Remove useless services
This commit is contained in:
parent
427838c903
commit
3f92c47e1c
7 changed files with 0 additions and 345 deletions
|
@ -1,21 +0,0 @@
|
|||
version: '3'
|
||||
|
||||
services:
|
||||
affine:
|
||||
image: ghcr.io/toeverything/affine:nightly-server-latest
|
||||
restart: always
|
||||
container_name: affine
|
||||
networks:
|
||||
- proxy
|
||||
labels:
|
||||
- "traefik.enable=true"
|
||||
- "traefik.http.routers.affine-secure.entrypoints=https"
|
||||
- "traefik.http.routers.affine-secure.rule=Host(`affine.mrdev023.fr`)"
|
||||
- "traefik.http.routers.affine-secure.tls=true"
|
||||
- "traefik.http.routers.affine-secure.tls.certresolver=sslResolver"
|
||||
- "traefik.http.services.affine-secure.loadbalancer.server.port=3000"
|
||||
- "traefik.docker.network=proxy"
|
||||
|
||||
networks:
|
||||
proxy:
|
||||
external: true
|
3
confs/dolibarr/.gitignore
vendored
3
confs/dolibarr/.gitignore
vendored
|
@ -1,3 +0,0 @@
|
|||
dolibarr/
|
||||
dump/
|
||||
mysql/
|
|
@ -1,46 +0,0 @@
|
|||
version: '3'
|
||||
|
||||
services:
|
||||
mariadb:
|
||||
image: mariadb:latest
|
||||
environment:
|
||||
MYSQL_ROOT_PASSWORD: root
|
||||
MYSQL_DATABASE: dolibarr
|
||||
volumes:
|
||||
- ./mysql/data:/var/lib/mysql
|
||||
- ./dump:/root/dump
|
||||
networks:
|
||||
- internal
|
||||
|
||||
dolibarr:
|
||||
image: upshift/dolibarr:latest
|
||||
restart: always
|
||||
container_name: dolibarr
|
||||
environment:
|
||||
DOLI_DB_HOST: mariadb
|
||||
DOLI_DB_USER: root
|
||||
DOLI_DB_PASSWORD: root
|
||||
DOLI_DB_NAME: dolibarr
|
||||
DOLI_URL_ROOT: 'http://0.0.0.0'
|
||||
DOLI_ADMIN_LOGIN: admin
|
||||
DOLI_ADMIN_PASSWORD: admin
|
||||
PHP_INI_date.timezone: 'Europe/Paris'
|
||||
DOLI_INSTALL_AUTO: 1
|
||||
volumes:
|
||||
- ./dolibarr/documents:/var/www/documents
|
||||
- ./dolibarr/html:/var/www/html
|
||||
networks:
|
||||
- proxy
|
||||
- internal
|
||||
labels:
|
||||
- "traefik.enable=true"
|
||||
- "traefik.http.routers.dolibarr-secure.entrypoints=https"
|
||||
- "traefik.http.routers.dolibarr-secure.rule=Host(`dolibarr.mrdev023.fr`)"
|
||||
- "traefik.http.routers.dolibarr-secure.tls=true"
|
||||
- "traefik.http.routers.dolibarr-secure.tls.certresolver=sslResolver"
|
||||
- "traefik.docker.network=proxy"
|
||||
|
||||
networks:
|
||||
internal:
|
||||
proxy:
|
||||
external: true
|
|
@ -1,72 +0,0 @@
|
|||
version: "3"
|
||||
services:
|
||||
|
||||
outline:
|
||||
image: outlinewiki/outline
|
||||
env_file: ./docker.env
|
||||
depends_on:
|
||||
- postgres
|
||||
- redis
|
||||
- storage
|
||||
networks:
|
||||
- proxy
|
||||
labels:
|
||||
- "traefik.enable=true"
|
||||
- "traefik.http.routers.outline-secure.entrypoints=https"
|
||||
- "traefik.http.routers.outline-secure.rule=Host(`outline.mrdev023.fr`)"
|
||||
- "traefik.http.routers.outline-secure.tls=true"
|
||||
- "traefik.http.routers.outline-secure.tls.certresolver=sslResolver"
|
||||
- "traefik.http.services.whoami.loadbalancer.server.port=3000"
|
||||
- "traefik.docker.network=proxy"
|
||||
|
||||
redis:
|
||||
image: redis
|
||||
env_file: ./docker.env
|
||||
volumes:
|
||||
- ./redis.conf:/redis.conf
|
||||
command: ["redis-server", "/redis.conf"]
|
||||
healthcheck:
|
||||
test: ["CMD", "redis-cli", "ping"]
|
||||
interval: 10s
|
||||
timeout: 30s
|
||||
retries: 3
|
||||
|
||||
postgres:
|
||||
image: postgres
|
||||
env_file: ./docker.env
|
||||
volumes:
|
||||
- database-data:/var/lib/postgresql/data
|
||||
healthcheck:
|
||||
test: ["CMD", "pg_isready"]
|
||||
interval: 30s
|
||||
timeout: 20s
|
||||
retries: 3
|
||||
environment:
|
||||
POSTGRES_USER: 'user'
|
||||
POSTGRES_PASSWORD: 'pass'
|
||||
POSTGRES_DB: 'outline'
|
||||
|
||||
storage:
|
||||
image: minio/minio
|
||||
env_file: ./docker.env
|
||||
entrypoint: sh
|
||||
command: -c 'minio server'
|
||||
deploy:
|
||||
restart_policy:
|
||||
condition: on-failure
|
||||
volumes:
|
||||
- storage-data:/data
|
||||
healthcheck:
|
||||
test: ["CMD", "curl", "-f", "http://localhost:9000/minio/health/live"]
|
||||
interval: 30s
|
||||
timeout: 20s
|
||||
retries: 3
|
||||
|
||||
volumes:
|
||||
https-portal-data:
|
||||
storage-data:
|
||||
database-data:
|
||||
networks:
|
||||
proxy:
