move all confs
This commit is contained in:
parent
f46c445b8d
commit
8e2ccd309d
50 changed files with 350 additions and 350 deletions
|
@ -1,21 +1,21 @@
|
||||||
version: '3'
|
version: '3'
|
||||||
|
|
||||||
services:
|
services:
|
||||||
affine:
|
affine:
|
||||||
image: ghcr.io/toeverything/affine:nightly-server-latest
|
image: ghcr.io/toeverything/affine:nightly-server-latest
|
||||||
restart: always
|
restart: always
|
||||||
container_name: affine
|
container_name: affine
|
||||||
networks:
|
networks:
|
||||||
- proxy
|
- proxy
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.affine-secure.entrypoints=https"
|
- "traefik.http.routers.affine-secure.entrypoints=https"
|
||||||
- "traefik.http.routers.affine-secure.rule=Host(`affine.mrdev023.fr`)"
|
- "traefik.http.routers.affine-secure.rule=Host(`affine.mrdev023.fr`)"
|
||||||
- "traefik.http.routers.affine-secure.tls=true"
|
- "traefik.http.routers.affine-secure.tls=true"
|
||||||
- "traefik.http.routers.affine-secure.tls.certresolver=sslResolver"
|
- "traefik.http.routers.affine-secure.tls.certresolver=sslResolver"
|
||||||
- "traefik.http.services.affine-secure.loadbalancer.server.port=3000"
|
- "traefik.http.services.affine-secure.loadbalancer.server.port=3000"
|
||||||
- "traefik.docker.network=proxy"
|
- "traefik.docker.network=proxy"
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
proxy:
|
proxy:
|
||||||
external: true
|
external: true
|
|
@ -1,70 +1,70 @@
|
||||||
version: '3'
|
version: '3'
|
||||||
|
|
||||||
services:
|
services:
|
||||||
db:
|
db:
|
||||||
image: postgres:14
|
image: postgres:14
|
||||||
restart: always
|
restart: always
|
||||||
container_name: nextcloud_db
|
container_name: nextcloud_db
|
||||||
networks:
|
networks:
|
||||||
- internal
|
- internal
|
||||||
volumes:
|
volumes:
|
||||||
- db:/var/lib/postgresql/data
|
- db:/var/lib/postgresql/data
|
||||||
environment:
|
environment:
|
||||||
- POSTGRES_PASSWORD=nextcloud
|
- POSTGRES_PASSWORD=nextcloud
|
||||||
- POSTGRES_DB=nextcloud
|
- POSTGRES_DB=nextcloud
|
||||||
- POSTGRES_USER=nextcloud
|
- POSTGRES_USER=nextcloud
|
||||||
|
|
||||||
nextcloud:
|
nextcloud:
|
||||||
image: nextcloud
|
image: nextcloud
|
||||||
restart: always
|
restart: always
|
||||||
container_name: nextcloud
|
container_name: nextcloud
|
||||||
networks:
|
networks:
|
||||||
- proxy
|
- proxy
|
||||||
- protonmail
|
- protonmail
|
||||||
- internal
|
- internal
|
||||||
depends_on:
|
depends_on:
|
||||||
- db
|
- db
|
||||||
volumes:
|
volumes:
|
||||||
- nextcloud:/var/www/html
|
- nextcloud:/var/www/html
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.middlewares.nextcloud-compress.compress=true"
|
- "traefik.http.middlewares.nextcloud-compress.compress=true"
|
||||||
- "traefik.http.middlewares.nextcloud-regex-redirect.redirectregex.permanent=true"
|
- "traefik.http.middlewares.nextcloud-regex-redirect.redirectregex.permanent=true"
|
||||||
- "traefik.http.middlewares.nextcloud-regex-redirect.redirectregex.regex=https://(.*)/.well-known/(card|cal)dav"
|
- "traefik.http.middlewares.nextcloud-regex-redirect.redirectregex.regex=https://(.*)/.well-known/(card|cal)dav"
|
||||||
- "traefik.http.middlewares.nextcloud-regex-redirect.redirectregex.replacement=https://$$1/remote.php/dav/"
|
