Compare commits
24 Commits
3a6bfa0854
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
| dde45742e1 | |||
| 0b93862185 | |||
| d5e8a573ad | |||
| 36b949d9c7 | |||
| 5a495cb8ee | |||
| 3e30c33fbe | |||
| b0a4f23cad | |||
| d02148af76 | |||
| a150527d95 | |||
| b8a5345d68 | |||
| 8dfe1a8310 | |||
| f649d4dcb7 | |||
| 26fcb257d5 | |||
| 6a47ec2ed6 | |||
| 08a1882232 | |||
| f5bccb9f3b | |||
| 05e0febeb4 | |||
| 0055e31123 | |||
| 76cdb88226 | |||
| 51edbebf28 | |||
| 1a75b85508 | |||
| ecbb8d0da4 | |||
| 8b634466b2 | |||
| a22e1307ae |
43
.gitea/workflows/deploy.yml
Normal file
43
.gitea/workflows/deploy.yml
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
name: Deploy All Stacks to Swarm
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
workflow_dispatch:
|
||||||
|
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
deploy:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout repository
|
||||||
|
uses: actions/checkout@v3
|
||||||
|
|
||||||
|
- name: Deploy remaining stacks
|
||||||
|
run: |
|
||||||
|
for stack_file in *-stack.yml; do
|
||||||
|
stack_name="${stack_file%-stack.yml}"
|
||||||
|
# Skip traefik, git-runner (deploy those manually)
|
||||||
|
if [[ "$stack_name" != "traefik" && "$stack_name" != "git-runner" ]]; then
|
||||||
|
echo "🚀 Deploying ${stack_name}..."
|
||||||
|
docker stack deploy -c "$stack_file" "$stack_name" --prune --with-registry-auth
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
- name: Deploy remaining stacks
|
||||||
|
run: |
|
||||||
|
for stack_file in *-stack.yml; do
|
||||||
|
stack_name="${stack_file%-stack.yml}"
|
||||||
|
# Skip if already deployed
|
||||||
|
if [[ "$stack_name" != "traefik" && "$stack_name" != "git-runner" ]]; then
|
||||||
|
echo "🚀 Deploying ${stack_name}..."
|
||||||
|
docker stack deploy -c "$stack_file" "$stack_name" --prune --with-registry-auth
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
- name: List deployed stacks
|
||||||
|
run: |
|
||||||
|
echo ""
|
||||||
|
echo "📋 All deployed stacks:"
|
||||||
|
docker stack ls
|
||||||
32
.vscode/setting.json
vendored
32
.vscode/setting.json
vendored
@@ -1,32 +0,0 @@
|
|||||||
{
|
|
||||||
"files.associations": {
|
|
||||||
"*.yml": "yaml",
|
|
||||||
"*.yaml": "yaml",
|
|
||||||
"docker-compose*.yml": "yaml",
|
|
||||||
"stack.yml": "yaml"
|
|
||||||
},
|
|
||||||
"yaml.schemas": {
|
|
||||||
"https://raw.githubusercontent.com/compose-spec/compose-spec/master/schema/compose-spec.json": [
|
|
||||||
"docker-compose*.yml",
|
|
||||||
"**/stacks/**/stack.yml"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"yaml.format.enable": true,
|
|
||||||
"yaml.validate": true,
|
|
||||||
"editor.formatOnSave": true,
|
|
||||||
"editor.rulers": [80, 120],
|
|
||||||
"files.trimTrailingWhitespace": true,
|
|
||||||
"files.insertFinalNewline": true,
|
|
||||||
"git.autofetch": true,
|
|
||||||
"git.confirmSync": false,
|
|
||||||
"terminal.integrated.defaultProfile.windows": "PowerShell",
|
|
||||||
"[yaml]": {
|
|
||||||
"editor.insertSpaces": true,
|
|
||||||
"editor.tabSize": 2,
|
|
||||||
"editor.autoIndent": "advanced",
|
|
||||||
"editor.defaultFormatter": "redhat.vscode-yaml"
|
|
||||||
},
