From 7daebc308bf4d56b4776e8df20aee4bcb5652a2f Mon Sep 17 00:00:00 2001 From: arcoast <81871508+arcoast@users.noreply.github.com> Date: Wed, 7 Jun 2023 12:29:41 +0100 Subject: [PATCH] example_configs: Add Mealie configuration --- README.md | 1 + example_configs/mealie.md | 28 ++++++++++++++++++++++++++++ 2 files changed, 29 insertions(+) create mode 100644 example_configs/mealie.md diff --git a/README.md b/README.md index 907180b..bac8fab 100644 --- a/README.md +++ b/README.md @@ -271,6 +271,7 @@ folder for help with: - [Jitsi Meet](example_configs/jitsi_meet.conf) - [KeyCloak](example_configs/keycloak.md) - [Matrix](example_configs/matrix_synapse.yml) +- [Mealie](example_configs/mealie.md) - [Nextcloud](example_configs/nextcloud.md) - [Nexus](example_configs/nexus.md) - [Organizr](example_configs/Organizr.md) diff --git a/example_configs/mealie.md b/example_configs/mealie.md new file mode 100644 index 0000000..e6daf60 --- /dev/null +++ b/example_configs/mealie.md @@ -0,0 +1,28 @@ +# Mealie + +Configuration is done solely with environmental variables in the mealie-api docker-compose config: + +## Note +[LDAP integration in Mealie currently only works with the nightly branch](https://github.com/hay-kot/mealie/issues/2402#issuecomment-1560176528), so `hkotel/mealie:api-nightly` and `hkotel/mealie:frontend-nightly` rather than the current "stable" release of `v1.0.0beta-5` + +## Configuration + +The following config should let you login with either members of the `mealie` group as a user, or as an admin user with members of the `mealie-admin` group. + +Mealie first checks credentials in the `mealie` group to authenticate, then checks for the presence of the user in the `mealie-admin` group and elevates that account to admin status if present, therefore for any account to be an admin account it must belong in both the `mealie` group and the `mealie-admin` group. + +It is recommended to create a `readonly_user` and add them to the `lldap_strict_readonly` group to bind with. + +```yaml + - LDAP_AUTH_ENABLED=true + - LDAP_SERVER_URL=ldap://lldap:3890 + - LDAP_TLS_INSECURE=true ## Only required for LDAPS with a self-signed certificate + - LDAP_BASE_DN=ou=people,dc=example,dc=com + - LDAP_USER_FILTER=(memberof=cn=mealie,ou=groups,dc=example,dc=com) + - LDAP_ADMIN_FILTER=(memberof=cn=mealie-admin,ou=groups,dc=example,dc=com) + - LDAP_QUERY_BIND=cn=readonly_user,ou=people,dc=example,dc=com + - LDAP_QUERY_PASSWORD=READONLY_USER_PASSWORD + - LDAP_ID_ATTRIBUTE=uid + - LDAP_NAME_ATTRIBUTE=displayName + - LDAP_MAIL_ATTRIBUTE=mail +```