Added fusion directory draft

This commit is contained in:
2025-04-08 17:58:06 +02:00
parent adecee43ec
commit 1be413f20d
7 changed files with 139 additions and 0 deletions

View File

@@ -0,0 +1,46 @@
services:
{% include 'roles/docker-oauth2-proxy/templates/container.yml.j2' %}
application:
container_name: {{ application_id }}
logging:
driver: journald
restart: {{docker_restart_policy}}
image: ghcr.io/ldapaccountmanager/lam:{{applications[application_id].version}}
ports:
- 127.0.0.1:{{ports.localhost.http[application_id]}}:80
{% include 'roles/docker-compose/templates/services/base.yml.j2' %}
{% include 'templates/docker/container/networks.yml.j2' %}
{# include 'templates/docker/compose/volumes.yml.j2' #}
{% include 'templates/docker/compose/networks.yml.j2' %}
services:
fusiondirectory:
image: tiredofit/fusiondirectory:latest
container_name: fusiondirectory
ports:
- "8080:80" # Exponiert den Webservice (HTTP) des Containers auf Port 8080 des Hosts
environment:
# FusionDirectory spezifische Einstellungen
- FUSIONDIRECTORY_ADMIN_USER=admin
- FUSIONDIRECTORY_ADMIN_PASS=yourFusionDirPassword
# LDAP-Verbindungsdaten (diese werden von FusionDirectory benötigt, um sich mit Ihrem LDAP-Server zu verbinden)
- LDAP_HOST=ldap.example.com
- LDAP_ADMIN_DN=cn=admin,dc=example,dc=com
- LDAP_ADMIN_PASS=yourLDAPPassword
- LDAP_BASE_DN=dc=example,dc=com
# Optional: Falls TLS für die LDAP-Verbindung genutzt werden soll, können Sie diese Variablen definieren:
#- ENABLE_TLS=TRUE
#- TLS_CRT_FILENAME=cert.pem
#- TLS_KEY_FILENAME=key.pem
#- TLS_CA_CRT_FILENAME=ca_cert.pem
volumes:
# Hier können Sie persistente Daten ablegen z.B. individuelle Konfigurationen oder benutzerdefinierte Plugins
- fusiondirectory_data:/assets/fusiondirectory
restart: always
volumes:
fusiondirectory_data:

View File

@@ -0,0 +1,14 @@
# See all variables here:
# https://github.com/LDAPAccountManager/lam/blob/develop/lam-packaging/docker/.env
# Basic Configuration
LAM_PASSWORD= {{applications[application_id].administrator_password}} # LAM configuration master password and password for server profile "lam
# Database
LAM_CONFIGURATION_DATABASE= files # configuration database (files or mysql) @todo implement mariadb
# LDAP Configuration
LDAP_SERVER= {{ldap.server.domain}} # domain of LDAP database root entry
LDAP_BASE_DN= {{ldap.dn.root}} # LDAP base DN to overwrite value generated by LDAP_DOMAIN
LDAP_USER= {{ldap.dn.administrator}} # LDAP admin user (set as login user for LAM)
LDAP_ADMIN_PASSWORD= {{ldap.bind_credential}} # LDAP admin password