Skip to content

Commit

Permalink
Updates for Authelia 4.38
Browse files Browse the repository at this point in the history
  • Loading branch information
jamescurtin committed Mar 21, 2024
1 parent 5937e83 commit 99defa8
Show file tree
Hide file tree
Showing 5 changed files with 13 additions and 7 deletions.
11 changes: 6 additions & 5 deletions authelia/configuration.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
# See https://www.authelia.com/configuration/prologue/introduction/ for options
server:
host: 0.0.0.0
port: 9091
address: 0.0.0.0:9091

log:
level: debug
Expand Down Expand Up @@ -44,7 +43,10 @@ session:
name: authelia_session
expiration: 3600 # 1 hour
inactivity: 300 # 5 minutes
domain: docker.localhost # CHANGEME: domain associated with the login subdomain
cookies:
- domain: docker.localhost # CHANGEME: domain associated with the login subdomain

Check warning on line 47 in authelia/configuration.yml

View workflow job for this annotation

GitHub Actions / Run yaml linting

47:85 [line-length] line too long (85 > 84 characters)
authelia_url: "https://auth.docker.localhost" # CHANGEME: Set as AUTH_SERVER_HOST

Check failure on line 48 in authelia/configuration.yml

View workflow job for this annotation

GitHub Actions / Run yaml linting

48:21 [quoted-strings] string value is redundantly quoted with double quotes

Check warning on line 48 in authelia/configuration.yml

View workflow job for this annotation

GitHub Actions / Run yaml linting

48:85 [line-length] line too long (87 > 84 characters)
default_redirection_url: "https://docker.localhost" # CHANGEME: Set as desired redirection URL

Check failure on line 49 in authelia/configuration.yml

View workflow job for this annotation

GitHub Actions / Run yaml linting

49:32 [quoted-strings] string value is redundantly quoted with double quotes

Check warning on line 49 in authelia/configuration.yml

View workflow job for this annotation

GitHub Actions / Run yaml linting

49:85 [line-length] line too long (100 > 84 characters)

redis:
host: authelia-redis
Expand All @@ -57,8 +59,7 @@ regulation:

storage:
postgres:
host: authelia-postgres
port: 5432
address: authelia-postgres:5432
database: authelia
username: authelia

Expand Down
2 changes: 1 addition & 1 deletion bin/create-new-user
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ echo
echo
echo "Creating user..."

hashed_password=$(docker run --rm -v "${SCRIPT_DIR}"/../authelia:/config authelia/authelia:latest authelia hash-password --config /config/configuration.yml -- "$password" | sed -e "s/^Digest: //")
hashed_password=$(docker run --rm -v "${SCRIPT_DIR}"/../authelia:/config authelia/authelia:latest authelia crypto hash generate argon2 --config /config/configuration.yml --password "$password" | sed -e "s/^Digest: //")

cat <<EOT >>"${SCRIPT_DIR}"/../authelia/users.yml
$username:
Expand Down
1 change: 1 addition & 0 deletions docker-compose.labels.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,7 @@ services:
- traefik.http.routers.traefik.service=api@internal
- traefik.http.routers.traefik.tls.certresolver=letsencrypt
- traefik.http.routers.traefik.tls=true
- traefik.http.routers.traefik.tls.domains[0].sans=*.docker.localhost
whoami:
labels:
- traefik.enable=true
Expand Down
2 changes: 1 addition & 1 deletion docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ services:
env_file:
- .env
environment:
AUTHELIA_JWT_SECRET_FILE: /run/secrets/jwt
AUTHELIA_IDENTITY_VALIDATION_RESET_PASSWORD_JWT_SECRET_FILE: /run/secrets/jwt
# yamllint disable-line rule:line-length
# CHANGEME: Uncomment the following line if using notifier.smtp in authelia/configuration.yml
# AUTHELIA_NOTIFIER_SMTP_PASSWORD_FILE: /run/secrets/smtp
Expand Down
4 changes: 4 additions & 0 deletions traefik.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,10 @@ certificatesResolvers:
storage: /etc/acme/acme.json
httpChallenge:
entryPoint: web
# CHANGEME: If you'd like to use the DNS challenge for a wildcard cert.
# See https://doc.traefik.io/traefik/https/acme/#dnschallenge
# dnsChallenge:
# provider: TODO

entryPoints:
web:
Expand Down

0 comments on commit 99defa8

Please sign in to comment.