mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
[MISC] Restructure repo folder layout (#628)
This commit is contained in:
parent
c2c4d9da79
commit
f1a89de2e7
.gitignoreREADME.md
cmd/authelia-scripts
docs
internal/suites
BypassAll
Docker
DuoPush
HAProxy
HighAvailability
LDAP
Mariadb
NetworkACL
OneFactorDefaultPolicy
Postgres
ShortTimeouts
Standalone
Traefik
Traefik2
docker-compose.ymldocker.goexample
compose
authelia
Dockerfile.backendDockerfile.frontenddocker-compose.backend.dev.ymldocker-compose.backend.dist.ymldocker-compose.frontend.dev.ymldocker-compose.frontend.dist.yml
resources
duo-api
haproxy
httpbin
kind
ldap
mariadb
nginx
backend
portal
postgres
redis
smtp
squid
traefik
traefik2
kube
README.md
apps
authelia
bootstrap-authelia.shbootstrap-dashboard.shbootstrap.shdashboard.ymlingress-controller
ldap
mail
2
.gitignore
vendored
2
.gitignore
vendored
|
@ -31,7 +31,7 @@ dist/
|
|||
/config.yml
|
||||
/config.test.yml
|
||||
|
||||
example/ldap/private.ldif
|
||||
internal/suites/example/ldap/private.ldif
|
||||
|
||||
Configuration.schema.json
|
||||
|
||||
|
|
|
@ -4,14 +4,14 @@
|
|||
<!-- Current release: 4.3.0 -->
|
||||
|
||||
[](https://buildkite.com/authelia/authelia)
|
||||
[](https://goreportcard.com/report/github.com/authelia/authelia)
|
||||
[](https://goreportcard.com/report/github.com/authelia/authelia)
|
||||
[](https://microbadger.com/images/authelia/authelia)
|
||||
[](https://microbadger.com/images/authelia/authelia)
|
||||
[](https://github.com/authelia/authelia/releases)
|
||||
[](https://aur.archlinux.org/packages/authelia/)
|
||||
[](https://aur.archlinux.org/packages/authelia-bin/)
|
||||
[](https://aur.archlinux.org/packages/authelia-git/)
|
||||
[][Apache 2.0]
|
||||
[][Apache 2.0]
|
||||
[](https://opencollective.com/authelia-sponsors)
|
||||
[](https://riot.im/app/#/room/#authelia:matrix.org)
|
||||
|
||||
|
|
|
@ -6,14 +6,14 @@ import (
|
|||
"github.com/spf13/cobra"
|
||||
)
|
||||
|
||||
const dockerPullCommandLine = "docker-compose -f docker-compose.yml " +
|
||||
"-f example/compose/mariadb/docker-compose.yml " +
|
||||
"-f example/compose/redis/docker-compose.yml " +
|
||||
"-f example/compose/nginx/portal/docker-compose.yml " +
|
||||
"-f example/compose/smtp/docker-compose.yml " +
|
||||
"-f example/compose/httpbin/docker-compose.yml " +
|
||||
"-f example/compose/ldap/docker-compose.admin.yml " +
|
||||
"-f example/compose/ldap/docker-compose.yml " +
|
||||
const dockerPullCommandLine = "docker-compose -p authelia -f internal/suites/docker-compose.yml " +
|
||||
"-f internal/suites/example/compose/mariadb/docker-compose.yml " +
|
||||
"-f internal/suites/example/compose/redis/docker-compose.yml " +
|
||||
"-f internal/suites/example/compose/nginx/portal/docker-compose.yml " +
|
||||
"-f internal/suites/example/compose/smtp/docker-compose.yml " +
|
||||
"-f internal/suites/example/compose/httpbin/docker-compose.yml " +
|
||||
"-f internal/suites/example/compose/ldap/docker-compose.admin.yml " +
|
||||
"-f internal/suites/example/compose/ldap/docker-compose.yml " +
|
||||
"pull"
|
||||
|
||||
// RunCI run the CI scripts
|
||||
|
|
|
@ -49,7 +49,7 @@ pay attention to the permissions of the configuration file. See
|
|||
**Authelia** can also be installed on top of [Kubernetes] using
|
||||
[nginx ingress controller](https://github.com/kubernetes/ingress-nginx).
