2019-12-05 10:35:28 +02:00
version : '2'
2016-01-03 16:03:57 +01:00
2018-10-26 17:10:14 +03:00
# Note: Do not add single quotes '' to variables. Having spaces still works without quotes where required.
2018-12-22 18:44:08 +02:00
#---------------------------------------------------------------------------------------------------------
# ==== CREATING USERS AND LOGGING IN TO WEKAN ====
# https://github.com/wekan/wekan/wiki/Adding-users
#---------------------------------------------------------------------------------------------------------
# ==== FORGOT PASSWORD ====
# https://github.com/wekan/wekan/wiki/Forgot-Password
#---------------------------------------------------------------------------------------------------------
# ==== Upgrading Wekan to new version =====
2019-07-25 01:16:52 +03:00
# NOTE: MongoDB has changed from 3.x to 4.x, in that case you need backup/restore with --noIndexRestore
# see https://github.com/wekan/wekan/wiki/Backup
2018-12-22 18:44:08 +02:00
# 1) Stop Wekan:
# docker-compose stop
2020-11-12 15:51:23 +02:00
# 2) Remove old Wekan app (wekan-app only, not that wekan-db container that has all your data)
# docker rm wekan-app
# 3) Get newest docker-compose.yml from https://github.com/wekan/wekan to have correct image,
# for example: "image: quay.io/wekan/wekan" or version tag "image: quay.io/wekan/wekan:v4.52"
2018-12-22 18:44:08 +02:00
# 4) Start Wekan:
2020-11-12 15:51:23 +02:00
# docker-compose up -d
2018-12-22 18:44:08 +02:00
#----------------------------------------------------------------------------------
# ==== OPTIONAL: DEDICATED DOCKER USER ====
# 1) Optionally create a dedicated user for Wekan, for example:
# sudo useradd -d /home/wekan -m -s /bin/bash wekan
# 2) Add this user to the docker group, then logout+login or reboot:
# sudo usermod -aG docker wekan
# 3) Then login as user wekan.
# 4) Create this file /home/wekan/docker-compose.yml with your modifications.
#----------------------------------------------------------------------------------
# ==== RUN DOCKER AS SERVICE ====
# 1a) Running Docker as service, on Systemd like Debian 9, Ubuntu 16.04, CentOS 7:
# sudo systemctl enable docker
# sudo systemctl start docker
# 1b) Running Docker as service, on init.d like Debian 8, Ubuntu 14.04, CentOS 6:
# sudo update-rc.d docker defaults
# sudo service docker start
# ----------------------------------------------------------------------------------
# ==== USAGE OF THIS docker-compose.yml ====
2020-04-24 09:07:32 -05:00
# 1) For seeing does Wekan work, try this and check with your web browser:
2018-12-22 18:44:08 +02:00
# docker-compose up
# 2) Stop Wekan and start Wekan in background:
# docker-compose stop
# docker-compose up -d
# 3) See running Docker containers:
# docker ps
# 4) Stop Docker containers:
# docker-compose stop
# ----------------------------------------------------------------------------------
# ===== INSIDE DOCKER CONTAINERS, AND BACKUP/RESTORE ====
# https://github.com/wekan/wekan/wiki/Backup
# If really necessary, repair MongoDB: https://github.com/wekan/wekan-mongodb/issues/6#issuecomment-424004116
# 1) Going inside containers:
# a) Wekan app, does not contain data
# docker exec -it wekan-app bash
# b) MongoDB, contains all data
# docker exec -it wekan-db bash
# 2) Copying database to outside of container:
# docker exec -it wekan-db bash
# cd /data
# mongodump
# exit
# docker cp wekan-db:/data/dump .
# 3) Restoring database
# # 1) Stop wekan
# docker stop wekan-app
# # 2) Go inside database container
# docker exec -it wekan-db bash
# # 3) and data directory
# cd /data
# # 4) Remove previos dump
# rm -rf dump
# # 5) Exit db container
# exit
# # 6) Copy dump to inside docker container
# docker cp dump wekan-db:/data/
# # 7) Go inside database container
# docker exec -it wekan-db bash
# # 8) and data directory
# cd /data
# # 9) Restore
# mongorestore --drop
# # 10) Exit db container
# exit
# # 11) Start wekan
# docker start wekan-app
#-------------------------------------------------------------------------
2018-10-26 17:10:14 +03:00
2017-01-17 08:49:42 +00:00
services :
2016-01-03 16:03:57 +01:00
2017-01-17 08:49:42 +00:00
wekandb :
2018-12-22 18:44:08 +02:00
#-------------------------------------------------------------------------------------
