forked from continuwuation/continuwuity
44 lines
1.6 KiB
YAML
44 lines
1.6 KiB
YAML
# Continuwuity - Behind Traefik Reverse Proxy
|
|
|
|
services:
|
|
homeserver:
|
|
image: forgejo.ellis.link/continuwuation/continuwuity:latest
|
|
restart: unless-stopped
|
|
command: /sbin/conduwuit
|
|
volumes:
|
|
- db:/var/lib/continuwuity
|
|
- ./continuwuity-resolv.conf:/etc/resolv.conf # use custom resolvers rather than Docker's
|
|
#- ./continuwuity.toml:/etc/continuwuity.toml
|
|
networks:
|
|
- proxy
|
|
labels:
|
|
- "traefik.enable=true"
|
|
- "traefik.http.routers.continuwuity.rule=(Host(`example.com`))"
|
|
- "traefik.http.routers.continuwuity.entrypoints=websecure" # your HTTPS entry point
|
|
- "traefik.http.routers.continuwuity.tls=true"
|
|
- "traefik.http.routers.continuwuity.service=continuwuity"
|
|
- "traefik.http.services.continuwuity.loadbalancer.server.port=8008"
|
|
# possibly, depending on your config:
|
|
# - "traefik.http.routers.continuwuity.tls.certresolver=letsencrypt"
|
|
environment:
|
|
CONTINUWUITY_SERVER_NAME: example.com
|
|
CONTINUWUITY_DATABASE_PATH: /var/lib/continuwuity
|
|
CONTINUWUITY_ADDRESS: 0.0.0.0
|
|
CONTINUWUITY_PORT: 8008 # This must match with traefik's loadbalancer label
|
|
#CONTINUWUITY_CONFIG: '/etc/continuwuity.toml' # Uncomment if you mapped config toml above
|
|
|
|
# Serve .well-known files to tell others to reach Continuwuity on port :443
|
|
CONTINUWUITY_WELL_KNOWN: |
|
|
{
|
|
client=https://example.com,
|
|
server=example.com:443
|
|
}
|
|
|
|
volumes:
|
|
db:
|
|
|
|
networks:
|
|
# This is the network Traefik listens to, if your network has a different
|
|
# name, don't forget to change it here and in the docker-compose.override.yml
|
|
proxy:
|
|
external: true
|