Compare commits
63 Commits
ad08678553
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
| dde45742e1 | |||
| 0b93862185 | |||
| d5e8a573ad | |||
| 36b949d9c7 | |||
| 5a495cb8ee | |||
| 3e30c33fbe | |||
| b0a4f23cad | |||
| d02148af76 | |||
| a150527d95 | |||
| b8a5345d68 | |||
| 3a6bfa0854 | |||
| cb73a13e48 | |||
| 08ebe28456 | |||
| 6c2dd888bb | |||
| bc097a98de | |||
| 18c04db9bb | |||
| 8dfe1a8310 | |||
| f649d4dcb7 | |||
| 26fcb257d5 | |||
| 6a47ec2ed6 | |||
| 08a1882232 | |||
| f5bccb9f3b | |||
| 05e0febeb4 | |||
| 0055e31123 | |||
| 76cdb88226 | |||
| 51edbebf28 | |||
| 1a75b85508 | |||
| ecbb8d0da4 | |||
| 8b634466b2 | |||
| a22e1307ae | |||
| 72ffc356b4 | |||
| f44d53cab9 | |||
| 1e6132437f | |||
| d4ce82d48d | |||
| 2c050791db | |||
| 77c33e6217 | |||
| 22b321ae74 | |||
| af38c71fb0 | |||
| 1d3a67a56c | |||
| d1e9ca973b | |||
| cec2cb6742 | |||
| 8595c769b0 | |||
| 8e5d39ebae | |||
| 4dfbbea537 | |||
| 2c6c89a2af | |||
| 601773bc39 | |||
| ea0de92f0f | |||
| 3207c27617 | |||
| 04297fa8dd | |||
| 195cbafcf7 | |||
| d16905c71a | |||
| eee375d07b | |||
| 8cba1e7fd3 | |||
| 0f75fbf226 | |||
| 95c867bf69 | |||
| 7f24735ead | |||
| e2060a70ec | |||
| 6a9d38f91c | |||
| 00bb5748a2 | |||
| 91220941b3 | |||
| cebd955b3d | |||
| ea7a373bc4 | |||
| 3871e30abd |
43
.gitea/workflows/deploy.yml
Normal file
43
.gitea/workflows/deploy.yml
Normal file
@@ -0,0 +1,43 @@
|
||||
name: Deploy All Stacks to Swarm
|
||||
|
||||
on:
|
||||
push:
|
||||
branches:
|
||||
- main
|
||||
workflow_dispatch:
|
||||
|
||||
|
||||
jobs:
|
||||
deploy:
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- name: Checkout repository
|
||||
uses: actions/checkout@v3
|
||||
|
||||
- name: Deploy remaining stacks
|
||||
run: |
|
||||
for stack_file in *-stack.yml; do
|
||||
stack_name="${stack_file%-stack.yml}"
|
||||
# Skip traefik, git-runner (deploy those manually)
|
||||
if [[ "$stack_name" != "traefik" && "$stack_name" != "git-runner" ]]; then
|
||||
echo "🚀 Deploying ${stack_name}..."
|
||||
docker stack deploy -c "$stack_file" "$stack_name" --prune --with-registry-auth
|
||||
fi
|
||||
done
|
||||
|
||||
- name: Deploy remaining stacks
|
||||
run: |
|
||||
for stack_file in *-stack.yml; do
|
||||
stack_name="${stack_file%-stack.yml}"
|
||||
# Skip if already deployed
|
||||
if [[ "$stack_name" != "traefik" && "$stack_name" != "git-runner" ]]; then
|
||||
echo "🚀 Deploying ${stack_name}..."