|
||||
external: true
|
||||
|
|
@ -1,96 +0,0 @@
|
|||
## Should be set to the public domain where penpot is going to be served.
|
||||
##
|
||||
## NOTE: If you are going to serve it under different domain than
|
||||
## 'localhost' without HTTPS, consider setting the
|
||||
## `disable-secure-session-cookies' flag on the 'PENPOT_FLAGS'
|
||||
## setting.
|
||||
|
||||
PENPOT_PUBLIC_URI=https://penpot.mrdev023.fr
|
||||
|
||||
## Feature flags.
|
||||
PENPOT_FLAGS=disable-registration disable-demo-users enable-login disable-email-verification
|
||||
|
||||
## Temporal workaround because of bad builtin default
|
||||
|
||||
PENPOT_HTTP_SERVER_HOST=0.0.0.0
|
||||
|
||||
## Standard database connection parameters (only postgresql is supported):
|
||||
|
||||
PENPOT_DATABASE_URI=postgresql://penpot-postgres/penpot
|
||||
PENPOT_DATABASE_USERNAME=penpot
|
||||
PENPOT_DATABASE_PASSWORD=penpot
|
||||
|
||||
## Redis is used for the websockets notifications.
|
||||
|
||||
PENPOT_REDIS_URI=redis://penpot-redis/0
|
||||
|
||||
## By default, files uploaded by users are stored in local
|
||||
## filesystem. But it can be configured to store in AWS S3.
|
||||
|
||||
PENPOT_ASSETS_STORAGE_BACKEND=assets-fs
|
||||
PENPOT_STORAGE_ASSETS_FS_DIRECTORY=/opt/data/assets
|
||||
|
||||
## Telemetry. When enabled, a periodical process will send anonymous
|
||||
## data about this instance. Telemetry data will enable us to learn on
|
||||
## how the application is used, based on real scenarios. If you want
|
||||
## to help us, please leave it enabled.
|
||||
|
||||
PENPOT_TELEMETRY_ENABLED=true
|
||||
|
||||
## Email sending configuration. By default, emails are printed in the
|
||||
## console, but for production usage is recommended to setup a real
|
||||
## SMTP provider. Emails are used to confirm user registrations.
|
||||
|
||||
PENPOT_SMTP_DEFAULT_FROM=no-reply@example.com
|
||||
PENPOT_SMTP_DEFAULT_REPLY_TO=no-reply@example.com
|
||||
# PENPOT_SMTP_HOST=
|
||||
# PENPOT_SMTP_PORT=
|
||||
# PENPOT_SMTP_USERNAME=
|
||||
# PENPOT_SMTP_PASSWORD=
|
||||
# PENPOT_SMTP_TLS=true
|
||||
# PENPOT_SMTP_SSL=false
|
||||
|
||||
## Comma separated list of allowed domains to register. Empty to allow
|
||||
## all.
|
||||
|
||||
# PENPOT_REGISTRATION_DOMAIN_WHITELIST=""
|
||||
|
||||
## Authentication providers
|
||||
|
||||
## Google
|
||||
|
||||
# PENPOT_GOOGLE_CLIENT_ID=
|
||||
# PENPOT_GOOGLE_CLIENT_SECRET=
|
||||
|
||||
## GitHub
|
||||
|
||||
# PENPOT_GITHUB_CLIENT_ID=
|
||||
# PENPOT_GITHUB_CLIENT_SECRET=
|
||||
|
||||
## GitLab
|
||||
|
||||
# PENPOT_GITLAB_BASE_URI=https://gitlab.com
|
||||
# PENPOT_GITLAB_CLIENT_ID=
|
||||
# PENPOT_GITLAB_CLIENT_SECRET=
|
||||
|
||||
## OpenID Connect (since 1.5.0)
|
||||
|
||||
# PENPOT_OIDC_BASE_URI=
|
||||
# PENPOT_OIDC_CLIENT_ID=
|
||||
# PENPOT_OIDC_CLIENT_SECRET=
|
||||
|
||||
## LDAP
|
||||
##
|
||||
## NOTE: to enable ldap, you will need to put 'enable-login-with-ldap'
|
||||
## on the 'PENPOT_FLAGS' environment variable.
|
||||
|
||||
# PENPOT_LDAP_HOST=ldap
|
||||
# PENPOT_LDAP_PORT=10389
|
||||
# PENPOT_LDAP_SSL=false
|
||||
# PENPOT_LDAP_STARTTLS=false
|
||||
# PENPOT_LDAP_BASE_DN=ou=people,dc=planetexpress,dc=com
|
||||
# PENPOT_LDAP_BIND_DN=cn=admin,dc=planetexpress,dc=com
|