|
|
||||||
"[markdown]": {
|
|
||||||
"editor.defaultFormatter": "yzhang.markdown-all-in-one"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -30,4 +30,4 @@ services:
|
|||||||
- traefik.http.services.adminer.loadbalancer.server.port=8080
|
- traefik.http.services.adminer.loadbalancer.server.port=8080
|
||||||
networks:
|
networks:
|
||||||
homelab:
|
homelab:
|
||||||
external: true
|
external: true
|
||||||
@@ -22,13 +22,15 @@ http:
|
|||||||
#-----------------------------------------------------------------------------------
|
#-----------------------------------------------------------------------------------
|
||||||
routers:
|
routers:
|
||||||
# Local VPN-only services (*.swarm.home)
|
# Local VPN-only services (*.swarm.home)
|
||||||
unraid-local:
|
unraid:
|
||||||
rule: "Host(`unraid.swarm.home`)"
|
rule: "Host(`unraid.frostlabs.me`)"
|
||||||
entryPoints:
|
entryPoints:
|
||||||
- web
|
|
||||||
- websecure
|
- websecure
|
||||||
service: unraid
|
service: unraid
|
||||||
tls: {}
|
middlewares:
|
||||||
|
- authentik
|
||||||
|
tls:
|
||||||
|
certResolver: cloudflare
|
||||||
|
|
||||||
# peertube:
|
# peertube:
|
||||||
# rule: "Host(`videos.frostlabs.me`)"
|
# rule: "Host(`videos.frostlabs.me`)"
|
||||||
|
|||||||
@@ -21,6 +21,13 @@ services:
|
|||||||
start_period: 120s
|
start_period: 120s
|
||||||
deploy:
|
deploy:
|
||||||
replicas: 1
|
replicas: 1
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.http.routers.emby.rule=Host(`movies.frostlabs.me`)
|
||||||
|
- traefik.http.routers.emby.entrypoints=websecure
|
||||||
|
- traefik.http.routers.emby.tls=true
|
||||||
|
- traefik.http.routers.emby.tls.certresolver=cloudflare
|
||||||
|
- traefik.http.services.emby.loadbalancer.server.port=8096
|
||||||
networks:
|
networks:
|
||||||
homelab:
|
homelab:
|
||||||
external: true
|
external: true
|
||||||
27
git-runner-stack.yml
Normal file
27
git-runner-stack.yml
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
services:
|
||||||
|
gitea-runner:
|
||||||
|
image: gitea/act_runner:latest
|
||||||
|
hostname: "{{.Node.Hostname}}-runner"
|
||||||
|
environment:
|
||||||
|
- GITEA_INSTANCE_URL=https://git.frostlabs.me
|
||||||
|
- GITEA_RUNNER_REGISTRATION_TOKEN=hF9V6IIV4lj1cZVgNaZAXuXOcdVBiAQuoZdTU5Pp
|
||||||
|
- GITEA_RUNNER_NAME=swarm-runner-{{.Node.Hostname}}
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
|
- gitea-runner-data:/data
|
||||||
|
networks:
|
||||||
|
- homelab # Adjust to match your Gitea network
|
||||||
|
deploy:
|
||||||
|
replicas: 1
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.role == manager
|
||||||
|
restart_policy:
|
||||||
|
condition: on-failure
|
||||||
|
delay: 5s
|
||||||
|
max_attempts: 3
|
||||||
|
volumes:
|
||||||
|
gitea-runner-data:
|
||||||
|
networks:
|
||||||
|
homelab:
|
||||||
|
external: true
|
||||||
@@ -42,4 +42,4 @@ services:
|
|||||||
|
|
||||||
networks:
|
networks:
|
||||||
homelab:
|
homelab:
|
||||||
external: true
|
external: true
|
||||||
@@ -7,7 +7,7 @@ services:
|
|||||||
ports:
|
ports:
|
||||||
- "5454:5454"
|
- "5454:5454"
|
||||||
volumes:
|
volumes:
|
||||||
- /home/doc/projects/unraid-appdata/Notifiarr:/config
|
