Obtain session and secrets
This commit is contained in:
@@ -8,6 +8,7 @@ services:
|
|||||||
NASCOMPOSE_TRAEFIK_DOMAINS: ${NASCOMPOSE_TRAEFIK_DOMAINS?}
|
NASCOMPOSE_TRAEFIK_DOMAINS: ${NASCOMPOSE_TRAEFIK_DOMAINS?}
|
||||||
AUTHELIA_DEFAULT_REDIRECTION_URL: "" #Heimdall
|
AUTHELIA_DEFAULT_REDIRECTION_URL: "" #Heimdall
|
||||||
AUTHELIA_JWT_SECRET_FILE: /run/secrets/jwt_secret
|
AUTHELIA_JWT_SECRET_FILE: /run/secrets/jwt_secret
|
||||||
|
AUTHELIA_STORAGE_ENCRYPTION_KEY_FILE: /run/secrets/storage_key
|
||||||
networks:
|
networks:
|
||||||
- traefik
|
- traefik
|
||||||
volumes:
|
volumes:
|
||||||
@@ -46,3 +47,5 @@ configs:
|
|||||||
secrets:
|
secrets:
|
||||||
jwt_secret:
|
jwt_secret:
|
||||||
file: ${NASCOMPOSE_SERVICES?}/secrets/authelia/jwt_secret
|
file: ${NASCOMPOSE_SERVICES?}/secrets/authelia/jwt_secret
|
||||||
|
storage_key:
|
||||||
|
file: ${NASCOMPOSE_SERVICES?}/secrets/authelia/storage_key
|
||||||
|
|||||||
@@ -28,3 +28,6 @@
|
|||||||
## Note: the order of the rules is important. The first policy matching (domain, resource, subject) applies.
|
## Note: the order of the rules is important. The first policy matching (domain, resource, subject) applies.
|
||||||
access_control:
|
access_control:
|
||||||
default_policy: two_factor
|
default_policy: two_factor
|
||||||
|
|
||||||
|
session:
|
||||||
|
domain: {{ (env `NASCOMPOSE_TRAEFIK_DOMAINS` | split)._0 }}
|
||||||
|
|||||||
@@ -8,11 +8,6 @@ theme: auto
|
|||||||
##
|
##
|
||||||
## The available providers are: `local`, `mysql`, `postgres`. You must use one and only one of these providers.
|
## The available providers are: `local`, `mysql`, `postgres`. You must use one and only one of these providers.
|
||||||
storage:
|
storage:
|
||||||
## The encryption key that is used to encrypt sensitive information in the database. Must be a string with a minimum
|
|
||||||
## length of 20. Please see the docs if you configure this with an undesirable key and need to change it, you MUST use
|
|
||||||
## the CLI to change this in the database if you want to change it from a previously configured value.
|
|
||||||
# encryption_key: you_must_generate_a_random_string_of_more_than_twenty_chars_and_configure_this
|
|
||||||
|
|
||||||
##
|
##
|
||||||
## Local (Storage Provider)
|
## Local (Storage Provider)
|
||||||
##
|
##
|
||||||
|
|||||||
Reference in New Issue
Block a user