Hawiyat

Docker Compose Providers

Docker Compose Provider Integration Guide

Hawiyat provides an enterprise-grade deployment system for Docker Compose applications, offering multiple sophisticated deployment methods to suit various development workflows and operational requirements.

Deployment Provider Overview

Our platform supports three robust deployment approaches, each designed for specific use cases:

Available Providers

  1. GitHub Integration

    • Native GitHub API integration
    • Automated repository synchronization
    • Advanced security features
    • CI/CD pipeline support
  2. Universal Git Provider Support

    • Multiple authentication methods
    • Custom Git server support
    • Advanced security protocols
    • Flexible branch management
  3. Raw Configuration

    • Direct compose file editing
    • Real-time validation
    • Version control integration
    • Template support

GitHub Integration

Our GitHub integration provides a seamless deployment experience with advanced features and automation capabilities:

Configuration Process

  1. Repository Setup

    • Navigate to /dashboard/settings/server
    • Configure GitHub OAuth integration
    • Set repository access permissions
    • Configure webhook settings
  2. Application Configuration

    • Automated repository discovery
    • Smart branch detection
    • Compose file validation
    • Environment variable mapping

Advanced Features

  1. Security Controls

    • OAuth2 authentication
    • Repository-level permissions
    • Secret management
    • Access token rotation
  2. Automation Capabilities

    • Automated builds
    • Deployment triggers
    • Status notifications
    • Rollback support
  3. Integration Options

    • GitHub Actions support
    • Status checks integration
    • PR preview deployments
    • Branch protection rules

Universal Git Integration

Our universal Git integration system supports deployments from any Git provider, offering flexible authentication options and advanced security features:

Authentication Methods

  1. HTTPS Integration

    • Personal access tokens
    • Basic authentication
    • Custom credentials
    • Certificate validation
  2. SSH Authentication

    • Key pair generation
    • Multiple key support
    • Key rotation policies
    • Access management

Repository Configuration

  1. Source Control

    • Repository URL configuration
    • Branch selection and tracking
    • Tag-based deployments
    • Commit verification
  2. Access Management

    • Permission controls
    • Role-based access
    • Audit logging
    • Activity monitoring

Private Repository Access

Our sophisticated SSH key management system ensures secure access to private repositories:

  1. Key Generation System
    • Click the lock icon interface
    • Automatic key generation
    • Secure parameter configuration
    • Key storage management
SSH Key Generation Interface
  1. Key Installation Process
    • Copy generated public key
    • Configure provider settings
    • Verify key installation
    • Test repository access
Repository Key Configuration

Supported Platforms

  • GitLab (Cloud & Self-hosted)
  • Bitbucket (Cloud & Server)
  • Azure DevOps
  • AWS CodeCommit
  • Custom Git servers

Security Features

  • Key encryption
  • Access logging
  • IP whitelisting
  • Rate limiting

Raw Configuration System

Our sophisticated raw configuration system provides direct Docker Compose file management:

Editor Features

  1. Compose File Management

    • Syntax highlighting
    • Real-time validation
    • Auto-completion
    • Error detection
  2. Version Control

    • Change tracking
    • Revision history
    • Rollback capability
    • Diff visualization

Advanced Capabilities

  1. Template System

    • Predefined templates
    • Custom templates
    • Variable substitution
    • Environment configuration
  2. Validation Features

    • Syntax checking
    • Service validation
    • Network configuration
    • Volume verification

Security Controls

  1. Access Management

    • Role-based editing
    • Change approval
    • Audit logging
    • Version locking
  2. Deployment Safety

    • Configuration validation
    • Resource verification
    • Dependency checking
    • Security scanning

On this page