- /home/doc/projects/swarm-data/appdata/Notifiarr:/config
|
||||||
- /var/run/docker.sock:/var/run/docker.sock:ro
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||||
environment:
|
environment:
|
||||||
- TZ=America/New_York
|
- TZ=America/New_York
|
||||||
@@ -79,4 +79,4 @@ networks:
|
|||||||
external: true
|
external: true
|
||||||
outline_internal:
|
outline_internal:
|
||||||
driver: overlay
|
driver: overlay
|
||||||
attachable: true
|
attachable: true
|
||||||
@@ -79,4 +79,4 @@ secrets:
|
|||||||
paperless-secret-key:
|
paperless-secret-key:
|
||||||
external: true
|
external: true
|
||||||
postgres-master:
|
postgres-master:
|
||||||
external: true
|
external: true
|
||||||
@@ -104,5 +104,5 @@ networks:
|
|||||||
# external: true
|
# external: true
|
||||||
# peertube-key:
|
# peertube-key:
|
||||||
# external: true
|
# external: true
|
||||||
# gmail-app-password:
|
# gmail-app-password:
|
||||||
# external: true
|
# external: true
|
||||||
@@ -22,4 +22,4 @@ services:
|
|||||||
|
|
||||||
networks:
|
networks:
|
||||||
homelab:
|
homelab:
|
||||||
external: true
|
external: true
|
||||||
0
pulse-stack.yml
Normal file
0
pulse-stack.yml
Normal file
@@ -10,7 +10,7 @@ services:
|
|||||||
- PGID=1000
|
- PGID=1000
|
||||||
- TZ=Etc/UTC
|
- TZ=Etc/UTC
|
||||||
volumes:
|
volumes:
|
||||||
- /home/doc/projects/unraid-appdata/radarr:/config
|
- /home/doc/projects/swarm-data/appdata/radarr:/config
|
||||||
- /home/doc/projects/data:/data
|
- /home/doc/projects/data:/data
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: [ "CMD", "curl", "-f", "http://localhost:7878/ping" ]
|
test: [ "CMD", "curl", "-f", "http://localhost:7878/ping" ]
|
||||||
@@ -23,4 +23,4 @@ services:
|
|||||||
|
|
||||||
networks:
|
networks:
|
||||||
homelab:
|
homelab:
|
||||||
external: true
|
external: true
|
||||||
@@ -17,4 +17,4 @@ services:
|
|||||||
|
|
||||||
networks:
|
networks:
|
||||||
homelab:
|
homelab:
|
||||||
external: true
|
external: true
|
||||||
@@ -1,171 +0,0 @@
|
|||||||
# PeerTube Docker Swarm Setup
|
|
||||||
|
|
||||||
## Prerequisites
|
|
||||||
|
|
||||||
1. Traefik is running and configured
|
|
||||||
2. PostgreSQL is running (`postgresSQL` service)
|
|
||||||
3. The `homelab` network exists
|
|
||||||
4. DNS record for `videos.frostlabs.me` points to your server
|
|
||||||
|
|
||||||
## Setup Steps
|
|
||||||
|
|
||||||
### 1. Create PeerTube Database
|
|
||||||
|
|
||||||
Connect to your existing PostgreSQL instance and create the PeerTube database:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Connect to PostgreSQL container
|
|
||||||
docker exec -it $(docker ps -q -f name=postgresSQL) psql -U admin -d postgres
|
|
||||||
|
|
||||||
# Create database (user 'admin' already exists with postgres-master secret)
|
|
||||||
CREATE DATABASE peertube;
|
|
||||||
GRANT ALL PRIVILEGES ON DATABASE peertube TO admin;
|
|
||||||
\q
|
|
||||||
```
|
|
||||||
|
|
||||||
### 2. Create Docker Secret for PeerTube
|
|
||||||
|
|
||||||
You already have the `postgres-master` secret for database access. You just need to create the PeerTube application secret:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Generate and create the PeerTube secret
