docker-taiga-front
docker-taiga-back
This Docker repository provides custom taiga-front and taiga-back docker images with additional plugins and a production ready docker-compose.
These images were inspired by ajira86/docker-taiga which is a fork of benhutchins/docker-taiga.
Taiga is a project management platform for startups and agile developers & designers who want a simple, beautiful tool that makes work truly enjoyable.
- 6.0.10-alpine 6.0-alpine alpine 6.0.10 6.0 latest (
images/6.0/alpine/front/Dockerfile
) - 6.0.10-alpine 6.0-alpine alpine 6.0.10 6.0 latest (
images/6.0/alpine/back/Dockerfile
) - 5.5.10-alpine 5.5-alpine 5.5.10 5.5 (
images/5.5/alpine/front/Dockerfile
) - 5.5.10-alpine 5.5-alpine 5.5.10 5.5 (
images/5.5/alpine/back/Dockerfile
) - 5.0.15-alpine 5.0-alpine 5.0.15 5.0 (
images/5.0/alpine/front/Dockerfile
) - 5.0.15-alpine 5.0-alpine 5.0.15 5.0 (
images/5.0/alpine/back/Dockerfile
) - 4.2.14-alpine 4.2-alpine 4.2.14 4.2 (
images/4.2/alpine/front/Dockerfile
) - 4.2.14-alpine 4.2-alpine 4.2.14 4.2 (
images/4.2/alpine/back/Dockerfile
)
To generate docker images from the template, execute update.sh
script.
Install Docker and then run cd images/VARIANT/VERSION && docker-compose build
to build the images for the variant and version you need.
You can also build all images by running update.sh build
.
- Run
cd images/VARIANT/VERSION
for the variant and version you need - Edit the
.env
file with your environment information - (Optional) Comment the
build:
and uncomment theimage:
to use official images and not build from local Dockerfile - Run
docker-compose up -d
to start the containers
The front is based on Monogramm/docker-taiga-front-base and adds the following plugins:
- https://github.com/taigaio/taiga-contrib-slack
- https://github.com/taigaio/taiga-contrib-gitlab-auth
- https://github.com/taigaio/taiga-contrib-github-auth
- https://github.com/taigaio/taiga-contrib-cookie-warning
- https://github.com/robrotheram/taiga-contrib-openid-auth
The Taiga frontend image supports auto configuration via environment variables. You can preconfigure nearly everything that is available in conf.json
.
See docker-taiga-front-base for more details on configuration.
This image also provides healthchecks and additionnal configuration properties.
Default value:
GitLab Authentication client ID. Remember to set TAIGA_CONTRIB_PLUGINS=gitlab-auth
too.
Examples:
GITLAB_API_CLIENT_ID=XXXXXX_get_a_valid_client_id_from_GITLAB_AUTH_XXXXXX
Default value: https://gitlab.com
GitLab Authentication instance URL.
Examples:
GITLAB_URL=https://gitlab.com
GITLAB_URL=https://gitlab.company.com
Default value:
GitHub Authentication client ID. Remember to set TAIGA_CONTRIB_PLUGINS=github-auth
too.
Examples:
GITHUB_AUTH_CLIENT_ID=XXXXXX_get_a_valid_client_id_from_GITHUB_AUTH_XXXXXX
Default value:
OpenID Authentication client ID. Remember to set TAIGA_CONTRIB_PLUGINS=openid-auth
too.
Examples:
OPENID_URL=https://{url-to-keycloak}/auth/realms/{realm}/protocol/openid-connect/auth
OPENID_NAME=Name_you_want_to_give_your_openid_provider_eg_keycloak
OPENID_CLIENT_ID=Client_ID
The image is based on Monogramm/docker-taiga-back-base and add the following plugins:
- https://github.com/taigaio/taiga-contrib-slack
- https://github.com/taigaio/taiga-contrib-gitlab-auth
- https://github.com/taigaio/taiga-contrib-github-auth
- https://github.com/Monogramm/taiga-contrib-ldap-auth-ext
- https://github.com/robrotheram/taiga-contrib-openid-auth
The Taiga image supports auto configuration via environment variables. You can preconfigure nearly everything that is available in local.py
.
