50 lines
1.8 KiB
YAML
50 lines
1.8 KiB
YAML
services:
|
|
traefik:
|
|
container_name: traefik
|
|
image: docker.io/library/traefik:v3.4.4
|
|
restart: unless-stopped
|
|
security_opt:
|
|
- no-new-privileges:true
|
|
secrets:
|
|
- cf_api_token
|
|
env_file: .env
|
|
labels:
|
|
- traefik.enable=true
|
|
- traefik.http.routers.traefik.entrypoints=http
|
|
- traefik.http.routers.traefik.rule=Host(`traefik.local.${DOMAIN_NAME}`)
|
|
- traefik.http.middlewares.traefik-auth.basicauth.users=${TRAEFIK_DASHBOARD_CREDENTIALS}
|
|
- traefik.http.middlewares.traefik-https-redirect.redirectscheme.scheme=https
|
|
- traefik.http.middlewares.sslheader.headers.customrequestheaders.X-Forwarded-Proto=https
|
|
- traefik.http.routers.traefik.middlewares=traefik-https-redirect
|
|
- traefik.http.routers.traefik-secure.entrypoints=https
|
|
- traefik.http.routers.traefik-secure.rule=Host(`traefik.local.${DOMAIN_NAME}`)
|
|
- traefik.http.routers.traefik-secure.middlewares=traefik-auth
|
|
- traefik.http.routers.traefik-secure.tls=true
|
|
- traefik.http.routers.traefik-secure.tls.certresolver=cloudflare
|
|
- traefik.http.routers.traefik-secure.tls.domains[0].main=local.${DOMAIN_NAME}
|
|
- traefik.http.routers.traefik-secure.tls.domains[0].sans=*.local.${DOMAIN_NAME}
|
|
- traefik.http.routers.traefik-secure.service=api@internal
|
|
environment:
|
|
CF_DNS_API_TOKEN_FILE: /run/secrets/cf_api_token
|
|
TRAEFIK_DASHBOARD_CREDENTIALS: ${TRAEFIK_DASHBOARD_CREDENTIALS}
|
|
volumes:
|
|
- ./data/traefik.yml:/traefik.yml:ro
|
|
- ./data/acme.json:/acme.json
|
|
- ./data/config.yml:/config.yml:ro
|
|
- /etc/localtime:/etc/localtime:ro
|
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
|
ports:
|
|
- 80:80
|
|
- 443:443
|
|
- 443:443/udp
|
|
networks:
|
|
- frontend
|
|
|
|
networks:
|
|
frontend:
|
|
external: true
|
|
|
|
secrets:
|
|
cf_api_token:
|
|
file: ./cf_api_token.txt
|