|
|
||||||
echo "$(openssl rand -hex 32)" | docker secret create peertube-secret -
|
|
||||||
|
|
||||||
# Verify the secret was created
|
|
||||||
docker secret ls | grep peertube
|
|
||||||
```
|
|
||||||
|
|
||||||
**Note:** The stack uses your existing `postgres-master` secret for database authentication with the `admin` user.
|
|
||||||
|
|
||||||
### 3. Verify Data Directory Permissions
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Check that the PeerTube appdata directory exists and has correct permissions
|
|
||||||
ls -la /home/doc/projects/unraid-appdata/PeerTube
|
|
||||||
|
|
||||||
# If needed, fix permissions (UID 999 is the PeerTube user)
|
|
||||||
sudo chown -R 999:999 /home/doc/projects/unraid-appdata/PeerTube
|
|
||||||
```
|
|
||||||
|
|
||||||
### 4. Deploy the Stack
|
|
||||||
|
|
||||||
```bash
|
|
||||||
docker stack deploy -c stack.yml peertube
|
|
||||||
```
|
|
||||||
|
|
||||||
### 5. Monitor Deployment
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Watch the services
|
|
||||||
docker service ls | grep peertube
|
|
||||||
|
|
||||||
# Check logs
|
|
||||||
docker service logs -f peertube_peertube
|
|
||||||
|
|
||||||
# Check if healthy
|
|
||||||
docker ps | grep peertube
|
|
||||||
```
|
|
||||||
|
|
||||||
### 6. Access PeerTube
|
|
||||||
|
|
||||||
Once deployed, access PeerTube at: https://videos.frostlabs.me
|
|
||||||
|
|
||||||
The first time you access it, you'll need to:
|
|
||||||
1. Complete the setup wizard
|
|
||||||
2. Create an admin account
|
|
||||||
3. Configure additional settings in the admin panel
|
|
||||||
|
|
||||||
## Configuration Notes
|
|
||||||
|
|
||||||
### Database Connection
|
|
||||||
- Host: `postgresSQL` (existing Postgres service)
|
|
||||||
- Port: 5432 (internal)
|
|
||||||
- Database: `peertube`
|
|
||||||
- User: `admin`
|
|
||||||
- Password: From `postgres-master` secret
|
|
||||||
|
|
||||||
### Redis Connection
|
|
||||||
- Host: `peertube-redis` (internal service)
|
|
||||||
- Port: 6379 (default)
|
|
||||||
|
|
||||||
### SMTP/Email
|
|
||||||
- Host: `peertube-postfix` (internal service)
|
|
||||||
- Port: 25
|
|
||||||
- From: noreply@videos.frostlabs.me
|
|
||||||
|
|
||||||
### Ports
|
|
||||||
- **9000**: PeerTube HTTP (internal, proxied by Traefik)
|
|
||||||
- **1935**: RTMP for live streaming (published on host)
|
|
||||||
|
|
||||||
### Traefik Integration
|
|
||||||
The stack is configured to use Traefik for:
|
|
||||||
- SSL/TLS certificates (Let's Encrypt)
|
|
||||||
- HTTPS on port 443
|
|
||||||
- HTTP to HTTPS redirect
|
|
||||||
- Domain: videos.frostlabs.me
|
|
||||||
|
|
||||||
## Storage Layout
|
|
||||||
|
|
||||||
All data is stored in `/home/doc/projects/unraid-appdata/PeerTube`:
|
|
||||||
- Videos and media files
|
|
||||||
- Thumbnails and previews
|
|
||||||
- User uploads
|
|
||||||
- Logs
|
|
||||||
- Configuration
|
|
||||||
|
|
||||||
## Troubleshooting
|
|
||||||
|
|
||||||
### Check service status
|
|
||||||
```bash
|
|
||||||
docker service ps peertube_peertube --no-trunc
|
|
||||||
```
|
|
||||||
|
|
||||||
### View logs
|
|
||||||
```bash
|
|
||||||
docker service logs peertube_peertube
|
|
||||||
docker service logs peertube_peertube-redis
|
|
||||||
docker service logs peertube_peertube-postfix
|
|
||||||
```
|
|
||||||
|
|
||||||
### Database connection issues
|
|
||||||
```bash
|
|
||||||
# Test connection from PeerTube container
|
|
||||||
docker exec -it $(docker ps -q -f name=peertube_peertube) sh
|
|
||||||
nc -zv postgresSQL 5432
|
|
||||||
```
|
|
||||||
|
|
||||||
### Restart services
|
|
||||||
```bash
|
|
||||||