# ==== MONGODB AND METEOR VERSION ====
2020-11-12 15:57:53 +02:00
# a) mongodb latest, like 3.2 - 4.4 or newer https://hub.docker.com/_/mongo?tab=description
2020-12-03 01:00:10 +02:00
# 2020-12-03:
# - Mongo image copied from Docker Hub mongo:4.4.2-bionic to Quay
# to avoid Docker Hub rate limits.
2021-01-29 15:09:11 +02:00
# Quay image does work:
2021-01-28 10:11:42 +02:00
# image: quay.io/wekan/mongo:4.4.2-bionic
2021-01-29 15:09:11 +02:00
# Docker Hub MongoDB image does work:
2021-01-28 10:11:42 +02:00
image : mongo:4.4
2018-12-22 18:44:08 +02:00
#-------------------------------------------------------------------------------------
2017-01-17 08:49:42 +00:00
container_name : wekan-db
restart : always
2020-11-23 20:40:37 +02:00
# command: mongod --oplogSize 128
# Syslog: mongod --syslog --oplogSize 128 --quiet
# Disable MongoDB logs:
command : mongod --logpath /dev/null --oplogSize 128 --quiet
2017-01-17 16:45:11 +00:00
networks :
- wekan-tier
2017-01-17 08:49:42 +00:00
expose :
- 27017
volumes :
- wekan-db:/data/db
- wekan-db-dump:/dump
2015-09-06 19:19:34 +02:00
2017-01-17 08:49:42 +00:00
wekan :
2018-12-22 18:44:08 +02:00
#-------------------------------------------------------------------------------------
# ==== MONGODB AND METEOR VERSION ====
2021-01-29 15:09:11 +02:00
# a) Quay automatic builds do work work, https://quay.io/wekan/wekan
2021-04-01 13:47:57 +03:00
image : quay.io/wekan/wekan
2020-11-12 15:43:21 +02:00
# b) Using specific version tag:
# image: quay.io/wekan/wekan:v4.52
2021-01-29 15:09:11 +02:00
# c) Docker Hub builds do work https://hub.docker.com/r/wekanteam/wekan
2021-03-31 21:58:23 +03:00
# image: wekanteam/wekan
2018-12-22 18:44:08 +02:00
#-------------------------------------------------------------------------------------
2017-01-17 08:49:42 +00:00
container_name : wekan-app
restart : always
2017-01-17 16:45:11 +00:00
networks :
- wekan-tier
2018-12-22 18:44:08 +02:00
#-------------------------------------------------------------------------------------
# ==== BUILD wekan-app DOCKER CONTAINER FROM SOURCE, if you uncomment these ====
2018-12-24 18:18:41 +02:00
# ==== and use commands: docker-compose up -d --build
2019-12-05 14:31:28 +02:00
#build:
# context: .
# dockerfile: Dockerfile
2018-12-22 18:44:08 +02:00
#-------------------------------------------------------------------------------------
2017-01-17 08:49:42 +00:00
ports :
2018-12-22 18:44:08 +02:00
# Docker outsideport:insideport. Do not add anything extra here.
# For example, if you want to have wekan on port 3001,
# use 3001:8080 . Do not add any extra address etc here, that way it does not work.
2018-12-28 17:26:30 +02:00
# remove port mapping if you use nginx reverse proxy, port 8080 is already exposed to wekan-tier network
2018-08-02 16:47:50 +03:00
- 80 : 8080
2017-01-17 08:49:42 +00:00
environment :
- MONGO_URL=mongodb://wekandb:27017/wekan
2018-12-22 18:44:08 +02:00
#---------------------------------------------------------------
# ==== ROOT_URL SETTING ====
# Change ROOT_URL to your real Wekan URL, for example:
# If you have Caddy/Nginx/Apache providing SSL
# - https://example.com
# - https://boards.example.com
# This can be problematic with avatars https://github.com/wekan/wekan/issues/1776
# - https://example.com/wekan
# If without https, can be only wekan node, no need for Caddy/Nginx/Apache if you don't need them
# - http://example.com
# - http://boards.example.com
# - http://192.168.1.100 <=== using at local LAN
- ROOT_URL=http://localhost # <=== using only at same laptop/desktop where Wekan is installed
