refactor: Update .env.example and local_core.yml for domain configuration
This commit is contained in:
+3
-1
@@ -6,7 +6,9 @@ NETWORK="web"
|
||||
TZ="Asia/Singapore"
|
||||
## dashboard configs
|
||||
HOST="localhost"
|
||||
DOMAINNAME="furyhawk.lol"
|
||||
TLD="lol"
|
||||
DOMAIN="$(hostname).${TLD}"
|
||||
DOMAINNAME="$(hostname).${TLD}"
|
||||
HOSTNAME="node00"
|
||||
DATADIR="/home/furyhawk/media"
|
||||
# subdomain for dashboard.
|
||||
|
||||
@@ -78,7 +78,7 @@ services:
|
||||
- traefik.http.routers.traefik-public-https.entrypoints=https
|
||||
- traefik.http.routers.traefik-public-https.tls=true
|
||||
# Use the "le" (Let's Encrypt) resolver created below
|
||||
# - traefik.http.routers.traefik-public-https.tls.certresolver=le
|
||||
- traefik.http.routers.traefik-public-https.tls.certresolver=le
|
||||
# Enable HTTP Basic auth, using the middleware created above
|
||||
- traefik.http.routers.traefik-public-https.middlewares=admin-auth
|
||||
# Use the special Traefik service api@internal with the web UI/Dashboard
|
||||
@@ -89,7 +89,7 @@ services:
|
||||
# Add Docker as a mounted volume, so that Traefik can read the labels of other services
|
||||
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||
# Mount the volume to store the certificates
|
||||
# - traefik-public-certificates:/certificates
|
||||
- traefik-public-certificates:/certificates
|
||||
- /var/data/config/traefik/certs:/certs:ro
|
||||
# Mount the configuration file for Traefik
|
||||
- /var/data/config/traefik/local_dynamic.yml:/etc/traefik/local_dynamic.yml:ro
|
||||
@@ -126,12 +126,12 @@ services:
|
||||
- --entrypoints.web-socket-secure.address=:8084
|
||||
- --entrypoints.bolt-socket.address=:7687
|
||||
# Create the certificate resolver "le" for Let's Encrypt, uses the environment variable EMAIL
|
||||
# - --certificatesresolvers.le.acme.email=${EMAIL?Variable not set}
|
||||
- --certificatesresolvers.le.acme.email=${EMAIL?Variable not set}
|
||||
# Store the Let's Encrypt certificates in the mounted volume
|
||||
# - --certificatesresolvers.le.acme.caserver=https://acme-staging-v02.api.letsencrypt.org/directory
|
||||
# - --certificatesresolvers.le.acme.storage=/certificates/acme.json
|
||||
- --certificatesresolvers.le.acme.caserver=https://acme-staging-v02.api.letsencrypt.org/directory
|
||||
- --certificatesresolvers.le.acme.storage=/certificates/acme.json
|
||||
# Use the TLS Challenge for Let's Encrypt
|
||||
# - --certificatesresolvers.le.acme.tlschallenge=true
|
||||
- --certificatesresolvers.le.acme.tlschallenge=true
|
||||
# Enable the access log, with HTTP requests
|
||||
- --accesslog=true
|
||||
# Enable the Traefik log, for configurations and errors
|
||||
@@ -174,11 +174,11 @@ services:
|
||||
constraints:
|
||||
- node.role==manager
|
||||
|
||||
# volumes:
|
||||
volumes:
|
||||
# Create a volume to store the certificates, there is a constraint to make sure
|
||||
# Traefik is always deployed to the same Docker node with the same volume containing
|
||||
# the HTTPS certificates
|
||||
# traefik-public-certificates:
|
||||
traefik-public-certificates:
|
||||
|
||||
networks:
|
||||
# Use the previously created public network "traefik-public", shared with other
|
||||
|
||||
Reference in New Issue
Block a user