docker service update --force peertube_peertube
|
|
||||||
```
|
|
||||||
|
|
||||||
### Remove and redeploy
|
|
||||||
```bash
|
|
||||||
docker stack rm peertube
|
|
||||||
# Wait for cleanup
|
|
||||||
docker stack deploy -c stack.yml peertube
|
|
||||||
```
|
|
||||||
|
|
||||||
## Updating PeerTube
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Update the image
|
|
||||||
docker service update --image chocobozzz/peertube:production-bookworm peertube_peertube
|
|
||||||
|
|
||||||
# Or redeploy the stack
|
|
||||||
docker stack deploy -c stack.yml peertube
|
|
||||||
```
|
|
||||||
|
|
||||||
## Security Considerations
|
|
||||||
|
|
||||||
1. Change the default admin password after first login
|
|
||||||
2. Keep PEERTUBE_SECRET secure and never commit it to version control
|
|
||||||
3. Regularly update the PeerTube image for security patches
|
|
||||||
4. Configure proper email settings for notifications
|
|
||||||
5. Review and configure user registration settings in admin panel
|
|
||||||
|
|
||||||
## Additional Resources
|
|
||||||
|
|
||||||
- [PeerTube Documentation](https://docs.joinpeertube.org/)
|
|
||||||
- [PeerTube Production Guide](https://docs.joinpeertube.org/install/docker)
|
|
||||||
- [PeerTube Admin Documentation](https://docs.joinpeertube.org/admin/following-instances)
|
|
||||||
@@ -1,20 +0,0 @@
|
|||||||
services:
|
|
||||||
rsync:
|
|
||||||
image: alpine:latest
|
|
||||||
user: "0:0"
|
|
||||||
command: >
|
|
||||||
sh -c " apk add --no-cache rsync && echo '0 2 * * * rsync -av --no-perms --no-owner --no-group --exclude-from=/excludes.txt /source/ /destination/ && echo \"Sync completed at $$(date)\"' | crontab - && echo 'Backup sync started. Daily sync at 2 AM.' && crond -f -l 2"
|
|
||||||
deploy:
|
|
||||||
replicas: 1
|
|
||||||
restart_policy:
|
|
||||||
condition: on-failure
|
|
||||||
delay: 30s
|
|
||||||
volumes:
|
|
||||||
- /home/doc/projects/swarm-data/appdata:/source:ro
|
|
||||||
- /home/doc/projects/backups:/destination
|
|
||||||
- /home/doc/projects/swarm/conf/rsync-conf/excludes.txt:/excludes.txt:ro
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
networks:
|
|
||||||
homelab:
|
|
||||||
external: true
|
|
||||||
@@ -1,112 +0,0 @@
|
|||||||
services:
|
|
||||||
redis:
|
|
||||||
image: redis:alpine
|
|
||||||
command: --save 60 1 --loglevel warning
|
|
||||||
volumes:
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/redis:/data
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
healthcheck:
|
|
||||||
test: [ "CMD", "redis-cli", "ping" ]
|
|
||||||
interval: 30s
|
|
||||||
timeout: 5s
|
|
||||||
retries: 3
|
|
||||||
start_period: 10s
|
|
||||||
deploy:
|
|
||||||
replicas: 1
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 512M
|
|
||||||
reservations:
|
|
||||||
memory: 128M
|
|
||||||
|
|
||||||
authentik_server:
|
|
||||||
image: ghcr.io/goauthentik/server:2025.10.0
|
|
||||||
command: server
|
|
||||||
environment:
|
|
||||||
AUTHENTIK_SECRET_KEY: "file:///run/secrets/auth-key"
|
|
||||||
AUTHENTIK_REDIS__HOST: "redis"
|
|
||||||
AUTHENTIK_POSTGRESQL__HOST: "10.0.4.10"
|
|
||||||
AUTHENTIK_POSTGRESQL__PORT: "5432"
|
|
||||||
AUTHENTIK_POSTGRESQL__USER: "admin"
|
|
||||||
AUTHENTIK_POSTGRESQL__NAME: "authentik"
|
|
||||||
AUTHENTIK_POSTGRESQL__PASSWORD: "file:///run/secrets/postgres-master"
|
|
||||||
# Optional: Set error reporting (set to false for privacy)
|
|
||||||
AUTHENTIK_ERROR_REPORTING__ENABLED: "false"
|
|
||||||
secrets:
|
|
||||||
- auth-key
|
|
||||||
- postgres-master
|
|
||||||
volumes:
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/media:/media
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/templates:/templates