- "traefik.http.middlewares.nextcloud-regex-redirect.redirectregex.replacement=https://$$1/remote.php/dav/"
|
||||||
- "traefik.http.middlewares.nextcloud-headers.headers.frameDeny=true"
|
- "traefik.http.middlewares.nextcloud-headers.headers.frameDeny=true"
|
||||||
- "traefik.http.middlewares.nextcloud-headers.headers.sslRedirect=true"
|
- "traefik.http.middlewares.nextcloud-headers.headers.sslRedirect=true"
|
||||||
- "traefik.http.middlewares.nextcloud-headers.headers.contentTypeNosniff=true"
|
- "traefik.http.middlewares.nextcloud-headers.headers.contentTypeNosniff=true"
|
||||||
- "traefik.http.middlewares.nextcloud-headers.headers.stsIncludeSubdomains=true"
|
- "traefik.http.middlewares.nextcloud-headers.headers.stsIncludeSubdomains=true"
|
||||||
- "traefik.http.middlewares.nextcloud-headers.headers.stsPreload=true"
|
- "traefik.http.middlewares.nextcloud-headers.headers.stsPreload=true"
|
||||||
- "traefik.http.middlewares.nextcloud-headers.headers.stsSeconds=31536000"
|
- "traefik.http.middlewares.nextcloud-headers.headers.stsSeconds=31536000"
|
||||||
- "traefik.http.middlewares.nextcloud-headers.headers.referrerPolicy=same-origin"
|
- "traefik.http.middlewares.nextcloud-headers.headers.referrerPolicy=same-origin"
|
||||||
- "traefik.http.middlewares.nextcloud-headers.headers.browserXssFilter=true"
|
- "traefik.http.middlewares.nextcloud-headers.headers.browserXssFilter=true"
|
||||||
- "traefik.http.middlewares.nextcloud-headers.headers.customRequestHeaders.X-Forwarded-Proto=https"
|
- "traefik.http.middlewares.nextcloud-headers.headers.customRequestHeaders.X-Forwarded-Proto=https"
|
||||||
- "traefik.http.middlewares.nextcloud-headers.headers.customRequestHeaders.X-Robots-Tag=none"
|
- "traefik.http.middlewares.nextcloud-headers.headers.customRequestHeaders.X-Robots-Tag=none"
|
||||||
- "traefik.http.middlewares.nextcloud-headers.headers.customFrameOptionsValue=SAMEORIGIN"
|
- "traefik.http.middlewares.nextcloud-headers.headers.customFrameOptionsValue=SAMEORIGIN"
|
||||||
- "traefik.http.routers.nextcloud-secure.entrypoints=https"
|
- "traefik.http.routers.nextcloud-secure.entrypoints=https"
|
||||||
- "traefik.http.routers.nextcloud-secure.rule=Host(`mycld.mrdev023.fr`)"
|
- "traefik.http.routers.nextcloud-secure.rule=Host(`mycld.mrdev023.fr`)"
|
||||||
- "traefik.http.routers.nextcloud-secure.tls=true"
|
- "traefik.http.routers.nextcloud-secure.tls=true"
|
||||||
- "traefik.http.routers.nextcloud-secure.tls.certresolver=sslResolver"
|
- "traefik.http.routers.nextcloud-secure.tls.certresolver=sslResolver"
|
||||||
- "traefik.http.routers.nextcloud-secure.middlewares=nextcloud-compress,nextcloud-regex-redirect,nextcloud-headers"
|
- "traefik.http.routers.nextcloud-secure.middlewares=nextcloud-compress,nextcloud-regex-redirect,nextcloud-headers"
|
||||||
# - "traefik.http.routers.nextcloud-secure.service=nextcloud"
|
# - "traefik.http.routers.nextcloud-secure.service=nextcloud"
|
||||||
# - "traefik.http.services.nextcloud.loadbalancer.server.port=9002"
|
# - "traefik.http.services.nextcloud.loadbalancer.server.port=9002"
|
||||||
- "traefik.docker.network=proxy"
|
- "traefik.docker.network=proxy"
|
||||||
environment:
|
environment:
|
||||||
- POSTGRES_PASSWORD=nextcloud
|
- POSTGRES_PASSWORD=nextcloud
|
||||||
