From 4df11ebb46d194627892c5ec45d236caebc23a24 Mon Sep 17 00:00:00 2001 From: hotstovejer Date: Mon, 9 Jun 2025 12:03:31 -0500 Subject: [PATCH] Update docker-compose.yml --- docker-compose.yml | 67 ++++++++++++++++++++++++++++++++++------------ 1 file changed, 50 insertions(+), 17 deletions(-) diff --git a/docker-compose.yml b/docker-compose.yml index 0593fd5..60a1bc7 100644 --- a/docker-compose.yml +++ b/docker-compose.yml @@ -1,21 +1,54 @@ +secrets: + cf-token: + file: ./cf-token services: - traefik: - image: "traefik:v3.4" - container_name: "traefik" - command: - #- "--log.level=DEBUG" - - "--api.insecure=true" - - "--providers.docker=true" - - "--providers.docker.exposedbydefault=false" - - "--entryPoints.websecure.address=:443" - - "--certificatesresolvers.myresolver.acme.tlschallenge=true" - #- "--certificatesresolvers.myresolver.acme.caserver=https://acme-staging-v02.api.letsencrypt.org/directory" - - "--certificatesresolvers.myresolver.acme.email=jeremymigonis@gmail.com" - - "--certificatesresolvers.myresolver.acme.storage=/letsencrypt/acme.json" + image: traefik:3.4 # or traefik:v3.3 to pin a version + container_name: traefik + restart: unless-stopped + security_opt: + - no-new-privileges:true # helps to increase security + secrets: + - cf-token # the secret at the top of this file + env_file: + - .env # store other secrets e.g., dashboard password + networks: + proxy: ports: - - "443:443" - - "8080:8080" + - 80:80 + - 443:443 + # - 10000:10000 # optional + # - 33073:33073 # optional + environment: + - TRAEFIK_DASHBOARD_CREDENTIALS=${TRAEFIK_DASHBOARD_CREDENTIALS} + # - CF_API_EMAIL=your@email.com # Cloudflare email + # - CF_DNS_API_TOKEN=YOUR-TOKEN # Cloudflare API Token + - CF_DNS_API_TOKEN_FILE=/run/secrets/cf-token # see https://doc.traefik.io/traefik/https/acme/#providers + # token file is the proper way to do it volumes: - - "./letsencrypt:/letsencrypt" - - "/var/run/docker.sock:/var/run/docker.sock:ro" \ No newline at end of file + - /etc/localtime:/etc/localtime:ro + - /var/run/docker.sock:/var/run/docker.sock:ro + - /home/localadmin/docker/traefik/traefik.yaml:/traefik.yaml:ro + - /home/localadmin/docker/traefik/acme.json:/acme.json + - /home/localadmin/docker/traefik/config.yaml:/config.yaml:ro + - /home/localadmin/docker/traefik/logs:/var/log/traefik + labels: + - "traefik.enable=true" + - "traefik.http.routers.traefik.entrypoints=http" + - "traefik.http.routers.traefik.rule=Host(`traefik.migonis.dom`)" + - "traefik.http.middlewares.traefik-auth.basicauth.users=${TRAEFIK_DASHBOARD_CREDENTIALS}" + - "traefik.http.middlewares.traefik-https-redirect.redirectscheme.scheme=https" + - "traefik.http.middlewares.sslheader.headers.customrequestheaders.X-Forwarded-Proto=https" + - "traefik.http.routers.traefik.middlewares=traefik-https-redirect" + - "traefik.http.routers.traefik-secure.entrypoints=https" + - "traefik.http.routers.traefik-secure.rule=Host(`traefik.migonis.dom`)" + - "traefik.http.routers.traefik-secure.middlewares=traefik-auth" + - "traefik.http.routers.traefik-secure.tls=true" + - "traefik.http.routers.traefik-secure.tls.certresolver=cloudflare" + - "traefik.http.routers.traefik-secure.tls.domains[0].main=migonis.tech" + - "traefik.http.routers.traefik-secure.tls.domains[0].sans=*.migonis.tech" + - "traefik.http.routers.traefik-secure.service=api@internal" + +networks: + proxy: + external: true # or comment this line to auto create the network \ No newline at end of file