Compare commits
1 Commits
feature/di
...
feature/di
| Author | SHA1 | Date | |
|---|---|---|---|
| 65ac0c30a5 |
12
dist/foundry/.env.example
vendored
12
dist/foundry/.env.example
vendored
@@ -1,12 +0,0 @@
|
||||
SERVICE_DOMAIN=foundry.example.com
|
||||
|
||||
FOUNDRY_PASSWORD=password
|
||||
FOUNDRY_USERNAME=admin@example.com
|
||||
FOUNDRY_ADMIN_KEY=admin
|
||||
FOUNDRY_LICENSE_KEY="XXXX-XXXX-XXXX-XXXX-XXX-XXXX"
|
||||
FOUNDRY_LANGUAGE=fr.core
|
||||
CONTAINER_PRESERVE_CONFIG=true
|
||||
CONTAINER_VERBOSE=true
|
||||
TZ="Europe/Paris"
|
||||
USER_UID=1001
|
||||
USER_GID=1001
|
||||
32
dist/foundry/compose.yaml
vendored
32
dist/foundry/compose.yaml
vendored
@@ -1,32 +0,0 @@
|
||||
networks:
|
||||
traefik-network:
|
||||
external: true
|
||||
services:
|
||||
foundry:
|
||||
container_name: foundry
|
||||
image: felddy/foundryvtt:13
|
||||
labels:
|
||||
- "traefik.enable=true"
|
||||
- "traefik.http.routers.foundry.rule=Host(`${SERVICE_DOMAIN}`)"
|
||||
- "traefik.http.routers.foundry.entrypoints=https"
|
||||
- "traefik.http.routers.foundry.tls.certresolver=letsencrypt"
|
||||
- "traefik.http.routers.foundry.service=foundry-service"
|
||||
- "traefik.http.services.foundry-service.loadbalancer.server.port=30000"
|
||||
networks:
|
||||
- traefik-network
|
||||
volumes:
|
||||
- "./data:/data"
|
||||
environment:
|
||||
- FOUNDRY_USERNAME=${FOUNDRY_USERNAME}
|
||||
- FOUNDRY_PASSWORD=${FOUNDRY_PASSWORD}
|
||||
- FOUNDRY_ADMIN_KEY=${FOUNDRY_ADMIN_KEY}
|
||||
- FOUNDRY_LICENSE_KEY=${FOUNDRY_LICENSE_KEY}
|
||||
- FOUNDRY_LANGUAGE=${FOUNDRY_LANGUAGE}
|
||||
- FOUNDRY_HOSTNAME=${SERVICE_DOMAIN}
|
||||
- CONTAINER_PRESERVE_CONFIG=${CONTAINER_PRESERVE_CONFIG}
|
||||
- CONTAINER_VERBOSE=${CONTAINER_VERBOSE}
|
||||
- TZ=${TZ}
|
||||
- PUID=${USER_UID}
|
||||
- PGID=${USER_GID}
|
||||
user: ${USER_UID}:${USER_GID}
|
||||
restart: unless-stopped
|
||||
5
dist/wg-easy/.env.template
vendored
Normal file
5
dist/wg-easy/.env.template
vendored
Normal file
@@ -0,0 +1,5 @@
|
||||
BASE_DOMAIN=example.com
|
||||
SERVICE_DOMAIN=wg-easy.example.com
|
||||
|
||||
WG_NETWORK_SUBNET=10.42.42.0/24
|
||||
WG_NETWORK_ADDRESS=10.42.42.42
|
||||
41
dist/wg-easy/compose.yaml
vendored
Normal file
41
dist/wg-easy/compose.yaml
vendored
Normal file
@@ -0,0 +1,41 @@
|
||||
services:
|
||||
wg-easy:
|
||||
|
||||
image: ghcr.io/wg-easy/wg-easy:15
|
||||
container_name: wg-easy
|
||||
networks:
|
||||
traefik-network: {}
|
||||
wg:
|
||||
ipv4_address: ${WG_NETWORK_ADDRESS}
|
||||
volumes:
|
||||
- ./etc_wireguard:/etc/wireguard
|
||||
- /lib/modules:/lib/modules:ro
|
||||
environment:
|
||||
- WG_HOST=${SERVICE_DOMAIN}
|
||||
ports:
|
||||
- "51820:51820/udp"
|
||||
restart: unless-stopped
|
||||
cap_add:
|
||||
- NET_ADMIN
|
||||
- SYS_MODULE
|
||||
sysctls:
|
||||
- net.ipv4.ip_forward=1
|
||||
- net.ipv4.conf.all.src_valid_mark=1
|
||||
labels:
|
||||
- "traefik.enable=true"
|
||||
- "traefik.http.routers.wg-easy.rule=Host(`${SERVICE_DOMAIN}`)"
|
||||
- "traefik.http.routers.wg-easy.entrypoints=https"
|
||||
- "traefik.http.routers.wg-easy.tls.certresolver=letsencrypt"
|
||||
- "traefik.http.routers.wg-easy-service.service=wg-easy"
|
||||
- "traefik.http.services.wg-easy-service.loadbalancer.server.port=51821"
|
||||
|
||||
networks:
|
||||
traefik-network:
|
||||
external: true
|
||||
wg:
|
||||
driver: bridge
|
||||
enable_ipv6: false
|
||||
ipam:
|
||||
driver: default
|
||||
config:
|
||||
- subnet: ${WG_NETWORK_SUBNET}
|
||||
Reference in New Issue
Block a user