- POSTGRES_DATABASE=nextcloud
|
- POSTGRES_DATABASE=nextcloud
|
||||||
- POSTGRES_USER=nextcloud
|
- POSTGRES_USER=nextcloud
|
||||||
- POSTGRES_HOST=db
|
- POSTGRES_HOST=db
|
||||||
- OVERWRITEPROTOCOL=https
|
- OVERWRITEPROTOCOL=https
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
nextcloud:
|
nextcloud:
|
||||||
db:
|
db:
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
internal:
|
internal:
|
||||||
proxy:
|
proxy:
|
||||||
external: true
|
external: true
|
||||||
protonmail:
|
protonmail:
|
||||||
external: true
|
external: true
|
|
@ -1,46 +1,46 @@
|
||||||
version: '3'
|
version: '3'
|
||||||
|
|
||||||
services:
|
services:
|
||||||
mariadb:
|
mariadb:
|
||||||
image: mariadb:latest
|
image: mariadb:latest
|
||||||
environment:
|
environment:
|
||||||
MYSQL_ROOT_PASSWORD: root
|
MYSQL_ROOT_PASSWORD: root
|
||||||
MYSQL_DATABASE: dolibarr
|
MYSQL_DATABASE: dolibarr
|
||||||
volumes:
|
volumes:
|
||||||
- ./mysql/data:/var/lib/mysql
|
- ./mysql/data:/var/lib/mysql
|
||||||
- ./dump:/root/dump
|
- ./dump:/root/dump
|
||||||
networks:
|
networks:
|
||||||
- internal
|
- internal
|
||||||
|
|
||||||
dolibarr:
|
dolibarr:
|
||||||
image: upshift/dolibarr:latest
|
image: upshift/dolibarr:latest
|
||||||
restart: always
|
restart: always
|
||||||
container_name: dolibarr
|
container_name: dolibarr
|
||||||
environment:
|
environment:
|
||||||
DOLI_DB_HOST: mariadb
|
DOLI_DB_HOST: mariadb
|
||||||
DOLI_DB_USER: root
|
DOLI_DB_USER: root
|
||||||
DOLI_DB_PASSWORD: root
|
DOLI_DB_PASSWORD: root
|
||||||
DOLI_DB_NAME: dolibarr
|
DOLI_DB_NAME: dolibarr
|
||||||
DOLI_URL_ROOT: 'http://0.0.0.0'
|
DOLI_URL_ROOT: 'http://0.0.0.0'
|
||||||
DOLI_ADMIN_LOGIN: admin
|
DOLI_ADMIN_LOGIN: admin
|
||||||
DOLI_ADMIN_PASSWORD: admin
|
DOLI_ADMIN_PASSWORD: admin
|
||||||
PHP_INI_date.timezone: 'Europe/Paris'
|
PHP_INI_date.timezone: 'Europe/Paris'
|
||||||
DOLI_INSTALL_AUTO: 1
|
DOLI_INSTALL_AUTO: 1
|
||||||
volumes:
|
volumes:
|
||||||
- ./dolibarr/documents:/var/www/documents
|
- ./dolibarr/documents:/var/www/documents
|
||||||
- ./dolibarr/html:/var/www/html
|
- ./dolibarr/html:/var/www/html
|
||||||
networks:
|
networks:
|
||||||
- proxy
|
- proxy
|
||||||
- internal
|
- internal
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.dolibarr-secure.entrypoints=https"
|
- "traefik.http.routers.dolibarr-secure.entrypoints=https"
|
||||||
- "traefik.http.routers.dolibarr-secure.rule=Host(`dolibarr.mrdev023.fr`)"
|
- "traefik.http.routers.dolibarr-secure.rule=Host(`dolibarr.mrdev023.fr`)"
|
||||||
- "traefik.http.routers.dolibarr-secure.tls=true"
|
- "traefik.http.routers.dolibarr-secure.tls=true"
|
||||||
- "traefik.http.routers.dolibarr-secure.tls.certresolver=sslResolver"
|
- "traefik.http.routers.dolibarr-secure.tls.certresolver=sslResolver"
|
||||||
- "traefik.docker.network=proxy"
|
- "traefik.docker.network=proxy"
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
internal:
|
internal:
|
||||||
proxy:
|
proxy:
|
||||||
external: true
|
external: true
|
|
@ -1,50 +1,50 @@
|
||||||
version: '3'
|
version: '3'
|
||||||
|
|
||||||
services:
|
services:
|
||||||
db:
|
db:
|
||||||
image: postgres:14
|
image: postgres:14
|
||||||
restart: always
|
restart: always
|
||||||
container_name: n8n_db
|
container_name: n8n_db
|
||||||
networks:
|
networks:
|
||||||
- internal
|
- internal
|
||||||
volumes:
|
volumes:
|
||||||
- db:/var/lib/postgresql/data
|
- db:/var/lib/postgresql/data
|
||||||
environment:
|
environment:
|
||||||
- POSTGRES_PASSWORD=n8n
|
- POSTGRES_PASSWORD=n8n
|
||||||
- POSTGRES_DB=n8n
|
- POSTGRES_DB=n8n
|
||||||
- POSTGRES_USER=n8n
|
- POSTGRES_USER=n8n
|
||||||
|
|
||||||
n8n:
|
n8n:
|
||||||
image: n8nio/n8n
|
image: n8nio/n8n
|
||||||
restart: always
|
restart: always
|
||||||
container_name: n8n
|
container_name: n8n
|
||||||
networks:
|
networks:
|
||||||
- internal
|
- internal
|
||||||
- proxy
|
- proxy
|
||||||
volumes:
|
volumes:
|
||||||
- n8n:/home/node/.n8n
|
- n8n:/home/node/.n8n
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.n8n-secure.entrypoints=https"
|
- "traefik.http.routers.n8n-secure.entrypoints=https"
|
||||||
- "traefik.http.routers.n8n-secure.rule=Host(`n8n.mrdev023.fr`)"
|
- "traefik.http.routers.n8n-secure.rule=Host(`n8n.mrdev023.fr`)"
|
||||||
- "traefik.http.routers.n8n-secure.tls=true"
|
- "traefik.http.routers.n8n-secure.tls=true"
|
||||||
- "traefik.http.routers.n8n-secure.tls.certresolver=sslResolver"
|
- "traefik.http.routers.n8n-secure.tls.certresolver=sslResolver"
|
||||||
# - "traefik.http.routers.whoami-secure.service=whoami"
|
# - "traefik.http.routers.whoami-secure.service=whoami"
|
||||||
# - "traefik.http.services.whoami.loadbalancer.server.port=9002"
|
# - "traefik.http.services.whoami.loadbalancer.server.port=9002"
|
||||||
- "traefik.docker.network=proxy"
|
- "traefik.docker.network=proxy"
|
||||||
environment:
|
environment:
|
||||||
- DB_TYPE=postgresdb
|
- DB_TYPE=postgresdb
|
||||||
- DB_POSTGRESDB_PORT=5432
|
- DB_POSTGRESDB_PORT=5432
|
||||||
- DB_POSTGRESDB_HOST=db
|
- DB_POSTGRESDB_HOST=db
|
||||||
- DB_POSTGRESDB_DATABASE=n8n
|
- DB_POSTGRESDB_DATABASE=n8n
|
||||||
- DB_POSTGRESDB_USER=n8n
|
- DB_POSTGRESDB_USER=n8n
|
||||||
- DB_POSTGRESDB_PASSWORD=n8n
|
- DB_POSTGRESDB_PASSWORD=n8n
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
n8n:
|
n8n:
|
||||||
db:
|
db:
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
internal:
|
internal:
|
||||||
proxy:
|
proxy:
|
||||||
external: true
|
external: true
|
|
@ -1,72 +1,72 @@
|
||||||
version: "3"
|
version: "3"
|
||||||
services:
|
services:
|
||||||
|
|
||||||
outline:
|
outline:
|
||||||
image: outlinewiki/outline
|
image: outlinewiki/outline
|
||||||
env_file: ./docker.env
|
env_file: ./docker.env
|
||||||
depends_on:
|
depends_on:
|
||||||
- postgres
|
- postgres
|
||||||
- redis
|
- redis
|
||||||
- storage
|
- storage
|
||||||
networks:
|
networks:
|
||||||
- proxy
|
- proxy
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.outline-secure.entrypoints=https"
|
- "traefik.http.routers.outline-secure.entrypoints=https"
|
||||||
- "traefik.http.routers.outline-secure.rule=Host(`outline.mrdev023.fr`)"
|
- "traefik.http.routers.outline-secure.rule=Host(`outline.mrdev023.fr`)"
|
||||||
- "traefik.http.routers.outline-secure.tls=true"
|
- "traefik.http.routers.outline-secure.tls=true"
|
||||||
- "traefik.http.routers.outline-secure.tls.certresolver=sslResolver"
|
- "traefik.http.routers.outline-secure.tls.certresolver=sslResolver"
|
||||||
- "traefik.http.services.whoami.loadbalancer.server.port=3000"
|
- "traefik.http.services.whoami.loadbalancer.server.port=3000"
|
||||||
- "traefik.docker.network=proxy"
|
- "traefik.docker.network=proxy"
|
||||||
|
|
||||||
redis:
|
redis:
|
||||||
image: redis
|
image: redis
|
||||||
env_file: ./docker.env
|
env_file: ./docker.env
|
||||||
volumes:
|
volumes:
|
||||||
- ./redis.conf:/redis.conf
|
- ./redis.conf:/redis.conf
|
||||||
command: ["redis-server", "/redis.conf"]
|
command: ["redis-server", "/redis.conf"]
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: ["CMD", "redis-cli", "ping"]
|
test: ["CMD", "redis-cli", "ping"]
|
||||||
interval: 10s
|
interval: 10s
|
||||||
timeout: 30s
|
timeout: 30s
|
||||||
retries: 3
|
retries: 3
|
||||||
|
|
||||||
postgres:
|
postgres:
|
||||||
image: postgres
|
image: postgres
|
||||||
env_file: ./docker.env
|
env_file: ./docker.env
|
||||||
volumes:
|
volumes:
|
||||||
- database-data:/var/lib/postgresql/data
|
- database-data:/var/lib/postgresql/data
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: ["CMD", "pg_isready"]
|
test: ["CMD", "pg_isready"]
|
||||||
interval: 30s
|
interval: 30s
|
||||||
timeout: 20s
|
timeout: 20s
|
||||||
retries: 3
|
retries: 3
|
||||||
environment:
|
environment:
|
||||||
POSTGRES_USER: 'user'
|
POSTGRES_USER: 'user'
|
||||||
POSTGRES_PASSWORD: 'pass'
|
POSTGRES_PASSWORD: 'pass'
|
||||||
POSTGRES_DB: 'outline'
|
POSTGRES_DB: 'outline'
|
||||||
|
|
||||||
storage:
|
storage:
|
||||||
image: minio/minio
|
image: minio/minio
|
||||||
env_file: ./docker.env
|
env_file: ./docker.env
|
||||||
entrypoint: sh
|
entrypoint: sh
|
||||||
command: -c 'minio server'
|
command: -c 'minio server'
|
||||||
deploy:
|
deploy:
|
||||||
restart_policy:
|
restart_policy:
|
||||||
condition: on-failure
|
condition: on-failure
|
||||||
volumes:
|
volumes:
|
||||||
- storage-data:/data
|
- storage-data:/data
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: ["CMD", "curl", "-f", "http://localhost:9000/minio/health/live"]
|
test: ["CMD", "curl", "-f", "http://localhost:9000/minio/health/live"]
|
||||||
interval: 30s
|
interval: 30s
|
||||||
timeout: 20s
|
timeout: 20s
|
||||||
retries: 3
|
retries: 3
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
https-portal-data:
|
https-portal-data:
|
||||||
storage-data:
|
storage-data:
|
||||||
database-data:
|
database-data:
|
||||||
networks:
|
networks:
|
||||||
proxy:
|
proxy:
|
||||||
external: true
|
external: true
|
||||||
|
|
|
@ -1,18 +1,18 @@
|
||||||
version: '3'
|
version: '3'
|
||||||
|
|
||||||
services:
|
services:
|
||||||
protonmail-bridge:
|
protonmail-bridge:
|
||||||
image: shenxn/protonmail-bridge
|
image: shenxn/protonmail-bridge
|
||||||
restart: always
|
restart: always
|
||||||
container_name: protonmail-bridge
|
container_name: protonmail-bridge
|
||||||
networks:
|
networks:
|
||||||
- protonmail
|
- protonmail
|
||||||
volumes:
|
volumes:
|
||||||
- protonmail:/root
|
- protonmail:/root
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
protonmail:
|
protonmail:
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
protonmail:
|
protonmail:
|
||||||
external: true
|
external: true
|
|
@ -1,51 +1,51 @@
|
||||||
log:
|
log:
|
||||||
level: DEBUG
|
level: DEBUG
|
||||||
|
|
||||||
api:
|
api:
|
||||||
dashboard: true
|
dashboard: true
|
||||||
|
|
||||||
