diff --git a/.env.example b/.env.example index 97e5c11..a537578 100644 --- a/.env.example +++ b/.env.example @@ -6,7 +6,9 @@ NETWORK="web" TZ="Asia/Singapore" ## dashboard configs HOST="localhost" -DOMAINNAME="furyhawk.lol" +TLD="lol" +DOMAIN="$(hostname).${TLD}" +DOMAINNAME="$(hostname).${TLD}" HOSTNAME="node00" DATADIR="/home/furyhawk/media" # subdomain for dashboard. diff --git a/swarm/local_core.yml b/swarm/local_core.yml index 27a4340..dbfd505 100644 --- a/swarm/local_core.yml +++ b/swarm/local_core.yml @@ -78,7 +78,7 @@ services: - traefik.http.routers.traefik-public-https.entrypoints=https - traefik.http.routers.traefik-public-https.tls=true # Use the "le" (Let's Encrypt) resolver created below - # - traefik.http.routers.traefik-public-https.tls.certresolver=le + - traefik.http.routers.traefik-public-https.tls.certresolver=le # Enable HTTP Basic auth, using the middleware created above - traefik.http.routers.traefik-public-https.middlewares=admin-auth # Use the special Traefik service api@internal with the web UI/Dashboard @@ -89,7 +89,7 @@ services: # Add Docker as a mounted volume, so that Traefik can read the labels of other services - /var/run/docker.sock:/var/run/docker.sock:ro # Mount the volume to store the certificates - # - traefik-public-certificates:/certificates + - traefik-public-certificates:/certificates - /var/data/config/traefik/certs:/certs:ro # Mount the configuration file for Traefik - /var/data/config/traefik/local_dynamic.yml:/etc/traefik/local_dynamic.yml:ro @@ -126,12 +126,12 @@ services: - --entrypoints.web-socket-secure.address=:8084 - --entrypoints.bolt-socket.address=:7687 # Create the certificate resolver "le" for Let's Encrypt, uses the environment variable EMAIL - # - --certificatesresolvers.le.acme.email=${EMAIL?Variable not set} + - --certificatesresolvers.le.acme.email=${EMAIL?Variable not set} # Store the Let's Encrypt certificates in the mounted volume - # - --certificatesresolvers.le.acme.caserver=https://acme-staging-v02.api.letsencrypt.org/directory - # - --certificatesresolvers.le.acme.storage=/certificates/acme.json + - --certificatesresolvers.le.acme.caserver=https://acme-staging-v02.api.letsencrypt.org/directory + - --certificatesresolvers.le.acme.storage=/certificates/acme.json # Use the TLS Challenge for Let's Encrypt - # - --certificatesresolvers.le.acme.tlschallenge=true + - --certificatesresolvers.le.acme.tlschallenge=true # Enable the access log, with HTTP requests - --accesslog=true # Enable the Traefik log, for configurations and errors @@ -174,11 +174,11 @@ services: constraints: - node.role==manager -# volumes: +volumes: # Create a volume to store the certificates, there is a constraint to make sure # Traefik is always deployed to the same Docker node with the same volume containing # the HTTPS certificates - # traefik-public-certificates: + traefik-public-certificates: networks: # Use the previously created public network "traefik-public", shared with other