docker-radicale

docker-radicale

Radicale 服务器的增强型 Docker 镜像

docker-radicale 是开源的 Radicale CalDAV/CardDAV 服务器的轻量级 Docker 镜像。它采用只读容器和最小权限运行,支持多架构,集成版本控制和时区处理。提供详细配置指南和自定义认证,易于扩展。适合个人和企业用户,简化 Radicale 服务的部署和管理。

DockerRadicaleCalDAVCardDAV容器化Github开源项目
<p align="center"> <img src="logo.png" alt="Logo" /> </p> <h1 align="center">Docker-Radicale</h1> <p align="center"> <a href="https://github.com/tomsquest/docker-radicale/actions/workflows/build.yaml"><img src="https://github.com/tomsquest/docker-radicale/actions/workflows/build.yaml/badge.svg" alt="Build Status" /></a> <a href="https://github.com/tomsquest/docker-radicale/tags"><img src="https://img.shields.io/github/tag/tomsquest/docker-radicale.svg" alt="GitHub tag" /></a> <a href="https://hub.docker.com/r/tomsquest/docker-radicale/"><img src="https://img.shields.io/docker/pulls/tomsquest/docker-radicale.svg" alt="Pulls" /></a> <a href="https://hub.docker.com/r/tomsquest/docker-radicale/"><img src="https://img.shields.io/docker/stars/tomsquest/docker-radicale.svg" alt="Stars" /></a> </p> <p align="center"> Enhanced Docker image for <a href="https://radicale.org">Radicale</a>, the CalDAV/CardDAV server. </p> <!-- START doctoc generated TOC please keep comment here to allow auto update --> <!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->

Table of contents

<!-- END doctoc generated TOC please keep comment here to allow auto update -->

Features

  • :closed_lock_with_key: Secured: the container is read-only, with only access to its data dir, and without extraneous privileges
  • :fire: Safe: run as a normal user (not root)
  • :building_construction: Multi-architecture: run on amd64 and arm64
  • :sparkles: Batteries included: git and ssh included for versioning and Pytz/tz-data for proper timezone handling

Changelog

:page_with_curl: See CHANGELOG.md

Latest version

latest tag

Running

Option 1: Basic instruction

docker run -d --name radicale \
    -p 5232:5232 \
    -v ./data:/data \
    tomsquest/docker-radicale

Option 2: Recommended, Production-grade instruction (secured, safe...) :rocket:

This is the most secured instruction:

docker run -d --name radicale \
    -p 127.0.0.1:5232:5232 \
    --init \
    --read-only \
    --security-opt="no-new-privileges:true" \
    --cap-drop ALL \
    --cap-add CHOWN \
    --cap-add SETUID \
    --cap-add SETGID \
    --cap-add KILL \
    --pids-limit 50 \
    --memory 256M \
    --health-cmd="curl --fail http://localhost:5232 || exit 1" \
    --health-interval=30s \
    --health-retries=3 \
    -v ./data:/data \
    tomsquest/docker-radicale

A Docker compose file is included.

Note on capabilities:

  • CHOWN is used to restore the permission of the data directory. Remove this if you do not need the chown to be run (see below)
  • SETUID and SETGID are used to run radicale as the less privileged radicale user (with su-exec), and are required.
  • KILL is to allow Radicale to exit, and is required.

Custom configuration

To customize Radicale configuration, first get the config file:

Then:

  1. create a config directory (eg. mkdir -p /my_custom_config_directory)
  2. copy your config file into the config folder (e.g. cp config /my_custom_config_directory/config)
  3. mount your custom config volume when running the container: -v /my_custom_config_directory:/config:ro. The :ro at the end make the volume read-only, and is more secured.

Authentication configuration

This section shows a basic example of configuring authentication for Radicale using htpasswd with bcrypt algorithm.
To learn more, refer to the official Radicale document.

First, we need to configure Radicale to use htpasswd authentication and specify htpasswd file's location.
Create a config file inside the config directory (resulting in the path config/config).

[server]
hosts = 0.0.0.0:5232

[auth]
type = htpasswd
htpasswd_filename = /config/users
htpasswd_encryption = bcrypt

[storage]
filesystem_folder = /data/collections

Next, create a users file inside the config directory (resulting in the path config/users).
Each line contains the username and bcrypt-hashed password, separated by a colon (:).

john:$2a$10$l1Se4qIaRlfOnaC1pGt32uNe/Dr61r4JrZQCNnY.kTx2KgJ70GPSm
sarah:$2a$10$lKEHYHjrZ.QHpWQeB/feWe/0m4ZtckLI.cYkVOITW8/0xoLCp1/Wy

Finally, create and run the container using the appropriate volume mount. In this example, both files are stored in the same directory (./config).

docker run -d --name radicale tomsquest/docker-radicale \ -p 5232:5232 \ -v ./data:/data \ -v ./config:/config \

Volumes versus Bind-Mounts

This section is related to the error message chown: /data: Permission denied.