|
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
healthcheck:
|
|
||||||
test: [ "CMD-SHELL", "ak healthcheck" ]
|
|
||||||
interval: 30s
|
|
||||||
timeout: 10s
|
|
||||||
retries: 3
|
|
||||||
start_period: 90s
|
|
||||||
deploy:
|
|
||||||
replicas: 1
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 1G
|
|
||||||
cpus: '1.0'
|
|
||||||
reservations:
|
|
||||||
memory: 512M
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.swarm.network=homelab"
|
|
||||||
# Public-facing domain with Let's Encrypt certificate
|
|
||||||
- "traefik.http.routers.authentik.rule=Host(`auth.frostlabs.me`)"
|
|
||||||
- "traefik.http.routers.authentik.entrypoints=websecure"
|
|
||||||
- "traefik.http.routers.authentik.tls=true"
|
|
||||||
- "traefik.http.routers.authentik.tls.certresolver=cloudflare"
|
|
||||||
- "traefik.http.services.authentik.loadbalancer.server.port=9000"
|
|
||||||
|
|
||||||
depends_on:
|
|
||||||
- redis
|
|
||||||
|
|
||||||
authentik_worker:
|
|
||||||
image: ghcr.io/goauthentik/server:2025.10.0
|
|
||||||
command: worker
|
|
||||||
environment:
|
|
||||||
AUTHENTIK_SECRET_KEY: "file:///run/secrets/auth-key"
|
|
||||||
AUTHENTIK_REDIS__HOST: "redis"
|
|
||||||
AUTHENTIK_POSTGRESQL__HOST: "10.0.4.10"
|
|
||||||
AUTHENTIK_POSTGRESQL__PORT: "5432"
|
|
||||||
AUTHENTIK_POSTGRESQL__USER: "admin"
|
|
||||||
AUTHENTIK_POSTGRESQL__NAME: "authentik"
|
|
||||||
AUTHENTIK_POSTGRESQL__PASSWORD: "file:///run/secrets/postgres-master"
|
|
||||||
# Optional: Set error reporting (set to false for privacy)
|
|
||||||
AUTHENTIK_ERROR_REPORTING__ENABLED: "false"
|
|
||||||
secrets:
|
|
||||||
- auth-key
|
|
||||||
- postgres-master
|
|
||||||
volumes:
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/media:/media
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/templates:/templates
|
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
deploy:
|
|
||||||
replicas: 1
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 1G
|
|
||||||
cpus: '1.0'
|
|
||||||
reservations:
|
|
||||||
memory: 512M
|
|
||||||
depends_on:
|
|
||||||
- redis
|
|
||||||
|
|
||||||
networks:
|
|
||||||
homelab:
|
|
||||||
external: true
|
|
||||||
secrets:
|
|
||||||
postgres-master:
|
|
||||||
external: true
|
|
||||||
auth-key:
|
|
||||||
external: true
|
|
||||||
@@ -1,36 +0,0 @@
|
|||||||
services:
|
|
||||||
portainer:
|
|
||||||
image: portainer/portainer-ce:latest
|
|
||||||
command: -H tcp://tasks.agent:9001 --tlsskipverify
|
|
||||||
volumes:
|
|
||||||
- /home/doc/projects/swarm-data/appdata/portainer:/data
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
ports:
|
|
||||||
- 9001:9000
|
|
||||||
deploy:
|
|
||||||
mode: replicated
|
|
||||||
replicas: 1
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.swarm.network=homelab"
|
|
||||||
# Public-facing domain with Let's Encrypt certificate
|
|
||||||
- "traefik.http.routers.portainer.rule=Host(`portainer.frostlabs.me`)"
|
|
||||||
- "traefik.http.routers.portainer.entrypoints=websecure"
|
|
||||||
- "traefik.http.routers.portainer.tls=true"
|
|
||||||
- "traefik.http.routers.portainer.tls.certresolver=cloudflare"
|
|
||||||
- "traefik.http.services.portainer.loadbalancer.server.port=9000"
|
|
||||||
|
|
||||||
agent:
|
|
||||||
image: portainer/agent:latest
|
|
||||||
volumes:
|
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
|
||||||
- /var/lib/docker/volumes:/var/lib/docker/volumes
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
deploy:
|
|
||||||
mode: global
|
|
||||||
|
|
||||||
networks:
|
|
||||||
homelab:
|
|
||||||
external: true
|
|
||||||
@@ -1,196 +0,0 @@
|
|||||||