accessLog:
|
accessLog:
|
||||||
filePath: "/var/log/traefik/access.log"
|
filePath: "/var/log/traefik/access.log"
|
||||||
format: json
|
format: json
|
||||||
|
|
||||||
entryPoints:
|
entryPoints:
|
||||||
http:
|
http:
|
||||||
address: ":80"
|
address: ":80"
|
||||||
http:
|
http:
|
||||||
redirections:
|
redirections:
|
||||||
entryPoint:
|
entryPoint:
|
||||||
to: https
|
to: https
|
||||||
scheme: https
|
scheme: https
|
||||||
https:
|
https:
|
||||||
address: ":443"
|
address: ":443"
|
||||||
metrics:
|
metrics:
|
||||||
address: ":8080"
|
address: ":8080"
|
||||||
|
|
||||||
metrics:
|
metrics:
|
||||||
prometheus:
|
prometheus:
|
||||||
entryPoint: metrics
|
entryPoint: metrics
|
||||||
buckets:
|
buckets:
|
||||||
- 0.1
|
- 0.1
|
||||||
- 0.3
|
- 0.3
|
||||||
- 1.2
|
- 1.2
|
||||||
- 5.0
|
- 5.0
|
||||||
addEntryPointsLabels: true
|
addEntryPointsLabels: true
|
||||||
addServicesLabels: true
|
addServicesLabels: true
|
||||||
|
|
||||||
providers:
|
providers:
|
||||||
docker:
|
docker:
|
||||||
endpoint: "unix:///var/run/docker.sock"
|
endpoint: "unix:///var/run/docker.sock"
|
||||||
exposedByDefault: false
|
exposedByDefault: false
|
||||||
http:
|
http:
|
||||||
endpoint: "http://http_provider/dynamic_conf.yaml"
|
endpoint: "http://http_provider/dynamic_conf.yaml"
|
||||||
|
|
||||||
certificatesResolvers:
|
certificatesResolvers:
|
||||||
sslResolver:
|
sslResolver:
|
||||||
acme:
|
acme:
|
||||||
email: florian.richer.97@outlook.com
|
email: florian.richer.97@outlook.com
|
||||||
tlschallenge: {}
|
tlschallenge: {}
|
||||||
storage: acme.json
|
storage: acme.json
|
||||||
keyType: RSA4096
|
keyType: RSA4096
|
||||||
#caServer: "https://acme-staging-v02.api.letsencrypt.org/directory"
|
#caServer: "https://acme-staging-v02.api.letsencrypt.org/directory"
|
||||||
httpChallenge:
|
httpChallenge:
|
||||||
entryPoint: http
|
entryPoint: http
|
|
@ -1,22 +1,22 @@
|
||||||
version: '3'
|
version: '3'
|
||||||
|
|
||||||
services:
|
services:
|
||||||
whoami:
|
whoami:
|
||||||
image: "containous/whoami"
|
image: "containous/whoami"
|
||||||
restart: always
|
restart: always
|
||||||
container_name: "whoami"
|
container_name: "whoami"
|
||||||
networks:
|
networks:
|
||||||
- proxy
|
- proxy
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.whoami-secure.entrypoints=https"
|
- "traefik.http.routers.whoami-secure.entrypoints=https"
|
||||||
- "traefik.http.routers.whoami-secure.rule=Host(`whoami.mrdev023.fr`)"
|
- "traefik.http.routers.whoami-secure.rule=Host(`whoami.mrdev023.fr`)"
|
||||||
- "traefik.http.routers.whoami-secure.tls=true"
|
- "traefik.http.routers.whoami-secure.tls=true"
|
||||||
- "traefik.http.routers.whoami-secure.tls.certresolver=sslResolver"
|
- "traefik.http.routers.whoami-secure.tls.certresolver=sslResolver"
|
||||||
# - "traefik.http.routers.whoami-secure.service=whoami"
|
# - "traefik.http.routers.whoami-secure.service=whoami"
|
||||||
# - "traefik.http.services.whoami.loadbalancer.server.port=9002"
|
# - "traefik.http.services.whoami.loadbalancer.server.port=9002"
|
||||||
- "traefik.docker.network=proxy"
|
- "traefik.docker.network=proxy"
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
proxy:
|
proxy:
|
||||||
external: true
|
external: true
|
Loading…
Reference in a new issue