Compare commits
	
		
			29 Commits
		
	
	
		
			feature/v3
			...
			revert-log
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 5e4ba7f327 | |||
| e21dbc655a | |||
| b9d825b5c5 | |||
| 74b3ee6716 | |||
| 14d5d79520 | |||
| 7185e6ab43 | |||
| 85d0c159b0 | |||
| 6294944952 | |||
| b5824c89f1 | |||
| 9c924f5d67 | |||
| ed0945f59f | |||
| 0fac81d4e2 | |||
| c8894b7ee7 | |||
| e65bffe337 | |||
| 8cce1b7ff7 | |||
| b9cbc9ba92 | |||
| d5f36255fe | |||
| b836d441f5 | |||
| 8de23fd652 | |||
| 6133be7830 | |||
| 5803d05532 | |||
| 0ace5037db | |||
| 9e2d000d12 | |||
| d4f1c6b45c | |||
| ca989e903c | |||
| 50cdb20a39 | |||
| 60b79b447a | |||
| f1b52916df | |||
| 35d435b4f6 | 
| @ -16,9 +16,9 @@ steps: | |||||||
|       STACK_NAME: traefik |       STACK_NAME: traefik | ||||||
|       LETS_ENCRYPT_ENV: production |       LETS_ENCRYPT_ENV: production | ||||||
|       LETS_ENCRYPT_EMAIL: helo@autonomic.zone |       LETS_ENCRYPT_EMAIL: helo@autonomic.zone | ||||||
|       TRAEFIK_YML_VERSION: v5 |       TRAEFIK_YML_VERSION: v21 | ||||||
|       FILE_PROVIDER_YML_VERSION: v4 |       FILE_PROVIDER_YML_VERSION: v10 | ||||||
|       ENTRYPOINT_VERSION: v1 |       ENTRYPOINT_VERSION: v4 | ||||||
| trigger: | trigger: | ||||||
|   branch: |   branch: | ||||||
|     - master |     - master | ||||||
|  | |||||||
							
								
								
									
										16
									
								
								.env.sample
									
									
									
									
									
								
							
							
						
						
									
										16
									
								
								.env.sample
									
									
									
									
									