#---------------------------------------------------------------
# ==== EMAIL SETTINGS ====
# Email settings are required in both MAIL_URL and Admin Panel,
# see https://github.com/wekan/wekan/wiki/Troubleshooting-Mail
# For SSL in email, change smtp:// to smtps://
# NOTE: Special characters need to be url-encoded in MAIL_URL.
# You can encode those characters for example at: https://www.urlencoder.org
2019-03-21 22:22:46 +02:00
#- MAIL_URL=smtp://user:pass@mailserver.example.com:25/
2019-04-12 00:44:54 +05:30
- MAIL_URL=smtp://<mail_url>:25/?ignoreTLS=true&tls={rejectUnauthorized:false}
- MAIL_FROM=Wekan Notifications <noreply.wekan@mydomain.com>
2018-12-22 18:44:08 +02:00
#---------------------------------------------------------------
# ==== OPTIONAL: MONGO OPLOG SETTINGS =====
# https://github.com/wekan/wekan-mongodb/issues/2#issuecomment-378343587
# We've fixed our CPU usage problem today with an environment
# change around Wekan. I wasn't aware during implementation
# that if you're using more than 1 instance of Wekan
# (or any MeteorJS based tool) you're supposed to set
# MONGO_OPLOG_URL as an environment variable.
2020-06-29 14:05:01 +09:00
# Without setting it, Meteor will perform a poll-and-diff
2018-12-22 18:44:08 +02:00
# update of it's dataset. With it, Meteor will update from
# the OPLOG. See here
# https://blog.meteor.com/tuning-meteor-mongo-livedata-for-scalability-13fe9deb8908
# After setting
# MONGO_OPLOG_URL=mongodb://<username>:<password>@<mongoDbURL>/local?authSource=admin&replicaSet=rsWekan
# the CPU usage for all Wekan instances dropped to an average
# of less than 10% with only occasional spikes to high usage
# (I guess when someone is doing a lot of work)
# - MONGO_OPLOG_URL=mongodb://<username>:<password>@<mongoDbURL>/local?authSource=admin&replicaSet=rsWekan
#---------------------------------------------------------------
# ==== OPTIONAL: KADIRA PERFORMANCE MONITORING FOR METEOR ====
2019-02-13 00:00:34 +00:00
# https://github.com/edemaine/kadira-compose
# https://github.com/meteor/meteor-apm-agent
2018-12-22 18:44:08 +02:00
# https://blog.meteor.com/kadira-apm-is-now-open-source-490469ffc85f
2019-02-13 00:00:34 +00:00
#- APM_OPTIONS_ENDPOINT=http://<kadira-ip>:11011
#- APM_APP_ID=
#- APM_APP_SECRET=
2018-12-22 18:44:08 +02:00
#---------------------------------------------------------------
# ==== OPTIONAL: LOGS AND STATS ====
# https://github.com/wekan/wekan/wiki/Logs
#
# Daily export of Wekan changes as JSON to Logstash and ElasticSearch / Kibana (ELK)
# https://github.com/wekan/wekan-logstash
#
# Statistics Python script for Wekan Dashboard
# https://github.com/wekan/wekan-stats
#
# Console, file, and zulip logger on database changes https://github.com/wekan/wekan/pull/1010
# with fix to replace console.log by winston logger https://github.com/wekan/wekan/pull/1033
# but there could be bug https://github.com/wekan/wekan/issues/1094
#
# There is Feature Request: Logging date and time of all activity with summary reports,
# and requesting reason for changing card to other column https://github.com/wekan/wekan/issues/1598
#---------------------------------------------------------------
2021-03-29 10:11:13 +03:00
# ==== NUMBER OF SEARCH RESULTS PER PAGE BY DEFAULT ====
#- RESULTS_PER_PAGE=20
#---------------------------------------------------------------
2018-12-22 18:44:08 +02:00
# ==== WEKAN API AND EXPORT BOARD ====
2018-10-26 17:10:14 +03:00
# Wekan Export Board works when WITH_API=true.
2018-12-22 18:44:08 +02:00
# https://github.com/wekan/wekan/wiki/REST-API
# https://github.com/wekan/wekan-gogs
2018-10-26 17:10:14 +03:00
# If you disable Wekan API with false, Export Board does not work.
2018-08-14 18:43:09 +03:00
- WITH_API=true
2019-02-25 18:10:36 +02:00
#---------------------------------------------------------------
2019-03-11 19:47:23 +02:00
# ==== PASSWORD BRUTE FORCE PROTECTION ====
#https://atmospherejs.com/lucasantoniassi/accounts-lockout
#Defaults below. Uncomment to change. wekan/server/accounts-lockout.js
#- ACCOUNTS_LOCKOUT_KNOWN_USERS_FAILURES_BEFORE=3
#- ACCOUNTS_LOCKOUT_KNOWN_USERS_PERIOD=60
#- ACCOUNTS_LOCKOUT_KNOWN_USERS_FAILURE_WINDOW=15
#- ACCOUNTS_LOCKOUT_UNKNOWN_USERS_FAILURES_BERORE=3
#- ACCOUNTS_LOCKOUT_UNKNOWN_USERS_LOCKOUT_PERIOD=60
#- ACCOUNTS_LOCKOUT_UNKNOWN_USERS_FAILURE_WINDOW=15
#---------------------------------------------------------------
2019-08-10 00:48:05 -04:00
# ==== STORE ATTACHMENT ON SERVER FILESYSTEM INSTEAD OF MONGODB ====
# https://github.com/wekan/wekan/pull/2603
#- ATTACHMENTS_STORE_PATH = <pathname> # pathname can be relative or fullpath
#---------------------------------------------------------------
2019-07-26 22:30:43 +03:00
# ==== RICH TEXT EDITOR IN CARD COMMENTS ====
# https://github.com/wekan/wekan/pull/2560
2020-02-05 01:17:15 +02:00
- RICHER_CARD_COMMENT_EDITOR=false
2019-07-26 22:30:43 +03:00
#---------------------------------------------------------------
2019-08-15 00:29:00 +03:00
