From c446f3c26de3e38072f882197e5adf27a71287f1 Mon Sep 17 00:00:00 2001 From: Alan Grainger Date: Thu, 31 Oct 2024 13:03:33 +0100 Subject: [PATCH] Testing docker image --- Dockerfile | 2 +- README.md | 3 +-- docker-compose.yml | 4 +--- 3 files changed, 3 insertions(+), 6 deletions(-) diff --git a/Dockerfile b/Dockerfile index a3935b2..4f982e9 100644 --- a/Dockerfile +++ b/Dockerfile @@ -1,4 +1,4 @@ -FROM node:20-slim +FROM node:22-slim WORKDIR /app diff --git a/README.md b/README.md index 92e22d8..c8dda3a 100644 --- a/README.md +++ b/README.md @@ -23,8 +23,7 @@ To view a shared album in Immich, you need access to the `/api/` path. If you're to make that path public. Any existing or future vulnerability has the potential to compromise your Immich instance. For me, the ideal setup is to have Immich secured privately behind mTLS or VPN, and only allow public access to Immich Public Proxy. - -Here is an example setup for [securing Immich behind mTLS](./docs/securing-immich-with-mtls.md). +Here is an example setup for [securing Immich behind mTLS](./docs/securing-immich-with-mtls.md) using Caddy. ## How to install with Docker diff --git a/docker-compose.yml b/docker-compose.yml index 96a9eb3..b9908ff 100644 --- a/docker-compose.yml +++ b/docker-compose.yml @@ -2,12 +2,10 @@ services: immich-public-proxy: image: ghcr.io/alangrainger/immich-public-proxy:latest container_name: immich-public-proxy - restart: unless-stopped + restart: always ports: - ${PORT}:3000 environment: - NODE_ENV=production env_file: - .env - -