See docker-taiga-back-base for more details on configuration.
This image also provides healthchecks and additionnal configuration properties.
Default value: False
Enable Taiga Slack plugin (also compatible with Mattermost). Remember to set TAIGA_CONTRIB_PLUGINS=slack
in the frontend too.
Examples:
ENABLE_SLACK=False
ENABLE_SLACK=True
Default value: False
Enable Taiga GitLab Authentication. Remember to set TAIGA_CONTRIB_PLUGINS=gitlab-auth
and TAIGA_GITLAB_AUTH_CLIENT_ID
in the frontend too.
Examples:
ENABLE_GITLAB_AUTH=False
ENABLE_GITLAB_AUTH=True
GITLAB_URL=https://gitlab.com
GITLAB_API_CLIENT_ID=XXXXXX_get_a_valid_client_id_from_GITLAB_AUTH_XXXXXX
GITLAB_API_CLIENT_SECRET=XXXXXX_get_a_valid_client_secret_from_GITLAB_AUTH_XXXXXX
Default value: False
Enable Taiga GitHub Authentication. Remember to set TAIGA_CONTRIB_PLUGINS=github-auth
and TAIGA_GITHUB_AUTH_CLIENT_ID
in the frontend too.
Examples:
ENABLE_GITHUB_AUTH=False
ENABLE_GITHUB_AUTH=True
GITHUB_API_CLIENT_ID=XXXXXX_get_a_valid_client_id_from_GITHUB_AUTH_XXXXXX
GITHUB_API_CLIENT_SECRET=XXXXXX_get_a_valid_client_secret_from_GITHUB_AUTH_XXXXXX
Default value: False
Enable Taiga LDAP Authentication. Remember to set TAIGA_LOGIN_FORM_TYPE=ldap
in the frontend too.
Examples:
ENABLE_LDAP=False
ENABLE_LDAP=True
# LDAP over STARTTLS
LDAP_START_TLS=True
LDAP_SERVER=ldap.company.com
LDAP_PORT=389
# LDAP bind and lookup properties
LDAP_BIND_DN=cn=admin,dc=ldap,dc=company,dc=com
LDAP_BIND_PASSWORD=somethingreallysecure
LDAP_SEARCH_BASE=ou=People,dc=ldap,dc=company,dc=com
LDAP_USERNAME_ATTRIBUTE=uid
LDAP_EMAIL_ATTRIBUTE=mail
LDAP_FULL_NAME_ATTRIBUTE=cn
# Fallback to local users if login not found in LDAP (default behavior)
LDAP_FALLBACK=normal
ENABLE_LDAP=True
# LDAP over SSL
LDAP_START_TLS=False
LDAP_SERVER=ldaps://ldap.company.com
LDAP_PORT=636
# LDAP bind and lookup properties
LDAP_BIND_DN=cn=admin,dc=ldap,dc=company,dc=com
LDAP_BIND_PASSWORD=somethingreallysecure
LDAP_SEARCH_BASE=ou=People,dc=ldap,dc=company,dc=com
LDAP_USERNAME_ATTRIBUTE=uid
LDAP_EMAIL_ATTRIBUTE=mail
TAIGA_LDAP_FULL_NAME_ATTRIBUTE=cn
# Disable passwords saved in DB on LDAP login
LDAP_SAVE_LOGIN_PASSWORD=False
# No fallback to local users (ie LDAP only)
LDAP_FALLBACK=
Default value: False
Enable Taiga OpenID Authentication. Remember to set TAIGA_CONTRIB_PLUGINS=openid-auth
and TAIGA_OPENID_AUTH_URL
/ TAIGA_OPENID_AUTH_NAME
/ TAIGA_OPENID_AUTH_CLIENT_ID
in the frontend too.
Examples:
ENABLE_OPENID=False
ENABLE_OPENID=True
OPENID_USER_URL=https://{url-to-keycloak}/auth/realms/{realm}/protocol/openid-connect/auth
OPENID_TOKEN_URL=https://{url-to-keycloak}/auth/realms/{realm}/protocol/openid-connect/token
OPENID_CLIENT_ID=Client_ID
OPENID_CLIENT_SECRET=Client_SECRET
OPENID_SCOPE=openid email