Compare commits

...

16 Commits

Author SHA1 Message Date
3wc
baba7ff87d Add default COMPOSE_FILE 2021-08-07 19:49:29 +02:00
3wc
e856591c97 COMPOSE_FILE=$COMPOSE_FILE:, to combine 'em easier
Thanks, @mirsal
2021-08-07 17:03:52 +02:00
3wc
8bcd8f054e Add missing Mumble vars to .env.sample 2021-08-07 17:03:20 +02:00
3wc
a9a513e8da Add Mumble TCP/UDP ports 2021-08-07 14:24:39 +02:00
3wc
46010aeb95 Enable Gandi DNS challenge for Letsencrypt 2021-07-18 16:30:22 +02:00
0421dd4747 Update traefik Docker tag to v2.4.11 2021-07-16 07:03:32 +00:00
eb69ba9309 Expose host mode networking for mssql
See https://github.com/WASHNote/washnote-apps/issues/17.
2021-07-07 15:58:08 +02:00
21cd25f3d6 Quote and version headless 2021-06-27 20:19:04 +02:00
f9b3475086 Version v2.4.9; sync labels 2021-06-27 20:18:21 +02:00
ef443bae50 Add "headless mode" config
Closes https://git.autonomic.zone/coop-cloud/traefik/issues/24.
2021-06-27 20:17:41 +02:00
aacf00309e Update traefik Docker tag to v2.4.9 2021-06-23 07:03:18 +00:00
f73e38d143 Use new image namespace 2021-06-21 12:32:15 +02:00
661bec4727 Bump versions for CI 2021-06-10 12:38:42 +02:00
7258b129c4 Support OVH configuration
See https://github.com/Autonomic-Cooperative/traefik/pull/1.
2021-06-10 12:36:54 +02:00
bbbdfc272d Merge pull request #1 from ahdinosaur/lets-encrypt-dns-challenge-ovh
add support for Let's Encrypt DNS-01 challenge (for wildcard domains)
2021-06-10 12:01:37 +02:00
2c81622d9a add support for Let's Encrypt DNS-01 challenge (for wildcard domains)
start with support for OVH provider, but in a way for others to be added in the future:

https://doc.traefik.io/traefik/https/acme/#dnschallenge
2021-06-10 14:53:17 +12:00
11 changed files with 173 additions and 19 deletions

View File

@ -14,8 +14,9 @@ steps:
STACK_NAME: traefik STACK_NAME: traefik
LETS_ENCRYPT_ENV: production LETS_ENCRYPT_ENV: production
LETS_ENCRYPT_EMAIL: helo@autonomic.zone LETS_ENCRYPT_EMAIL: helo@autonomic.zone
TRAEFIK_YML_VERSION: v3 TRAEFIK_YML_VERSION: v4
FILE_PROVIDER_YML_VERSION: v2 FILE_PROVIDER_YML_VERSION: v3
ENTRYPOINT_VERSION: v1
trigger: trigger:
branch: branch:
- master - master
@ -24,7 +25,7 @@ kind: pipeline
name: recipe release name: recipe release
steps: steps:
- name: release a new version - name: release a new version
image: decentral1se/drone-abra:latest image: thecoopcloud/drone-abra:latest
settings: settings:
command: recipe traefik release command: recipe traefik release
deploy_key: deploy_key:

View File

@ -8,33 +8,79 @@ LETS_ENCRYPT_EMAIL=certs@example.com
# WARN, INFO etc. # WARN, INFO etc.
LOG_LEVEL=WARN LOG_LEVEL=WARN
# This is here so later lines can extend the definition; you likely don't wanna
# edit
COMPOSE_FILE="compose.yml"
#####################################################################
# General settings #
#####################################################################
## Host-mode networking
#COMPOSE_FILE="$COMPOSE_FILE:compose.host.yml"
## "Headless mode" (no domain configured)
#COMPOSE_FILE="$COMPOSE_FILE:compose.headless.yml"
#####################################################################
# Automatic DNS set-up for Letsencrypt #
#####################################################################
## Enable dns challenge (for wildcard domains)
## https://doc.traefik.io/traefik/https/acme/#dnschallenge
#LETS_ENCRYPT_DNS_CHALLENGE_ENABLED=1
#LETS_ENCRYPT_DNS_CHALLENGE_PROVIDER=ovh
## OVH, https://ovh.com
#COMPOSE_FILE="$COMPOSE_FILE:compose.ovh.yml"
#OVH_ENABLED=1
#OVH_APPLICATION_KEY=
#OVH_ENDPOINT=
#SECRET_OVH_APP_SECRET_VERSION=v1
#SECRET_OVH_CONSUMER_KEY=v1
## Gandi, https://gandi.net
## note(3wc): only "V5" (new) API is supported, so far
#COMPOSE_FILE="$COMPOSE_FILE:compose.gandi.yml"
#GANDI_ENABLED=1
#SECRET_GANDIV5_API_KEY_VERSION=v1
#####################################################################
# Keycloak log-in #
#####################################################################
## Enable Keycloak ## Enable Keycloak
#COMPOSE_FILE="compose.yml:compose.keycloak.yml" #COMPOSE_FILE="$COMPOSE_FILE:compose.keycloak.yml"
#KEYCLOAK_MIDDLEWARE_ENABLED=1 #KEYCLOAK_MIDDLEWARE_ENABLED=1
#####################################################################
# Additional services #
#####################################################################
## SMTP port 587 ## SMTP port 587
#COMPOSE_FILE="compose.yml:compose.smtp.yml" #COMPOSE_FILE="$COMPOSE_FILE:compose.smtp.yml"
#SMTP_ENABLED=1 #SMTP_ENABLED=1
## Gitea SSH ## Gitea SSH
# COMPOSE_FILE="compose.yml:compose.gitea.yml" # COMPOSE_FILE="$COMPOSE_FILE:compose.gitea.yml"
# GITEA_SSH_ENABLED=1 # GITEA_SSH_ENABLED=1
## Foodsoft SMTP ## Foodsoft SMTP
# COMPOSE_FILE="compose.yml:compose.foodsoft.yml" # COMPOSE_FILE="$COMPOSE_FILE:compose.foodsoft.yml"
# FOODSOFT_SMTP_ENABLED=1 # FOODSOFT_SMTP_ENABLED=1
## Peertube RTMP ## Peertube RTMP
# COMPOSE_FILE="compose.yml:compose.peertube.yml" #COMPOSE_FILE="$COMPOSE_FILE:compose.peertube.yml"
#PEERTUBE_RTMP_ENABLED=1 #PEERTUBE_RTMP_ENABLED=1
## Secure Scuttlebutt MUXRPC ## Secure Scuttlebutt MUXRPC
# COMPOSE_FILE="compose.yml:compose.ssb.yml" #COMPOSE_FILE="$COMPOSE_FILE:compose.ssb.yml"
#SSB_MUXRPC_ENABLED=1 #SSB_MUXRPC_ENABLED=1
## MSSQL ## MSSQL
# COMPOSE_FILE="compose.yml:compose.mssql.yml" #COMPOSE_FILE="$COMPOSE_FILE:compose.mssql.yml"
#MSSQL_ENABLED=1 #MSSQL_ENABLED=1
## Host-mode networking ## Mumble
#COMPOSE_FILE="compose.yml:compose.host.yml" #COMPOSE_FILE="$COMPOSE_FILE:compose.mumble.yml"
#MUMBLE_ENABLED=1

View File

@ -1,2 +1,3 @@
export TRAEFIK_YML_VERSION=v8 export TRAEFIK_YML_VERSION=v11
export FILE_PROVIDER_YML_VERSION=v2 export FILE_PROVIDER_YML_VERSION=v2
export ENTRYPOINT_VERSION=v2

15
compose.gandi.yml Normal file
View File

@ -0,0 +1,15 @@
version: "3.8"
services:
app:
environment:
- GANDIV5_API_KEY_FILE=/run/secrets/gandiv5_api_key
- LETS_ENCRYPT_DNS_CHALLENGE_ENABLED
- LETS_ENCRYPT_DNS_CHALLENGE_PROVIDER
secrets:
- gandiv5_api_key
secrets:
gandiv5_api_key:
name: ${STACK_NAME}_gandiv5_api_key_${SECRET_GANDIV5_API_KEY_VERSION}
external: true

15
compose.headless.yml Normal file
View File

@ -0,0 +1,15 @@
---
version: "3.8"
services:
app:
deploy:
update_config:
failure_action: rollback
order: start-first
labels:
- "traefik.enable=true"
- "traefik.http.services.traefik.loadbalancer.server.port=web"
- "traefik.http.routers.traefik.entrypoints=web-secure"
- "traefik.http.routers.traefik.service=api@internal"
- "coop-cloud.${STACK_NAME}.app.version=v2.4.9-be23e1f6"

View File

@ -4,4 +4,7 @@ services:
environment: environment:
- MSSQL_ENABLED - MSSQL_ENABLED
ports: ports:
- "1433:1433" - target: 1433
published: 1433
protocol: tcp
mode: host

9
compose.mumble.yml Normal file
View File

@ -0,0 +1,9 @@
version: "3.8"
services:
app:
environment:
- MUMBLE_ENABLED
ports:
- "64738:64738/udp"
# note (3wc): see https://github.com/docker/compose/issues/7627
- "64737-64739:64737-64739/tcp"

21
compose.ovh.yml Normal file
View File

@ -0,0 +1,21 @@
version: "3.8"
services:
app:
environment:
- OVH_APPLICATION_KEY
- OVH_APPLICATION_SECRET_FILE=/run/secrets/ovh_app_secret
- OVH_CONSUMER_KEY_FILE=/run/secrets/ovh_consumer_key
- OVH_ENABLED
- OVH_ENDPOINT
secrets:
- ovh_app_secret
- ovh_consumer_key
secrets:
ovh_app_secret:
name: ${STACK_NAME}_ovh_app_secret_${SECRET_OVH_APP_SECRET_VERSION}
external: true
ovh_consumer_key:
name: ${STACK_NAME}_ovh_consumer_key_${SECRET_OVH_CONSUMER_KEY}
external: true

