Update stack.production.yml
ci/woodpecker/push/woodpecker Pipeline failed Details

This commit is contained in:
colin 2025-06-03 21:17:13 -04:00
parent cce185d0b4
commit aa364b9637
1 changed files with 67 additions and 41 deletions

View File

@ -1,12 +1,9 @@
version: '3.7'
x-authelia-env: &authelia-env x-authelia-env: &authelia-env
X_AUTHELIA_EMAIL: "authelia@nixc.us" X_AUTHELIA_EMAIL: authelia@nixc.us
X_AUTHELIA_SITE_NAME: ATLAS X_AUTHELIA_SITE_NAME: ATLAS
# X_AUTHELIA_DUO_HOSTNAME: my_duo_hostname
X_AUTHELIA_CONFIG_FILTERS: template X_AUTHELIA_CONFIG_FILTERS: template
X_AUTHELIA_LDAP_DOMAIN: dc=nixc,dc=us X_AUTHELIA_LDAP_DOMAIN: dc=nixc,dc=us
TRAEFIK_DOMAIN: nixc.us TRAEFIK_DOMAIN: nixc.us
# CONFIG: /home/deleted-porcupine/docker-configs
secrets: secrets:
AUTHENTICATION_BACKEND_LDAP_PASSWORD: AUTHENTICATION_BACKEND_LDAP_PASSWORD:
@ -37,6 +34,7 @@ networks:
external: true external: true
ad: ad:
external: true external: true
services: services:
authelia: authelia:
image: git.nixc.us/nixius/authelia:production-authelia image: git.nixc.us/nixius/authelia:production-authelia
@ -51,79 +49,107 @@ services:
- NOTIFIER_SMTP_PASSWORD - NOTIFIER_SMTP_PASSWORD
- SESSION_SECRET - SESSION_SECRET
- STORAGE_ENCRYPTION_KEY - STORAGE_ENCRYPTION_KEY
environment: environment: *authelia-env
<<: *authelia-env
dns: dns:
- 1.1.1.1 - 1.1.1.1 # Cloudflare
- 9.9.9.9 - 9.9.9.9 # Quad9
volumes:
- /mnt/tank/persist/nixc.us/authelia/production/config:/config:rw
networks: networks:
- traefik - traefik
- default - default
- ad - ad
deploy: deploy:
update_config:
order: start-first
failure_action: rollback
parallelism: 1
restart_policy:
condition: on-failure
replicas: 1
placement: placement:
constraints: constraints:
## - node.labels.role == db
- node.hostname == ingress.nixc.us - node.hostname == ingress.nixc.us
# - node.labels.mac-rack == true
labels: labels:
us.nixc.autodeploy: "true"
homepage.group: Infrastructure homepage.group: Infrastructure
homepage.name: Authelia homepage.name: Authelia
homepage.href: https://login.nixc.us homepage.href: https://login.nixc.us
homepage.description: ATLAS homepage.description: ATLAS
traefik.enable: "true" traefik.enable: "true"
traefik.http.routers.authelia_authelia.rule: Host(`login.nixc.us`)
traefik.http.routers.authelia_authelia.entryPoints: websecure
traefik.http.routers.authelia_authelia.service: "authelia_authelia"
traefik.http.routers.authelia_authelia.tls.certresolver: "letsencryptresolver"
traefik.http.services.authelia_authelia.loadbalancer.server.port: "9091"
traefik.http.routers.authelia_authelia.tls: "true"
traefik.http.middlewares.authelia_authelia.forwardAuth.address: http://authelia:9091/api/authz/forward-auth
traefik.docker.network: traefik traefik.docker.network: traefik
traefik.http.routers.authelia_authelia.rule: Host(`login.nixc.us`)
traefik.http.routers.authelia_authelia.entrypoints: websecure
traefik.http.routers.authelia_authelia.tls: "true"
traefik.http.routers.authelia_authelia.tls.certresolver: letsencryptresolver
traefik.http.routers.authelia_authelia.service: authelia_authelia
traefik.http.services.authelia_authelia.loadbalancer.server.port: 9091
traefik.http.middlewares.authelia_authelia.forwardauth.address: http://authelia_authelia:9091/api/verify?rd=https://login.nixc.us/
traefik.http.middlewares.authelia_authelia.forwardauth.trustForwardHeader: "true"
traefik.http.middlewares.authelia_authelia.forwardauth.authResponseHeaders: Remote-User,Remote-Groups,Remote-Name,Remote-Email
traefik.http.middlewares.authelia-basic.forwardauth.address: http://authelia_authelia:9091/api/verify?auth=basic
traefik.http.middlewares.authelia-basic.forwardauth.trustForwardHeader: "true"
traefik.http.middlewares.authelia-basic.forwardauth.authResponseHeaders: Remote-User,Remote-Groups,Remote-Name,Remote-Email
logging:
driver: json-file
options:
max-size: 10m
max-file: "3"
redis: redis:
image: git.nixc.us/nixius/authelia:production-redis image: git.nixc.us/nixius/authelia:production-redis
# command: redis-server --appendonly yes command: redis-server --appendonly yes
volumes:
- /mnt/tank/persist/nixc.us/authelia/production/redis:/data:rw
networks:
- default
deploy: deploy:
update_config:
order: start-first
failure_action: rollback
parallelism: 1
restart_policy:
condition: on-failure
replicas: 1 replicas: 1
placement: placement:
constraints: constraints:
## - node.labels.role == db
- node.hostname == ingress.nixc.us - node.hostname == ingress.nixc.us
# - node.labels.mac-rack == true
# preferences:
# - spread: node.id
labels: labels:
- traefik.enable=false us.nixc.autodeploy: "true"
- "us.nixc.autodeploy=true" traefik.enable: "false"
volumes: logging:
- /mnt/tank/persist/nixc.us/authelia/production/redis:/data driver: json-file
networks: options:
- default max-size: 10m
max-file: "3"
mariadb: mariadb:
image: git.nixc.us/nixius/authelia:production-mariadb image: git.nixc.us/nixius/authelia:production-mariadb
# restart: always
environment: environment:
MYSQL_ROOT_PASSWORD: authelia MYSQL_ROOT_PASSWORD: authelia
MYSQL_DATABASE: authelia MYSQL_DATABASE: authelia
MYSQL_USER: authelia MYSQL_USER: authelia
MYSQL_PASSWORD: authelia MYSQL_PASSWORD: authelia
volumes: volumes:
- '/mnt/tank/persist/nixc.us/authelia/production/db:/var/lib/mysql' - /mnt/tank/persist/nixc.us/authelia/production/db:/var/lib/mysql:rw
networks:
- default
deploy: deploy:
update_config:
order: start-first
failure_action: rollback
parallelism: 1
restart_policy:
condition: on-failure
replicas: 1 replicas: 1
placement: placement:
constraints: constraints:
## - node.labels.role == db
- node.hostname == ingress.nixc.us - node.hostname == ingress.nixc.us
# - node.labels.mac-rack == true
# placement:
# constraints:
# - node.role == manager
# preferences:
# - spread: node.id
labels: labels:
- traefik.enable=false us.nixc.autodeploy: "true"
- "us.nixc.autodeploy=true" traefik.enable: "false"
networks: logging:
- default driver: json-file
options:
max-size: 10m
max-file: "3"