|
||||
docker stack deploy -c "$stack_file" "$stack_name" --prune --with-registry-auth
|
||||
fi
|
||||
done
|
||||
|
||||
- name: List deployed stacks
|
||||
run: |
|
||||
echo ""
|
||||
echo "📋 All deployed stacks:"
|
||||
docker stack ls
|
||||
32
.vscode/setting.json
vendored
32
.vscode/setting.json
vendored
@@ -1,32 +0,0 @@
|
||||
{
|
||||
"files.associations": {
|
||||
"*.yml": "yaml",
|
||||
"*.yaml": "yaml",
|
||||
"docker-compose*.yml": "yaml",
|
||||
"stack.yml": "yaml"
|
||||
},
|
||||
"yaml.schemas": {
|
||||
"https://raw.githubusercontent.com/compose-spec/compose-spec/master/schema/compose-spec.json": [
|
||||
"docker-compose*.yml",
|
||||
"**/stacks/**/stack.yml"
|
||||
]
|
||||
},
|
||||
"yaml.format.enable": true,
|
||||
"yaml.validate": true,
|
||||
"editor.formatOnSave": true,
|
||||
"editor.rulers": [80, 120],
|
||||
"files.trimTrailingWhitespace": true,
|
||||
"files.insertFinalNewline": true,
|
||||
"git.autofetch": true,
|
||||
"git.confirmSync": false,
|
||||
"terminal.integrated.defaultProfile.windows": "PowerShell",
|
||||
"[yaml]": {
|
||||
"editor.insertSpaces": true,
|
||||
"editor.tabSize": 2,
|
||||
"editor.autoIndent": "advanced",
|
||||
"editor.defaultFormatter": "redhat.vscode-yaml"
|
||||
},
|
||||
"[markdown]": {
|
||||
"editor.defaultFormatter": "yzhang.markdown-all-in-one"
|
||||
}
|
||||
}
|
||||
@@ -13,31 +13,37 @@ http:
|
||||
# loadBalancer:
|
||||
# servers:
|
||||
# - url: "http://10.0.4.10:8096"
|
||||
|
||||
# peertube:
|
||||
# loadBalancer:
|
||||
# servers:
|
||||
# - url: "http://10.0.4.10:9000"
|
||||
#-----------------------------------------------------------------------------------
|
||||
# ROUTERS SECTION
|
||||
#-----------------------------------------------------------------------------------
|
||||
routers:
|
||||
# Local VPN-only services (*.swarm.home)
|
||||
unraid-local:
|
||||
rule: "Host(`unraid.swarm.home`)"
|
||||
unraid:
|
||||
rule: "Host(`unraid.frostlabs.me`)"
|
||||
entryPoints:
|
||||
- web
|
||||
- websecure
|
||||
service: unraid
|
||||
tls: {}
|
||||
# emby:
|
||||
# rule: "Host(`movies.swarm.home`)"
|
||||
# entryPoints:
|
||||
# - web
|
||||
# - websecure
|
||||
# service: emby
|
||||
# tls: {}
|
||||
middlewares:
|
||||
- authentik
|
||||
tls:
|
||||
certResolver: cloudflare
|
||||
|
||||
# peertube:
|
||||
# rule: "Host(`videos.frostlabs.me`)"
|
||||
# entryPoints:
|
||||
# - websecure
|
||||
# service: peertube
|
||||
# tls:
|
||||
# certResolver: cloudflare
|
||||
#-----------------------------------------------------------------------------------
|
||||
# MIDDLEWARES SECTION
|
||||
#-----------------------------------------------------------------------------------
|
||||
middlewares:
|
||||
# Authentik forward auth for protecting services
|
||||
authentik:
|
||||
forwardAuth:
|
||||
address: "http://authentik_server:9000/outpost.goauthentik.io/auth/traefik"
