Removing abra bloatware 😜

This commit is contained in:
Christian Galo 2023-07-14 21:26:07 +00:00
parent 8d926529c5
commit 3108529953
6 changed files with 12 additions and 69 deletions

View File

@ -1,14 +0,0 @@
---
version: "3.8"
services:
app:
deploy:
update_config:
failure_action: rollback
order: start-first
labels:
- "traefik.enable=true"
- "traefik.http.services.traefik.loadbalancer.server.port=web"
- "traefik.http.routers.traefik.entrypoints=web-secure"
- "traefik.http.routers.traefik.service=api@internal"

View File

@ -1,15 +0,0 @@
---
version: "3.8"
services:
app:
deploy:
update_config:
order: stop-first
ports:
- target: 80
published: 80
mode: host
- target: 443
published: 443
mode: host

View File

@ -1,9 +0,0 @@
---
version: "3.8"
services:
app:
environment:
- SMTP_ENABLED
ports:
- "587:587"

View File

@ -2,8 +2,12 @@ services:
app:
image: "traefik:v2.10.1"
ports:
# HTTP
- "80:80"
# HTTPS
- "443:443"
# SMTP
- "587:587"
volumes:
- "/var/run/docker.sock:/var/run/docker.sock"
- "letsencrypt:/etc/letsencrypt"
@ -12,9 +16,6 @@ services:
target: /etc/traefik/traefik.yml
- source: file_provider_yml
target: /etc/traefik/file-provider.yml
- source: entrypoint
target: /custom-entrypoint.sh
mode: 0555
networks:
- proxy
environment:
@ -27,7 +28,6 @@ services:
retries: 10
start_period: 1m
command: traefik
entrypoint: /custom-entrypoint.sh
deploy:
update_config:
failure_action: rollback
@ -41,7 +41,6 @@ services:
- "traefik.http.routers.traefik.tls.options=default@file"
- "traefik.http.routers.traefik.service=api@internal"
- "traefik.http.routers.traefik.middlewares=security@file"
- "coop-cloud.${STACK_NAME}.version=1.1.1+v2.8.1"
networks:
proxy:
@ -56,10 +55,6 @@ configs:
name: ${STACK_NAME}_file_provider_yml_${FILE_PROVIDER_YML_VERSION}
file: file-provider.yml.tmpl
template_driver: golang
entrypoint:
name: ${STACK_NAME}_entrypoint_${ENTRYPOINT_VERSION}
file: entrypoint.sh.tmpl
template_driver: golang
volumes:
letsencrypt:

View File

@ -1,14 +0,0 @@
#!/bin/sh
set -e
{{ if eq (env "OVH_ENABLED") "1" }}
export OVH_CONSUMER_KEY=$(cat "$OVH_CONSUMER_KEY_FILE")
export OVH_APPLICATION_SECRET=$(cat "$OVH_APPLICATION_SECRET_FILE")
{{ end }}
{{ if eq (env "GANDI_ENABLED") "1" }}
export GANDIV5_API_KEY=$(cat "$GANDIV5_API_KEY_FILE")
{{ end }}
/entrypoint.sh "$@"

View File

@ -9,14 +9,14 @@ http:
authResponseHeaders:
- X-Forwarded-User
{{ end }}
{{ if eq (env "KEYCLOAK_MIDDLEWARE_2_ENABLED") "1" }}
keycloak2:
forwardAuth:
address: "http://{{ env "KEYCLOAK_TFA_SERVICE_2" }}:4181"
trustForwardHeader: true
authResponseHeaders:
- X-Forwarded-User
{{ end }}
# {{ if eq (env "KEYCLOAK_MIDDLEWARE_2_ENABLED") "1" }}
# keycloak2:
# forwardAuth:
# address: "http://{{ env "KEYCLOAK_TFA_SERVICE_2" }}:4181"
# trustForwardHeader: true
# authResponseHeaders:
# - X-Forwarded-User
# {{ end }}
security:
headers:
frameDeny: true