#---------------------------
|
|
||||||
# AUTHENTIK
|
|
||||||
#---------------------------
|
|
||||||
services:
|
|
||||||
redis:
|
|
||||||
image: redis:alpine
|
|
||||||
command: --save 60 1 --loglevel warning
|
|
||||||
volumes:
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/redis:/data
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
healthcheck:
|
|
||||||
test: [ "CMD", "redis-cli", "ping" ]
|
|
||||||
interval: 30s
|
|
||||||
timeout: 5s
|
|
||||||
retries: 3
|
|
||||||
start_period: 10s
|
|
||||||
deploy:
|
|
||||||
replicas: 1
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 512M
|
|
||||||
reservations:
|
|
||||||
memory: 128M
|
|
||||||
|
|
||||||
authentik_server:
|
|
||||||
image: ghcr.io/goauthentik/server:2025.10.0
|
|
||||||
command: server
|
|
||||||
environment:
|
|
||||||
AUTHENTIK_SECRET_KEY: "file:///run/secrets/auth-key"
|
|
||||||
AUTHENTIK_REDIS__HOST: "redis"
|
|
||||||
AUTHENTIK_POSTGRESQL__HOST: "10.0.4.10"
|
|
||||||
AUTHENTIK_POSTGRESQL__PORT: "5432"
|
|
||||||
AUTHENTIK_POSTGRESQL__USER: "admin"
|
|
||||||
AUTHENTIK_POSTGRESQL__NAME: "authentik"
|
|
||||||
AUTHENTIK_POSTGRESQL__PASSWORD: "file:///run/secrets/postgres-master"
|
|
||||||
# Optional: Set error reporting (set to false for privacy)
|
|
||||||
AUTHENTIK_ERROR_REPORTING__ENABLED: "false"
|
|
||||||
secrets:
|
|
||||||
- auth-key
|
|
||||||
- postgres-master
|
|
||||||
volumes:
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/media:/media
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/templates:/templates
|
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
healthcheck:
|
|
||||||
test: [ "CMD-SHELL", "ak healthcheck" ]
|
|
||||||
interval: 30s
|
|
||||||
timeout: 10s
|
|
||||||
retries: 3
|
|
||||||
start_period: 90s
|
|
||||||
deploy:
|
|
||||||
replicas: 1
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 1G
|
|
||||||
cpus: '1.0'
|
|
||||||
reservations:
|
|
||||||
memory: 512M
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.swarm.network=homelab"
|
|
||||||
# Public-facing domain with Let's Encrypt certificate
|
|
||||||
- "traefik.http.routers.authentik.rule=Host(`auth.frostlabs.me`)"
|
|
||||||
- "traefik.http.routers.authentik.entrypoints=websecure"
|
|
||||||
- "traefik.http.routers.authentik.tls=true"
|
|
||||||
- "traefik.http.routers.authentik.tls.certresolver=cloudflare"
|
|
||||||
- "traefik.http.services.authentik.loadbalancer.server.port=9000"
|
|
||||||
|
|
||||||
depends_on:
|
|
||||||
- redis
|
|
||||||
|
|
||||||
authentik_worker:
|
|
||||||
image: ghcr.io/goauthentik/server:2025.10.0
|
|
||||||
command: worker
|
|
||||||
environment:
|
|
||||||
AUTHENTIK_SECRET_KEY: "file:///run/secrets/auth-key"
|
|
||||||
AUTHENTIK_REDIS__HOST: "redis"
|
|
||||||
AUTHENTIK_POSTGRESQL__HOST: "10.0.4.10"
|
|
||||||
AUTHENTIK_POSTGRESQL__PORT: "5432"
|
|
||||||
AUTHENTIK_POSTGRESQL__USER: "admin"
|
|
||||||
AUTHENTIK_POSTGRESQL__NAME: "authentik"
|
|
||||||
AUTHENTIK_POSTGRESQL__PASSWORD: "file:///run/secrets/postgres-master"
|
|
||||||
# Optional: Set error reporting (set to false for privacy)
|
|
||||||
AUTHENTIK_ERROR_REPORTING__ENABLED: "false"
|
|
||||||
secrets:
|
|
||||||
- auth-key
|
|
||||||
- postgres-master
|
|
||||||
volumes:
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/media:/media
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/templates:/templates
|
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
deploy:
|
|
||||||
replicas: 1
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 1G
|
|
||||||
cpus: '1.0'
|
|
||||||
reservations:
|
|
||||||
memory: 512M
|
|
||||||
depends_on:
|
|
||||||
- redis
|
|
||||||
|
|
