111 lines
5.3 KiB
YAML
111 lines
5.3 KiB
YAML
# gluetun for arr apps
|
|
# to use gluetun from apps in other projects, use network_mode: "container:gluetun-arr"
|
|
# access apps in this project with 127.0.0.1:PORT, e.g. to access qbittorrent use localhost:10095
|
|
# NB: Start gluetun-arr first, before starting depending apps in other projects
|
|
# Stop & inactivate depending apps in other projects first, before stopping this gluetun-arr
|
|
|
|
# we will use 10.255.239.0/24 block of the traefik subnet for containers that have to connect to arr apps
|
|
# See .static-ips.yml for static ip addresses
|
|
|
|
name: gluetun-qb
|
|
|
|
networks:
|
|
traefik-net:
|
|
external: true
|
|
|
|
secrets:
|
|
wireguard_private_key:
|
|
file: ${SECRETSDIR}/wireguard_private_key
|
|
|
|
services:
|
|
qbittorrent:
|
|
image: lscr.io/linuxserver/qbittorrent:latest
|
|
env_file: .${QBIT_APP}.env
|
|
network_mode: "service:gluetun"
|
|
volumes:
|
|
- "${DATAROOT}/${QBIT_APP}/config:/config"
|
|
- "${DOWNLOADSDIR}:${CT_DOWNLOADS}"
|
|
- "${RECYCLINGDIR}/${QBIT_APP}:${CT_RECYCLINGBIN}:rw"
|
|
restart: unless-stopped
|
|
depends_on:
|
|
gluetun:
|
|
condition: service_healthy
|
|
|
|
flaresolverr:
|
|
# DockerHub mirror flaresolverr/flaresolverr:latest
|
|
image: ghcr.io/flaresolverr/flaresolverr:latest
|
|
# container_name: flaresolverr
|
|
env_file: .${FLARESOLVERR_APP}.env
|
|
network_mode: "service:gluetun"
|
|
restart: unless-stopped
|
|
|
|
gluetun:
|
|
image: qmcgaw/gluetun:latest
|
|
#hostname: gluetun-qb
|
|
env_file: .gluetun.env
|
|
cap_add:
|
|
- NET_ADMIN
|
|
devices:
|
|
- /dev/net/tun
|
|
volumes:
|
|
- "${DATADIR}/appdata:/gluetun"
|
|
secrets:
|
|
- wireguard_private_key
|
|
networks:
|
|
traefik-net:
|
|
ipv4_address: 10.255.239.3 # to access services in this project from other containers; hostnames and aliases will not work
|
|
restart: always
|
|
labels:
|
|
- traefik.enable=true
|
|
- traefik.docker.network=traefik-net
|
|
##################################################################################
|
|
################################# QBIT_APP ##################################
|
|
#
|
|
# http services
|
|
# -------------
|
|
- "traefik.http.services.${QBIT_APP}-gt-svc.loadbalancer.server.port=${QBIT_PORT}"
|
|
#
|
|
# http routers
|
|
# ------------
|
|
# limit router to web ":80" entrypoint (Note: web entrypoint http requests are globally redirected to websecure router in traefik.yml)
|
|
- "traefik.http.routers.${QBIT_APP}-rtr.entrypoints=web"
|
|
# set match criteria for router
|
|
- "traefik.http.routers.${QBIT_APP}-rtr.rule=Host(`${QBIT_URL}`)&& PathPrefix(`/`)"
|
|
# attach middlewares to router
|
|
- "traefik.http.routers.${QBIT_APP}-rtr.middlewares=http-mw-rateLimit-secureHeaders-compress-redirect@file"
|
|
# assign svc target to router
|
|
- "traefik.http.routers.${QBIT_APP}-rtr.service=${QBIT_APP}-gt-svc"
|
|
#
|
|
# limit router to websecure ":443" entrypoint
|
|
- "traefik.http.routers.${QBIT_APP}-secure-rtr.entrypoints=websecure"
|
|
# set match criteria for router
|
|
- "traefik.http.routers.${QBIT_APP}-secure-rtr.rule=Host(`${QBIT_URL}`)&& PathPrefix(`/`)"
|
|
# set router to be dedicated to secure requests only for the host specified in match criteria
|
|
- "traefik.http.routers.${QBIT_APP}-secure-rtr.tls=true"
|
|
# apply tls options
|
|
- "traefik.http.routers.${QBIT_APP}-secure-rtr.tls.options=tls-options@file"
|
|
# generate certificates using following certresolver
|
|
- "traefik.http.routers.${QBIT_APP}-secure-rtr.tls.certresolver=solver-dns"
|
|
# attach middlewares to routers
|
|
#- "traefik.http.routers.${QBIT_APP}-secure-rtr.middlewares=${QBIT_APP}-auth"
|
|
- "traefik.http.routers.${QBIT_APP}-secure-rtr.middlewares=http-mw-rateLimit-secureHeaders-compress@file"
|
|
# assign svc target to router
|
|
- "traefik.http.routers.${QBIT_APP}-secure-rtr.service=${QBIT_APP}-gt-svc"
|
|
|
|
##################################################################################
|
|
################################# FLARESOLVERR_APP ##################################
|
|
- "traefik.http.services.${FLARESOLVERR_APP}-gt-svc.loadbalancer.server.port=${FLARESOLVERR_PORT}"
|
|
- "traefik.http.routers.${FLARESOLVERR_APP}-rtr.entrypoints=web"
|
|
- "traefik.http.routers.${FLARESOLVERR_APP}-rtr.rule=Host(`${FLARESOLVERR_URL}`)&& PathPrefix(`/`)"
|
|
- "traefik.http.routers.${FLARESOLVERR_APP}-rtr.middlewares=http-mw-rateLimit-secureHeaders-compress-redirect@file"
|
|
- "traefik.http.routers.${FLARESOLVERR_APP}-rtr.service=${FLARESOLVERR_APP}-gt-svc"
|
|
- "traefik.http.routers.${FLARESOLVERR_APP}-secure-rtr.entrypoints=websecure"
|
|
- "traefik.http.routers.${FLARESOLVERR_APP}-secure-rtr.rule=Host(`${FLARESOLVERR_URL}`)&& PathPrefix(`/`)"
|
|
- "traefik.http.routers.${FLARESOLVERR_APP}-secure-rtr.tls=true"
|
|
- "traefik.http.routers.${FLARESOLVERR_APP}-secure-rtr.tls.options=tls-options@file"
|
|
- "traefik.http.routers.${FLARESOLVERR_APP}-secure-rtr.tls.certresolver=solver-dns"
|
|
#- "traefik.http.routers.${FLARESOLVERR_APP}-secure-rtr.middlewares=${FLARESOLVERR_APP}-auth"
|
|
- "traefik.http.routers.${FLARESOLVERR_APP}-secure-rtr.middlewares=http-mw-rateLimit-secureHeaders-compress@file"
|
|
- "traefik.http.routers.${FLARESOLVERR_APP}-secure-rtr.service=${FLARESOLVERR_APP}-gt-svc"
|
|
|
|
################################################################################## |