With Docker volumes, and not bind-mounts like shown in the examples above, you may need to disable the container trying to make the data directory writable.

This is done with the TAKE_FILE_OWNERSHIP environment variable.
The variable will tell the container to perform or skip the chown instruction.
The default value is true: the container will try to make the data directory writable to the radicale user.

To disable the chown, declare the variable like this:

docker run -d --name radicale tomsquest/docker-radicale \
    -e "TAKE_FILE_OWNERSHIP=false"

Running with Docker compose

A Docker compose file is included.
It can also be extended.
Make sure you have Docker compose version 2 or higher.

Multi-architecture

Docker will automatically select the correct image type for your architecture, whether it is amd64 or arm64.

Unraid

This image is compatible with Unraid, and you can find it in the Community App store.

Extending the image

The image is extendable, as per Docker image architecture. You need to create your own Dockerfile.

For example, here is how to add RadicaleIMAP (authenticate by email) and RadicaleInfCloud (an alternative UI) to the image.

Please note that the radicale-imap plugin is not compatible with Radicale 3.0 anymore!

First, create a Dockerfile.extended (pick the name you want) with this content:

FROM tomsquest/docker-radicale RUN /venv/bin/pip install git+https://github.com/Unrud/RadicaleIMAP RUN /venv/bin/pip install git+https://github.com/Unrud/RadicaleInfCloud

Then, build and run it:

docker build -t radicale-extended -f Dockerfile.extended . docker run --name radicale-extended -p 5232:5232 radicale-extended

Versioning with Git

Radicale supports a hook which is executed after each change to the CalDAV/CardDAV files. This hook can be used to keep a versions of your CalDAV/CardDAV files through git.

This image provides git to support this feature.

Refer to the official documentation of Radicale for the details.

Custom User/Group ID for the data volume

You will certainly mount a volume to keep Radicale data between restart/upgrade of the container. But sharing files from the host and the container can be problematic. The reason is that radicale user in the container does not match the user running the container on the host.

To solve this, this image offers four options (see below for details):

  • Option 0: Do nothing, permission will be fixed by the container itself
  • Option 1: Create a user/group with id 2999 on the host
  • Option 2: Force the user/group ids on docker run
  • Option 3: Build the image with a custom user/group

Option 0: Do nothing, permission will be fixed by the container itself

When running the container with a /data volume (e.g. -v ./data:/data), the container entrypoint will automatically fix the permissions on /data.

This option is OK, but not optimal:

  • Ok for the container, as inside the container, the radicale user can read and write its data
  • But on the host, the data directory will then be owned by the user/group 2999:2999

Option 1: Create a user/group with id 2999 on the host

The image creates a user and a group with id 2999 in the container.
You can create a user/group on your host matching this id.

Example:

# On your host sudo addgroup --gid 2999 radicale sudo adduser --gid 2999 --uid 2999 --shell /bin/false --disabled-password --no-create-home radicale

Option 2: Force the user/group ids on docker run

The user and group ids used in the container can be overridden when the container is run.
This is done with the UID and GID env variables, e.g. docker run -e UID=123 -e GID=456 ....
This will force all operations to be run with this UID/GID.

:warning: The --read-only run flag cannot be used in this case. Using custom UID/GID tries to modify the filesystem at runtime but this is made impossible by the --read-only flag.

Option 3: Build the image with a custom user/group

You can build the image with custom user and group ids and still use the --read-only flag.
But you will have to clone this repo, do a local build and keep up with changes of this image.

Usage: docker build --build-arg=BUILD_UID=5000 --build-arg=BUILD_GID=5001 ....

BUILD_UID and BUILD_GID are also supported as environment variables to work around a problem on some Synology NAS. See this PR#68.

Tags

The image is tagged with this scheme:

Version number = Architecture + '.' + Radicale version + '.' + This image increment number

Example:

  • tomsquest/docker-radicale:amd64.3.0.6.3
  • tomsquest/docker-radicale:arm64.3.0.6.3

The last number is ours, and it is incremented on new release. For example, 2.1.11.2 made the /config readonly (this is specific to this image).

Running with Podman

Two users have given the instructions they used to run the image with Podman:

Running behind Caddy

Caddy is sitting in front of all my self-hosted services, like Radicale.
It brings https and security (basic authentication).