||||
# PENPOT_LDAP_BIND_PASSWORD=GoodNewsEveryone
|
||||
# PENPOT_LDAP_ATTRS_USERNAME=uid
|
||||
# PENPOT_LDAP_ATTRS_EMAIL=mail
|
||||
# PENPOT_LDAP_ATTRS_FULLNAME=cn
|
|
@ -1,78 +0,0 @@
|
|||
version: '3.5'
|
||||
|
||||
services:
|
||||
penpot-frontend:
|
||||
image: 'penpotapp/frontend:latest'
|
||||
restart: always
|
||||
volumes:
|
||||
- penpot_assets_data:/opt/data
|
||||
env_file:
|
||||
- config.env
|
||||
depends_on:
|
||||
- penpot-backend
|
||||
- penpot-exporter
|
||||
labels:
|
||||
- "traefik.enable=true"
|
||||
- "traefik.http.routers.penpot-secure.entrypoints=https"
|
||||
- "traefik.http.routers.penpot-secure.rule=Host(`penpot.mrdev023.fr`)"
|
||||
- "traefik.http.routers.penpot-secure.tls=true"
|
||||
- "traefik.http.routers.penpot-secure.tls.certresolver=sslResolver"
|
||||
# - "traefik.http.routers.whoami-secure.service=whoami"
|
||||
# - "traefik.http.services.whoami.loadbalancer.server.port=9002"
|
||||
- "traefik.docker.network=proxy"
|
||||
networks:
|
||||
- internal
|
||||
- proxy
|
||||
|
||||
penpot-backend:
|
||||
image: 'penpotapp/backend:latest'
|
||||
restart: always
|
||||
volumes:
|
||||
- penpot_assets_data:/opt/data
|
||||
depends_on:
|
||||
- penpot-postgres
|
||||
- penpot-redis
|
||||
env_file:
|
||||
- config.env
|
||||
networks:
|
||||
- internal
|
||||
|
||||
penpot-exporter:
|
||||
image: 'penpotapp/exporter:latest'
|
||||
restart: always
|
||||
env_file:
|
||||
- config.env
|
||||
environment:
|
||||
# Don't touch it; this uses internal docker network to
|
||||
# communicate with the frontend.
|
||||
- PENPOT_PUBLIC_URI=http://penpot-frontend
|
||||
networks:
|
||||
- internal
|
||||
|
||||
penpot-postgres:
|
||||
image: 'postgres:14'
|
||||
restart: always
|
||||
environment:
|
||||
- POSTGRES_INITDB_ARGS=--data-checksums
|
||||
- POSTGRES_DB=penpot
|
||||
- POSTGRES_USER=penpot
|
||||
- POSTGRES_PASSWORD=penpot
|
||||
volumes:
|
||||
- penpot_postgres_data:/var/lib/postgresql/data
|
||||
networks:
|
||||
- internal
|
||||
|
||||
penpot-redis:
|
||||
image: redis:7
|
||||
restart: always
|
||||
networks:
|
||||
- internal
|
||||
|
||||
volumes:
|
||||
penpot_postgres_data:
|
||||
penpot_assets_data:
|
||||
|
||||
networks:
|
||||
internal:
|
||||
proxy:
|
||||
external: true
|
|
@ -1,29 +0,0 @@
|
|||
version: '3'
|
||||
|
||||
services:
|
||||
rhasspy:
|
||||
image: rhasspy/rhasspy
|
||||
restart: always
|
||||
container_name: rhasspy
|
||||
volumes:
|
||||
- rhasspy_profiles:/profiles
|
||||
- /etc/localtime:/etc/localtime:ro
|
||||
networks:
|
||||
- proxy
|
||||
labels:
|
||||
- "traefik.enable=true"
|
||||
- "traefik.http.routers.rhasspy-secure.entrypoints=https"
|
||||
- "traefik.http.routers.rhasspy-secure.rule=Host(`rhasspy.mrdev023.fr`)"
|
||||
- "traefik.http.routers.rhasspy-secure.tls=true"
|
||||
- "traefik.http.routers.rhasspy-secure.tls.certresolver=sslResolver"
|
||||
# - "traefik.http.routers.rhasspy-secure.service=rhasspy"
|
||||
- "traefik.http.services.rhasspy.loadbalancer.server.port=12101"
|
||||
- "traefik.docker.network=proxy"
|
||||
command: --user-profiles /profiles --profile fr
|
||||
|
||||
volumes:
|
||||
rhasspy_profiles:
|
||||
|
||||
networks:
|
||||
proxy:
|
||||
external: true
|
Loading…
Reference in a new issue