mit bitwarden und mailcow
This commit is contained in:
parent
e8527e9391
commit
843d8bae39
|
|
@ -0,0 +1,92 @@
|
||||||
|
#
|
||||||
|
# Note: After making changes to this file you need to run the `rebuild` or `update`
|
||||||
|
# command for them to be applied.
|
||||||
|
#
|
||||||
|
# Full URL for accessing the installation from a browser. (Required)
|
||||||
|
url: http://bitwarden.herrmann.es
|
||||||
|
#
|
||||||
|
# Auto-generate the `./docker/docker-compose.yml` config file.
|
||||||
|
# WARNING: Disabling generated config files can break future updates. You will be
|
||||||
|
# responsible for maintaining this config file.
|
||||||
|
# Template: https://github.com/bitwarden/server/blob/master/util/Setup/Templates/DockerCompose.hbs
|
||||||
|
generate_compose_config: true
|
||||||
|
#
|
||||||
|
# Auto-generate the `./nginx/default.conf` file.
|
||||||
|
# WARNING: Disabling generated config files can break future updates. You will be
|
||||||
|
# responsible for maintaining this config file.
|
||||||
|
# Template: https://github.com/bitwarden/server/blob/master/util/Setup/Templates/NginxConfig.hbs
|
||||||
|
generate_nginx_config: true
|
||||||
|
#
|
||||||
|
# Docker compose file port mapping for HTTP. Leave empty to remove the port mapping.
|
||||||
|
# Learn more: https://docs.docker.com/compose/compose-file/#ports
|
||||||
|
http_port: 445
|
||||||
|
#
|
||||||
|
# Docker compose file port mapping for HTTPS. Leave empty to remove the port mapping.
|
||||||
|
# Learn more: https://docs.docker.com/compose/compose-file/#ports
|
||||||
|
https_port: 444
|
||||||
|
#
|
||||||
|
# Configure Nginx for Captcha.
|
||||||
|
captcha: false
|
||||||
|
#
|
||||||
|
# Configure Nginx for SSL.
|
||||||
|
ssl: false
|
||||||
|
#
|
||||||
|
# SSL versions used by Nginx (ssl_protocols). Leave empty for recommended default.
|
||||||
|
# Learn more: https://wiki.mozilla.org/Security/Server_Side_TLS
|
||||||
|
ssl_versions:
|
||||||
|
#
|
||||||
|
# SSL ciphersuites used by Nginx (ssl_ciphers). Leave empty for recommended default.
|
||||||
|
# Learn more: https://wiki.mozilla.org/Security/Server_Side_TLS
|
||||||
|
ssl_ciphersuites:
|
||||||
|
#
|
||||||
|
# Installation uses a managed Let's Encrypt certificate.
|
||||||
|
ssl_managed_lets_encrypt: false
|
||||||
|
#
|
||||||
|
# The actual certificate. (Required if using SSL without managed Let's Encrypt)
|
||||||
|
# Note: Path uses the container's ssl directory. The `./ssl` host directory is mapped to
|
||||||
|
# `/etc/ssl` within the container.
|
||||||
|
ssl_certificate_path:
|
||||||
|
#
|
||||||
|
# The certificate's private key. (Required if using SSL without managed Let's Encrypt)
|
||||||
|
# Note: Path uses the container's ssl directory. The `./ssl` host directory is mapped to
|
||||||
|
# `/etc/ssl` within the container.
|
||||||
|
ssl_key_path:
|
||||||
|
#
|
||||||
|
# If the certificate is trusted by a CA, you should provide the CA's certificate.
|
||||||
|
# Note: Path uses the container's ssl directory. The `./ssl` host directory is mapped to
|
||||||
|
# `/etc/ssl` within the container.
|
||||||
|
ssl_ca_path:
|
||||||
|
#
|
||||||
|
# Diffie Hellman ephemeral parameters
|
||||||
|
# Learn more: https://security.stackexchange.com/q/94390/79072
|
||||||
|
# Note: Path uses the container's ssl directory. The `./ssl` host directory is mapped to
|
||||||
|
# `/etc/ssl` within the container.
|
||||||
|
ssl_diffie_hellman_path:
|
||||||
|
#
|
||||||
|
# Nginx Header Content-Security-Policy parameter
|
||||||
|
# WARNING: Reconfiguring this parameter may break features. By changing this parameter
|
||||||
|
# you become responsible for maintaining this value.
|
||||||
|
nginx_header_content_security_policy:
|
||||||
|
#
|
||||||
|
# Communicate with the Bitwarden push relay service (push.bitwarden.com) for mobile
|
||||||
|
# app live sync.
|
||||||
|
push_notifications: true
|
||||||
|
#
|
||||||
|
# Use a docker volume (`mssql_data`) instead of a host-mapped volume for the persisted database.
|
||||||
|
# WARNING: Changing this value will cause you to lose access to the existing persisted database.
|
||||||
|
# Learn more: https://docs.docker.com/storage/volumes/
|
||||||
|
database_docker_volume: false
|
||||||
|
#
|
||||||
|
# Defines "real" IPs in nginx.conf. Useful for defining proxy servers that forward the
|
||||||
|
# client IP address.
|
||||||
|
# Learn more: https://nginx.org/en/docs/http/ngx_http_realip_module.html
|
||||||
|
#
|
||||||
|
# Defined as a dictionary, e.g.:
|
||||||
|
# real_ips: ['10.10.0.0/24', '172.16.0.0/16']
|
||||||
|
real_ips:
|
||||||
|
#
|
||||||
|
# Enable Key Connector (https://bitwarden.com/help/article/deploy-key-connector)
|
||||||
|
enable_key_connector: false
|
||||||
|
#
|
||||||
|
# Enable SCIM
|
||||||
|
enable_scim: false
|
||||||
|
|
@ -0,0 +1,24 @@
|
||||||
|
services:
|
||||||
|
nginx:
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.http.middlewares.nginx-redirect-websecure.redirectscheme.scheme=https
|
||||||
|
- traefik.http.routers.nginx-web.rule=Host(`bitwarden.herrmann.es`)
|
||||||
|
- traefik.http.routers.nginx-web.entrypoints=web
|
||||||
|
- traefik.http.routers.nginx-web.middlewares=nginx-redirect-websecure
|
||||||
|
- traefik.http.routers.nginx-websecure.entrypoints=websecure
|
||||||
|
- traefik.http.routers.nginx-websecure.rule=Host(`bitwarden.herrmann.es`)
|
||||||
|
- traefik.tags= traefik-public
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.http.routers.nginx-websecure.tls=true
|
||||||
|
- traefik.http.routers.nginx-websecure.tls.certresolver=myresolver
|
||||||
|
- traefik.http.services.bitwarden-nginx.loadbalancer.server.port=8080
|
||||||
|
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
|
||||||
|
networks:
|
||||||
|
traefik-public:
|
||||||
|
name: traefik-public
|
||||||
|
external: true
|
||||||
|
|
||||||
|
|
@ -0,0 +1,36 @@
|
||||||
|
globalSettings__baseServiceUri__vault=https://bitwarden.herrmann.es
|
||||||
|
globalSettings__baseServiceUri__cloudRegion=US
|
||||||
|
globalSettings__sqlServer__connectionString="Data Source=tcp:mssql,1433;Initial Catalog=vault;Persist Security Info=False;User ID=sa;Password=pRA6ibAm7ODCpZSyvKpDpyvKJFOaa0uv;MultipleActiveResultSets=False;Connect Timeout=30;Encrypt=True;TrustServerCertificate=True"
|
||||||
|
globalSettings__identityServer__certificatePassword=yQeVOvf9JDpflyOrIQMQIe2CJOGtvNvM
|
||||||
|
globalSettings__internalIdentityKey=9iPt4ERlWJNVzYQ1K1Jz3CK0UhEne4ru2V3tFLKawWbjrvwDuObE7ZMkJu3UeJUF
|
||||||
|
globalSettings__oidcIdentityClientKey=WXcaXid68p1iaa24NBm8W60yQtN0P0wVcY8WOyXOFS7j6SviI2PmKS6vxzbItqQW
|
||||||
|
globalSettings__duo__aKey=JwXxgffEh2TD6WBIgXgOJf4CihypMS0kN7Bqyx9nxisVuvwujK1JINyfDPgwMxIc
|
||||||
|
globalSettings__installation__id=b644b86f-99bb-4aca-9d35-ac4b00808148
|
||||||
|
globalSettings__installation__key=gEyWjSRa8C3mfuWqiV2W
|
||||||
|
