Compare commits

...

24 Commits

Author SHA1 Message Date
PorridgePi
c3c6826fc8 traefik: feat: Add custom error pages 2022-09-26 02:06:46 +01:00
PorridgePi
aa44a7edf2 uptime-kuma: feat: Add docker support 2022-09-26 01:58:43 +01:00
PorridgePi
28df96cac8 pihole: feat: Add traefik reverse proxy 2022-09-26 01:58:20 +01:00
PorridgePi
d683f2a17b traefik: feat: Reverse proxy for homeassistant in host mode 2022-09-26 01:53:01 +01:00
PorridgePi
757a5e4f0c homeassistant: feat: Use host mode networking 2022-09-26 01:52:11 +01:00
PorridgePi
ef3e441b15 freshrss: Initial commit 2022-09-24 12:58:46 +01:00
PorridgePi
b637789816 homeassistant: Initial commit 2022-09-24 12:37:52 +01:00
PorridgePi
7b366ef150 nextcloud: !fix: Remove extraneous services definition line 2022-09-24 12:16:55 +01:00
PorridgePi
2bf7928579 traefik: gitignore: feat: Add certs directory 2022-09-24 12:06:41 +01:00
PorridgePi
b46745df14 traefik: feat: Add static IP and disable SSL cert verification for nextcloud 2022-09-24 12:05:33 +01:00
PorridgePi
903c153dc3 nextcloud: feat: Add collabora 2022-09-24 12:02:22 +01:00
PorridgePi
1554e4a9ba nextcloud: Initial commit 2022-09-24 11:59:11 +01:00
PorridgePi
e231d7872c syncthing: feat: Add example .env file 2022-09-24 11:42:40 +01:00
PorridgePi
b77cddd766 syncthing: feat: Add vaultwarden-data volume mount 2022-09-24 11:41:45 +01:00
PorridgePi
9678d62027 flame: feat: Add example .env file 2022-09-24 11:40:13 +01:00
PorridgePi
09978dabd1 flame: chore: Use env variables instead of actual values 2022-09-24 11:38:52 +01:00
PorridgePi
d953b10c0a gitignore: feat: Add ._ files 2022-09-24 11:37:16 +01:00
PorridgePi
ccab3a253a traefik: feat: Add Netease Music proxy 2022-09-22 09:12:01 +01:00
PorridgePi
72d06db083 uptime-kuma: Initial commit 2022-09-21 11:41:05 +01:00
PorridgePi
79d53f793a vaultwarden: Initial commit 2022-09-21 11:24:48 +01:00
PorridgePi
a1d45e7385 syncthing: Initial commit 2022-09-21 04:12:48 +01:00
PorridgePi
17521c70e4 pihole: feat: Change of arch via env file 2022-09-20 15:12:08 +01:00
PorridgePi
eb1b74dbb2 pihole: fix: Update path of data directories 2022-09-20 14:56:53 +01:00
PorridgePi
11b3bb0425 pihole: fix: Update to unbound-data directory in script 2022-09-20 14:54:15 +01:00
24 changed files with 336 additions and 6 deletions

1
.gitignore vendored
View File

@@ -1,5 +1,6 @@
# macOS # macOS
.DS_Store .DS_Store
._*
# Ignore Docker env files # Ignore Docker env files
*.env *.env

2
flame/.env.example Normal file
View File

@@ -0,0 +1,2 @@
FLAME_PASSWORD=password_goes_here
FLAME_ROUTERS_RULE=Host(`domain_goes_here`) || Host(`domain_goes_here`)

View File

@@ -20,7 +20,7 @@ services:
- public - public
labels: labels:
- "traefik.enable=true" - "traefik.enable=true"
- "traefik.http.routers.flame.rule=Host(`ykz.app`) || Host(`www.ykz.app`)" - "traefik.http.routers.flame.rule=${FLAME_ROUTERS_RULE}"
- "traefik.http.routers.flame.middlewares=redirect-www@docker" - "traefik.http.routers.flame.middlewares=redirect-www@docker"
- "traefik.http.middlewares.redirect-www.redirectregex.regex=^https?://www\\.(.+)" - "traefik.http.middlewares.redirect-www.redirectregex.regex=^https?://www\\.(.+)"
- "traefik.http.middlewares.redirect-www.redirectregex.replacement=https://$${1}" - "traefik.http.middlewares.redirect-www.redirectregex.replacement=https://$${1}"

11
freshrss/.env.example Normal file
View File

@@ -0,0 +1,11 @@
# set IS_ARM to :arm for ARM version
IS_ARM=
FRESHRSS_DOMAIN=freshrss.ykz.app
CRON_MIN=2,32
# Variables below are only used at the very first run
ADMIN_USERNAME=admin_username_goes_here
ADMIN_EMAIL=admin_email_goes_here
ADMIN_PASSWORD=admin_password_goes_here
ADMIN_API_PASSWORD=admin_api_password_goes_here

View File

@@ -0,0 +1,48 @@
version: "3.9"
networks:
public:
external: true
services:
freshrss:
image: freshrss/freshrss${IS_ARM}
container_name: freshrss
restart: always
logging:
options:
max-size: 10m
volumes:
- "./freshrss-data:/var/www/FreshRSS/data"
- "./freshrss-extensions-data:/var/www/FreshRSS/extensions"
environment:
TZ: Asia/Singapore
CRON_MIN: '${CRON_MIN}'
FRESHRSS_INSTALL: |-
--api_enabled
--default_user ${ADMIN_USERNAME}
--language en
FRESHRSS_USER: |-
--api_password ${ADMIN_API_PASSWORD}
--email ${ADMIN_EMAIL}
--language en
--password ${ADMIN_PASSWORD}
--user ${ADMIN_USERNAME}
# ports:
# - "80:80"
networks:
- public
labels:
- "traefik.enable=true"
- "traefik.http.routers.freshrss.rule=Host(`${FRESHRSS_DOMAIN}`)"
- "traefik.http.routers.freshrss.service=freshrss-service"
- "traefik.http.services.freshrss-service.loadbalancer.server.port=80"
- "traefik.http.routers.freshrss.tls=true"
- "traefik.http.routers.freshrss.tls.certresolver=le"
- traefik.http.middlewares.freshrssM1.compress=true
- traefik.http.middlewares.freshrssM2.headers.browserXssFilter=true
- traefik.http.middlewares.freshrssM2.headers.forceSTSHeader=true
- traefik.http.middlewares.freshrssM2.headers.frameDeny=true
- traefik.http.middlewares.freshrssM2.headers.referrerPolicy=no-referrer-when-downgrade
- traefik.http.middlewares.freshrssM2.headers.stsSeconds=31536000
- traefik.http.routers.freshrss.middlewares=freshrssM1,freshrssM2

View File

@@ -0,0 +1 @@
HOMEASSISTANT_DOMAIN=domain_goes_here

View File

@@ -0,0 +1,11 @@
version: "3.9"
services:
homeassistant:
image: "ghcr.io/home-assistant/home-assistant:stable"
container_name: homeassistant
restart: always
volumes:
- "./homeassistant-config-data:/config"
- "/etc/localtime:/etc/localtime:ro"
network_mode: host

4
nextcloud/.env.example Normal file
View File

@@ -0,0 +1,4 @@
NEXTCLOUD_DOMAIN=nextcloud_domain_goes_here
DB_ROOT_PASSWORD=mariadb_root_password_goes_here
NEXTCLOUD_DB_PASSWORD=mariadb_nextcloud_user_password_goes_here
COLLABORA_DOMAIN=collabora_domain_goes_here

View File

@@ -0,0 +1,76 @@
version: "3.9"
networks:
public:
external: true
services:
nextcloud:
image: lscr.io/linuxserver/nextcloud:latest
container_name: nextcloud
restart: always
volumes:
- "./nextcloud-config-data:/config"
- "./nextcloud-data:/data"
environment:
- "PUID=1000"
- "PGID=1000"
- "TZ=Asia/Singapore"
# ports:
# - "443:443"
networks:
- public
labels:
- "traefik.enable=true"
- "traefik.http.routers.nextcloud.rule=Host(`${NEXTCLOUD_DOMAIN}`)"
- "traefik.http.routers.nextcloud.service=nextcloud-service"
- "traefik.http.services.nextcloud-service.loadbalancer.server.port=443"
- "traefik.http.services.nextcloud-service.loadbalancer.server.scheme=https"
- "traefik.http.routers.nextcloud.tls=true"
- "traefik.http.routers.nextcloud.tls.certresolver=le"
# Nextcloud DAV services discovery
- "traefik.http.middlewares.nextcloud-redirectregex.redirectregex.regex=https://(.*)/.well-known/(card|cal)dav"
- "traefik.http.middlewares.nextcloud-redirectregex.redirectregex.replacement=https://$${1}/remote.php/dav/"
- "traefik.http.middlewares.nextcloud-redirectregex.redirectregex.permanent=true"
# HSTS
- "traefik.http.middlewares.nextcloud-headers.headers.stsSeconds=15552000"
# Apply middlewares
- "traefik.http.routers.nextcloud.middlewares=nextcloud-redirectregex,nextcloud-headers"
mariadb:
image: lscr.io/linuxserver/mariadb:latest
container_name: mariadb
restart: always
volumes:
- "./mariadb-data:/config"
environment:
- "PUID=1000"
- "PGID=1000"
- "MYSQL_ROOT_PASSWORD=${DB_ROOT_PASSWORD}"
- "TZ=Asia/Singapore"
- "MYSQL_DATABASE=nextcloud_db"
- "MYSQL_USER=nextcloud"
- "MYSQL_PASSWORD=${NEXTCLOUD_DB_PASSWORD}"
# ports:
# - "3306:3306"
networks:
- public
collabora:
image: collabora/code
container_name: collabora
restart: always
environment:
- "domain=${NEXTCLOUD_DOMAIN}"
- "extra_params=--o:ssl.enable=false --o:ssl.termination=true"
# ports:
# - "9980:9980"
networks:
- public
labels:
- "traefik.enable=true"
- "traefik.http.routers.collabora.rule=Host(`${COLLABORA_DOMAIN}`)"
- "traefik.http.routers.collabora.service=collabora-service"
- "traefik.http.services.collabora-service.loadbalancer.server.port=9980"
- "traefik.http.routers.collabora.tls=true"
- "traefik.http.routers.collabora.tls.certresolver=le"

View File

@@ -1,6 +1,8 @@
version: "3.9" version: "3.9"
networks: networks:
public:
external: true
dns_net: dns_net:
name: dns_net name: dns_net
driver: bridge driver: bridge
@@ -16,9 +18,10 @@ services:
ports: ports:
- "53:53/tcp" - "53:53/tcp"
- "53:53/udp" - "53:53/udp"
- "8180:80/tcp" # - "8180:80/tcp"
hostname: pihole hostname: pihole
networks: networks:
public: {}
dns_net: dns_net:
ipv4_address: 172.20.0.10 ipv4_address: 172.20.0.10
environment: environment:
@@ -30,9 +33,21 @@ services:
volumes: volumes:
- "./pihole-data/:/etc/pihole/" - "./pihole-data/:/etc/pihole/"
- "./dnsmasq.d-data/:/etc/dnsmasq.d/" - "./dnsmasq.d-data/:/etc/dnsmasq.d/"
labels:
- "traefik.enable=true"
- "traefik.http.routers.pihole.rule=Host(`${PIHOLE_DOMAIN}`)"
- "traefik.http.routers.pihole.service=pihole-service"
- "traefik.http.services.pihole-service.loadbalancer.server.port=80"
- "traefik.http.routers.pihole.tls=true"
- "traefik.http.routers.pihole.tls.certresolver=le"
# - "traefik.http.middlewares.pihole-admin.addprefix.prefix=/admin"
- "traefik.http.middlewares.pihole-redirect.redirectregex.regex=^https://pihole.ykz.app/$$"
- "traefik.http.middlewares.pihole-redirect.redirectregex.replacement=https://pihole.ykz.app/admin"
- "traefik.http.middlewares.pihole-redirect.redirectregex.permanent=true"
- "traefik.http.routers.pihole.middlewares=pihole-redirect"
unbound: unbound:
image: mvance/unbound-rpi:latest image: mvance/unbound${IS_RPI}:latest
container_name: unbound container_name: unbound
restart: always restart: always
volumes: volumes:

View File

@@ -1,3 +1,3 @@
#!/usr/bin/env bash #!/usr/bin/env bash
wget https://www.internic.net/domain/named.root -O unbound/root.hints wget https://www.internic.net/domain/named.root -O unbound-data/root.hints

2
syncthing/.env.example Normal file
View File

@@ -0,0 +1,2 @@
SYNCTHING_DOMAIN=domain_goes_here
SYNCTHING_HOSTNAME=hostname_goes_here # will appear on dashboard

View File

@@ -0,0 +1,32 @@
version: "3.9"
networks:
public:
external: true
services:
syncthing:
image: syncthing/syncthing
container_name: syncthing
hostname: ${SYNCTHING_HOSTNAME}
restart: always
volumes:
- "./syncthing-data:/var/syncthing"
- "../vaultwarden/vaultwarden-data:/mnt/vaultwarden-data"
environment:
- "PUID=1000"
- "PGID=1000"
ports:
# - "8384:8384" # Web UI
- "22000:22000/tcp" # TCP file transfers
- "22000:22000/udp" # QUIC file transfers
- "21027:21027/udp" # Receive local discovery broadcasts
networks:
- public
labels:
- "traefik.enable=true"
- "traefik.http.routers.syncthing.rule=Host(`${SYNCTHING_DOMAIN}`)"
- "traefik.http.routers.syncthing.service=syncthing-service"
- "traefik.http.services.syncthing-service.loadbalancer.server.port=8384"
- "traefik.http.routers.syncthing.tls=true"
- "traefik.http.routers.syncthing.tls.certresolver=le"

1
traefik/.gitignore vendored
View File

@@ -1 +1,2 @@
acme.json acme.json
certs/

View File

@@ -18,12 +18,15 @@ services:
volumes: volumes:
- "/var/run/docker.sock:/var/run/docker.sock:ro" - "/var/run/docker.sock:/var/run/docker.sock:ro"
- "./acme.json:/acme.json" - "./acme.json:/acme.json"
- "./dynamic:/etc/traefik/dynamic"
- "./certs:/certs"
ports: ports:
- "80:80" - "80:80"
- "443:443" - "443:443"
# - "8080:8080" # - "8080:8080"
networks: networks:
- public public:
ipv4_address: 172.22.0.254
command: command:
- "--log.level=DEBUG" - "--log.level=DEBUG"
- "--api.insecure=true" - "--api.insecure=true"
@@ -33,6 +36,7 @@ services:
- "--entrypoints.web.address=:80" - "--entrypoints.web.address=:80"
- "--entrypoints.web.http.redirections.entryPoint.to=websecure" - "--entrypoints.web.http.redirections.entryPoint.to=websecure"
- "--entrypoints.websecure.address=:443" - "--entrypoints.websecure.address=:443"
- "--providers.file.directory=/etc/traefik/dynamic"
# Let's Encrypt # Let's Encrypt
- "--certificatesresolvers.le.acme.email=${CF_API_EMAIL}" - "--certificatesresolvers.le.acme.email=${CF_API_EMAIL}"
@@ -41,6 +45,7 @@ services:
- "--certificatesresolvers.le.acme.dnschallenge=true" - "--certificatesresolvers.le.acme.dnschallenge=true"
- "--certificatesresolvers.le.acme.dnschallenge.provider=cloudflare" - "--certificatesresolvers.le.acme.dnschallenge.provider=cloudflare"
- "--certificatesresolvers.le.acme.dnschallenge.resolvers=1.1.1.1:53,8.8.8.8:53" - "--certificatesresolvers.le.acme.dnschallenge.resolvers=1.1.1.1:53,8.8.8.8:53"
- "--serversTransport.insecureSkipVerify=true"
labels: labels:
- "traefik.enable=true" - "traefik.enable=true"
- "traefik.http.routers.dashboard.rule=Host(`${TRAEFIK_DOMAIN}`)" - "traefik.http.routers.dashboard.rule=Host(`${TRAEFIK_DOMAIN}`)"
@@ -49,4 +54,32 @@ services:
- "traefik.http.routers.dashboard.tls=true" - "traefik.http.routers.dashboard.tls=true"
- "traefik.http.routers.dashboard.tls.certresolver=le" - "traefik.http.routers.dashboard.tls.certresolver=le"
- "traefik.http.middlewares.dashboard-basicauth.basicauth.users=${BASIC_AUTH_CREDENTIALS}" - "traefik.http.middlewares.dashboard-basicauth.basicauth.users=${BASIC_AUTH_CREDENTIALS}"
- "traefik.http.routers.dashboard.middlewares=dashboard-basicauth@docker" - "traefik.http.routers.dashboard.middlewares=dashboard-basicauth,error-pages-middleware"
error-pages:
image: tarampampam/error-pages
container_name: error-pages
restart: always
environment:
TEMPLATE_NAME: lost-in-space
SHOW_DETAILS: true
labels:
traefik.enable: true
# use as "fallback" for any NON-registered services (with priority below normal)
traefik.http.routers.error-pages.rule: HostRegexp(`{host:.+}`) || Host(`error.ykz.app`)
traefik.http.routers.error-pages.priority: 10
# "errors" middleware settings
traefik.http.routers.error-pages.middlewares: error-pages-middleware
traefik.http.middlewares.error-pages-middleware.errors.status: 400-599
traefik.http.middlewares.error-pages-middleware.errors.service: error-pages-service
traefik.http.middlewares.error-pages-middleware.errors.query: /{status}.html
# define service properties
traefik.http.services.error-pages-service.loadbalancer.server.port: 8080
traefik.http.routers.error-pages.service: error-pages-service
traefik.http.routers.error-pages.tls: true
traefik.http.routers.error-pages.tls.certresolver: le
traefik.http.routers.traefik.middlewares: error-pages-middleware
networks:
- public
depends_on:
- traefik