|
||||
@@ -48,3 +54,22 @@ http:
|
||||
- X-authentik-email
|
||||
- X-authentik-name
|
||||
- X-authentik-uid
|
||||
|
||||
# Security headers for public-facing services
|
||||
security-headers:
|
||||
headers:
|
||||
frameDeny: true
|
||||
browserXssFilter: true
|
||||
contentTypeNosniff: true
|
||||
sslRedirect: true
|
||||
forceSTSHeader: true
|
||||
stsSeconds: 31536000
|
||||
stsIncludeSubdomains: true
|
||||
stsPreload: true
|
||||
|
||||
# Rate limiting for public services
|
||||
rate-limit:
|
||||
rateLimit:
|
||||
average: 100
|
||||
period: 1s
|
||||
burst: 50
|
||||
|
||||
@@ -41,7 +41,6 @@ providers:
|
||||
watch: true
|
||||
|
||||
# Certificate resolvers
|
||||
tls:
|
||||
certificatesResolvers:
|
||||
cloudflare:
|
||||
acme:
|
||||
@@ -49,6 +48,9 @@ tls:
|
||||
storage: /certificates/acme.json
|
||||
dnsChallenge:
|
||||
provider: cloudflare
|
||||
resolvers:
|
||||
- 1.1.1.1:53
|
||||
- 8.8.8.8:53
|
||||
|
||||
# Logging
|
||||
log:
|
||||
|
||||
33
emby-stack.yml
Normal file
33
emby-stack.yml
Normal file
@@ -0,0 +1,33 @@
|
||||
services:
|
||||
emby:
|
||||
image: lscr.io/linuxserver/emby:latest
|
||||
networks:
|
||||
- homelab
|
||||
environment:
|
||||
- PUID=1000
|
||||
- PGID=1000
|
||||
- TZ=Etc/UTC
|
||||
volumes:
|
||||
- /home/doc/projects/swarm-data/appdata/emby:/config
|
||||
- /home/doc/projects/data/media/tv:/data/tvshows
|
||||
- /home/doc/projects/data/media/movies:/data/movies
|
||||
ports:
|
||||
- 8096:8096
|
||||
healthcheck:
|
||||
test: [ "CMD", "curl", "-f", "http://localhost:8096/web/index.html" ]
|
||||
interval: 30s
|
||||
timeout: 10s
|
||||
retries: 5
|
||||
start_period: 120s
|
||||
deploy:
|
||||
replicas: 1
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.http.routers.emby.rule=Host(`movies.frostlabs.me`)
|
||||
- traefik.http.routers.emby.entrypoints=websecure
|
||||
- traefik.http.routers.emby.tls=true
|
||||
- traefik.http.routers.emby.tls.certresolver=cloudflare
|
||||
- traefik.http.services.emby.loadbalancer.server.port=8096
|
||||
networks:
|
||||
homelab:
|
||||
external: true
|
||||
27
git-runner-stack.yml
Normal file
27
git-runner-stack.yml
Normal file
@@ -0,0 +1,27 @@
|
||||
services:
|
||||
gitea-runner:
|
||||
image: gitea/act_runner:latest
|
||||
hostname: "{{.Node.Hostname}}-runner"
|
||||
environment:
|
||||
- GITEA_INSTANCE_URL=https://git.frostlabs.me
|
||||
- GITEA_RUNNER_REGISTRATION_TOKEN=hF9V6IIV4lj1cZVgNaZAXuXOcdVBiAQuoZdTU5Pp
|
||||
- GITEA_RUNNER_NAME=swarm-runner-{{.Node.Hostname}}
|
||||
volumes:
|
||||
- /var/run/docker.sock:/var/run/docker.sock
|
||||
- gitea-runner-data:/data
|
||||
networks:
|
||||
- homelab # Adjust to match your Gitea network
|
||||
deploy:
|
||||
replicas: 1
|
||||
placement:
|
||||
constraints:
|
||||
- node.role == manager
|
||||
restart_policy:
|
||||
condition: on-failure
|
||||
delay: 5s
|
||||
max_attempts: 3
|
||||
volumes:
|
||||
gitea-runner-data:
|
||||
networks:
|
||||
homelab:
|
||||
external: true
|
||||
@@ -32,6 +32,13 @@ services:
|
||||
memory: 2G
|
||||
reservations:
|
||||
memory: 512M
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.http.routers.n8n.rule=Host(`n8n.bitfrost.me`)
|
||||
- traefik.http.routers.n8n.entrypoints=websecure
|
||||
- traefik.http.routers.n8n.tls=true
|
||||
- traefik.http.routers.n8n.tls.certresolver=cloudflare
|
||||
- traefik.http.services.n8n.loadbalancer.server.port=5678
|
||||
|
||||
networks:
|
||||
homelab:
|
||||
21
notifiarr-stack.yml
Normal file
21
notifiarr-stack.yml
Normal file
@@ -0,0 +1,21 @@
|
||||
services:
|
||||
notifiarr:
|
||||
image: golift/notifiarr:latest
|
||||
hostname: notifiarr
|
||||
networks:
|
||||
- homelab
|
||||
ports:
|
||||
- "5454:5454"
|
||||
volumes:
|
||||
- /home/doc/projects/swarm-data/appdata/Notifiarr:/config
|
||||
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||
environment:
|
||||
- TZ=America/New_York
|
||||
- PUID=1000
|
||||
- PGID=1000
|
||||
deploy:
|
||||
replicas: 1
|
||||
|
||||
networks:
|
||||
homelab:
|
||||
external: true
|
||||
@@ -40,9 +40,11 @@ services:
|
||||
labels:
|
||||
- "traefik.enable=true"
|
||||
- "traefik.swarm.network=homelab"
|
||||
- "traefik.http.routers.outline.rule=Host(`flow.swarm.home`)"
|
||||
# Public-facing domain with Let's Encrypt certificate
|
||||
- "traefik.http.routers.outline.rule=Host(`flow.frostlabs.me`)"
|
||||
- "traefik.http.routers.outline.entrypoints=websecure"
|
||||
- "traefik.http.routers.outline.tls=true"
|
||||
- "traefik.http.routers.outline.tls.certresolver=cloudflare"
|
||||
- "traefik.http.services.outline.loadbalancer.server.port=3000"
|
||||
depends_on:
|
||||
- redis
|
||||
108
peertube-stack.yml
Normal file
108
peertube-stack.yml
Normal file
@@ -0,0 +1,108 @@
|
||||
services:
|
||||
peertube:
|
||||
image: chocobozzz/peertube:production-bookworm
|
||||
networks:
|
||||
- homelab
|
||||
environment:
|
||||
# Database configuration - connecting to existing Postgres
|
||||
- POSTGRES_USER=admin
|
||||
- POSTGRES_PASSWORD=AllOfTheStars+1
|
||||
- POSTGRES_DB=peertube
|
||||
- POSTGRES_HOSTNAME=postgres
|
||||
- POSTGRES_PORT=5432
|
||||
- PEERTUBE_DB_HOSTNAME=postgres
|
||||
- PEERTUBE_DB_PORT=5432
|
||||
- PEERTUBE_DB_USERNAME=admin
|
||||
- PEERTUBE_DB_PASSWORD=AllOfTheStars+1
|
||||
- PEERTUBE_DB_NAME=peertube
|
||||
# Redis configuration
|
||||
- REDIS_HOSTNAME=redis
|
||||
- PEERTUBE_REDIS_HOSTNAME=redis
|
||||
# PeerTube configuration
|
||||
- PEERTUBE_WEBSERVER_HOSTNAME=videos.frostlabs.me
|
||||
- PEERTUBE_WEBSERVER_PORT=443
|
||||
- PEERTUBE_WEBSERVER_HTTPS=true
|
||||
- PEERTUBE_TRUST_PROXY=["127.0.0.1", "loopback", "10.0.1.0/24"]
|
||||
# SMTP configuration - Gmail
|
||||
- PEERTUBE_SMTP_HOSTNAME=smtp.gmail.com
|
||||
- PEERTUBE_SMTP_PORT=587
|
||||
- PEERTUBE_SMTP_USERNAME=frostlabs25@gmail.com
|
||||
- PEERTUBE_SMTP_PASSWORD=tewo awqe ffhw rtun
|
||||
- PEERTUBE_SMTP_FROM=frostlabs25@gmail.com
|
||||
- PEERTUBE_SMTP_TLS=true
|
||||
- PEERTUBE_SMTP_DISABLE_STARTTLS=false
|
||||
- PEERTUBE_ADMIN_EMAIL=frostlabs25@gmail.com
|
||||
# Secrets - loaded from Docker secrets as files
|
||||
- PEERTUBE_SECRET=dfd1cad851c1a5b795131fd2033d46ef80c809b5ac30a3ce8e69b049587138a2
|
||||
# secrets:
|
||||
# - postgres-master
|
||||
# - peertube-key
|
||||
# - gmail-app-password
|
||||
# ports:
|
||||
# - target: 9000
|
||||
# published: 9000
|
||||
# mode: host
|
||||
# - target: 1935
|
||||
# published: 1935
|
||||
# mode: host
|
||||
volumes:
|
||||
# - /home/doc/projects/swarm-data/appdata/peertube/assets:/app/client/dist
|
||||
- /home/doc/projects/swarm-data/appdata/peertube/data:/data
|
||||
# healthcheck:
|
||||
# test: [ "CMD", "wget", "--quiet", "--tries=1", "--spider", "http://localhost:9000/api/v1/config" ]
|
||||
# interval: 30s
|
||||
# timeout: 10s
|
||||
# retries: 3
|
||||
# start_period: 60s
|
||||
deploy:
|
||||
mode: replicated
|
||||
replicas: 1
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.http.routers.peertube.rule=Host(`videos.frostlabs.me`)
|
||||
- traefik.http.routers.peertube.entrypoints=websecure
|
||||
- traefik.http.routers.peertube.tls=true
|
||||
- traefik.http.routers.peertube.tls.certresolver=cloudflare
|
||||
- traefik.http.services.peertube.loadbalancer.server.port=9000
|
||||
|
||||
redis:
|
||||
image: redis:7-alpine
|
||||
networks:
|
||||
- homelab
|
||||
volumes:
|
||||
- /home/doc/projects/swarm-data/appdata/peertube/redis:/data
|
||||
healthcheck:
|
||||
test: [ "CMD", "redis-cli", "ping" ]
|
||||
interval: 30s
|
||||
timeout: 5s
|
||||
retries: 3
|
||||
deploy:
|
||||
mode: replicated
|
||||
replicas: 1
|
||||
|
||||
postgres:
|
||||
image: postgres:17-alpine
|
||||
networks:
|
||||
- homelab
|
||||
environment:
|
||||
- POSTGRES_USER=admin
|
||||
- POSTGRES_PASSWORD=AllOfTheStars+1
|
||||
- POSTGRES_DB=peertube
|
||||
volumes:
|
||||
- /home/doc/projects/swarm-data/appdata/peertube/postgres:/var/lib/postgresql/data
|
||||
ports:
|
||||
- 5432:5432
|
||||
deploy:
|
||||
replicas: 1
|
||||
|
||||
networks:
|
||||
homelab:
|
||||
external: true
|
||||
|
||||
# secrets:
|
||||
# postgres-master:
|
||||
# external: true
|
||||
# peertube-key:
|
||||
# external: true
|
||||
# gmail-app-password:
|
||||
# external: true
|
||||
25
prowlarr-stack.yml
Normal file
25
prowlarr-stack.yml
Normal file
@@ -0,0 +1,25 @@
|
||||
services:
|
||||
prowlarr:
|
||||
image: lscr.io/linuxserver/prowlarr:latest
|
||||
networks:
|
||||
- homelab
|
||||
ports:
|
||||
- 9696:9696
|
||||
environment:
|
||||
- PUID=1000
|
||||
- PGID=1000
|
||||
- TZ=Etc/UTC
|
||||
volumes:
|
||||
- /home/doc/projects/swarm-data/appdata/prowlarr:/config
|
||||
healthcheck:
|
||||
test: [ "CMD", "curl", "-f", "http://localhost:9696/ping" ]
|
||||
interval: 30s
|
||||
timeout: 10s
|
||||
retries: 3
|
||||
start_period: 60s
|
||||
deploy:
|
||||
replicas: 1
|
||||
|
||||
networks:
|
||||
homelab:
|
||||
external: true
|
||||
0
pulse-stack.yml
Normal file
0
pulse-stack.yml
Normal file
26
radarr-stack.yml
Normal file
26
radarr-stack.yml
Normal file
@@ -0,0 +1,26 @@
|
||||
services:
|
||||
radarr:
|
||||
image: lscr.io/linuxserver/radarr:latest
|
||||
networks:
|
||||
- homelab
|
||||
ports:
|
||||
- 7878:7878
|
||||
environment:
|
||||
- PUID=1000
|
||||
- PGID=1000
|
||||
- TZ=Etc/UTC
|
||||
volumes:
|
||||
- /home/doc/projects/swarm-data/appdata/radarr:/config
|
||||
- /home/doc/projects/data:/data
|
||||
healthcheck:
|
||||
test: [ "CMD", "curl", "-f", "http://localhost:7878/ping" ]
|
||||
interval: 30s
|
||||
timeout: 10s
|
||||
retries: 3
|
||||
start_period: 60s
|
||||
deploy:
|
||||
replicas: 1
|
||||
|
||||
networks:
|
||||
homelab:
|
||||
external: true
|
||||
26
sab-stack.yml
Normal file
26
sab-stack.yml
Normal file
@@ -0,0 +1,26 @@
|
||||
services:
|
||||
sabnzbd:
|
||||
image: lscr.io/linuxserver/sabnzbd:latest
|
||||
networks:
|
||||
- homelab
|
||||
ports:
|
||||
- 8080:8080
|
||||
environment:
|
||||
- PUID=1000
|
||||
- PGID=1000
|
||||
- TZ=Etc/UTC
|
||||
volumes:
|
||||
- /home/doc/projects/swarm-data/appdata/sabnzbd:/config
|
||||
- /home/doc/projects/data/usenet:/data/usenet
|
||||
healthcheck:
|
||||
test: [ "CMD", "curl", "-f", "http://localhost:8080/api?mode=version" ]
|
||||
interval: 30s
|
||||
timeout: 10s
|
||||
retries: 3
|
||||
start_period: 60s
|
||||
deploy:
|
||||
replicas: 1
|
||||
|
||||
networks:
|
||||
homelab:
|
||||
external: true
|
||||
20
sonarr-stack.yml
Normal file
20
sonarr-stack.yml
Normal file
@@ -0,0 +1,20 @@
|
||||
services:
|
||||
sonarr:
|
||||
image: lscr.io/linuxserver/sonarr:latest
|
||||
networks:
|
||||
- homelab
|
||||
ports:
|
||||
- 8989:8989
|
||||
environment:
|
||||
- PUID=1000
|
||||
- PGID=1000
|
||||
- TZ=Etc/UTC
|
||||
volumes:
|
||||
- /home/doc/projects/swarm-data/appdata/sonarr:/config
|
||||
- /home/doc/projects/data:/data
|
||||
deploy:
|
||||
replicas: 1
|
||||
|
||||
networks:
|
||||
homelab:
|
||||
external: true
|
||||
@@ -1,112 +0,0 @@
|
||||
services:
|
||||
redis:
|
||||
image: redis:alpine
|
||||
command: --save 60 1 --loglevel warning
|
||||
volumes:
|
||||
- /home/doc/projects/swarm-data/appdata/authentik/redis:/data
|
||||
ports:
|
||||
- 6379:6379
|
||||
networks:
|
||||
- homelab
|
||||
healthcheck:
|
||||
test: [ "CMD", "redis-cli", "ping" ]
|
||||
interval: 30s
|
||||
timeout: 5s
|
||||
retries: 3
|
||||
start_period: 10s
|
||||
deploy:
|
||||
replicas: 1
|
||||
resources:
|
||||
limits:
|
||||
memory: 512M
|
||||
reservations:
|
||||
memory: 128M
|
||||
|
||||
authentik_server:
|
||||
image: ghcr.io/goauthentik/server:2025.10.0
|
||||
command: server
|
||||
environment:
|
||||
AUTHENTIK_SECRET_KEY: "file:///run/secrets/auth-key"
|
||||
AUTHENTIK_REDIS__HOST: "redis"
|
||||
AUTHENTIK_POSTGRESQL__HOST: "10.0.4.10"
|
||||
AUTHENTIK_POSTGRESQL__PORT: "5432"
|
||||
AUTHENTIK_POSTGRESQL__USER: "admin"
|
||||
AUTHENTIK_POSTGRESQL__NAME: "authentik"
|
||||
AUTHENTIK_POSTGRESQL__PASSWORD: "file:///run/secrets/postgres-master"
|
||||
# Optional: Set error reporting (set to false for privacy)
|
||||
AUTHENTIK_ERROR_REPORTING__ENABLED: "false"
|
||||
secrets:
|
||||
- auth-key
|
||||
- postgres-master
|
||||
volumes:
|
||||
- /home/doc/projects/swarm-data/appdata/authentik/media:/media
|
||||
- /home/doc/projects/swarm-data/appdata/authentik/templates:/templates
|
||||
- /var/run/docker.sock:/var/run/docker.sock
|
||||
networks:
|
||||
- homelab
|
||||
healthcheck:
|
||||
test: [ "CMD-SHELL", "ak healthcheck" ]
|
||||
interval: 30s
|
||||
timeout: 10s
|
||||
retries: 3
|
||||
start_period: 90s
|
||||
deploy:
|
||||
replicas: 1
|
||||
resources:
|
||||
limits:
|
||||
memory: 1G
|
||||
cpus: '1.0'
|
||||
reservations:
|
||||
memory: 512M
|
||||
labels:
|
||||
- "traefik.enable=true"
|
||||
- "traefik.swarm.network=homelab"
|
||||
- "traefik.http.routers.authentik.rule=Host(`auth.frostlabs.me`)"
|
||||
- "traefik.http.routers.authentik.entrypoints=websecure"
|
||||
- "traefik.http.routers.authentik.tls=certificatesResolvers=cloudflare"
|
||||
- "traefik.http.services.authentik.loadbalancer.server.port=9000"
|
||||
|
||||
depends_on:
|
||||
- redis
|
||||
|
||||
authentik_worker:
|
||||
image: ghcr.io/goauthentik/server:2025.10.0
|
||||
command: worker
|
||||
environment:
|
||||
AUTHENTIK_SECRET_KEY: "file:///run/secrets/auth-key"
|
||||
AUTHENTIK_REDIS__HOST: "redis"
|
||||
AUTHENTIK_POSTGRESQL__HOST: "10.0.4.10"
|
||||
AUTHENTIK_POSTGRESQL__PORT: "5432"
|
||||
AUTHENTIK_POSTGRESQL__USER: "admin"
|
||||
AUTHENTIK_POSTGRESQL__NAME: "authentik"
|
||||
AUTHENTIK_POSTGRESQL__PASSWORD: "file:///run/secrets/postgres-master"
|
||||
# Optional: Set error reporting (set to false for privacy)
|
||||
AUTHENTIK_ERROR_REPORTING__ENABLED: "false"
|
||||
secrets:
|
||||
- auth-key
|
||||
- postgres-master
|
||||
volumes:
|
||||
- /home/doc/projects/swarm-data/appdata/authentik/media:/media
|
||||
- /home/doc/projects/swarm-data/appdata/authentik/templates:/templates
|
||||
- /var/run/docker.sock:/var/run/docker.sock
|
||||
networks:
|
||||
- homelab
|
||||
deploy:
|
||||
replicas: 1
|
||||
resources:
|
||||
limits:
|
||||
memory: 1G
|
||||
cpus: '1.0'
|
||||
reservations:
|
||||
memory: 512M
|
||||
depends_on:
|
||||
- redis
|
||||
|
||||
networks:
|
||||
homelab:
|
||||
external: true
|
||||
secrets:
|
||||
postgres-master:
|
||||
external: true
|
||||
auth-key:
|
||||
external: true
|
||||
@@ -1,34 +0,0 @@
|
||||
services:
|
||||
portainer:
|
||||
image: portainer/portainer-ce:latest
|
||||
command: -H tcp://tasks.agent:9001 --tlsskipverify