# ==== CARD OPENED, SEND WEBHOOK MESSAGE ====
# https://github.com/wekan/wekan/issues/2518
- CARD_OPENED_WEBHOOK_ENABLED=false
#---------------------------------------------------------------
2019-07-18 04:52:19 +03:00
# ==== Allow to shrink attached/pasted image ====
# https://github.com/wekan/wekan/pull/2544
#-MAX_IMAGE_PIXEL=1024
#-IMAGE_COMPRESS_RATIO=80
#---------------------------------------------------------------
2020-04-08 23:16:48 +03:00
# ==== NOTIFICATION TRAY AFTER READ DAYS BEFORE REMOVE =====
# Number of days after a notification is read before we remove it.
# Default: 2
#- NOTIFICATION_TRAY_AFTER_READ_DAYS_BEFORE_REMOVE=2
#---------------------------------------------------------------
2019-07-11 17:14:34 -04:00
# ==== BIGEVENTS DUE ETC NOTIFICATIONS =====
# https://github.com/wekan/wekan/pull/2541
2019-08-26 22:27:45 +03:00
# Introduced a system env var BIGEVENTS_PATTERN default as "NONE",
2019-07-11 17:14:34 -04:00
# so any activityType matches the pattern, system will send out
# notifications to all board members no matter they are watching
# or tracking the board or not. Owner of the wekan server can
# disable the feature by setting this variable to "NONE" or
# change the pattern to any valid regex. i.e. '|' delimited
# activityType names.
2019-08-26 22:27:45 +03:00
# a) Example
2019-07-11 17:14:34 -04:00
#- BIGEVENTS_PATTERN=due
# b) All
#- BIGEVENTS_PATTERN=received|start|due|end
# c) Disabled
2019-08-26 22:27:45 +03:00
- BIGEVENTS_PATTERN=NONE
2019-07-11 17:14:34 -04:00
#---------------------------------------------------------------
2019-07-10 13:45:37 -04:00
# ==== EMAIL DUE DATE NOTIFICATION =====
# https://github.com/wekan/wekan/pull/2536
# System timelines will be showing any user modification for
# dueat startat endat receivedat, also notification to
# the watchers and if any card is due, about due or past due.
#
2019-10-01 10:39:36 -04:00
# Notify due days, default is None, 2 days before and on the event day
#- NOTIFY_DUE_DAYS_BEFORE_AND_AFTER=2,0
2019-07-10 13:45:37 -04:00
#
# Notify due at hour of day. Default every morning at 8am. Can be 0-23.
# If env variable has parsing error, use default. Notification sent to watchers.
#- NOTIFY_DUE_AT_HOUR_OF_DAY=8
#-----------------------------------------------------------------
2019-02-25 18:10:36 +02:00
# ==== EMAIL NOTIFICATION TIMEOUT, ms =====
# Defaut: 30000 ms = 30s
#- EMAIL_NOTIFICATION_TIMEOUT=30000
2018-12-22 18:44:08 +02:00
#-----------------------------------------------------------------
# ==== CORS =====
2019-02-12 03:09:30 +02:00
# CORS: Set Access-Control-Allow-Origin header.
2018-12-03 16:05:24 +02:00
#- CORS=*
2019-05-24 12:39:54 -04:00
# CORS_ALLOW_HEADERS: Set Access-Control-Allow-Headers header. "Authorization,Content-Type" is required for cross-origin use of the API.
#- CORS_ALLOW_HEADERS=Authorization,Content-Type
# CORS_EXPOSE_HEADERS: Set Access-Control-Expose-Headers header. This is not needed for typical CORS situations
#- CORS_EXPOSE_HEADERS=*
2018-12-22 18:44:08 +02:00
#-----------------------------------------------------------------
# ==== MATOMO INTEGRATION ====
2018-08-01 21:45:11 +03:00
# Optional: Integration with Matomo https://matomo.org that is installed to your server
2018-10-24 11:39:45 +03:00
# The address of the server where Matomo is hosted.
2019-02-12 03:09:30 +02:00
#- MATOMO_ADDRESS=https://example.com/matomo
2018-08-01 22:04:33 +03:00
# The value of the site ID given in Matomo server for Wekan
2019-02-12 03:09:30 +02:00
#- MATOMO_SITE_ID=1
2018-08-15 23:41:01 +03:00
# The option do not track which enables users to not be tracked by matomo
2019-02-12 03:09:30 +02:00
#- MATOMO_DO_NOT_TRACK=true
2018-08-01 22:04:33 +03:00
# The option that allows matomo to retrieve the username:
2019-02-12 03:09:30 +02:00
#- MATOMO_WITH_USERNAME=true
2018-12-22 18:44:08 +02:00
#-----------------------------------------------------------------
# ==== BROWSER POLICY AND TRUSTED IFRAME URL ====
2018-08-13 19:24:07 +03:00
# Enable browser policy and allow one trusted URL that can have iframe that has Wekan embedded inside.
# Setting this to false is not recommended, it also disables all other browser policy protections
# and allows all iframing etc. See wekan/server/policy.js
2018-08-14 18:43:09 +03:00
- BROWSER_POLICY_ENABLED=true
2018-08-13 19:24:07 +03:00
# When browser policy is enabled, HTML code at this Trusted URL can have iframe that embeds Wekan inside.
2019-02-12 03:09:30 +02:00
#- TRUSTED_URL=https://intra.example.com
2018-12-22 18:44:08 +02:00
#-----------------------------------------------------------------
# ==== OUTGOING WEBHOOKS ====
2021-02-18 22:52:18 +13:00
# What to send to Outgoing Webhook, or leave out. If commented out the default values will be: cardId,listId,oldListId,boardId,comment,user,card,commentId,swimlaneId,customerField,customFieldValue
2019-02-12 03:09:30 +02:00
#- WEBHOOKS_ATTRIBUTES=cardId,listId,oldListId,boardId,comment,user,card,commentId