View File

@@ -0,0 +1,4 @@
tls:
certificates:
- certFile: /certs/neteasemusic.crt
keyFile: /certs/neteasemusic.key

View File

@@ -0,0 +1,13 @@
http:
routers:
homeassistant:
rule: "Host(`ha.ykz.app`)"
tls:
certResolver: le
service: homeassistant
services:
homeassistant:
loadBalancer:
servers:
- url: "http://192.168.2.200:8123"

View File

@@ -0,0 +1,18 @@
http:
routers:
neteasemusic:
rule: "Host(`music.163.com`)"
tls: {}
middlewares: unblockNeteaseMusic
service: neteasemusic
services:
neteasemusic:
loadBalancer:
servers:
- url: "https://music.163.com"
middlewares:
unblockNeteaseMusic:
headers:
customRequestHeaders:
X-Real-IP: "1.1.0.0"
X-Forwarded-For: "1.1.0.0"

1
uptime-kuma/.env.example Normal file
View File

@@ -0,0 +1 @@
UPTIME_KUMA_DOMAIN=domain_goes_here

View File

@@ -0,0 +1,25 @@
version: "3.9"
networks:
public:
external: true
services:
uptime-kuma:
image: louislam/uptime-kuma
container_name: uptime-kuma
restart: always
volumes:
- "./uptime-kuma-data:/app/data"
- "/var/run/docker.sock:/var/run/docker.sock:ro"
# ports:
# - "3001:3001"
networks:
- public
labels:
- "traefik.enable=true"
- "traefik.http.routers.uptime-kuma.rule=Host(`${UPTIME_KUMA_DOMAIN}`)"
- "traefik.http.routers.uptime-kuma.service=uptime-kuma-service"
- "traefik.http.services.uptime-kuma-service.loadbalancer.server.port=3001"
- "traefik.http.routers.uptime-kuma.tls=true"
- "traefik.http.routers.uptime-kuma.tls.certresolver=le"

3
vaultwarden/.env.example Normal file
View File

@@ -0,0 +1,3 @@
SIGNUPS_ALLOWED=false # set to true to allow signups
VAULTWARDEN_DOMAIN=domain_goes_here
ADMIN_TOKEN=token_goes_here

View File

@@ -0,0 +1,29 @@
version: "3.9"
networks:
public:
external: true
services:
vaultwarden:
image: vaultwarden/server
container_name: vaultwarden
restart: always
volumes:
- "./vaultwarden-data:/data"
environment:
- "WEBSOCKET_ENABLED=true"
- "SIGNUPS_ALLOWED=${SIGNUPS_ALLOWED}"
- "ADMIN_TOKEN=${ADMIN_TOKEN}"
- "DOMAIN=https://${VAULTWARDEN_DOMAIN}"
# ports:
# - "80:80"
networks:
- public
labels:
- "traefik.enable=true"
- "traefik.http.routers.vaultwarden.rule=Host(`${VAULTWARDEN_DOMAIN}`)"
- "traefik.http.routers.vaultwarden.service=vaultwarden-service"
- "traefik.http.services.vaultwarden-service.loadbalancer.server.port=80"
- "traefik.http.routers.vaultwarden.tls=true"
- "traefik.http.routers.vaultwarden.tls.certresolver=le"