mirror of
https://github.com/opencloud-eu/opencloud.git
synced 2026-01-01 10:40:30 -05:00
120 lines
5.3 KiB
YAML
120 lines
5.3 KiB
YAML
---
|
|
services:
|
|
# OpenCloud instance configured for multi-tenancy using keycloak as identity provider
|
|
# The graph service is setup to consume users via the CS3 API.
|
|
opencloud:
|
|
image: ${OC_DOCKER_IMAGE:-opencloudeu/opencloud-rolling}:${OC_DOCKER_TAG:-latest}
|
|
# changelog: https://github.com/opencloud-eu/opencloud/tree/main/changelog
|
|
# release notes: https://docs.opencloud.eu/opencloud_release_notes.html
|
|
networks:
|
|
opencloud-net:
|
|
entrypoint:
|
|
- /bin/sh
|
|
# run opencloud init to initialize a configuration file with random secrets
|
|
# it will fail on subsequent runs, because the config file already exists
|
|
# therefore we ignore the error and then start the opencloud server
|
|
command: ["-c", "opencloud init || true; opencloud server"]
|
|
environment:
|
|
OC_MULTI_TENANT_ENABLED: "true"
|
|
# enable services that are not started automatically
|
|
OC_URL: https://${OC_DOMAIN:-cloud.opencloud.test}
|
|
OC_LOG_LEVEL: ${LOG_LEVEL:-info}
|
|
OC_LOG_COLOR: "${LOG_PRETTY:-false}"
|
|
OC_LOG_PRETTY: "${LOG_PRETTY:-false}"
|
|
OC_EXCLUDE_RUN_SERVICES: idm,idp
|
|
PROXY_ROLE_ASSIGNMENT_DRIVER: "oidc"
|
|
OC_OIDC_ISSUER: https://${KEYCLOAK_DOMAIN:-keycloak.opencloud.test}/realms/openCloud
|
|
PROXY_OIDC_REWRITE_WELLKNOWN: "true"
|
|
WEB_OIDC_CLIENT_ID: ${OC_OIDC_CLIENT_ID:-web}
|
|
PROXY_USER_OIDC_CLAIM: "uuid"
|
|
PROXY_USER_CS3_CLAIM: "userid"
|
|
WEB_OPTION_ACCOUNT_EDIT_LINK_HREF: "https://${KEYCLOAK_DOMAIN:-keycloak.opencloud.test}/realms/openCloud/account"
|
|
# admin and demo accounts must be created in Keycloak
|
|
OC_ADMIN_USER_ID: ""
|
|
SETTINGS_SETUP_DEFAULT_ASSIGNMENTS: "false"
|
|
GRAPH_ASSIGN_DEFAULT_USER_ROLE: "false"
|
|
GRAPH_USERNAME_MATCH: "none"
|
|
GROUPS_DRIVER: "null"
|
|
# This is needed to set the correct CSP rules for OpenCloud
|
|
IDP_DOMAIN: ${KEYCLOAK_DOMAIN:-keycloak.opencloud.test}
|
|
# do not use SSL between the reverse proxy and OpenCloud
|
|
PROXY_TLS: "false"
|
|
# INSECURE: needed if OpenCloud / reverse proxy is using self generated certificates
|
|
OC_INSECURE: "${INSECURE:-false}"
|
|
# basic auth (not recommended, but needed for eg. WebDav clients that do not support OpenID Connect)
|
|
PROXY_ENABLE_BASIC_AUTH: "false"
|
|
GRAPH_IDENTITY_BACKEND: "cs3"
|
|
PROXY_CSP_CONFIG_FILE_LOCATION: /etc/opencloud/csp.yaml
|
|
OC_LDAP_URI: ldaps://ldap-server:1636
|
|
OC_LDAP_INSECURE: "true"
|
|
OC_LDAP_BIND_DN: "cn=admin,dc=opencloud,dc=eu"
|
|
OC_LDAP_BIND_PASSWORD: ${LDAP_BIND_PASSWORD:-admin}
|
|
OC_LDAP_USER_BASE_DN: "ou=users,dc=opencloud,dc=eu"
|
|
OC_LDAP_USER_SCHEMA_TENANT_ID: "openCloudMemberOfSchool"