								
							| @ -1,6 +1,7 @@ | |||||||
| TYPE=traefik | TYPE=traefik | ||||||
| TIMEOUT=300 | TIMEOUT=300 | ||||||
| ENABLE_AUTO_UPDATE=true | ENABLE_AUTO_UPDATE=true | ||||||
|  | ENABLE_BACKUPS=true | ||||||
|  |  | ||||||
| DOMAIN=traefik.example.com | DOMAIN=traefik.example.com | ||||||
| LETS_ENCRYPT_ENV=production | LETS_ENCRYPT_ENV=production | ||||||
| @ -9,6 +10,7 @@ LETS_ENCRYPT_EMAIL=certs@example.com | |||||||
| # DASHBOARD_ENABLED=true | # DASHBOARD_ENABLED=true | ||||||
| # WARN, INFO etc. | # WARN, INFO etc. | ||||||
| LOG_LEVEL=WARN | LOG_LEVEL=WARN | ||||||
|  | LOG_MAX_AGE=0 | ||||||
|  |  | ||||||
| # This is here so later lines can extend it; you likely don't wanna edit | # This is here so later lines can extend it; you likely don't wanna edit | ||||||
| COMPOSE_FILE="compose.yml" | COMPOSE_FILE="compose.yml" | ||||||
| @ -42,10 +44,16 @@ COMPOSE_FILE="compose.yml" | |||||||
|  |  | ||||||
| ## Gandi, https://gandi.net | ## Gandi, https://gandi.net | ||||||
| ## note(3wc): only "V5" (new) API is supported, so far | ## note(3wc): only "V5" (new) API is supported, so far | ||||||
| #COMPOSE_FILE="$COMPOSE_FILE:compose.gandi.yml" | #COMPOSE_FILE="$COMPOSE_FILE:compose.gandi-api-key.yml" | ||||||
| #GANDI_ENABLED=1 | #GANDI_API_KEY_ENABLED=1 | ||||||
| #SECRET_GANDIV5_API_KEY_VERSION=v1 | #SECRET_GANDIV5_API_KEY_VERSION=v1 | ||||||
|  |  | ||||||
|  | ## Gandi, https://gandi.net | ||||||
|  | ## note: uses GandiV5 Personal Access Token | ||||||
|  | #COMPOSE_FILE="$COMPOSE_FILE:compose.gandi-personal-access-token.yml" | ||||||
|  | #GANDI_PERSONAL_ACCESS_TOKEN_ENABLED=1 | ||||||
|  | #SECRET_GANDIV5_PERSONAL_ACCESS_TOKEN_VERSION=v1 | ||||||
|  |  | ||||||
| ## DigitalOcean, https://digitalocean.com | ## DigitalOcean, https://digitalocean.com | ||||||
| #COMPOSE_FILE="$COMPOSE_FILE:compose.digitalocean.yml" | #COMPOSE_FILE="$COMPOSE_FILE:compose.digitalocean.yml" | ||||||
| #DIGITALOCEAN_ENABLED=1 | #DIGITALOCEAN_ENABLED=1 | ||||||
| @ -57,8 +65,8 @@ COMPOSE_FILE="compose.yml" | |||||||
|  |  | ||||||
| # Set wildcards = 1, and uncomment compose_file to enable. | # Set wildcards = 1, and uncomment compose_file to enable. | ||||||
| # Create your certs elsewhere and add them like: | # Create your certs elsewhere and add them like: | ||||||
| # abra app secrets insert {myapp.example.coop} ssl_cert v1 "$(cat /path/to/fullchain.pem)" | # abra app secret insert {myapp.example.coop} ssl_cert v1 "$(cat /path/to/fullchain.pem)" | ||||||
| # abra app secrets insert {myapp.example.coop} ssl_key v1 "$(cat /path/to/privkey.pem)" | # abra app secret insert {myapp.example.coop} ssl_key v1 "$(cat /path/to/privkey.pem)" | ||||||
| #WILDCARDS_ENABLED=1 | #WILDCARDS_ENABLED=1 | ||||||
| #SECRET_WILDCARD_CERT_VERSION=v1 | #SECRET_WILDCARD_CERT_VERSION=v1 | ||||||
| #SECRET_WILDCARD_KEY_VERSION=v1 | #SECRET_WILDCARD_KEY_VERSION=v1 | ||||||
|  | |||||||
| @ -40,8 +40,10 @@ Letsencrypt DNS challenges. | |||||||
|    `SECRET_GANDIV5_API_KEY_VERSION` |    `SECRET_GANDIV5_API_KEY_VERSION` | ||||||
| 4. Generate an API key for your provider | 4. Generate an API key for your provider | ||||||
| 5. Run `abra app secret insert YOURAPPDOMAIN SECRETNAME v1 SECRETVALUE`, where | 5. Run `abra app secret insert YOURAPPDOMAIN SECRETNAME v1 SECRETVALUE`, where | ||||||
|    `SECRETNAME` is from the compose file (e.g. `compose.gandi.yml`) e.g. |    `SECRETNAME` is from the compose file (e.g. `compose.gandi-api-key.yml`) e.g. | ||||||
|    `gandiv5_api_key` and `SECRETVALUE` is the API key. |    `gandiv5_api_key` and `SECRETVALUE` is the API key. | ||||||
|  |    - For Gandi, you can use either the deprecated API Key or a GandiV5 Personal | ||||||
|  |      Access Token, in which case use compose.gandi-personal-access-token.yml. | ||||||
| 6. Redeploy Traefik, using e.g. `abra app deploy YOURAPPDOMAIN -f` | 6. Redeploy Traefik, using e.g. `abra app deploy YOURAPPDOMAIN -f` | ||||||
|  |  | ||||||
| [`abra`]: https://git.autonomic.zone/autonomic-cooperative/abra | [`abra`]: https://git.autonomic.zone/autonomic-cooperative/abra | ||||||
|  | |||||||
							
								
								
									
										4
									
								
								abra.sh
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								abra.sh
									
									
									
									
									
								
							| @ -1,3 +1,3 @@ | |||||||
| export TRAEFIK_YML_VERSION=v20 | export TRAEFIK_YML_VERSION=v22 | ||||||
| export FILE_PROVIDER_YML_VERSION=v10 | export FILE_PROVIDER_YML_VERSION=v10 | ||||||
| export ENTRYPOINT_VERSION=v3 | export ENTRYPOINT_VERSION=v4 | ||||||
|  | |||||||
							
								
								
									
										4
									
								
								alaconnect.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										4
									
								
								alaconnect.yml
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,4 @@ | |||||||
|  | matrix-synapse: | ||||||
|  |     uncomment: | ||||||
|  |         - compose.matrix.yml | ||||||
|  |         - MATRIX_FEDERATION_ENABLED | ||||||
							