||||||
#---------------------------
|
|
||||||
# TRAEFIK
|
|
||||||
#---------------------------
|
|
||||||
traefik:
|
|
||||||
image: traefik:v3.5.4
|
|
||||||
# Remove all command arguments - using static config file instead
|
|
||||||
ports:
|
|
||||||
- 80:80
|
|
||||||
- 443:443
|
|
||||||
- 8080:8080
|
|
||||||
environment:
|
|
||||||
- CF_DNS_API_TOKEN_FILE=/run/secrets/cloudflare_api_token
|
|
||||||
volumes:
|
|
||||||
- type: bind
|
|
||||||
source: /var/run/docker.sock
|
|
||||||
target: /var/run/docker.sock
|
|
||||||
read_only: true
|
|
||||||
- type: bind
|
|
||||||
source: /home/doc/projects/swarm-data/swarm-production/conf/traefik-conf/static.yml
|
|
||||||
target: /etc/traefik/traefik.yml
|
|
||||||
read_only: true
|
|
||||||
- type: bind
|
|
||||||
source: /home/doc/projects/swarm-data/swarm-production/conf/traefik-conf/dynamic.yml
|
|
||||||
target: /etc/traefik/dynamic/dynamic.yml
|
|
||||||
- type: bind
|
|
||||||
source: /home/doc/projects/swarm-data/appdata/traefik/certificates/acme.json
|
|
||||||
target: /certificates/acme.json
|
|
||||||
secrets:
|
|
||||||
- cloudflare_api_token
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
healthcheck:
|
|
||||||
test: [ "CMD", "wget", "--quiet", "--tries=1", "--spider", "http://localhost:8080/ping" ]
|
|
||||||
interval: 30s
|
|
||||||
timeout: 5s
|
|
||||||
retries: 3
|
|
||||||
start_period: 30s
|
|
||||||
deploy:
|
|
||||||
mode: replicated
|
|
||||||
replicas: 1
|
|
||||||
placement:
|
|
||||||
constraints:
|
|
||||||
- node.hostname == p0
|
|
||||||
|
|
||||||
#---------------------------
|
|
||||||
# TRAEFIK
|
|
||||||
#---------------------------
|
|
||||||
portainer:
|
|
||||||
image: portainer/portainer-ce:latest
|
|
||||||
command: -H tcp://tasks.agent:9001 --tlsskipverify
|
|
||||||
volumes:
|
|
||||||
- /home/doc/projects/swarm-data/appdata/portainer:/data
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
ports:
|
|
||||||
- 9001:9000
|
|
||||||
deploy:
|
|
||||||
mode: replicated
|
|
||||||
replicas: 1
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.swarm.network=homelab"
|
|
||||||
# Public-facing domain with Let's Encrypt certificate
|
|
||||||
- "traefik.http.routers.portainer.rule=Host(`portainer.frostlabs.me`)"
|
|
||||||
- "traefik.http.routers.portainer.entrypoints=websecure"
|
|
||||||
- "traefik.http.routers.portainer.tls=true"
|
|
||||||
- "traefik.http.routers.portainer.tls.certresolver=cloudflare"
|
|
||||||
- "traefik.http.services.portainer.loadbalancer.server.port=9000"
|
|
||||||
|
|
||||||
agent:
|
|
||||||
image: portainer/agent:latest
|
|
||||||
volumes:
|
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
|
||||||
- /var/lib/docker/volumes:/var/lib/docker/volumes
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
deploy:
|
|
||||||
mode: global
|
|
||||||
|
|
||||||
networks:
|
|
||||||
homelab:
|
|
||||||
external: true
|
|
||||||
secrets:
|
|
||||||
postgres-master:
|
|
||||||
external: true
|
|
||||||
auth-key:
|
|
||||||
external: true
|
|
||||||
cloudflare_api_token:
|
|
||||||
external: true
|
|
||||||
@@ -5,7 +5,7 @@ services:
|
|||||||
ports:
|
ports:
|
||||||
- 80:80
|
- 80:80
|
||||||
- 443:443
|
- 443:443
|
||||||
- 8080:8080
|
- 8082:8080
|
||||||
environment:
|
environment:
|
||||||
- CF_DNS_API_TOKEN_FILE=/run/secrets/cloudflare_api_token
|
- CF_DNS_API_TOKEN_FILE=/run/secrets/cloudflare_api_token
|
||||||
volumes:
|
volumes:
|
||||||
@@ -46,4 +46,4 @@ networks:
|
|||||||
|
|
||||||
secrets:
|
secrets:
|
||||||
cloudflare_api_token:
|
cloudflare_api_token:
|
||||||
external: true
|
external: true
|
||||||
Reference in New Issue
Block a user