2018-12-22 18:44:08 +02:00
#-----------------------------------------------------------------
2019-02-12 03:09:30 +02:00
# ==== Debug OIDC OAuth2 etc ====
#- DEBUG=true
#-----------------------------------------------------------------
2020-10-02 23:15:39 +03:00
# ==== OAUTH2 ORACLE on premise identity manager OIM ====
#- ORACLE_OIM_ENABLED=true
#-----------------------------------------------------------------
2019-02-12 03:09:30 +02:00
# ==== OAUTH2 AZURE ====
# https://github.com/wekan/wekan/wiki/Azure
# 1) Register the application with Azure. Make sure you capture
# the application ID as well as generate a secret key.
# 2) Configure the environment variables. This differs slightly
# by installation type, but make sure you have the following:
#- OAUTH2_ENABLED=true
2020-11-01 23:14:20 +02:00
# Optional OAuth2 CA Cert, see https://github.com/wekan/wekan/issues/3299
#- OAUTH2_CA_CERT=ABCD1234
2020-09-13 09:41:53 +03:00
# Use OAuth2 ADFS additional changes. Also needs OAUTH2_ENABLED=true setting.
#- OAUTH2_ADFS_ENABLED=false
2019-03-21 21:37:38 +02:00
# OAuth2 login style: popup or redirect.
#- OAUTH2_LOGIN_STYLE=redirect
2019-02-12 03:09:30 +02:00
# Application GUID captured during app registration:
#- OAUTH2_CLIENT_ID=xxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx
# Secret key generated during app registration:
#- OAUTH2_SECRET=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
#- OAUTH2_SERVER_URL=https://login.microsoftonline.com/
#- OAUTH2_AUTH_ENDPOINT=/oauth2/v2.0/authorize
#- OAUTH2_USERINFO_ENDPOINT=https://graph.microsoft.com/oidc/userinfo
#- OAUTH2_TOKEN_ENDPOINT=/oauth2/v2.0/token
# The claim name you want to map to the unique ID field:
#- OAUTH2_ID_MAP=email
# The claim name you want to map to the username field:
#- OAUTH2_USERNAME_MAP=email
# The claim name you want to map to the full name field:
#- OAUTH2_FULLNAME_MAP=name
# Tthe claim name you want to map to the email field:
2020-01-22 22:28:03 +01:00
#- OAUTH2_EMAIL_MAP=email
#-----------------------------------------------------------------
# ==== OAUTH2 Nextcloud ====
2020-08-30 18:58:11 +02:00
# 1) Register the application with Nextcloud: https://your.nextcloud/index.php/settings/admin/security
2020-01-22 22:28:03 +01:00
# Make sure you capture the application ID as well as generate a secret key.
2020-08-30 18:58:11 +02:00
# Use https://your.wekan/_oauth/oidc for the redirect URI.
2020-01-22 22:28:03 +01:00
# 2) Configure the environment variables. This differs slightly
# by installation type, but make sure you have the following:
#- OAUTH2_ENABLED=true
# OAuth2 login style: popup or redirect.
#- OAUTH2_LOGIN_STYLE=redirect
# Application GUID captured during app registration:
#- OAUTH2_CLIENT_ID=xxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx
# Secret key generated during app registration:
#- OAUTH2_SECRET=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
#- OAUTH2_SERVER_URL=https://your-nextcloud.tld
#- OAUTH2_AUTH_ENDPOINT=/index.php/apps/oauth2/authorize
#- OAUTH2_USERINFO_ENDPOINT=/ocs/v2.php/cloud/user?format=json
#- OAUTH2_TOKEN_ENDPOINT=/index.php/apps/oauth2/api/v1/token
# The claim name you want to map to the unique ID field:
#- OAUTH2_ID_MAP=id
# The claim name you want to map to the username field:
#- OAUTH2_USERNAME_MAP=id
# The claim name you want to map to the full name field:
#- OAUTH2_FULLNAME_MAP=display-name
# Tthe claim name you want to map to the email field:
2019-02-12 03:09:30 +02:00
#- OAUTH2_EMAIL_MAP=email
#-----------------------------------------------------------------
# ==== OAUTH2 KEYCLOAK ====
# https://github.com/wekan/wekan/wiki/Keycloak <== MAPPING INFO, REQUIRED
#- OAUTH2_ENABLED=true
2019-03-21 21:37:38 +02:00
# OAuth2 login style: popup or redirect.
#- OAUTH2_LOGIN_STYLE=redirect
2019-02-12 03:09:30 +02:00
#- OAUTH2_CLIENT_ID=<Keycloak create Client ID>
#- OAUTH2_SERVER_URL=<Keycloak server name>/auth
#- OAUTH2_AUTH_ENDPOINT=/realms/<keycloak realm>/protocol/openid-connect/auth
#- OAUTH2_USERINFO_ENDPOINT=/realms/<keycloak realm>/protocol/openid-connect/userinfo
#- OAUTH2_TOKEN_ENDPOINT=/realms/<keycloak realm>/protocol/openid-connect/token
#- OAUTH2_SECRET=<keycloak client secret>
#-----------------------------------------------------------------
# ==== OAUTH2 DOORKEEPER ====
2018-12-22 18:44:08 +02:00
# https://github.com/wekan/wekan/issues/1874
# https://github.com/wekan/wekan/wiki/OAuth2
2018-10-09 14:14:39 +02:00
# Enable the OAuth2 connection
2019-02-12 03:09:30 +02:00
#- OAUTH2_ENABLED=true
2018-08-25 00:49:02 +03:00
# OAuth2 docs: https://github.com/wekan/wekan/wiki/OAuth2
2019-03-21 21:37:38 +02:00
# OAuth2 login style: popup or redirect.
#- OAUTH2_LOGIN_STYLE=redirect
2019-02-12 03:09:30 +02:00
# OAuth2 Client ID.
#- OAUTH2_CLIENT_ID=abcde12345
# OAuth2 Secret.
#- OAUTH2_SECRET=54321abcde
# OAuth2 Server URL.
#- OAUTH2_SERVER_URL=https://chat.example.com
# OAuth2 Authorization Endpoint.
#- OAUTH2_AUTH_ENDPOINT=/oauth/authorize
# OAuth2 Userinfo Endpoint.
#- OAUTH2_USERINFO_ENDPOINT=/oauth/userinfo
# OAuth2 Token Endpoint.
#- OAUTH2_TOKEN_ENDPOINT=/oauth/token
2019-05-22 21:37:01 +03:00
# OAUTH2 ID Token Whitelist Fields.
2019-06-14 16:23:18 +03:00
#- OAUTH2_ID_TOKEN_WHITELIST_FIELDS=""
