mirror of
https://github.com/seanmorley15/AdventureLog.git
synced 2025-08-05 05:05:17 +02:00
Merge pull request #455 from UndyingSoul/main
Fixes gap in docker-compose example/docs with working oidc implementation
This commit is contained in:
commit
8af53f8f01
2 changed files with 12 additions and 2 deletions
|
@ -39,7 +39,7 @@ services:
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.adventurelogweb.entrypoints=websecure"
|
- "traefik.http.routers.adventurelogweb.entrypoints=websecure"
|
||||||
- "traefik.http.routers.adventurelogweb.rule=Host(`yourdomain.com`) && !(PathPrefix(`/media`) || PathPrefix(`/admin`) || PathPrefix(`/static`))" # Replace with your domain
|
- "traefik.http.routers.adventurelogweb.rule=Host(`yourdomain.com`) && !(PathPrefix(`/media`) || PathPrefix(`/admin`) || PathPrefix(`/static`) || PathPrefix(`/accounts`))" # Replace with your domain
|
||||||
- "traefik.http.routers.adventurelogweb.tls=true"
|
- "traefik.http.routers.adventurelogweb.tls=true"
|
||||||
- "traefik.http.routers.adventurelogweb.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.adventurelogweb.tls.certresolver=letsencrypt"
|
||||||
depends_on:
|
depends_on:
|
||||||
|
@ -66,7 +66,7 @@ services:
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.adventurelogserver.entrypoints=websecure"
|
- "traefik.http.routers.adventurelogserver.entrypoints=websecure"
|
||||||
- "traefik.http.routers.adventurelogserver.rule=Host(`yourdomain.com`) && (PathPrefix(`/media`) || PathPrefix(`/admin`) || PathPrefix(`/static`))" # Replace with your domain
|
- "traefik.http.routers.adventurelogserver.rule=Host(`yourdomain.com`) && (PathPrefix(`/media`) || PathPrefix(`/admin`) || PathPrefix(`/static`) || PathPrefix(`/accounts`))" # Replace with your domain
|
||||||
- "traefik.http.routers.adventurelogserver.tls=true"
|
- "traefik.http.routers.adventurelogserver.tls=true"
|
||||||
- "traefik.http.routers.adventurelogserver.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.adventurelogserver.tls.certresolver=letsencrypt"
|
||||||
depends_on:
|
depends_on:
|
||||||
|
|
|
@ -54,3 +54,13 @@ This configuration is done in the [Admin Panel](../../guides/admin_panel.md). Yo
|
||||||
4. Save the configuration.
|
4. Save the configuration.
|
||||||
|
|
||||||
Ensure that the Authentik server is running and accessible by AdventureLog. Users should now be able to log in to AdventureLog using their Authentik account.
|
Ensure that the Authentik server is running and accessible by AdventureLog. Users should now be able to log in to AdventureLog using their Authentik account.
|
||||||
|
|
||||||
|
## Troubleshooting
|
||||||
|
|
||||||
|
### 404 error when logging in.
|
||||||
|
|
||||||
|
Ensure the <adventurelog-server-url>/accounts path is routed to the backend, as it shouldn't hit the frontend when it's properly configured.
|
||||||
|
|
||||||
|
### Authentik - No Permission
|
||||||
|
|
||||||
|
In the Authentik instance, check access to the AdventureLog application from a specific user by using the Check Access/Test button on the Application dashboard. If the user doesn't have access, you can add an existing user/group policy to give your specific user/group access to the AdventureLog application.
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue