Huge role refactoring/cleanup. Other commits will propably follow. Because some bugs will exist. Still important for longrun and also for auto docs/help/slideshow generation

This commit is contained in:
2025-07-08 23:43:13 +02:00
parent 6b87a049d4
commit 563d5fd528
1242 changed files with 2301 additions and 1355 deletions

View File

@@ -0,0 +1,29 @@
{% include 'roles/docker-compose/templates/base.yml.j2' %}
fusiondirectory:
image: tiredofit/fusiondirectory:latest
container_name: fusiondirectory
ports:
- "8080:80" # Exponiert den Webservice (HTTP) des Containers auf Port 8080 des Hosts
environment:
# FusionDirectory spezifische Einstellungen
- FUSIONDIRECTORY_ADMIN_USER=admin
- FUSIONDIRECTORY_ADMIN_PASS=yourFusionDirPassword
# LDAP-Verbindungsdaten (diese werden von FusionDirectory benötigt, um sich mit Ihrem LDAP-Server zu verbinden)
- LDAP_HOST=ldap.example.com
- LDAP_ADMIN_DN=cn=admin,dc=example,dc=com
- LDAP_ADMIN_PASS=yourLDAPPassword
- LDAP_BASE_DN=dc=example,dc=com
# Optional: Falls TLS für die LDAP-Verbindung genutzt werden soll, können Sie diese Variablen definieren:
#- ENABLE_TLS=TRUE
#- TLS_CRT_FILENAME=cert.pem
#- TLS_KEY_FILENAME=key.pem
#- TLS_CA_CRT_FILENAME=ca_cert.pem
volumes:
# Hier können Sie persistente Daten ablegen z.B. individuelle Konfigurationen oder benutzerdefinierte Plugins
- fusiondirectory_data:/assets/fusiondirectory
restart: always
{% include 'roles/docker-compose/templates/volumes.yml.j2' %}
fusiondirectory_data:
{% include 'roles/docker-compose/templates/networks.yml.j2' %}

View File

@@ -0,0 +1,14 @@
# See all variables here:
# https://github.com/LDAPAccountManager/lam/blob/develop/lam-packaging/docker/.env
# Basic Configuration
LAM_PASSWORD= {{applications[application_id].credentials.administrator_password}} # LAM configuration master password and password for server profile "lam
# Database
LAM_CONFIGURATION_DATABASE= files # configuration database (files or mysql) @todo implement mariadb
# LDAP Configuration
LDAP_SERVER= {{ldap.server.domain}} # domain of LDAP database root entry
LDAP_BASE_DN= {{ldap.dn.root}} # LDAP base DN to overwrite value generated by LDAP_DOMAIN
LDAP_USER= {{ldap.dn.administrator.data}} # LDAP admin user (set as login user for LAM)
LDAP_ADMIN_PASSWORD= {{ldap.bind_credential}} # LDAP admin password