View File

@ -1,7 +1,7 @@
version: "3.8" version: "3.8"
services: services:
app: app:
image: "traefik:v2.4.8" image: "traefik:v2.4.11"
# Note(decentral1se): *please do not* add any additional ports here. # Note(decentral1se): *please do not* add any additional ports here.
# Doing so could break new installs with port conflicts. Please use # Doing so could break new installs with port conflicts. Please use
# the usual `compose.$app.yml` approach for any additional ports # the usual `compose.$app.yml` approach for any additional ports
@ -16,6 +16,9 @@ services:
target: /etc/traefik/traefik.yml target: /etc/traefik/traefik.yml
- source: file_provider_yml - source: file_provider_yml
target: /etc/traefik/file-provider.yml target: /etc/traefik/file-provider.yml
- source: entrypoint
target: /custom-entrypoint.sh
mode: 0555
networks: networks:
- proxy - proxy
environment: environment:
@ -27,6 +30,8 @@ services:
timeout: 10s timeout: 10s
retries: 10 retries: 10
start_period: 1m start_period: 1m
command: traefik
entrypoint: /custom-entrypoint.sh
deploy: deploy:
update_config: update_config:
failure_action: rollback failure_action: rollback
@ -40,7 +45,7 @@ services:
- "traefik.http.routers.traefik.tls.options=default@file" - "traefik.http.routers.traefik.tls.options=default@file"
- "traefik.http.routers.traefik.service=api@internal" - "traefik.http.routers.traefik.service=api@internal"
- "traefik.http.routers.traefik.middlewares=security@file" - "traefik.http.routers.traefik.middlewares=security@file"
- coop-cloud.${STACK_NAME}.app.version=v2.4.8-d7d63b0d - "coop-cloud.${STACK_NAME}.app.version=v2.4.9-be23e1f6"
networks: networks:
proxy: proxy:
external: true external: true
@ -53,5 +58,9 @@ configs:
name: ${STACK_NAME}_file_provider_yml_${FILE_PROVIDER_YML_VERSION} name: ${STACK_NAME}_file_provider_yml_${FILE_PROVIDER_YML_VERSION}
file: file-provider.yml.tmpl file: file-provider.yml.tmpl
template_driver: golang template_driver: golang
entrypoint:
name: ${STACK_NAME}_entrypoint_${ENTRYPOINT_VERSION}
file: entrypoint.sh.tmpl
template_driver: golang
volumes: volumes:
letsencrypt: letsencrypt:

14
entrypoint.sh.tmpl Normal file
View File

@ -0,0 +1,14 @@
#!/bin/sh
set -e
{{ if eq (env "OVH_ENABLED") "1" }}
export OVH_CONSUMER_KEY=$(cat "$OVH_CONSUMER_KEY_FILE")
export OVH_APPLICATION_SECRET=$(cat "$OVH_APPLICATION_SECRET_FILE")
{{ end }}
{{ if eq (env "GANDI_ENABLED") "1" }}
export GANDIV5_API_KEY=$(cat "$GANDIV5_API_KEY_FILE")
{{ end }}
/entrypoint.sh "$@"

View File

@ -48,6 +48,12 @@ entrypoints:
mssql: mssql:
address: ":1433" address: ":1433"
{{ end }} {{ end }}
{{ if eq (env "MUMBLE_ENABLED") "1" }}
mumble:
address: ":64738"
mumble-udp:
address: ":64738/udp"
{{ end }}
ping: ping:
entryPoint: web entryPoint: web
@ -60,9 +66,23 @@ certificatesResolvers:
caServer: "https://acme-staging-v02.api.letsencrypt.org/directory" caServer: "https://acme-staging-v02.api.letsencrypt.org/directory"
httpChallenge: httpChallenge:
entryPoint: web entryPoint: web
{{ if eq (env "LETS_ENCRYPT_DNS_CHALLENGE_ENABLED") "1" }}
dnsChallenge:
provider: {{ (env "LETS_ENCRYPT_DNS_CHALLENGE_PROVIDER") }}
resolvers:
- "1.1.1.1:53"
- "8.8.8.8:53"
{{ end }}
production: production:
acme: acme:
email: {{ env "LETS_ENCRYPT_EMAIL" }} email: {{ env "LETS_ENCRYPT_EMAIL" }}
storage: /etc/letsencrypt/production-acme.json storage: /etc/letsencrypt/production-acme.json
httpChallenge: httpChallenge:
entryPoint: web entryPoint: web
{{ if eq (env "LETS_ENCRYPT_DNS_CHALLENGE_ENABLED") "1" }}
dnsChallenge:
provider: {{ (env "LETS_ENCRYPT_DNS_CHALLENGE_PROVIDER") }}
resolvers:
- "1.1.1.1:53"
- "8.8.8.8:53"
{{ end }}