parent
5aba838de1
commit
fb38a61311
31
apps/logto/config.json
Normal file
31
apps/logto/config.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
{
|
||||
"$schema": "../schema.json",
|
||||
"name": "Logto",
|
||||
"port": 8203,
|
||||
"available": true,
|
||||
"exposable": true,
|
||||
"id": "logto",
|
||||
"tipi_version": 1,
|
||||
"version": "1.3.0",
|
||||
"force_expose": true,
|
||||
"categories": ["security"],
|
||||
"description": "Logto is a cost-effective open-source alternative to Auth0.",
|
||||
"short_desc": "Logto is a cost-effective open-source alternative to Auth0. ",
|
||||
"author": "Logto Team",
|
||||
"source": "https://github.com/logto-io/logto",
|
||||
"form_fields": [
|
||||
{
|
||||
"type": "random",
|
||||
"label": "Database Password",
|
||||
"min": 32,
|
||||
"env_variable": "LOGTO_DB_PASSWORD"
|
||||
},
|
||||
{
|
||||
"type": "text",
|
||||
"label": "Logto Admin Console URL URL",
|
||||
"hint": "Example: admin.example.com",
|
||||
"required": true,
|
||||
"env_variable": "LOGTO_ADMIN_URL"
|
||||
}
|
||||
]
|
||||
}
|
50
apps/logto/docker-compose.yml
Normal file
50
apps/logto/docker-compose.yml
Normal file
|
@ -0,0 +1,50 @@
|
|||
version: "3.9"
|
||||
services:
|
||||
logto:
|
||||
depends_on:
|
||||
logto-db:
|
||||
condition: service_healthy
|
||||
image: svhd/logto:1.3.0
|
||||
container_name: logto
|
||||
entrypoint: ["sh", "-c", "npm run cli db seed -- --swe && npm start"]
|
||||
ports:
|
||||
- ${APP_PORT}:3001
|
||||
- 8204:3002
|
||||
environment:
|
||||
- NODE_ENV=production
|
||||
- TRUST_PROXY_HEADER=1
|
||||
- DB_URL=postgres://tipi:${LOGTO_DB_PASSWORD}@logto-db:5432/logto
|
||||
- ENDPOINT=https://${APP_DOMAIN}
|
||||
- ADMIN_ENDPOINT=https://${LOGTO_ADMIN_URL}
|
||||
networks:
|
||||
- tipi_main_network
|
||||
labels:
|
||||
traefik.enable: ${APP_EXPOSED}
|
||||
traefik.http.routers.logto.rule: Host(`${APP_DOMAIN}`)
|
||||
traefik.http.routers.logto.entrypoints: websecure
|
||||
traefik.http.routers.logto.service: logto
|
||||
traefik.http.routers.logto.tls.certresolver: myresolver
|
||||
traefik.http.services.logto.loadbalancer.server.port: 3001
|
||||
traefik.http.routers.logto-admin.rule: Host(`${LOGTO_ADMIN_URL}`)
|
||||
traefik.http.routers.logto-admin.entrypoints: websecure
|
||||
traefik.http.routers.logto-admin.service: logto
|
||||
traefik.http.routers.logto-admin.tls.certresolver: myresolver
|
||||
traefik.http.services.logto-admin.loadbalancer.server.port: 3002
|
||||
|
||||
logto-db:
|
||||
container_name: logto-db
|
||||
image: postgres:14
|
||||
restart: unless-stopped
|
||||
environment:
|
||||
- POSTGRES_USER=tipi
|
||||
- POSTGRES_PASSWORD=${LOGTO_DB_PASSWORD}
|
||||
- POSTGRES_DB=logto
|
||||
volumes:
|
||||
- ${APP_DATA_DIR}/data/postgres:/var/lib/postgresql/data
|
||||
healthcheck:
|
||||
test: ["CMD-SHELL", "pg_isready"]
|
||||
interval: 10s
|
||||
timeout: 5s
|
||||
retries: 5
|
||||
networks:
|
||||
- tipi_main_network
|
30
apps/logto/metadata/description.md
Normal file
30
apps/logto/metadata/description.md
Normal file
|
@ -0,0 +1,30 @@
|
|||
[![](https://github.com/logto-io/logto/raw/master/logo.png)](https://logto.io)
|
||||
|
||||
Logto is a cost-effective open-source alternative to Auth0. It offers a seamless developer experience and is well-suited for individuals and growing companies.
|
||||
|
||||
🧑💻 **A frontend-to-backend identity solution**
|
||||
|
||||
- OIDC-based authentication and RBAC authorization.
|
||||
- Passwordless sign in and much more diverse options, including Email, Phone number, Username, Google, Facebook and other social sign in methods.
|
||||
- Beautiful UI components with customizable CSS to fit your business needs.
|
||||
|
||||
📦 **Out-of-box infrastructure**
|
||||
|
||||
- A ready-to-use management API can serve as your authentication provider, eliminating the need for extra implementation.
|
||||
- SDKs that can integrate your apps with Logto quickly, multi-platform and language compatible, tailored to your development environment.
|
||||
- Flexible connectors, scalable with community contributions, customizable with SAML, OAuth, and OIDC protocols.
|
||||
|
||||
💻 **Enterprise-ready solutions**
|
||||
|
||||
- RBAC to control your resource through scalable role authorization for diverse use cases.
|
||||
- User management and audit Logs to understand identity related user info and keep your security on track.
|
||||
- We are currently working on SSO, Organizations and MFA! Stay tuned!
|
||||
|
||||
Boringly, we call it "[customer identity access management](https://en.wikipedia.org/wiki/Customer_identity_access_management)" (CIAM) or "customer identity solution."
|
||||
|
||||
[Subscribe to us](https://logto.io/subscribe/?utm_source=github&utm_medium=repo_logto) right away to receive up-to-date information about the Logto Cloud (SaaS) as well as in-time feature updates.
|
||||
|
||||
## Get started
|
||||
|
||||
- Visit our 🎨 [website](https://logto.io/?utm_source=github&utm_medium=repo_logto) for a brief introduction if you are new to Logto.
|
||||
- A step-by-step guide is available on 📖 [docs.logto.io](https://docs.logto.io/?utm_source=github&utm_medium=repo_logto).
|
BIN
apps/logto/metadata/logo.jpg
Normal file
BIN
apps/logto/metadata/logo.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 23 KiB |
Loading…
Reference in New Issue
Block a user