docker-compose.yml 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164
  1. version: "3.9"
  2. networks:
  3. home_network:
  4. name: "home_network"
  5. volumes:
  6. pihole_config_etc:
  7. pihole_config_dnsmasq:
  8. heimdall_config:
  9. git_data:
  10. postgres_data:
  11. services:
  12. traefik:
  13. image: traefik:v2.9
  14. command: --api.insecure=true
  15. ports:
  16. - "10.10.20.251:80:80/tcp"
  17. - "10.10.20.251:443:443/tcp"
  18. - "10.10.20.254:8080:8080/tcp"
  19. networks:
  20. - "home_network"
  21. volumes:
  22. # So that Traefik can listen to the Docker events
  23. - /var/run/docker.sock:/var/run/docker.sock
  24. - ./traefik:/etc/traefik/
  25. traefik-forward-auth:
  26. image: thomseddon/traefik-forward-auth:2
  27. env_file: traefik/traefik-forward-auth.env
  28. labels: # you only need these if you're using an auth host
  29. - traefik.enable=true
  30. - traefik.http.routers.auth.rule=Host(`auth.playne.au`)
  31. - traefik.http.routers.auth.entrypoints=websecure
  32. - traefik.http.routers.auth.tls=true
  33. - traefik.http.routers.auth.tls.domains[0].main=auth.playne.au
  34. # - traefik.http.routers.auth.tls.domains[0].sans=*.auth.playne.au
  35. - traefik.http.routers.auth.tls.certresolver=le
  36. - traefik.http.routers.auth.service=auth@docker
  37. - traefik.http.services.auth.loadbalancer.server.port=4181
  38. - traefik.http.middlewares.forward-auth.forwardauth.address=http://traefik-forward-auth:4181
  39. - traefik.http.middlewares.forward-auth.forwardauth.trustForwardHeader=true
  40. - traefik.http.middlewares.forward-auth.forwardauth.authResponseHeaders=X-Forwarded-User
  41. - traefik.http.routers.auth.middlewares=forward-auth
  42. heimdall:
  43. environment:
  44. - PGID=1000
  45. - PUID=1000
  46. image: ghcr.io/linuxserver/heimdall
  47. ports:
  48. - "10.10.20.254:80:80/tcp"
  49. restart: unless-stopped
  50. networks:
  51. - "home_network"
  52. volumes:
  53. - heimdall_config:/config:rw
  54. - /etc/timezone:/etc/timezone:ro
  55. - /etc/localtime:/etc/localtime:ro
  56. labels:
  57. - traefik.http.routers.heimdall.rule=Host(`media.playne.au`)
  58. - traefik.http.routers.heimdall.tls=true
  59. - traefik.http.routers.heimdall.tls.certresolver=le
  60. - traefik.http.routers.heimdall.entrypoints=websecure
  61. - traefik.http.routers.heimdall.middlewares=forward-auth
  62. - traefik.http.services.heimdall.loadbalancer.healthCheck.path=/
  63. pihole:
  64. dns:
  65. - 202.142.142.142
  66. - 202.142.142.242
  67. environment:
  68. - PUID=1000
  69. - CONDITIONAL_FORWARDING_IP=10.10.20.1
  70. - CONDITIONAL_FORWARDING_DOMAIN=playne.id.au
  71. - DNS2=202.142.142.242
  72. - ServerIP=10.10.20.253
  73. - CONDITIONAL_FORWARDING=True
  74. - DNS1=202.142.142.142
  75. - PGID=1000
  76. - DNS_IPv6=2403:5800:c100:7802::feed
  77. - DNS_IP=10.10.20.253
  78. - IPv6=True
  79. image: pihole/pihole:latest
  80. ports:
  81. - "10.10.20.253:443:443/tcp"
  82. - "10.10.20.253:53:53/tcp"
  83. - "10.10.20.253:53:53/udp"
  84. - "10.10.20.253:80:80/tcp"
  85. restart: unless-stopped
  86. volumes:
  87. - /etc/timezone:/etc/timezone:ro
  88. - /etc/localtime:/etc/localtime:ro
  89. - pihole_config_etc:/etc/pihole:rw
  90. - pihole_config_dnsmasq:/etc/dnsmasq.d:rw
  91. git:
  92. image: gogs/gogs
  93. ports:
  94. - "10022:22"
  95. - "3000:3000"
  96. networks:
  97. - "home_network"
  98. volumes:
  99. - git_data:/data
  100. labels:
  101. - traefik.http.routers.git.rule=Host(`git.playne.au`)
  102. - traefik.http.routers.git.tls=true
  103. - traefik.http.routers.git.tls.certresolver=le
  104. - traefik.http.routers.git.entrypoints=websecure
  105. - traefik.http.services.git.loadbalancer.server.port=3000
  106. # - traefik.tcp.routers.git.entrypoints[0]=gitssh
  107. # - traefik.tcp.routers.git.rule=HostSNI(`*`)
  108. # - traefik.tcp.services.git.loadbalancer.server.port=10022
  109. nextcloud:
  110. image: nextcloud
  111. restart: unless-stopped
  112. ports:
  113. - "10.10.20.252:80:80/tcp"
  114. networks:
  115. - "home_network"
  116. volumes:
  117. - /mnt/documents/files/cloud/:/var/www/html
  118. environment:
  119. - POSTGRES_DB=nextcloud
  120. - POSTGRES_USER=nextcloud
  121. - POSTGRES_PASSWORD=nextcloud
  122. - POSTGRES_HOST=postgres
  123. depends_on:
  124. - postgres
  125. labels:
  126. - traefik.http.routers.nextcloud.rule=Host(`cloud.playne.au`)
  127. - traefik.http.routers.nextcloud.tls=true
  128. - traefik.http.routers.nextcloud.tls.certresolver=le
  129. - traefik.http.routers.nextcloud.middlewares=nextcloud_redirectregex
  130. - traefik.http.routers.nextcloud.entrypoints=websecure
  131. - traefik.http.middlewares.nextcloud_redirectregex.redirectregex.permanent=true
  132. - traefik.http.middlewares.nextcloud_redirectregex.redirectregex.regex='https://(.*)/.well-known/(?:card|cal)dav'
  133. - traefik.http.middlewares.nextcloud_redirectregex.redirectregex.replacement='https://$${1}/remote.php/dav'
  134. postgres:
  135. image: postgres:14
  136. ports:
  137. - "5432"
  138. networks:
  139. - "home_network"
  140. volumes:
  141. - postgres_data:/var/lib/postgresql/data
  142. environment:
  143. - POSTGRES_PASSWORD=nextcloud
  144. - POSTGRES_USER=nextcloud
  145. - POSTGRES_DB=nextcloud
  146. watchtower:
  147. image: containrrr/watchtower
  148. environment:
  149. - WATCHTOWER_CLEANUP=true
  150. networks:
  151. - "home_network"
  152. volumes:
  153. - /var/run/docker.sock:/var/run/docker.sock