1
0
Fork 0

move all confs

This commit is contained in:
Florian RICHER 2023-05-02 18:38:04 +02:00
parent f46c445b8d
commit 8e2ccd309d
No known key found for this signature in database
GPG key ID: 6BF27BF8A1E71623
50 changed files with 350 additions and 350 deletions

View file

@ -1,21 +1,21 @@
version: '3' version: '3'
services: services:
affine: affine:
image: ghcr.io/toeverything/affine:nightly-server-latest image: ghcr.io/toeverything/affine:nightly-server-latest
restart: always restart: always
container_name: affine container_name: affine
networks: networks:
- proxy - proxy
labels: labels:
- "traefik.enable=true" - "traefik.enable=true"
- "traefik.http.routers.affine-secure.entrypoints=https" - "traefik.http.routers.affine-secure.entrypoints=https"
- "traefik.http.routers.affine-secure.rule=Host(`affine.mrdev023.fr`)" - "traefik.http.routers.affine-secure.rule=Host(`affine.mrdev023.fr`)"
- "traefik.http.routers.affine-secure.tls=true" - "traefik.http.routers.affine-secure.tls=true"
- "traefik.http.routers.affine-secure.tls.certresolver=sslResolver" - "traefik.http.routers.affine-secure.tls.certresolver=sslResolver"
- "traefik.http.services.affine-secure.loadbalancer.server.port=3000" - "traefik.http.services.affine-secure.loadbalancer.server.port=3000"
- "traefik.docker.network=proxy" - "traefik.docker.network=proxy"
networks: networks:
proxy: proxy:
external: true external: true

View file

@ -1,70 +1,70 @@
version: '3' version: '3'
services: services:
db: db:
image: postgres:14 image: postgres:14
restart: always restart: always
container_name: nextcloud_db container_name: nextcloud_db
networks: networks:
- internal - internal
volumes: volumes:
- db:/var/lib/postgresql/data - db:/var/lib/postgresql/data
environment: environment:
- POSTGRES_PASSWORD=nextcloud - POSTGRES_PASSWORD=nextcloud
- POSTGRES_DB=nextcloud - POSTGRES_DB=nextcloud
- POSTGRES_USER=nextcloud - POSTGRES_USER=nextcloud
nextcloud: nextcloud:
image: nextcloud image: nextcloud
restart: always restart: always
container_name: nextcloud container_name: nextcloud
networks: networks:
- proxy - proxy
- protonmail - protonmail
- internal - internal
depends_on: depends_on:
- db - db
volumes: volumes:
- nextcloud:/var/www/html - nextcloud:/var/www/html
labels: labels:
- "traefik.enable=true" - "traefik.enable=true"
- "traefik.http.middlewares.nextcloud-compress.compress=true" - "traefik.http.middlewares.nextcloud-compress.compress=true"
- "traefik.http.middlewares.nextcloud-regex-redirect.redirectregex.permanent=true" - "traefik.http.middlewares.nextcloud-regex-redirect.redirectregex.permanent=true"
- "traefik.http.middlewares.nextcloud-regex-redirect.redirectregex.regex=https://(.*)/.well-known/(card|cal)dav" - "traefik.http.middlewares.nextcloud-regex-redirect.redirectregex.regex=https://(.*)/.well-known/(card|cal)dav"
- "traefik.http.middlewares.nextcloud-regex-redirect.redirectregex.replacement=https://$$1/remote.php/dav/" - "traefik.http.middlewares.nextcloud-regex-redirect.redirectregex.replacement=https://$$1/remote.php/dav/"
- "traefik.http.middlewares.nextcloud-headers.headers.frameDeny=true" - "traefik.http.middlewares.nextcloud-headers.headers.frameDeny=true"
- "traefik.http.middlewares.nextcloud-headers.headers.sslRedirect=true" - "traefik.http.middlewares.nextcloud-headers.headers.sslRedirect=true"
- "traefik.http.middlewares.nextcloud-headers.headers.contentTypeNosniff=true" - "traefik.http.middlewares.nextcloud-headers.headers.contentTypeNosniff=true"
- "traefik.http.middlewares.nextcloud-headers.headers.stsIncludeSubdomains=true" - "traefik.http.middlewares.nextcloud-headers.headers.stsIncludeSubdomains=true"
- "traefik.http.middlewares.nextcloud-headers.headers.stsPreload=true" - "traefik.http.middlewares.nextcloud-headers.headers.stsPreload=true"
- "traefik.http.middlewares.nextcloud-headers.headers.stsSeconds=31536000" - "traefik.http.middlewares.nextcloud-headers.headers.stsSeconds=31536000"
- "traefik.http.middlewares.nextcloud-headers.headers.referrerPolicy=same-origin" - "traefik.http.middlewares.nextcloud-headers.headers.referrerPolicy=same-origin"
- "traefik.http.middlewares.nextcloud-headers.headers.browserXssFilter=true" - "traefik.http.middlewares.nextcloud-headers.headers.browserXssFilter=true"
- "traefik.http.middlewares.nextcloud-headers.headers.customRequestHeaders.X-Forwarded-Proto=https" - "traefik.http.middlewares.nextcloud-headers.headers.customRequestHeaders.X-Forwarded-Proto=https"
- "traefik.http.middlewares.nextcloud-headers.headers.customRequestHeaders.X-Robots-Tag=none" - "traefik.http.middlewares.nextcloud-headers.headers.customRequestHeaders.X-Robots-Tag=none"
- "traefik.http.middlewares.nextcloud-headers.headers.customFrameOptionsValue=SAMEORIGIN" - "traefik.http.middlewares.nextcloud-headers.headers.customFrameOptionsValue=SAMEORIGIN"
- "traefik.http.routers.nextcloud-secure.entrypoints=https" - "traefik.http.routers.nextcloud-secure.entrypoints=https"
- "traefik.http.routers.nextcloud-secure.rule=Host(`mycld.mrdev023.fr`)" - "traefik.http.routers.nextcloud-secure.rule=Host(`mycld.mrdev023.fr`)"
- "traefik.http.routers.nextcloud-secure.tls=true" - "traefik.http.routers.nextcloud-secure.tls=true"
- "traefik.http.routers.nextcloud-secure.tls.certresolver=sslResolver" - "traefik.http.routers.nextcloud-secure.tls.certresolver=sslResolver"
- "traefik.http.routers.nextcloud-secure.middlewares=nextcloud-compress,nextcloud-regex-redirect,nextcloud-headers" - "traefik.http.routers.nextcloud-secure.middlewares=nextcloud-compress,nextcloud-regex-redirect,nextcloud-headers"
# - "traefik.http.routers.nextcloud-secure.service=nextcloud" # - "traefik.http.routers.nextcloud-secure.service=nextcloud"
# - "traefik.http.services.nextcloud.loadbalancer.server.port=9002" # - "traefik.http.services.nextcloud.loadbalancer.server.port=9002"
- "traefik.docker.network=proxy" - "traefik.docker.network=proxy"
environment: environment:
- POSTGRES_PASSWORD=nextcloud - POSTGRES_PASSWORD=nextcloud
- POSTGRES_DATABASE=nextcloud - POSTGRES_DATABASE=nextcloud
- POSTGRES_USER=nextcloud - POSTGRES_USER=nextcloud
- POSTGRES_HOST=db - POSTGRES_HOST=db
- OVERWRITEPROTOCOL=https - OVERWRITEPROTOCOL=https
volumes: volumes:
nextcloud: nextcloud:
db: db:
networks: networks:
internal: internal:
proxy: proxy:
external: true external: true
protonmail: protonmail:
external: true external: true

View file

@ -1,46 +1,46 @@
version: '3' version: '3'
services: services:
mariadb: mariadb:
image: mariadb:latest image: mariadb:latest
environment: environment:
MYSQL_ROOT_PASSWORD: root MYSQL_ROOT_PASSWORD: root
MYSQL_DATABASE: dolibarr MYSQL_DATABASE: dolibarr
volumes: volumes:
- ./mysql/data:/var/lib/mysql - ./mysql/data:/var/lib/mysql
- ./dump:/root/dump - ./dump:/root/dump
networks: networks:
- internal - internal
dolibarr: dolibarr:
image: upshift/dolibarr:latest image: upshift/dolibarr:latest
restart: always restart: always
container_name: dolibarr container_name: dolibarr
environment: environment:
DOLI_DB_HOST: mariadb DOLI_DB_HOST: mariadb
DOLI_DB_USER: root DOLI_DB_USER: root
DOLI_DB_PASSWORD: root DOLI_DB_PASSWORD: root
DOLI_DB_NAME: dolibarr DOLI_DB_NAME: dolibarr
DOLI_URL_ROOT: 'http://0.0.0.0' DOLI_URL_ROOT: 'http://0.0.0.0'
DOLI_ADMIN_LOGIN: admin DOLI_ADMIN_LOGIN: admin
DOLI_ADMIN_PASSWORD: admin DOLI_ADMIN_PASSWORD: admin
PHP_INI_date.timezone: 'Europe/Paris' PHP_INI_date.timezone: 'Europe/Paris'
DOLI_INSTALL_AUTO: 1 DOLI_INSTALL_AUTO: 1
volumes: volumes:
- ./dolibarr/documents:/var/www/documents - ./dolibarr/documents:/var/www/documents
- ./dolibarr/html:/var/www/html - ./dolibarr/html:/var/www/html
networks: networks:
- proxy - proxy
- internal - internal
labels: labels:
- "traefik.enable=true" - "traefik.enable=true"
- "traefik.http.routers.dolibarr-secure.entrypoints=https" - "traefik.http.routers.dolibarr-secure.entrypoints=https"
- "traefik.http.routers.dolibarr-secure.rule=Host(`dolibarr.mrdev023.fr`)" - "traefik.http.routers.dolibarr-secure.rule=Host(`dolibarr.mrdev023.fr`)"
- "traefik.http.routers.dolibarr-secure.tls=true" - "traefik.http.routers.dolibarr-secure.tls=true"
- "traefik.http.routers.dolibarr-secure.tls.certresolver=sslResolver" - "traefik.http.routers.dolibarr-secure.tls.certresolver=sslResolver"
- "traefik.docker.network=proxy" - "traefik.docker.network=proxy"
networks: networks:
internal: internal:
proxy: proxy:
external: true external: true

View file

@ -1,50 +1,50 @@
version: '3' version: '3'
services: services:
db: db:
image: postgres:14 image: postgres:14
restart: always restart: always
container_name: n8n_db container_name: n8n_db
networks: networks:
- internal - internal
volumes: volumes:
- db:/var/lib/postgresql/data - db:/var/lib/postgresql/data
environment: environment:
- POSTGRES_PASSWORD=n8n - POSTGRES_PASSWORD=n8n
- POSTGRES_DB=n8n - POSTGRES_DB=n8n
- POSTGRES_USER=n8n - POSTGRES_USER=n8n
n8n: n8n:
image: n8nio/n8n image: n8nio/n8n
restart: always restart: always
container_name: n8n container_name: n8n
networks: networks:
- internal - internal
- proxy - proxy
volumes: volumes:
- n8n:/home/node/.n8n - n8n:/home/node/.n8n
labels: labels:
- "traefik.enable=true" - "traefik.enable=true"
- "traefik.http.routers.n8n-secure.entrypoints=https" - "traefik.http.routers.n8n-secure.entrypoints=https"
- "traefik.http.routers.n8n-secure.rule=Host(`n8n.mrdev023.fr`)" - "traefik.http.routers.n8n-secure.rule=Host(`n8n.mrdev023.fr`)"
- "traefik.http.routers.n8n-secure.tls=true" - "traefik.http.routers.n8n-secure.tls=true"
- "traefik.http.routers.n8n-secure.tls.certresolver=sslResolver" - "traefik.http.routers.n8n-secure.tls.certresolver=sslResolver"
# - "traefik.http.routers.whoami-secure.service=whoami" # - "traefik.http.routers.whoami-secure.service=whoami"
# - "traefik.http.services.whoami.loadbalancer.server.port=9002" # - "traefik.http.services.whoami.loadbalancer.server.port=9002"
- "traefik.docker.network=proxy" - "traefik.docker.network=proxy"
environment: environment:
- DB_TYPE=postgresdb - DB_TYPE=postgresdb
- DB_POSTGRESDB_PORT=5432 - DB_POSTGRESDB_PORT=5432
- DB_POSTGRESDB_HOST=db - DB_POSTGRESDB_HOST=db
- DB_POSTGRESDB_DATABASE=n8n - DB_POSTGRESDB_DATABASE=n8n
- DB_POSTGRESDB_USER=n8n - DB_POSTGRESDB_USER=n8n
- DB_POSTGRESDB_PASSWORD=n8n - DB_POSTGRESDB_PASSWORD=n8n
volumes: volumes:
n8n: n8n:
db: db:
networks: networks:
internal: internal:
proxy: proxy:
external: true external: true

View file

@ -1,72 +1,72 @@
version: "3" version: "3"
services: services:
outline: outline:
image: outlinewiki/outline image: outlinewiki/outline
env_file: ./docker.env env_file: ./docker.env
depends_on: depends_on:
- postgres - postgres
- redis - redis
- storage - storage
networks: networks:
- proxy - proxy
labels: labels:
- "traefik.enable=true" - "traefik.enable=true"
- "traefik.http.routers.outline-secure.entrypoints=https" - "traefik.http.routers.outline-secure.entrypoints=https"
- "traefik.http.routers.outline-secure.rule=Host(`outline.mrdev023.fr`)" - "traefik.http.routers.outline-secure.rule=Host(`outline.mrdev023.fr`)"
- "traefik.http.routers.outline-secure.tls=true" - "traefik.http.routers.outline-secure.tls=true"
- "traefik.http.routers.outline-secure.tls.certresolver=sslResolver" - "traefik.http.routers.outline-secure.tls.certresolver=sslResolver"
- "traefik.http.services.whoami.loadbalancer.server.port=3000" - "traefik.http.services.whoami.loadbalancer.server.port=3000"
- "traefik.docker.network=proxy" - "traefik.docker.network=proxy"
redis: redis:
image: redis image: redis
env_file: ./docker.env env_file: ./docker.env
volumes: volumes:
- ./redis.conf:/redis.conf - ./redis.conf:/redis.conf
command: ["redis-server", "/redis.conf"] command: ["redis-server", "/redis.conf"]
healthcheck: healthcheck:
test: ["CMD", "redis-cli", "ping"] test: ["CMD", "redis-cli", "ping"]
interval: 10s interval: 10s
timeout: 30s timeout: 30s
retries: 3 retries: 3
postgres: postgres:
image: postgres image: postgres
env_file: ./docker.env env_file: ./docker.env
volumes: volumes:
- database-data:/var/lib/postgresql/data - database-data:/var/lib/postgresql/data
healthcheck: healthcheck:
test: ["CMD", "pg_isready"] test: ["CMD", "pg_isready"]
interval: 30s interval: 30s
timeout: 20s timeout: 20s
retries: 3 retries: 3
environment: environment:
POSTGRES_USER: 'user' POSTGRES_USER: 'user'
POSTGRES_PASSWORD: 'pass' POSTGRES_PASSWORD: 'pass'
POSTGRES_DB: 'outline' POSTGRES_DB: 'outline'
storage: storage:
image: minio/minio image: minio/minio
env_file: ./docker.env env_file: ./docker.env
entrypoint: sh entrypoint: sh
command: -c 'minio server' command: -c 'minio server'
deploy: deploy:
restart_policy: restart_policy:
condition: on-failure condition: on-failure
volumes: volumes:
- storage-data:/data - storage-data:/data
healthcheck: healthcheck:
test: ["CMD", "curl", "-f", "http://localhost:9000/minio/health/live"] test: ["CMD", "curl", "-f", "http://localhost:9000/minio/health/live"]
interval: 30s interval: 30s
timeout: 20s timeout: 20s
retries: 3 retries: 3
volumes: volumes:
https-portal-data: https-portal-data:
storage-data: storage-data:
database-data: database-data:
networks: networks:
proxy: proxy:
external: true external: true