globalSettings__yubico__clientId=REPLACE
|
||||||
|
globalSettings__yubico__key=REPLACE
|
||||||
|
globalSettings__mail__replyToEmail=no-reply@bitwarden.herrmann.es
|
||||||
|
globalSettings__mail__smtp__host=mail.herrmann.es
|
||||||
|
globalSettings__mail__smtp__port=25
|
||||||
|
globalSettings__mail__smtp__ssl=false
|
||||||
|
globalSettings__mail__smtp__username=
|
||||||
|
globalSettings__mail__smtp__password=
|
||||||
|
globalSettings__disableUserRegistration=false
|
||||||
|
globalSettings__hibpApiKey=REPLACE
|
||||||
|
adminSettings__admins=bitwarden@herrmann.es
|
||||||
|
globalSettings__baseServiceUri__cloudVaultRegion=US
|
||||||
|
globalSettings__baseServiceUri__api=https://bitwarden.herrmann.es/api
|
||||||
|
globalSettings__baseServiceUri__identity=https://bitwarden.herrmann.es/identity
|
||||||
|
globalSettings__baseServiceUri__admin=https://bitwarden.herrmann.es/admin
|
||||||
|
globalSettings__baseServiceUri__notifications=https://bitwarden.herrmann.es/notifications
|
||||||
|
globalSettings__baseServiceUri__sso=https://bitwarden.herrmann.es/sso
|
||||||
|
globalSettings__baseServiceUri__portal=https://bitwarden.herrmann.es/portal
|
||||||
|
globalSettings__attachment__baseDirectory=/etc/bitwarden/core/attachments
|
||||||
|
globalSettings__attachment__baseUrl=https://bitwarden.herrmann.es/attachments
|
||||||
|
globalSettings__send__baseDirectory=/etc/bitwarden/core/attachments/send
|
||||||
|
globalSettings__send__baseUrl=https://bitwarden.herrmann.es/attachments/send
|
||||||
|
globalSettings__dataProtection__directory=/etc/bitwarden/core/aspnet-dataprotection
|
||||||
|
globalSettings__logDirectory=/etc/bitwarden/logs
|
||||||
|
globalSettings__logRollBySizeLimit=
|
||||||
|
globalSettings__syslog__destination=
|
||||||
|
globalSettings__licenseDirectory=/etc/bitwarden/core/licenses
|
||||||
Binary file not shown.
|
|
@ -8,8 +8,10 @@ services:
|
||||||
# image: "traefik:v2.2"
|
# image: "traefik:v2.2"
|
||||||
image: "traefik:latest"
|
image: "traefik:latest"
|
||||||
command:
|
command:
|
||||||
- --log.level=DEBUG
|
- "--accesslog=true"
|
||||||
- --accesslog=true
|
- "--log.level=DEBUG"
|
||||||
|
- "--providers.docker"
|
||||||
|
- "--log.filePath=/logs/traefik.log"
|
||||||
container_name: "traefik"
|
container_name: "traefik"
|
||||||
restart: always
|
restart: always
|
||||||
ports:
|
ports:
|
||||||
|
|
@ -21,6 +23,7 @@ services:
|
||||||
- "/var/run/docker.sock:/var/run/docker.sock:ro"
|
- "/var/run/docker.sock:/var/run/docker.sock:ro"
|
||||||
- "${PWD}/traefik.toml:/etc/traefik/traefik.toml"
|
- "${PWD}/traefik.toml:/etc/traefik/traefik.toml"
|
||||||
- "${PWD}/dynamic.toml:/etc/traefik/dynamic.toml"
|
- "${PWD}/dynamic.toml:/etc/traefik/dynamic.toml"
|
||||||
|
- "traefik_logs:/logs/"
|
||||||
networks:
|
networks:
|
||||||
- internal
|
- internal
|
||||||
- traefik-public
|
- traefik-public
|
||||||
|
|
@ -121,6 +124,7 @@ volumes:
|
||||||
letsencrypt:
|
letsencrypt:
|
||||||
portainer_data:
|
portainer_data:
|
||||||
gitea_data:
|
gitea_data:
|
||||||
|
traefik_logs:
|
||||||
networks:
|
networks:
|
||||||
# das Netzwerk traefik-public muss extern true haben, es wird nicht von dem Dockerfile hier erstellt
|
# das Netzwerk traefik-public muss extern true haben, es wird nicht von dem Dockerfile hier erstellt
|
||||||
# Es haben alle container Zugriff darauf.
|
# Es haben alle container Zugriff darauf.
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue