55 Commits

Author SHA1 Message Date
d164d2870e Add support for porkbun (#91)
* [x] I have deployed and tested my changes
LetsEncrypt challenges pass successfully, wildcard cert retrieved
* [x] I have [updated relevant versions in `abra.sh`](https://docs.coopcloud.tech/maintainers/upgrade/#updating-versions-in-the-abrash)
No relevant versions to update
* [x] I have made my environment variable changes [backwards compatible](https://docs.coopcloud.tech/maintainers/upgrade/#backwards-compatible-environment-variable-changes)
Only added new env vars
* [ ] I have added a [release note entry](https://docs.coopcloud.tech/maintainers/upgrade/#creating-new-release-notes)
The guide does not say how to do this

This is my first coopcloud PR, lmk if there is something glaring :)

Co-authored-by: Patrick Melanson <patrick.j.melanson@gmail.com>
Reviewed-on: coop-cloud/traefik#91
Reviewed-by: decentral1se <decentral1se@noreply.git.coopcloud.tech>
Reviewed-by: p4u1 <p4u1@noreply.git.coopcloud.tech>
Co-authored-by: moosemower <moose@resisttechmonopolies.online>
Co-committed-by: moosemower <moose@resisttechmonopolies.online>
2026-02-17 08:56:08 +00:00
b67ed0ca88 compose: Switch to host-mode port publishing by default (#88)
By default, swarm services use ingress mode port publishing, which is
not ideal for traefik (it breaks IPv6 ingress and there is no need to
load-balance traffic between multiple traefik instances or to route it
from multiple swarm nodes)

This PR switches traefik's port publishing mode to `host` for all of
its exposed ports as well as:

 * change traefik's update order to stop-first (there cannot be multiple
   containers exposing the same port when using host-mode publishing)
 * use `endpoint_mode: dnsrr` instead of the default `vip`
 * remove all overrides from `compose.host.yml`, leaving the file empty
   for backwards compatibility

/!\ This is a breaking change

Closes: #52

* [x] I have deployed and tested my changes
* [x] I have added a [release note entry](https://docs.coopcloud.tech/maintainers/upgrade/#creating-new-release-notes)

Reviewed-on: coop-cloud/traefik#88
Reviewed-by: p4u1 <p4u1@noreply.git.coopcloud.tech>
Reviewed-by: decentral1se <decentral1se@noreply.git.coopcloud.tech>
Co-authored-by: mirsal <mirsal@mirsal.fr>
Co-committed-by: mirsal <mirsal@mirsal.fr>
2026-02-15 18:19:19 +00:00
1ce9d9ca72 add onion support 2026-01-13 02:13:06 -05:00
ed257bd0b2 remove default TIMEOUT (abra #596) 2026-01-03 15:31:32 +01:00
f
92650aa12a feat: serve default robots txt 2025-12-26 13:40:51 -03:00
f
0e38a772e9 feat: anubis open graph cache 2025-12-26 13:29:05 -03:00
f
d05c81b4d7 feat: anubis 2025-12-24 16:27:05 -03:00
1acff756cc feat: support nextcloud talk high performance backend (#66)
This implements the high performance backend for Nextcloud Talk, which is nessecary if it needs to handle more people (video) calling.
More Details about it: https://nextcloud-talk.readthedocs.io/en/latest/quick-install/

The current implementation is sadly limited to be used once per host, so this might need some additional love in the future, if someone needs it more flexible.

The related Nextcloud PR: coop-cloud/nextcloud#56

Co-authored-by: Apfelwurm <Alexander@volzit.de>
Reviewed-on: coop-cloud/traefik#66
Co-authored-by: p4u1 <p4u1_f4u1@riseup.net>
Co-committed-by: p4u1 <p4u1_f4u1@riseup.net>
2025-12-23 13:25:15 +00:00
7e688c9094 feat: support UDP proxy of port 2022 and 2023 for P2Panda apps (#70)
# Support P2P communication between P2Panda Apps

Apps built with the set of [P2Panda](https://p2panda.org/) libraries perform P2P communication over two UDP ports. The default ports for these are 2022 and 2023.

There aren't really a lot (any?) P2Panda web apps out there, most are desktop or mobile apps.

So, this change is being specifically request by the [LoRes Tech](https://lores.tech/) project in order to support our [LoRes Node](https://github.com/local-resilience-tech/lores-node/) app. We have a recipe drafted for this [here](https://codeberg.org/lores/lores-node-coop-cloud-recipe) and we will push that to the catalogue once this change is in.

It seems better to make this kiwix change as general as possible, which is why we called the flag `P2PANDA_ENABLED` rather than `LORES_NODE_ENABLED`. In practice if there was a larger ecosystem of such apps, we'd probably need to make the actual port numbers configurable.

Reviewed-on: coop-cloud/traefik#70
Reviewed-by: p4u1 <p4u1@noreply.git.coopcloud.tech>
Co-authored-by: Jade Ambrose <jade@noreply.git.coopcloud.tech>
Co-committed-by: Jade Ambrose <jade@noreply.git.coopcloud.tech>
2025-12-22 12:37:50 +00:00
993ed9cf09 Garage support .env addition 2025-10-22 21:09:23 -04:00
7e7422a593 Expose LOG_MAX_AGE
Reviewed-on: coop-cloud/traefik#55
Reviewed-by: decentral1se <decentral1se@noreply.git.coopcloud.tech>
2025-08-28 18:05:27 +00:00
b8aa102a01 azure: update code to align with established conventions 2025-08-12 01:21:56 -07:00
c7e510fbad Added Azure DNS 01-Challenge support 2025-08-12 00:20:57 +00:00
01c5b2a3a4 Update to Traefik v3 2025-08-06 18:13:11 -04:00
3wc
8fbcab6bea Initial support for IRC, port 6697 2025-02-06 13:54:28 -05:00
ed0945f59f add backupbot label 2024-10-24 13:12:51 +02:00
e65bffe337 Update to handle gandiv5 personal access tokens 2024-10-03 19:40:34 -04:00
f
35d435b4f6 fix: the command is "secret" 2024-06-01 13:54:50 -03:00
3wc
e76d61be00 Add preliminary DigitalOcean DNS support 2024-04-06 15:00:06 -03:00
3wc
c558e1dbdb Ditch DISABLE_HTTPS_REDIRECT 2024-04-01 22:53:56 -03:00
3wc
edc29f9594 Add "web-alt" entrypoint (mostly for Icecast) 2024-04-01 19:49:23 -03:00
3wc
f7f77dc942 Add support for unencrypted HTTP apps (please don't use this 😢) 2024-03-30 17:59:48 -03:00
998190f684 feat: add distinct version for wildcard key secret 2024-01-11 21:47:50 -05:00
cd92c909ba docs: correct secret insertion examples 2024-01-11 21:47:04 -05:00
3c5333ba71 feat: add support for wildcard certs via secrets 2024-01-11 21:45:05 -05:00
c9d80df34d feat: enable public facing metrics 2023-05-25 13:34:34 +02:00
e2c16be2ff feat: adds basic auth middleware 2023-05-10 15:35:52 +02:00
b00a65a890 feat: routing bare metal 2023-04-20 21:19:47 +02:00
8bb3adba81 add auto update and timeout env 2023-04-18 18:26:15 +02:00
3wc
a1e75e8c8b Revert to traefik.example.com templating 2022-11-16 20:35:34 -08:00
df49a1f3b2 use domain env var 2022-03-27 21:12:16 +02:00
3wc
099dcfaed0 Add compy support 2022-03-26 23:49:10 +02:00
1d7542cd5f fix: drop minio config changes for now
New version is hard to config, unsure if this is needed.
2022-01-06 11:12:47 +01:00
29f90fe409 feat: minio port 2022-01-06 09:50:35 +01:00
612d0cc6cc feat: matrix federation 2021-12-13 13:56:36 +01:00
3wc
556c448c05 Align traefik-forward-auth 2nd var name with existing 2021-11-23 12:40:17 +02:00
3wc
26fcaaea69 Add a slot for a second traefik-forward-auth instance 2021-11-23 12:40:17 +02:00
3wc
8e91a5a3ee Minuscule .env tweak 2021-10-14 00:44:40 +02:00
3048d09cd8 fix: support configurable tfa service 2021-10-14 00:43:56 +02:00
fc5aa70d27 Allow prometheus metrics collection
This patch adds a METRICS_ENABLED configuration variables which,
when switched on, defines a metrics entrypoint and enables the
built-in prometheus metrics exporter. This allows the monitoring
stack to collect and show traefik metrics
2021-08-09 23:28:15 +00:00
3wc
baba7ff87d Add default COMPOSE_FILE 2021-08-07 19:49:29 +02:00
3wc
e856591c97 COMPOSE_FILE=$COMPOSE_FILE:, to combine 'em easier
Thanks, @mirsal
2021-08-07 17:03:52 +02:00
3wc
8bcd8f054e Add missing Mumble vars to .env.sample 2021-08-07 17:03:20 +02:00
3wc
46010aeb95 Enable Gandi DNS challenge for Letsencrypt 2021-07-18 16:30:22 +02:00
ef443bae50 Add "headless mode" config
Closes https://git.autonomic.zone/coop-cloud/traefik/issues/24.
2021-06-27 20:17:41 +02:00
7258b129c4 Support OVH configuration
See https://github.com/Autonomic-Cooperative/traefik/pull/1.
2021-06-10 12:36:54 +02:00
2c81622d9a add support for Let's Encrypt DNS-01 challenge (for wildcard domains)
start with support for OVH provider, but in a way for others to be added in the future:

https://doc.traefik.io/traefik/https/acme/#dnschallenge
2021-06-10 14:53:17 +12:00
2c745416fc Support mssql host mode connections 2021-06-07 09:42:50 +02:00
3wc
8d309bc7bf Entrypoint for SSB MUXRPC 2021-06-05 14:23:58 +02:00
9a1dd29d01 Add RTMP optional port setup 2021-05-10 12:58:10 +02:00