|
|
PROXY_LOG_LEVEL: "debug"
|
|
volumes:
|
|
- ./config/opencloud/csp.yaml:/etc/opencloud/csp.yaml
|
|
# configure the .env file to use own paths instead of docker internal volumes
|
|
- ${OC_CONFIG_DIR:-opencloud-config}:/etc/opencloud
|
|
- ${OC_DATA_DIR:-opencloud-data}:/var/lib/opencloud
|
|
logging:
|
|
driver: ${LOG_DRIVER:-local}
|
|
restart: always
|
|
labels:
|
|
- "traefik.enable=true"
|
|
- "traefik.http.routers.opencloud.entrypoints=https"
|
|
- "traefik.http.routers.opencloud.rule=Host(`${OC_DOMAIN:-cloud.opencloud.test}`)"
|
|
- "traefik.http.routers.opencloud.service=opencloud"
|
|
- "traefik.http.services.opencloud.loadbalancer.server.port=9200"
|
|
- "traefik.http.routers.opencloud.${TRAEFIK_SERVICES_TLS_CONFIG}"
|
|
# Stand-alone instance of the 'graph' service to serve the provisioning API
|
|
provsioning:
|
|
image: ${OC_DOCKER_IMAGE:-opencloudeu/opencloud-rolling}:${OC_DOCKER_TAG:-latest}
|
|
networks:
|
|
opencloud-net:
|
|
entrypoint:
|
|
- /bin/sh
|
|
# run opencloud init to initialize a configuration file with random secrets
|
|
# it will fail on subsequent runs, because the config file already exists
|
|
# therefore we ignore the error and then start the opencloud server
|
|
command: ["-c", "opencloud init || true; opencloud graph server"]
|
|
environment:
|
|
OC_LOG_LEVEL: "debug"
|
|
OC_LOG_COLOR: "${LOG_PRETTY:-false}"
|
|
OC_LOG_PRETTY: "${LOG_PRETTY:-false}"
|
|
# This just runs the standalone graph service we don't need access to the registry
|
|
MICRO_REGISTRY: "memory"
|
|
# INSECURE: needed if OpenCloud / reverse proxy is using self generated certificates
|
|
OC_INSECURE: "${INSECURE:-false}"
|
|
GRAPH_HTTP_ADDR: "0.0.0.0:9120"
|
|
GRAPH_HTTP_API_TOKEN: "${PROVISIONING_API_TOKEN:-changeme}"
|
|
# disable listening for events
|
|
GRAPH_EVENTS_ENDPOINT: ""
|
|
GRAPH_STORE_NODES: ""
|
|
GRAPH_ASSIGN_DEFAULT_USER_ROLE: "false"
|
|
GRAPH_USERNAME_MATCH: "none"
|
|
GRAPH_LDAP_EDUCATION_RESOURCES_ENABLED: "true"
|
|
GRAPH_LDAP_SCHOOL_BASE_DN: "ou=tenants,dc=opencloud,dc=eu"
|
|
OC_LDAP_URI: ldaps://ldap-server:1636
|
|
OC_LDAP_INSECURE: "true"
|
|
OC_LDAP_BIND_DN: "cn=admin,dc=opencloud,dc=eu"
|
|
OC_LDAP_BIND_PASSWORD: ${LDAP_BIND_PASSWORD:-admin}
|
|
OC_LDAP_USER_BASE_DN: "ou=users,dc=opencloud,dc=eu"
|
|
OC_LDAP_USER_FILTER: "(objectclass=inetOrgPerson)"
|
|
volumes:
|
|
# configure the .env file to use own paths instead of docker internal volumes
|
|
- ${PROVISIONING_CONFIG_DIR:-provisioning-config}:/etc/opencloud
|
|
logging:
|
|
driver: ${LOG_DRIVER:-local}
|
|
restart: always
|
|
ports:
|
|
- "9120:9120"
|
|
|
|
volumes:
|
|
opencloud-config:
|
|
opencloud-data:
|
|
provisioning-config:
|
|
|
|
networks:
|
|
opencloud-net:
|