1 Commits

Author SHA1 Message Date
a9c73db45c feat: Added Traefik
- Added compose.yaml file containg also certs-dumper to extract certificates
- Added traefik.yaml configuration file
2026-02-01 00:28:58 +01:00
5 changed files with 72 additions and 44 deletions

View File

@@ -1,12 +0,0 @@
SERVICE_DOMAIN=foundry.example.com
FOUNDRY_PASSWORD=password
FOUNDRY_USERNAME=admin@example.com
FOUNDRY_ADMIN_KEY=admin
FOUNDRY_LICENSE_KEY="XXXX-XXXX-XXXX-XXXX-XXX-XXXX"
FOUNDRY_LANGUAGE=fr.core
CONTAINER_PRESERVE_CONFIG=true
CONTAINER_VERBOSE=true
TZ="Europe/Paris"
USER_UID=1001
USER_GID=1001

View File

@@ -1,32 +0,0 @@
networks:
traefik-network:
external: true
services:
foundry:
container_name: foundry
image: felddy/foundryvtt:13
labels:
- "traefik.enable=true"
- "traefik.http.routers.foundry.rule=Host(`${SERVICE_DOMAIN}`)"
- "traefik.http.routers.foundry.entrypoints=https"
- "traefik.http.routers.foundry.tls.certresolver=letsencrypt"
- "traefik.http.routers.foundry.service=foundry-service"
- "traefik.http.services.foundry-service.loadbalancer.server.port=30000"
networks:
- traefik-network
volumes:
- "./data:/data"
environment:
- FOUNDRY_USERNAME=${FOUNDRY_USERNAME}
- FOUNDRY_PASSWORD=${FOUNDRY_PASSWORD}
- FOUNDRY_ADMIN_KEY=${FOUNDRY_ADMIN_KEY}
- FOUNDRY_LICENSE_KEY=${FOUNDRY_LICENSE_KEY}
- FOUNDRY_LANGUAGE=${FOUNDRY_LANGUAGE}
- FOUNDRY_HOSTNAME=${SERVICE_DOMAIN}
- CONTAINER_PRESERVE_CONFIG=${CONTAINER_PRESERVE_CONFIG}
- CONTAINER_VERBOSE=${CONTAINER_VERBOSE}
- TZ=${TZ}
- PUID=${USER_UID}
- PGID=${USER_GID}
user: ${USER_UID}:${USER_GID}
restart: unless-stopped

4
dist/traefik/.env.template vendored Normal file
View File

@@ -0,0 +1,4 @@
BASE_DOMAIN=example.com
SERVICE_DOMAIN=traefik.example.com
# admin:admin
DASHBOARD_HTPASSWORD=admin:$2b$10$1DxaLIdVmJVNcQUmMxdfiOjlnp2gDKiMQjpTNxagVJEoTGTUOfVnG

42
dist/traefik/compose.yaml vendored Normal file
View File

@@ -0,0 +1,42 @@
networks:
traefik-network:
services:
traefik:
image: traefik:v3.6.4
container_name: traefik
restart: unless-stopped
dns:
- 1.1.1.1
- 8.8.8.8
ports:
- 80:80
- 443:443
labels:
- "traefik.enable=true"
- "traefik.http.routers.dashboard.rule=Host(`${SERVICE_DOMAIN}`)"
- "traefik.http.routers.dashboard.entrypoints=https"
- "traefik.http.routers.dashboard.service=api@internal"
- "traefik.http.routers.dashboard.tls.certresolver=letsencrypt"
- "traefik.http.routers.dashboard.middlewares=dashboard-auth"
- "traefik.http.middlewares.dashboard-auth.basicauth.users=${DASHBOARD_HTPASSWORD}"
command:
- "--log.level=DEBUG"
volumes:
- /var/run/docker.sock:/var/run/docker.sock:ro
- ./traefik.yaml:/traefik.yaml:ro
- ./acme.json:/acme.json
- ./certs:/certs
networks:
- traefik-network
traefik-certs-dumper:
image: ldez/traefik-certs-dumper:v2.9.3
container_name: traefik-certs-dumper
restart: unless-stopped
volumes:
- ./acme.json:/acme.json:ro
- ./certs:/output
environment:
- DOMAIN=${BASE_DOMAIN}
command: "file --version v2 --watch --source /acme.json --dest /output"

26
dist/traefik/traefik.yaml vendored Normal file
View File

@@ -0,0 +1,26 @@
api:
insecure: false
dashboard: true
entryPoints:
http:
address: ":80"
http:
redirections:
entryPoint:
to: https
scheme: https
https:
address: ":443"
providers:
docker:
exposedByDefault: false
certificatesResolvers:
letsencrypt:
acme:
email: YOUR_EMAIL@example.com
storage: /acme.json
httpChallenge:
entryPoint: web