|
||||
|
||||
Please refer to the following [documentation](../example/kube/README.md)
|
||||
Please refer to the following [documentation](../internal/suites/example/kube/README.md)
|
||||
for more information.
|
||||
|
||||
## FAQ
|
||||
|
|
|
@ -2,5 +2,5 @@ version: '3'
|
|||
services:
|
||||
authelia-backend:
|
||||
volumes:
|
||||
- './internal/suites/BypassAll/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './internal/suites/BypassAll/users.yml:/var/lib/authelia/users.yml'
|
||||
- './BypassAll/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './BypassAll/users.yml:/var/lib/authelia/users.yml'
|
|
@ -2,5 +2,5 @@ version: '3'
|
|||
services:
|
||||
authelia-backend:
|
||||
volumes:
|
||||
- './internal/suites/Docker/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './internal/suites/Docker/users.yml:/var/lib/authelia/users.yml'
|
||||
- './Docker/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './Docker/users.yml:/var/lib/authelia/users.yml'
|
|
@ -2,5 +2,5 @@ version: '3'
|
|||
services:
|
||||
authelia-backend:
|
||||
volumes:
|
||||
- './internal/suites/DuoPush/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './internal/suites/DuoPush/users.yml:/var/lib/authelia/users.yml'
|
||||
- './DuoPush/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './DuoPush/users.yml:/var/lib/authelia/users.yml'
|
|
@ -2,5 +2,5 @@ version: '3'
|
|||
services:
|
||||
authelia-backend:
|
||||
volumes:
|
||||
- './internal/suites/HAProxy/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './internal/suites/HAProxy/users.yml:/var/lib/authelia/users.yml'
|
||||
- './HAProxy/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './HAProxy/users.yml:/var/lib/authelia/users.yml'
|
|
@ -2,4 +2,4 @@ version: '3'
|
|||
services:
|
||||
authelia-backend:
|
||||
volumes:
|
||||
- './internal/suites/HighAvailability/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './HighAvailability/configuration.yml:/etc/authelia/configuration.yml:ro'
|
|
@ -2,4 +2,4 @@ version: '3'
|
|||
services:
|
||||
authelia-backend:
|
||||
volumes:
|
||||
- './internal/suites/LDAP/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './LDAP/configuration.yml:/etc/authelia/configuration.yml:ro'
|
|
@ -2,5 +2,5 @@ version: '3'
|
|||
services:
|
||||
authelia-backend:
|
||||
volumes:
|
||||
- './internal/suites/Mariadb/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './internal/suites/Mariadb/users.yml:/var/lib/authelia/users.yml'
|
||||
- './Mariadb/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './Mariadb/users.yml:/var/lib/authelia/users.yml'
|
|
@ -2,5 +2,5 @@ version: '3'
|
|||
services:
|
||||
authelia-backend:
|
||||
volumes:
|
||||
- './internal/suites/NetworkACL/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './internal/suites/NetworkACL/users.yml:/var/lib/authelia/users.yml'
|
||||
- './NetworkACL/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './NetworkACL/users.yml:/var/lib/authelia/users.yml'
|
|
@ -2,5 +2,5 @@ version: '3'
|
|||
services:
|
||||
authelia-backend:
|
||||
volumes:
|
||||
- './internal/suites/OneFactorDefaultPolicy/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './internal/suites/OneFactorDefaultPolicy/users.yml:/var/lib/authelia/users.yml'
|
||||
- './OneFactorDefaultPolicy/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './OneFactorDefaultPolicy/users.yml:/var/lib/authelia/users.yml'
|
|
@ -2,5 +2,5 @@ version: '3'
|
|||
services:
|
||||
authelia-backend:
|
||||
volumes:
|
||||
- './internal/suites/Postgres/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './internal/suites/Postgres/users.yml:/var/lib/authelia/users.yml'
|
||||