2019-05-22 21:37:01 +03:00
# OAUTH2 Request Permissions.
2019-06-12 13:41:10 +02:00
#- OAUTH2_REQUEST_PERMISSIONS=openid profile email
2019-02-12 03:09:30 +02:00
# OAuth2 ID Mapping
#- OAUTH2_ID_MAP=
# OAuth2 Username Mapping
#- OAUTH2_USERNAME_MAP=
# OAuth2 Fullname Mapping
#- OAUTH2_FULLNAME_MAP=
# OAuth2 Email Mapping
#- OAUTH2_EMAIL_MAP=
2019-02-11 16:32:24 +02:00
#-----------------------------------------------------------------
2019-03-21 22:22:46 +02:00
# ==== LDAP: UNCOMMENT ALL TO ENABLE LDAP ====
2018-12-22 18:44:08 +02:00
# https://github.com/wekan/wekan/wiki/LDAP
# For Snap settings see https://github.com/wekan/wekan-snap/wiki/Supported-settings-keys
# Most settings work both on Snap and Docker below.
# Note: Do not add single quotes '' to variables. Having spaces still works without quotes where required.
#
2019-03-21 22:22:46 +02:00
# The default authentication method used if a user does not exist to create and authenticate. Can be set as ldap.
#- DEFAULT_AUTHENTICATION_METHOD=ldap
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# Enable or not the connection by the LDAP
#- LDAP_ENABLE=true
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# The port of the LDAP server
2018-10-26 17:10:14 +03:00
#- LDAP_PORT=389
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# The host server for the LDAP server
#- LDAP_HOST=localhost
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# The base DN for the LDAP Tree
#- LDAP_BASEDN=ou=user,dc=example,dc=org
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# Fallback on the default authentication method
2018-10-26 17:10:14 +03:00
#- LDAP_LOGIN_FALLBACK=false
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# Reconnect to the server if the connection is lost
2018-10-26 17:10:14 +03:00
#- LDAP_RECONNECT=true
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# Overall timeout, in milliseconds
2018-10-26 17:10:14 +03:00
#- LDAP_TIMEOUT=10000
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# Specifies the timeout for idle LDAP connections in milliseconds
2018-10-26 17:10:14 +03:00
#- LDAP_IDLE_TIMEOUT=10000
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# Connection timeout, in milliseconds
2018-10-26 17:10:14 +03:00
#- LDAP_CONNECT_TIMEOUT=10000
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# If the LDAP needs a user account to search
#- LDAP_AUTHENTIFICATION=true
2018-12-22 18:44:08 +02:00
#
2019-09-06 01:22:15 +03:00
# The search user DN - You need quotes when you have spaces in parameters
# 2 examples:
2021-01-28 13:39:48 +02:00
#- LDAP_AUTHENTIFICATION_USERDN=CN=ldap admin,CN=users,DC=domainmatter,DC=lan
#- LDAP_AUTHENTIFICATION_USERDN=CN=wekan_adm,OU=serviceaccounts,OU=admin,OU=prod,DC=mydomain,DC=com
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# The password for the search user
#- LDAP_AUTHENTIFICATION_PASSWORD=pwd
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# Enable logs for the module
#- LDAP_LOG_ENABLED=true
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# If the sync of the users should be done in the background
2018-10-26 17:10:14 +03:00
#- LDAP_BACKGROUND_SYNC=false
2018-12-22 18:44:08 +02:00
#
2019-12-20 16:03:46 +02:00
# At which interval does the background task sync.
2019-12-18 15:12:36 +01:00
# The format must be as specified in:
2019-12-18 15:32:17 +01:00
# https://bunkat.github.io/later/parsers.html#text
2019-12-20 16:03:46 +02:00
#- LDAP_BACKGROUND_SYNC_INTERVAL='every 1 hour'
2018-12-22 18:44:08 +02:00
#
2018-10-26 17:10:14 +03:00
#- LDAP_BACKGROUND_SYNC_KEEP_EXISTANT_USERS_UPDATED=false
2018-12-22 18:44:08 +02:00
#
2018-10-26 17:10:14 +03:00
#- LDAP_BACKGROUND_SYNC_IMPORT_NEW_USERS=false
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# If using LDAPS: LDAP_ENCRYPTION=ssl
2018-10-26 17:10:14 +03:00
#- LDAP_ENCRYPTION=false
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# The certification for the LDAPS server. Certificate needs to be included in this docker-compose.yml file.
#- LDAP_CA_CERT=-----BEGIN CERTIFICATE-----MIIE+G2FIdAgIC...-----END CERTIFICATE-----
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# Reject Unauthorized Certificate
2018-10-26 17:10:14 +03:00
#- LDAP_REJECT_UNAUTHORIZED=false
2018-12-22 18:44:08 +02:00
#
2019-05-10 23:04:51 +03:00
# Option to login to the LDAP server with the user's own username and password, instead of an administrator key. Default: false (use administrator key).
