--- version: "3.8" services: api: image: vikunja/api environment: - DOMAIN - LOG_LEVEL volumes: - files:/app/vikunja/files networks: - proxy - internal secrets: - jwt_secret - db_password configs: - source: config_yml target: /app/vikunja/config.yml deploy: restart_policy: condition: on-failure labels: - "traefik.enable=true" - "traefik.http.services.${STACK_NAME}_api.loadbalancer.server.port=3456" - "traefik.http.routers.${STACK_NAME}_api.rule=Host(`${DOMAIN}`) && PathPrefix(`/api/v1`, `/dav/`, `/.well-known/`)" - "traefik.http.routers.${STACK_NAME}_api.entrypoints=web-secure" - "traefik.http.routers.${STACK_NAME}_api.tls.certresolver=${LETS_ENCRYPT_ENV}" app: image: vikunja/frontend networks: - proxy deploy: restart_policy: condition: on-failure labels: - "traefik.enable=true" - "traefik.http.services.${STACK_NAME}.loadbalancer.server.port=80" - "traefik.http.routers.${STACK_NAME}.rule=Host(`${DOMAIN}`)" - "traefik.http.routers.${STACK_NAME}.entrypoints=web-secure" - "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}" - "coop-cloud.${STACK_NAME}.version=" healthcheck: test: [ "CMD", "curl", "-f", "http://localhost" ] interval: 30s timeout: 10s retries: 10 start_period: 1m redis: image: redis networks: - internal db: image: postgres:13 environment: POSTGRES_PASSWORD_FILE: /run/secrets/db_password POSTGRES_USER: vikunja POSTGRES_DB: vikunja volumes: - db:/var/lib/postgresql/data healthcheck: test: [ "CMD", "pg_isready", "-U", "vikunja" ] networks: - internal secrets: - db_password deploy: restart_policy: condition: on-failure labels: backupbot.backup: "true" backupbot.backup.pre-hook: "mkdir -p /tmp/backup/ && PGPASSWORD=$$(cat $${POSTGRES_PASSWORD_FILE}) pg_dump -U $${POSTGRES_USER} $${POSTGRES_DB} > /tmp/backup/backup.sql" backupbot.backup.post-hook: "rm -rf /tmp/backup" backupbot.backup.path: "/tmp/backup/" volumes: files: db: networks: proxy: external: true internal: configs: config_yml: name: ${STACK_NAME}_config_yml_${CONFIG_YML_VERSION} file: config.yml.tmpl template_driver: golang secrets: db_password: external: true name: ${STACK_NAME}_db_password_${SECRET_DB_PASSWORD_VERSION} jwt_secret: external: true name: ${STACK_NAME}_jwt_secret_${SECRET_JWT_SECRET_VERSION}