- './Postgres/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './Postgres/users.yml:/var/lib/authelia/users.yml'
|
|
@ -2,5 +2,5 @@ version: '3'
|
|||
services:
|
||||
authelia-backend:
|
||||
volumes:
|
||||
- './internal/suites/ShortTimeouts/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './internal/suites/ShortTimeouts/users.yml:/var/lib/authelia/users.yml'
|
||||
- './ShortTimeouts/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './ShortTimeouts/users.yml:/var/lib/authelia/users.yml'
|
|
@ -5,7 +5,7 @@ services:
|
|||
- AUTHELIA_JWT_SECRET=very_important_secret
|
||||
- AUTHELIA_SESSION_SECRET=unsecure_session_secret
|
||||
volumes:
|
||||
- './internal/suites/Standalone/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './internal/suites/Standalone/users.yml:/var/lib/authelia/users.yml'
|
||||
- './Standalone/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './Standalone/users.yml:/var/lib/authelia/users.yml'
|
||||
- '/tmp:/tmp'
|
||||
user: ${USER_ID}:${GROUP_ID}
|
|
@ -2,5 +2,5 @@ version: '3'
|
|||
services:
|
||||
authelia-backend:
|
||||
volumes:
|
||||
- './internal/suites/Traefik/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './internal/suites/Traefik/users.yml:/var/lib/authelia/users.yml'
|
||||
- './Traefik/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './Traefik/users.yml:/var/lib/authelia/users.yml'
|
|
@ -2,5 +2,5 @@ version: '3'
|
|||
services:
|
||||
authelia-backend:
|
||||
volumes:
|
||||
- './internal/suites/Traefik2/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './internal/suites/Traefik2/users.yml:/var/lib/authelia/users.yml'
|
||||
- './Traefik2/configuration.yml:/etc/authelia/configuration.yml:ro'
|
||||
- './Traefik2/users.yml:/var/lib/authelia/users.yml'
|
|
@ -30,13 +30,13 @@ func NewDockerEnvironment(files []string) *DockerEnvironment {
|
|||
}
|
||||
|
||||
func (de *DockerEnvironment) createCommandWithStdout(cmd string) *exec.Cmd {
|
||||
dockerCmdLine := fmt.Sprintf("docker-compose -f %s %s", strings.Join(de.dockerComposeFiles, " -f "), cmd)
|
||||
dockerCmdLine := fmt.Sprintf("docker-compose -p authelia -f %s %s", strings.Join(de.dockerComposeFiles, " -f "), cmd)
|
||||
log.Trace(dockerCmdLine)
|
||||
return utils.CommandWithStdout("bash", "-c", dockerCmdLine)
|
||||
}
|
||||
|
||||
func (de *DockerEnvironment) createCommand(cmd string) *exec.Cmd {
|
||||
dockerCmdLine := fmt.Sprintf("docker-compose -f %s %s", strings.Join(de.dockerComposeFiles, " -f "), cmd)
|
||||
dockerCmdLine := fmt.Sprintf("docker-compose -p authelia -f %s %s", strings.Join(de.dockerComposeFiles, " -f "), cmd)
|
||||
log.Trace(dockerCmdLine)
|
||||
return utils.Command("bash", "-c", dockerCmdLine)
|
||||
}
|
||||
|
|
|
@ -2,7 +2,7 @@ version: '3'
|
|||
services:
|
||||
nginx-backend:
|
||||
build:
|
||||
context: example/compose/nginx/backend
|
||||
context: ./example/compose/nginx/backend
|
||||
labels:
|
||||
- 'traefik.frontend.rule=Host:home.example.com,public.example.com,secure.example.com,admin.example.com,singlefactor.example.com' # Traefik 1.x
|
||||
- 'traefik.frontend.auth.forward.address=http://authelia-backend:9091/api/verify?rd=https://login.example.com:8080/' # Traefik 1.x
|
Before ![]() (image error) Size: 1.4 KiB After ![]() (image error) Size: 1.4 KiB ![]() ![]() |
|
@ -54,7 +54,7 @@ manual intervention.
|
|||
Given your cluster already runs a LDAP server, a Redis, a SQL database,
|
||||
a SMTP server and a nginx ingress-controller, you can deploy **Authelia**
|
||||
and update your ingress configurations. An example is provided
|
||||
[here](./authelia).
|
||||
[here](authelia).
|
||||
|
||||
## Questions
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user