2021-01-28 13:39:48 +02:00
#- LDAP_USER_AUTHENTICATION=true
2019-05-10 23:04:51 +03:00
#
2019-08-04 11:12:21 +02:00
# Which field is used to find the user for the user authentication. Default: uid.
2021-01-28 13:39:48 +02:00
#- LDAP_USER_AUTHENTICATION_FIELD=uid
2019-08-04 11:12:21 +02:00
#
2019-03-21 22:22:46 +02:00
# Optional extra LDAP filters. Don't forget the outmost enclosing parentheses if needed
2018-10-26 17:10:14 +03:00
#- LDAP_USER_SEARCH_FILTER=
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# base (search only in the provided DN), one (search only in the provided DN and one level deep), or sub (search the whole subtree)
#- LDAP_USER_SEARCH_SCOPE=one
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# Which field is used to find the user, like uid / sAMAccountName
#- LDAP_USER_SEARCH_FIELD=sAMAccountName
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# Used for pagination (0=unlimited)
2018-10-26 17:10:14 +03:00
#- LDAP_SEARCH_PAGE_SIZE=0
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# The limit number of entries (0=unlimited)
2018-10-26 17:10:14 +03:00
#- LDAP_SEARCH_SIZE_LIMIT=0
2018-12-22 18:44:08 +02:00
#
2020-03-14 15:38:19 +01:00
# Enable group filtering. Note the authenticated ldap user must be able to query all relevant group data with own login data from ldap.
2018-10-26 17:10:14 +03:00
#- LDAP_GROUP_FILTER_ENABLE=false
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# The object class for filtering. Example: group
2018-10-26 17:10:14 +03:00
#- LDAP_GROUP_FILTER_OBJECTCLASS=
2018-12-22 18:44:08 +02:00
#
2020-03-14 15:38:19 +01:00
# The attribute of a group identifying it. Example: cn
2018-10-26 17:10:14 +03:00
#- LDAP_GROUP_FILTER_GROUP_ID_ATTRIBUTE=
2018-12-22 18:44:08 +02:00
#
2020-03-14 15:38:19 +01:00
# The attribute inside a group object listing its members. Example: member
2018-10-26 17:10:14 +03:00
#- LDAP_GROUP_FILTER_GROUP_MEMBER_ATTRIBUTE=
2018-12-22 18:44:08 +02:00
#
2020-03-14 15:38:19 +01:00
# The format of the value of LDAP_GROUP_FILTER_GROUP_MEMBER_ATTRIBUTE. Example: 'dn' if the users dn ist saved as value into the attribute.
2018-10-26 17:10:14 +03:00
#- LDAP_GROUP_FILTER_GROUP_MEMBER_FORMAT=
2018-12-22 18:44:08 +02:00
#
2020-03-14 15:38:19 +01:00
# The group name (id) that matches all users.
2018-10-26 17:10:14 +03:00
#- LDAP_GROUP_FILTER_GROUP_NAME=
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# LDAP_UNIQUE_IDENTIFIER_FIELD : This field is sometimes class GUID (Globally Unique Identifier). Example: guid
2018-10-26 17:10:14 +03:00
#- LDAP_UNIQUE_IDENTIFIER_FIELD=
2018-12-22 18:44:08 +02:00
#
2018-10-09 14:14:39 +02:00
# LDAP_UTF8_NAMES_SLUGIFY : Convert the username to utf8
2018-10-26 17:10:14 +03:00
#- LDAP_UTF8_NAMES_SLUGIFY=true
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# LDAP_USERNAME_FIELD : Which field contains the ldap username. username / sAMAccountName
#- LDAP_USERNAME_FIELD=sAMAccountName
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# LDAP_FULLNAME_FIELD : Which field contains the ldap fullname. fullname / sAMAccountName
#- LDAP_FULLNAME_FIELD=fullname
2018-12-22 18:44:08 +02:00
#
2018-10-26 17:10:14 +03:00
#- LDAP_MERGE_EXISTING_USERS=false
2019-02-21 09:02:47 +00:00
#
2019-03-21 22:22:46 +02:00
# Allow existing account matching by e-mail address when username does not match
#- LDAP_EMAIL_MATCH_ENABLE=true
2019-02-21 09:02:47 +00:00
#
# LDAP_EMAIL_MATCH_REQUIRE : require existing account matching by e-mail address when username does match
2019-03-21 22:22:46 +02:00
#- LDAP_EMAIL_MATCH_REQUIRE=true
2019-02-21 09:02:47 +00:00
#
# LDAP_EMAIL_MATCH_VERIFIED : require existing account email address to be verified for matching
2019-03-21 22:22:46 +02:00
#- LDAP_EMAIL_MATCH_VERIFIED=true
2019-02-21 09:02:47 +00:00
#
# LDAP_EMAIL_FIELD : which field contains the LDAP e-mail address
2019-03-21 22:22:46 +02:00
#- LDAP_EMAIL_FIELD=mail
2018-12-22 18:44:08 +02:00
#-----------------------------------------------------------------
2018-10-26 17:10:14 +03:00
#- LDAP_SYNC_USER_DATA=false
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
#- LDAP_SYNC_USER_DATA_FIELDMAP={"cn":"name", "mail":"email"}
2018-12-22 18:44:08 +02:00
#
2021-01-28 13:39:48 +02:00
#- LDAP_SYNC_GROUP_ROLES=
2018-12-22 18:44:08 +02:00
#
2019-03-21 22:22:46 +02:00
# The default domain of the ldap it is used to create email if the field is not map correctly with the LDAP_SYNC_USER_DATA_FIELDMAP