								
								
									
										15
									
								
								compose.gandi-personal-access-token.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										15
									
								
								compose.gandi-personal-access-token.yml
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,15 @@ | |||||||
|  | version: "3.8" | ||||||
|  |  | ||||||
|  | services: | ||||||
|  |   app: | ||||||
|  |     environment: | ||||||
|  |       - GANDIV5_PERSONAL_ACCESS_TOKEN_FILE=/run/secrets/gandiv5_pat | ||||||
|  |       - LETS_ENCRYPT_DNS_CHALLENGE_ENABLED | ||||||
|  |       - LETS_ENCRYPT_DNS_CHALLENGE_PROVIDER | ||||||
|  |     secrets: | ||||||
|  |       - gandiv5_pat | ||||||
|  |  | ||||||
|  | secrets: | ||||||
|  |   gandiv5_pat: | ||||||
|  |     name: ${STACK_NAME}_gandiv5_pat_${SECRET_GANDIV5_PERSONAL_ACCESS_TOKEN_VERSION} | ||||||
|  |     external: true | ||||||
							
								
								
									
										44
									
								
								compose.yml
									
									
									
									
									
								
							
							
						
						
									
										44
									
								
								compose.yml
									
									
									
									
									
								
							| @ -3,7 +3,7 @@ version: "3.8" | |||||||
|  |  | ||||||
| services: | services: | ||||||
|   app: |   app: | ||||||
|     image: "traefik:v2.11.2" |     image: "traefik:v2.11.14" | ||||||
|     # Note(decentral1se): *please do not* add any additional ports here. |     # Note(decentral1se): *please do not* add any additional ports here. | ||||||
|     # Doing so could break new installs with port conflicts. Please use |     # Doing so could break new installs with port conflicts. Please use | ||||||
|     # the usual `compose.$app.yml` approach for any additional ports |     # the usual `compose.$app.yml` approach for any additional ports | ||||||
| @ -11,7 +11,6 @@ services: | |||||||
|       - "80:80" |       - "80:80" | ||||||
|       - "443:443" |       - "443:443" | ||||||
|     volumes: |     volumes: | ||||||
|       - "/var/run/docker.sock:/var/run/docker.sock" |  | ||||||
|       - "letsencrypt:/etc/letsencrypt" |       - "letsencrypt:/etc/letsencrypt" | ||||||
|       - "file-providers:/etc/traefik/file-providers" |       - "file-providers:/etc/traefik/file-providers" | ||||||
|     configs: |     configs: | ||||||
| @ -24,9 +23,11 @@ services: | |||||||
|         mode: 0555 |         mode: 0555 | ||||||
|     networks: |     networks: | ||||||
|       - proxy |       - proxy | ||||||
|  |       - internal | ||||||
|     environment: |     environment: | ||||||
|       - DASHBOARD_ENABLED |       - DASHBOARD_ENABLED | ||||||
|       - LOG_LEVEL |       - LOG_LEVEL | ||||||
|  |       - LOG_MAX_AGE=${LOG_MAX_AGE:0} | ||||||
|     healthcheck: |     healthcheck: | ||||||
|       test: ["CMD", "traefik", "healthcheck"] |       test: ["CMD", "traefik", "healthcheck"] | ||||||
|       interval: 30s |       interval: 30s | ||||||
| @ -47,12 +48,49 @@ services: | |||||||
|         - "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}" |         - "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}" | ||||||
|         - "traefik.http.routers.${STACK_NAME}.service=api@internal" |         - "traefik.http.routers.${STACK_NAME}.service=api@internal" | ||||||
|         - "traefik.http.routers.${STACK_NAME}.middlewares=security@file" |         - "traefik.http.routers.${STACK_NAME}.middlewares=security@file" | ||||||
|         - "coop-cloud.${STACK_NAME}.version=2.6.3+v2.11.2" |         - "coop-cloud.${STACK_NAME}.version=3.1.0+v2.11.14" | ||||||
|         - "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}" |         - "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}" | ||||||
|  |         - "backupbot.backup=${ENABLE_BACKUPS:-true}" | ||||||
|  |  | ||||||
|  |   socket-proxy: | ||||||
|  |     image: lscr.io/linuxserver/socket-proxy:1.26.2-r0-ls30 | ||||||
|  |     environment: | ||||||
|  |       - ALLOW_START=0 | ||||||
|  |       - ALLOW_STOP=0 | ||||||
|  |       - ALLOW_RESTARTS=0 | ||||||
|  |       - AUTH=0 | ||||||
|  |       - BUILD=0 | ||||||
|  |       - COMMIT=0 | ||||||
|  |       - CONFIGS=0 | ||||||
|  |       - CONTAINERS=1 # Needs access | ||||||
|  |       - DISABLE_IPV6=0 | ||||||
|  |       - DISTRIBUTION=0 | ||||||
|  |       - EVENTS=1 # Needs access | ||||||
|  |       - EXEC=0 | ||||||
|  |       - IMAGES=0 | ||||||
|  |       - INFO=0 | ||||||
|  |       - NETWORKS=1 # Needs access | ||||||
|  |       - NODES=0 | ||||||
|  |       - PING=0 | ||||||
|  |       - POST=0 | ||||||
|  |       - PLUGINS=0 | ||||||
|  |       - SECRETS=0 | ||||||
|  |       - SERVICES=1 # Needs access | ||||||
|  |       - SESSION=0 | ||||||
|  |       - SWARM=0 | ||||||
|  |       - SYSTEM=0 | ||||||
|  |       - TASKS=1 # Needs access | ||||||
|  |       - VERSION=1 # Needs access | ||||||
|  |       - VOLUMES=0 | ||||||
|  |     volumes: | ||||||
|  |       - /var/run/docker.sock:/var/run/docker.sock:ro | ||||||
|  |     networks: | ||||||
|  |       - internal | ||||||
|  |  | ||||||
| networks: | networks: | ||||||
|   proxy: |   proxy: | ||||||
|     external: true |     external: true | ||||||
|  |   internal: | ||||||
|  |  | ||||||
| configs: | configs: | ||||||
|   traefik_yml: |   traefik_yml: | ||||||
|  | |||||||
| @ -7,10 +7,6 @@ export OVH_CONSUMER_KEY=$(cat "$OVH_CONSUMER_KEY_FILE") | |||||||
| export OVH_APPLICATION_SECRET=$(cat "$OVH_APPLICATION_SECRET_FILE") | export OVH_APPLICATION_SECRET=$(cat "$OVH_APPLICATION_SECRET_FILE") | ||||||
| {{ end }} | {{ end }} | ||||||
|  |  | ||||||
| {{ if eq (env "GANDI_ENABLED") "1" }} |  | ||||||
| export GANDIV5_API_KEY=$(cat "$GANDIV5_API_KEY_FILE") |  | ||||||
| {{ end }} |  | ||||||
|  |  | ||||||
| {{ if eq (env "DIGITALOCEAN_ENABLED") "1" }} | {{ if eq (env "DIGITALOCEAN_ENABLED") "1" }} | ||||||
| export DO_AUTH_TOKEN=$(cat "$DO_AUTH_TOKEN_FILE") | export DO_AUTH_TOKEN=$(cat "$DO_AUTH_TOKEN_FILE") | ||||||
| {{ end }} | {{ end }} | ||||||
|  | |||||||
							