|
||||
volumes:
|
||||
- /home/doc/projects/swarm-data/appdata/portainer:/data
|
||||
networks:
|
||||
- homelab
|
||||
ports:
|
||||
- 9000:9000
|
||||
deploy:
|
||||
mode: replicated
|
||||
replicas: 1
|
||||
labels:
|
||||
- "traefik.enable=true"
|
||||
- "traefik.swarm.network=homelab"
|
||||
- "traefik.http.routers.portainer.rule=Host(`portainer.frostlabs.me`)"
|
||||
- "traefik.http.routers.portainer.entrypoints=websecure"
|
||||
- "traefik.http.routers.portainer.tls.certificatesResolvers=cloudflare"
|
||||
- "traefik.http.services.portainer.loadbalancer.server.port=9000"
|
||||
|
||||
agent:
|
||||
image: portainer/agent:latest
|
||||
volumes:
|
||||
- /var/run/docker.sock:/var/run/docker.sock
|
||||
- /var/lib/docker/volumes:/var/lib/docker/volumes
|
||||
networks:
|
||||
- homelab
|
||||
deploy:
|
||||
mode: global
|
||||
|
||||
networks:
|
||||
homelab:
|
||||
external: true
|
||||
@@ -1,20 +0,0 @@
|
||||
services:
|
||||
rsync:
|
||||
image: alpine:latest
|
||||
user: "0:0"
|
||||
command: >
|
||||
sh -c " apk add --no-cache rsync && echo '0 2 * * * rsync -av --no-perms --no-owner --no-group --exclude-from=/excludes.txt /source/ /destination/ && echo \"Sync completed at $$(date)\"' | crontab - && echo 'Backup sync started. Daily sync at 2 AM.' && crond -f -l 2"
|
||||
deploy:
|
||||
replicas: 1
|
||||
restart_policy:
|
||||
condition: on-failure
|
||||
delay: 30s
|
||||
volumes:
|
||||
- /home/doc/projects/swarm-data/appdata:/source:ro
|
||||
- /home/doc/projects/backups:/destination
|
||||
- /home/doc/projects/swarm/conf/rsync-conf/excludes.txt:/excludes.txt:ro
|
||||
networks:
|
||||
- homelab
|
||||
networks:
|
||||
homelab:
|
||||
external: true
|
||||
@@ -5,14 +5,24 @@ services:
|
||||
ports:
|
||||
- 80:80
|
||||
- 443:443
|
||||
- 8080:8080
|
||||
- 8082:8080
|
||||
environment:
|
||||
- CF_DNS_API_TOKEN_FILE=/run/secrets/cloudflare_api_token
|
||||
volumes:
|
||||
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||
#
|
||||
- /home/doc/projects/swarm/conf/traefik-conf/static.yml:/etc/traefik/traefik.yml:ro
|
||||
- /home/doc/projects/swarm/conf/traefik-conf/dynamic.yml:/etc/traefik/dynamic/dynamic.yml:rw
|
||||
- type: bind
|
||||
source: /var/run/docker.sock
|
||||
target: /var/run/docker.sock
|
||||
read_only: true
|
||||
- type: bind
|
||||
source: /home/doc/projects/swarm-data/swarm-production/conf/traefik-conf/static.yml
|
||||
target: /etc/traefik/traefik.yml
|
||||
read_only: true
|
||||
- type: bind
|
||||
source: /home/doc/projects/swarm-data/swarm-production/conf/traefik-conf/dynamic.yml
|
||||
target: /etc/traefik/dynamic/dynamic.yml
|
||||
- type: bind
|
||||
source: /home/doc/projects/swarm-data/appdata/traefik/certificates/acme.json
|
||||
target: /certificates/acme.json
|
||||
secrets:
|
||||
- cloudflare_api_token
|
||||
networks:
|
||||
Reference in New Issue
Block a user