View file

@ -1,18 +1,18 @@
version: '3' version: '3'
services: services:
protonmail-bridge: protonmail-bridge:
image: shenxn/protonmail-bridge image: shenxn/protonmail-bridge
restart: always restart: always
container_name: protonmail-bridge container_name: protonmail-bridge
networks: networks:
- protonmail - protonmail
volumes: volumes:
- protonmail:/root - protonmail:/root
volumes: volumes:
protonmail: protonmail:
networks: networks:
protonmail: protonmail:
external: true external: true

View file

@ -1,51 +1,51 @@
log: log:
level: DEBUG level: DEBUG
api: api:
dashboard: true dashboard: true
accessLog: accessLog:
filePath: "/var/log/traefik/access.log" filePath: "/var/log/traefik/access.log"
format: json format: json
entryPoints: entryPoints:
http: http:
address: ":80" address: ":80"
http: http:
redirections: redirections:
entryPoint: entryPoint:
to: https to: https
scheme: https scheme: https
https: https:
address: ":443" address: ":443"
metrics: metrics:
address: ":8080" address: ":8080"
metrics: metrics:
prometheus: prometheus:
entryPoint: metrics entryPoint: metrics
buckets: buckets:
- 0.1 - 0.1
- 0.3 - 0.3
- 1.2 - 1.2
- 5.0 - 5.0
addEntryPointsLabels: true addEntryPointsLabels: true
addServicesLabels: true addServicesLabels: true
providers: providers:
docker: docker:
endpoint: "unix:///var/run/docker.sock" endpoint: "unix:///var/run/docker.sock"
exposedByDefault: false exposedByDefault: false
http: http:
endpoint: "http://http_provider/dynamic_conf.yaml" endpoint: "http://http_provider/dynamic_conf.yaml"
certificatesResolvers: certificatesResolvers:
sslResolver: sslResolver:
acme: acme:
email: florian.richer.97@outlook.com email: florian.richer.97@outlook.com
tlschallenge: {} tlschallenge: {}
storage: acme.json storage: acme.json
keyType: RSA4096 keyType: RSA4096
#caServer: "https://acme-staging-v02.api.letsencrypt.org/directory" #caServer: "https://acme-staging-v02.api.letsencrypt.org/directory"
httpChallenge: httpChallenge:
entryPoint: http entryPoint: http

View file

@ -1,22 +1,22 @@
version: '3' version: '3'
services: services:
whoami: whoami:
image: "containous/whoami" image: "containous/whoami"
restart: always restart: always
container_name: "whoami" container_name: "whoami"
networks: networks:
- proxy - proxy
labels: labels:
- "traefik.enable=true" - "traefik.enable=true"
- "traefik.http.routers.whoami-secure.entrypoints=https" - "traefik.http.routers.whoami-secure.entrypoints=https"
- "traefik.http.routers.whoami-secure.rule=Host(`whoami.mrdev023.fr`)" - "traefik.http.routers.whoami-secure.rule=Host(`whoami.mrdev023.fr`)"
- "traefik.http.routers.whoami-secure.tls=true" - "traefik.http.routers.whoami-secure.tls=true"
- "traefik.http.routers.whoami-secure.tls.certresolver=sslResolver" - "traefik.http.routers.whoami-secure.tls.certresolver=sslResolver"
# - "traefik.http.routers.whoami-secure.service=whoami" # - "traefik.http.routers.whoami-secure.service=whoami"
# - "traefik.http.services.whoami.loadbalancer.server.port=9002" # - "traefik.http.services.whoami.loadbalancer.server.port=9002"
- "traefik.docker.network=proxy" - "traefik.docker.network=proxy"
networks: networks:
proxy: proxy:
external: true external: true