								
								
									
										1
									
								
								release/2.8.0+v2.11.10
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								release/2.8.0+v2.11.10
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1 @@ | |||||||
|  | Important Security Update! https://nvd.nist.gov/vuln/detail/CVE-2024-45410 | ||||||
							
								
								
									
										1
									
								
								release/2.9.0+v2.11.14
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								release/2.9.0+v2.11.14
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1 @@ | |||||||
|  | Closes Security Issue https://github.com/traefik/traefik/security/advisories/GHSA-h924-8g65-j9wg | ||||||
							
								
								
									
										1
									
								
								release/3.1.0+v2.11.14
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								release/3.1.0+v2.11.14
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1 @@ | |||||||
|  | Adds log retention configuration option | ||||||
| @ -1,10 +1,12 @@ | |||||||
| --- | --- | ||||||
| log: | log: | ||||||
|   level: {{ env "LOG_LEVEL" }} |   level: {{ env "LOG_LEVEL" }} | ||||||
|  |   maxAge: {{ env "LOG_MAX_AGE" }} | ||||||
|  |  | ||||||
|  |  | ||||||
| providers: | providers: | ||||||
|   docker: |   docker: | ||||||
|     endpoint: "unix:///var/run/docker.sock" |     endpoint: "tcp://socket-proxy:2375" | ||||||
|     exposedByDefault: false |     exposedByDefault: false | ||||||
|     network: proxy |     network: proxy | ||||||
|     swarmMode: true |     swarmMode: true | ||||||
|  | |||||||
		Reference in New Issue
	
	Block a user
	