2018-10-24 11:39:45 +03:00
# example :
2019-03-21 22:22:46 +02:00
#- LDAP_DEFAULT_DOMAIN=mydomain.com
2019-03-06 02:47:27 +02:00
#
# Enable/Disable syncing of admin status based on ldap groups:
#- LDAP_SYNC_ADMIN_STATUS=true
#
# Comma separated list of admin group names to sync.
#- LDAP_SYNC_ADMIN_GROUPS=group1,group2
2018-12-22 18:44:08 +02:00
#---------------------------------------------------------------------
2019-03-08 18:40:43 +02:00
# Login to LDAP automatically with HTTP header.
# In below example for siteminder, at right side of = is header name.
2019-04-08 12:01:26 +03:00
#- HEADER_LOGIN_ID=HEADERUID
#- HEADER_LOGIN_FIRSTNAME=HEADERFIRSTNAME
#- HEADER_LOGIN_LASTNAME=HEADERLASTNAME
#- HEADER_LOGIN_EMAIL=HEADEREMAILADDRESS
2019-03-08 18:40:43 +02:00
#---------------------------------------------------------------------
2018-12-22 18:44:08 +02:00
# ==== LOGOUT TIMER, probably does not work yet ====
2018-11-22 18:00:21 +01:00
# LOGOUT_WITH_TIMER : Enables or not the option logout with timer
# example : LOGOUT_WITH_TIMER=true
#- LOGOUT_WITH_TIMER=
2018-12-22 18:44:08 +02:00
#
2018-11-22 18:00:21 +01:00
# LOGOUT_IN : The number of days
# example : LOGOUT_IN=1
#- LOGOUT_IN=
2018-12-22 18:44:08 +02:00
#
2018-11-22 18:00:21 +01:00
# LOGOUT_ON_HOURS : The number of hours
# example : LOGOUT_ON_HOURS=9
#- LOGOUT_ON_HOURS=
2018-12-22 18:44:08 +02:00
#
2018-11-22 18:00:21 +01:00
# LOGOUT_ON_MINUTES : The number of minutes
# example : LOGOUT_ON_MINUTES=55
#- LOGOUT_ON_MINUTES=
2018-12-22 18:44:08 +02:00
#-------------------------------------------------------------------
2020-08-27 03:15:00 +03:00
# Hide password login form
2020-04-14 08:56:52 +02:00
# - PASSWORD_LOGIN_ENABLED=true
#-------------------------------------------------------------------
2020-09-14 19:57:50 +03:00
#- CAS_ENABLED=true
#- CAS_BASE_URL=https://cas.example.com/cas
#- CAS_LOGIN_URL=https://cas.example.com/login
#- CAS_VALIDATE_URL=https://cas.example.com/cas/p3/serviceValidate
#---------------------------------------------------------------------
#- SAML_ENABLED=true
#- SAML_PROVIDER=
#- SAML_ENTRYPOINT=
#- SAML_ISSUER=
#- SAML_CERT=
#- SAML_IDPSLO_REDIRECTURL=
#- SAML_PRIVATE_KEYFILE=
#- SAML_PUBLIC_CERTFILE=
#- SAML_IDENTIFIER_FORMAT=
#- SAML_LOCAL_PROFILE_MATCH_ATTRIBUTE=
#- SAML_ATTRIBUTES=
#---------------------------------------------------------------------
2020-09-15 20:16:42 +08:00
depends_on :
2017-01-17 08:49:42 +00:00
- wekandb
2018-12-22 18:44:08 +02:00
#---------------------------------------------------------------------------------
# ==== OPTIONAL: SHARE DATABASE TO OFFICE LAN AND REMOTE VPN ====
# When using Wekan both at office LAN and remote VPN:
# 1) Have above Wekan docker container config with LAN IP address
# 2) Copy all of above wekan container config below, look above of this part above and all config below it,
# before above depends_on: part:
#
# wekan:
# #-------------------------------------------------------------------------------------
# # ==== MONGODB AND METEOR VERSION ====
# # a) For Wekan Meteor 1.8.x version at meteor-1.8 branch, .....
#
#
# and change name to different name like wekan2 or wekanvpn, and change ROOT_URL to server VPN IP
# address.
# 3) This way both Wekan containers can use same MongoDB database
# and see the same Wekan boards.
# 4) You could also add 3rd Wekan container for 3rd network etc.
# EXAMPLE:
# wekan2:
# ....COPY CONFIG FROM ABOVE TO HERE...
# environment:
# - ROOT_URL='http://10.10.10.10'
# ...COPY CONFIG FROM ABOVE TO HERE...
#---------------------------------------------------------------------------------
2018-12-28 17:26:30 +02:00
# OPTIONAL NGINX CONFIG FOR REVERSE PROXY
# nginx:
# image: nginx
# container_name: nginx
# restart: always
# networks:
# - wekan-tier
# depends_on:
# - wekan
# ports:
# - 80:80
# - 443:443
# volumes:
2019-03-21 22:22:46 +02:00
# - ./nginx/ssl:/etc/nginx/ssl/:ro
# - ./nginx/nginx.conf:/etc/nginx/nginx.conf:ro
## Alternative volume config:
## volumes:
## - ./nginx/nginx.conf:/etc/nginx/conf.d/default.conf:ro
## - ./nginx/ssl/ssl.conf:/etc/nginx/conf.d/ssl/ssl.conf:ro
## - ./nginx/ssl/testvm-ehu.crt:/etc/nginx/conf.d/ssl/certs/mycert.crt:ro
## - ./nginx/ssl/testvm-ehu.key:/etc/nginx/conf.d/ssl/certs/mykey.key:ro
## - ./nginx/ssl/pphrase:/etc/nginx/conf.d/ssl/pphrase:ro
2018-12-28 17:26:30 +02:00
2017-01-17 08:49:42 +00:00
volumes :
wekan-db :
driver : local
2017-01-17 16:45:11 +00:00
wekan-db-dump :
driver : local
networks :
wekan-tier :
driver : bridge