
|
command: server
|
|
environment:
|
|
AUTHENTIK_REDIS__HOST: authentik-redis
|
|
AUTHENTIK_POSTGRESQL__HOST: ${DATABASE__HOSTNAME:-postgresql}
|
|
AUTHENTIK_POSTGRESQL__USER: ${POSTGRES_USER:-authentik}
|
|
AUTHENTIK_POSTGRESQL__NAME: ${PG_DB:-authentik}
|
|
AUTHENTIK_POSTGRESQL__PASSWORD: ${POSTGRES_PASSWORD}
|
|
AUTHENTIK_SECRET_KEY: ${AUTHENTIK_SECRET_KEY}
|
|
volumes:
|
|
- /var/data/authentik/media:/media
|
|
- /var/data/authentik/custom-templates:/templates
|
|
# env_file:
|
|
# - .env
|
|
expose:
|
|
- 9000
|
|
- 9443
|
|
# ports:
|
|
# - "${COMPOSE_PORT_HTTP:-9000}:9000"
|
|
# - "${COMPOSE_PORT_HTTPS:-9443}:9443"
|
|
depends_on:
|
|
- postgresql
|
|
- redis
|
|
networks:
|
|
- authentik
|
|
- traefik-public
|
|
deploy:
|
|
labels:
|
|
- traefik.enable=true
|
|
- traefik.docker.network=traefik-public
|
|
- traefik.constraint-label=traefik-public
|
|
- traefik.http.routers.authentik-rtr.entrypoints=https
|
|
- traefik.http.routers.authentik-rtr.rule=Host(`authentik.${DOMAIN}`)
|
|
- traefik.http.routers.authentik-rtr.tls.certresolver=le
|
|
- traefik.http.routers.authentik-rtr.service=authentik-svc
|
|
- traefik.http.services.authentik-svc.loadbalancer.server.port=9000
|
|
worker:
|
|
image: ${AUTHENTIK_IMAGE:-ghcr.io/goauthentik/server}:${AUTHENTIK_TAG:-2024.8.1}
|
|
restart: unless-stopped
|
|
command: worker
|
|
environment:
|
|
AUTHENTIK_REDIS__HOST: authentik-redis
|
|
AUTHENTIK_POSTGRESQL__HOST: ${DATABASE__HOSTNAME:-postgresql}
|
|
AUTHENTIK_POSTGRESQL__USER: ${POSTGRES_USER:-authentik}
|
|
AUTHENTIK_POSTGRESQL__NAME: ${PG_DB:-authentik}
|
|
AUTHENTIK_POSTGRESQL__PASSWORD: ${POSTGRES_PASSWORD}
|
|
# `user: root` and the docker socket volume are optional.
|
|
# See more for the docker socket integration here:
|
|
# https://goauthentik.io/docs/outposts/integrations/docker
|
|
# Removing `user: root` also prevents the worker from fixing the permissions
|
|
# on the mounted folders, so when removing this make sure the folders have the correct UID/GID
|
|
# (1000:1000 by default)
|
|
# user: root
|
|
volumes:
|
|
- /var/run/docker.sock:/var/run/docker.sock
|
|
- /var/data/authentik/media:/media
|
|
- /var/data/authentik/certs:/certs
|
|
- /var/data/authentik/custom-templates:/templates
|
|
# env_file:
|
|
# - .env
|
|
depends_on:
|
|
- postgresql
|
|
- redis
|
|
networks:
|
|
- authentik
|
|
|