refactor: Update .env.example and local_core.yml for domain configuration

This commit is contained in:
2024-09-05 20:26:47 +08:00
parent 8706b82009
commit 84b0cb09fb
2 changed files with 11 additions and 9 deletions
+3 -1
View File
@@ -6,7 +6,9 @@ NETWORK="web"
TZ="Asia/Singapore"
## dashboard configs
HOST="localhost"
DOMAINNAME="furyhawk.lol"
TLD="lol"
DOMAIN="$(hostname).${TLD}"
DOMAINNAME="$(hostname).${TLD}"
HOSTNAME="node00"
DATADIR="/home/furyhawk/media"
# subdomain for dashboard.
+8 -8
View File
@@ -78,7 +78,7 @@ services:
- traefik.http.routers.traefik-public-https.entrypoints=https
- traefik.http.routers.traefik-public-https.tls=true
# Use the "le" (Let's Encrypt) resolver created below
# - traefik.http.routers.traefik-public-https.tls.certresolver=le
- traefik.http.routers.traefik-public-https.tls.certresolver=le
# Enable HTTP Basic auth, using the middleware created above
- traefik.http.routers.traefik-public-https.middlewares=admin-auth
# Use the special Traefik service api@internal with the web UI/Dashboard
@@ -89,7 +89,7 @@ services:
# Add Docker as a mounted volume, so that Traefik can read the labels of other services
- /var/run/docker.sock:/var/run/docker.sock:ro
# Mount the volume to store the certificates
# - traefik-public-certificates:/certificates
- traefik-public-certificates:/certificates
- /var/data/config/traefik/certs:/certs:ro
# Mount the configuration file for Traefik
- /var/data/config/traefik/local_dynamic.yml:/etc/traefik/local_dynamic.yml:ro
@@ -126,12 +126,12 @@ services:
- --entrypoints.web-socket-secure.address=:8084
- --entrypoints.bolt-socket.address=:7687
# Create the certificate resolver "le" for Let's Encrypt, uses the environment variable EMAIL
# - --certificatesresolvers.le.acme.email=${EMAIL?Variable not set}
- --certificatesresolvers.le.acme.email=${EMAIL?Variable not set}
# Store the Let's Encrypt certificates in the mounted volume
# - --certificatesresolvers.le.acme.caserver=https://acme-staging-v02.api.letsencrypt.org/directory
# - --certificatesresolvers.le.acme.storage=/certificates/acme.json
- --certificatesresolvers.le.acme.caserver=https://acme-staging-v02.api.letsencrypt.org/directory
- --certificatesresolvers.le.acme.storage=/certificates/acme.json
# Use the TLS Challenge for Let's Encrypt
# - --certificatesresolvers.le.acme.tlschallenge=true
- --certificatesresolvers.le.acme.tlschallenge=true
# Enable the access log, with HTTP requests
- --accesslog=true
# Enable the Traefik log, for configurations and errors
@@ -174,11 +174,11 @@ services:
constraints:
- node.role==manager
# volumes:
volumes:
# Create a volume to store the certificates, there is a constraint to make sure
# Traefik is always deployed to the same Docker node with the same volume containing
# the HTTPS certificates
# traefik-public-certificates:
traefik-public-certificates:
networks:
# Use the previously created public network "traefik-public", shared with other