diff --git a/traefik.stream-test.coopcloud.tech.env b/traefik.stream-test.coopcloud.tech.env new file mode 100644 index 0000000..caf0414 --- /dev/null +++ b/traefik.stream-test.coopcloud.tech.env @@ -0,0 +1,137 @@ +TYPE=traefik +TIMEOUT=300 +ENABLE_AUTO_UPDATE=true + +DOMAIN=traefik.stream-test.coopcloud.tech +LETS_ENCRYPT_ENV=production + +LETS_ENCRYPT_EMAIL=certs@coopcloud.tech +# DASHBOARD_ENABLED=true +# WARN, INFO etc. +LOG_LEVEL=WARN + +# This is here so later lines can extend it; you likely don't wanna edit +COMPOSE_FILE="compose.yml" + +##################################################################### +# General settings # +##################################################################### + +## Host-mode networking +#COMPOSE_FILE="$COMPOSE_FILE:compose.host.yml" + +## "Headless mode" (no domain configured) +#COMPOSE_FILE="$COMPOSE_FILE:compose.headless.yml" + +##################################################################### +# Automatic DNS set-up for Letsencrypt # +##################################################################### + +## Enable dns challenge (for wildcard domains) +## https://doc.traefik.io/traefik/https/acme/#dnschallenge +#LETS_ENCRYPT_DNS_CHALLENGE_ENABLED=1 +#LETS_ENCRYPT_DNS_CHALLENGE_PROVIDER=ovh + +## OVH, https://ovh.com +#COMPOSE_FILE="$COMPOSE_FILE:compose.ovh.yml" +#OVH_ENABLED=1 +#OVH_APPLICATION_KEY= +#OVH_ENDPOINT= +#SECRET_OVH_APP_SECRET_VERSION=v1 +#SECRET_OVH_CONSUMER_KEY=v1 + +## Gandi, https://gandi.net +## note(3wc): only "V5" (new) API is supported, so far +#COMPOSE_FILE="$COMPOSE_FILE:compose.gandi.yml" +#GANDI_ENABLED=1 +#SECRET_GANDIV5_API_KEY_VERSION=v1 + +##################################################################### +# Manual wildcard certificate insertion # +##################################################################### + +# Set wildcards = 1, and uncomment compose_file to enable. +# Create your certs elsewhere and add them like: +# abra app secrets insert {myapp.example.coop} ssl_cert v1 "$(cat /path/to/fullchain.pem)" +# abra app secrets insert {myapp.example.coop} ssl_key v1 "$(cat /path/to/privkey.pem)" +#WILDCARDS_ENABLED=1 +#SECRET_WILDCARD_CERT_VERSION=v1 +#SECRET_WILDCARD_KEY_VERSION=v1 +#COMPOSE_FILE="$COMPOSE_FILE:compose.wildcard.yml" + +##################################################################### +# Keycloak log-in # +##################################################################### + +## Enable Keycloak +#COMPOSE_FILE="$COMPOSE_FILE:compose.keycloak.yml" +#KEYCLOAK_MIDDLEWARE_ENABLED=1 +#KEYCLOAK_TFA_SERVICE=traefik-forward-auth_app +#KEYCLOAK_MIDDLEWARE_2_ENABLED=1 +#KEYCLOAK_TFA_SERVICE_2=traefik-forward-auth_app + +##################################################################### +# Prometheus metrics # +##################################################################### + +## Enable prometheus metrics collection +## used used by the coop-cloud monitoring stack +#COMPOSE_FILE="$COMPOSE_FILE:compose.metrics.yml" +#METRICS_ENABLED=1 + +##################################################################### +# File provider directory configuration # +# (Route bare metal and non-docker services on the machine!) # +##################################################################### +#FILE_PROVIDER_DIRECTORY_ENABLED=1 + +##################################################################### +# Additional services # +##################################################################### + +## SMTP port 587 +#COMPOSE_FILE="$COMPOSE_FILE:compose.smtp.yml" +#SMTP_ENABLED=1 + +## Compy +#COMPOSE_FILE="$COMPOSE_FILE:compose.compy.yml" +#COMPY_ENABLED=1 + +## Gitea SSH +# COMPOSE_FILE="$COMPOSE_FILE:compose.gitea.yml" +# GITEA_SSH_ENABLED=1 + +## Foodsoft SMTP +# COMPOSE_FILE="$COMPOSE_FILE:compose.foodsoft.yml" +# FOODSOFT_SMTP_ENABLED=1 + +## Peertube RTMP +#COMPOSE_FILE="$COMPOSE_FILE:compose.peertube.yml" +#PEERTUBE_RTMP_ENABLED=1 + +## Secure Scuttlebutt MUXRPC +#COMPOSE_FILE="$COMPOSE_FILE:compose.ssb.yml" +#SSB_MUXRPC_ENABLED=1 + +## MSSQL +#COMPOSE_FILE="$COMPOSE_FILE:compose.mssql.yml" +#MSSQL_ENABLED=1 + +## Mumble +#COMPOSE_FILE="$COMPOSE_FILE:compose.mumble.yml" +#MUMBLE_ENABLED=1 + +## Matrix +#COMPOSE_FILE="$COMPOSE_FILE:compose.matrix.yml" +#MATRIX_FEDERATION_ENABLED=1 + +## BASIC_AUTH +## Use httpasswd to generate the secret +#COMPOSE_FILE="$COMPOSE_FILE:compose.basicauth.yml" +#BASIC_AUTH=1 +#SECRET_USERSFILE_VERSION=v1 + +##################################################################### +# Extremely insecure options, do not use # +##################################################################### +#DISABLE_HTTPS_REDIRECT=1 diff --git a/whoami.stream-test.coopcloud.tech.env b/whoami.stream-test.coopcloud.tech.env new file mode 100644 index 0000000..ede8a1b --- /dev/null +++ b/whoami.stream-test.coopcloud.tech.env @@ -0,0 +1,8 @@ +TYPE=container + +DOMAIN=whoami.stream-test.coopcloud.tech +LETS_ENCRYPT_ENV=production + +PORT=80 + +IMAGE=traefik/whoami:v1.10