The following Caddyfile works for me. Note that I don't use Radicale authentication, I have only one user.

radicale.yourdomain.com { reverse_proxy 127.0.0.1:5232 basicauth { tom pas$w0rd } }

Contributing

To run the tests:

  1. pip install pipenv
  2. pipenv install -d
  3. pipenv run pytest -v

Releasing

  1. Create a Git tag, e.g. 3.0.6.0, push it and the CI will build the images and publish them on Docker hub
  2. Update the latest tag
  3. Create release on GitHub (Draft a new release > pick the tag > Generate release notes > Publish release)
  4. Update CHANGELOG.md

Example instructions :

# Update local tags git fetch --all --tags # Create tag TAG=3.0.6.0 && git tag $TAG && git push origin $TAG # Update latest tag git push --delete origin latest && git tag -d latest && git tag latest && git push origin latest

Contributors

  • Nate Harris: add image to Unraid community app store
  • SalaryTheft: add section about Authentication configuration
  • Dillbyrne: update alpine
  • Jauder Ho: update alpine
  • Greylinux: running with podman
  • Tionis: add openssh for git ssh remotes
  • flixhsw: support armv7 (Raspberry) and simplify the CI using Docker Buildx
  • hecd: fix to run su-exec only when the actual user is root
  • Jake Mayeux: change "data" folder to ./data instead of ~/radicale/data in docker-compose.yml and doc
  • Thomas: reduce image size (/root/.cache) and Alpine upgrade
  • Bernard Kerckenaere: check for read-only container, and help for volumes versus bind-mounts
  • Dylan Van Assche: hook to read/write to a Git repo
  • Adzero: override build args with environment variables
  • Robert Beal: fixed/configurable userId, versioning...
  • Loader23: config

编辑推荐精选

扣子-AI办公

扣子-AI办公

职场AI,就用扣子

AI办公助手,复杂任务高效处理。办公效率低?扣子空间AI助手支持播客生成、PPT制作、网页开发及报告写作,覆盖科研、商业、舆情等领域的专家Agent 7x24小时响应,生活工作无缝切换,提升50%效率!

堆友

堆友

多风格AI绘画神器

堆友平台由阿里巴巴设计团队创建,作为一款AI驱动的设计工具,专为设计师提供一站式增长服务。功能覆盖海量3D素材、AI绘画、实时渲染以及专业抠图,显著提升设计品质和效率。平台不仅提供工具,还是一个促进创意交流和个人发展的空间,界面友好,适合所有级别的设计师和创意工作者。

图像生成AI工具AI反应堆AI工具箱AI绘画GOAI艺术字堆友相机AI图像热门
码上飞

码上飞

零代码AI应用开发平台

零代码AI应用开发平台,用户只需一句话简单描述需求,AI能自动生成小程序、APP或H5网页应用,无需编写代码。

Vora

Vora

免费创建高清无水印Sora视频

Vora是一个免费创建高清无水印Sora视频的AI工具

Refly.AI

Refly.AI

最适合小白的AI自动化工作流平台

无需编码,轻松生成可复用、可变现的AI自动化工作流

酷表ChatExcel

酷表ChatExcel

大模型驱动的Excel数据处理工具

基于大模型交互的表格处理系统,允许用户通过对话方式完成数据整理和可视化分析。系统采用机器学习算法解析用户指令,自动执行排序、公式计算和数据透视等操作,支持多种文件格式导入导出。数据处理响应速度保持在0.8秒以内,支持超过100万行数据的即时分析。

AI工具酷表ChatExcelAI智能客服AI营销产品使用教程
TRAE编程

TRAE编程

AI辅助编程,代码自动修复

Trae是一种自适应的集成开发环境(IDE),通过自动化和多元协作改变开发流程。利用Trae,团队能够更快速、精确地编写和部署代码,从而提高编程效率和项目交付速度。Trae具备上下文感知和代码自动完成功能,是提升开发效率的理想工具。

AI工具TraeAI IDE协作生产力转型热门
AIWritePaper论文写作

AIWritePaper论文写作

AI论文写作指导平台

AIWritePaper论文写作是一站式AI论文写作辅助工具,简化了选题、文献检索至论文撰写的整个过程。通过简单设定,平台可快速生成高质量论文大纲和全文,配合图表、参考文献等一应俱全,同时提供开题报告和答辩PPT等增值服务,保障数据安全,有效提升写作效率和论文质量。

AI辅助写作AI工具AI论文工具论文写作智能生成大纲数据安全AI助手热门
博思AIPPT

博思AIPPT

AI一键生成PPT,就用博思AIPPT!

博思AIPPT,新一代的AI生成PPT平台,支持智能生成PPT、AI美化PPT、文本&链接生成PPT、导入Word/PDF/Markdown文档生成PPT等,内置海量精美PPT模板,涵盖商务、教育、科技等不同风格,同时针对每个页面提供多种版式,一键自适应切换,完美适配各种办公场景。

AI办公办公工具AI工具博思AIPPTAI生成PPT智能排版海量精品模板AI创作热门
潮际好麦

潮际好麦

AI赋能电商视觉革命,一站式智能商拍平台

潮际好麦深耕服装行业,是国内AI试衣效果最好的软件。使用先进AIGC能力为电商卖家批量提供优质的、低成本的商拍图。合作品牌有Shein、Lazada、安踏、百丽等65个国内外头部品牌,以及国内10万+淘宝、天猫、京东等主流平台的品牌商家,为卖家节省将近85%的出图成本,提升约3倍出图效率,让品牌能够快速上架。

下拉加载更多