Compare commits
1 Commits
main
...
mailserver
Author | SHA1 | Date | |
---|---|---|---|
|
77f8bf719a |
|
@ -3,6 +3,8 @@ DOMAIN=example.com
|
|||
UID=1000
|
||||
GID=1000
|
||||
TZ=Etc/UTC
|
||||
DBUSER=example
|
||||
DBPASS=password
|
||||
CONFIG_LOCATION=./config
|
||||
DATA_LOCATION=./data
|
||||
EMAIL=example@mail.com
|
||||
EMAIL=example@mail.com
|
660
.env.mail.example
Normal file
660
.env.mail.example
Normal file
|
@ -0,0 +1,660 @@
|
|||
# -----------------------------------------------
|
||||
# --- Mailserver Environment Variables ----------
|
||||
# -----------------------------------------------
|
||||
|
||||
# DOCUMENTATION FOR THESE VARIABLES IS FOUND UNDER
|
||||
# https://docker-mailserver.github.io/docker-mailserver/latest/config/environment/
|
||||
|
||||
# -----------------------------------------------
|
||||
# --- General Section ---------------------------
|
||||
# -----------------------------------------------
|
||||
|
||||
# empty => uses the `hostname` command to get the mail server's canonical hostname
|
||||
# => Specify a fully-qualified domainname to serve mail for. This is used for many of the config features so if you can't set your hostname (e.g. you're in a container platform that doesn't let you) specify it in this environment variable.
|
||||
OVERRIDE_HOSTNAME=
|
||||
|
||||
# REMOVED in version v11.0.0! Use LOG_LEVEL instead.
|
||||
DMS_DEBUG=0
|
||||
|
||||
# Set the log level for DMS.
|
||||
# This is mostly relevant for container startup scripts and change detection event feedback.
|
||||
#
|
||||
# Valid values (in order of increasing verbosity) are: `error`, `warn`, `info`, `debug` and `trace`.
|
||||
# The default log level is `info`.
|
||||
LOG_LEVEL=info
|
||||
|
||||
# critical => Only show critical messages
|
||||
# error => Only show erroneous output
|
||||
# **warn** => Show warnings
|
||||
# info => Normal informational output
|
||||
# debug => Also show debug messages
|
||||
SUPERVISOR_LOGLEVEL=
|
||||
|
||||
# Support for deployment where these defaults are not compatible (eg: some NAS appliances):
|
||||
# /var/mail vmail User ID (default: 5000)
|
||||
DMS_VMAIL_UID=
|
||||
# /var/mail vmail Group ID (default: 5000)
|
||||
DMS_VMAIL_GID=
|
||||
|
||||
# **empty** => use FILE
|
||||
# LDAP => use LDAP authentication
|
||||
# OIDC => use OIDC authentication (not yet implemented)
|
||||
# FILE => use local files (this is used as the default)
|
||||
ACCOUNT_PROVISIONER=
|
||||
|
||||
# empty => postmaster@domain.com
|
||||
# => Specify the postmaster address
|
||||
POSTMASTER_ADDRESS=
|
||||
|
||||
# Check for updates on container start and then once a day
|
||||
# If an update is available, a mail is sent to POSTMASTER_ADDRESS
|
||||
# 0 => Update check disabled
|
||||
# 1 => Update check enabled
|
||||
ENABLE_UPDATE_CHECK=1
|
||||
|
||||
# Customize the update check interval.
|
||||
# Number + Suffix. Suffix must be 's' for seconds, 'm' for minutes, 'h' for hours or 'd' for days.
|
||||
UPDATE_CHECK_INTERVAL=1d
|
||||
|
||||
# Set different options for mynetworks option (can be overwrite in postfix-main.cf)
|
||||
# **WARNING**: Adding the docker network's gateway to the list of trusted hosts, e.g. using the `network` or
|
||||
# `connected-networks` option, can create an open relay
|
||||
# https://github.com/docker-mailserver/docker-mailserver/issues/1405#issuecomment-590106498
|
||||
# The same can happen for rootless podman. To prevent this, set the value to "none" or configure slirp4netns
|
||||
# https://github.com/docker-mailserver/docker-mailserver/issues/2377
|
||||
#
|
||||
# none => Explicitly force authentication
|
||||
# container => Container IP address only
|
||||
# host => Add docker container network (ipv4 only)
|
||||
# network => Add all docker container networks (ipv4 only)
|
||||
# connected-networks => Add all connected docker networks (ipv4 only)
|
||||
PERMIT_DOCKER=none
|
||||
|
||||
# Set the timezone. If this variable is unset, the container runtime will try to detect the time using
|
||||
# `/etc/localtime`, which you can alternatively mount into the container. The value of this variable
|
||||
# must follow the pattern `AREA/ZONE`, i.e. of you want to use Germany's time zone, use `Europe/Berlin`.
|
||||
# You can lookup all available timezones here: https://en.wikipedia.org/wiki/List_of_tz_database_time_zones#List
|
||||
TZ=
|
||||
|
||||
# In case you network interface differs from 'eth0', e.g. when you are using HostNetworking in Kubernetes,
|
||||
# you can set NETWORK_INTERFACE to whatever interface you want. This interface will then be used.
|
||||
# - **empty** => eth0
|
||||
NETWORK_INTERFACE=
|
||||
|
||||
# empty => modern
|
||||
# modern => Enables TLSv1.2 and modern ciphers only. (default)
|
||||
# intermediate => Enables TLSv1, TLSv1.1 and TLSv1.2 and broad compatibility ciphers.
|
||||
TLS_LEVEL=
|
||||
|
||||
# Configures the handling of creating mails with forged sender addresses.
|
||||
#
|
||||
# **0** => (not recommended) Mail address spoofing allowed. Any logged in user may create email messages with a forged sender address (see also https://en.wikipedia.org/wiki/Email_spoofing).
|
||||
# 1 => Mail spoofing denied. Each user may only send with his own or his alias addresses. Addresses with extension delimiters(http://www.postfix.org/postconf.5.html#recipient_delimiter) are not able to send messages.
|
||||
SPOOF_PROTECTION=
|
||||
|
||||
# Enables the Sender Rewriting Scheme. SRS is needed if your mail server acts as forwarder. See [postsrsd](https://github.com/roehling/postsrsd/blob/master/README.md#sender-rewriting-scheme-crash-course) for further explanation.
|
||||
# - **0** => Disabled
|
||||
# - 1 => Enabled
|
||||
ENABLE_SRS=0
|
||||
|
||||
# Enables the OpenDKIM service.
|
||||
# **1** => Enabled
|
||||
# 0 => Disabled
|
||||
ENABLE_OPENDKIM=1
|
||||
|
||||
# Enables the OpenDMARC service.
|
||||
# **1** => Enabled
|
||||
# 0 => Disabled
|
||||
ENABLE_OPENDMARC=1
|
||||
|
||||
|
||||
# Enabled `policyd-spf` in Postfix's configuration. You will likely want to set this
|
||||
# to `0` in case you're using Rspamd (`ENABLE_RSPAMD=1`).
|
||||
#
|
||||
# - 0 => Disabled
|
||||
# - **1** => Enabled
|
||||
ENABLE_POLICYD_SPF=1
|
||||
|
||||
# Enables POP3 service
|
||||
# - **0** => Disabled
|
||||
# - 1 => Enabled
|
||||
ENABLE_POP3=
|
||||
|
||||
# Enables IMAP service
|
||||
# - 0 => Disabled
|
||||
# - **1** => Enabled
|
||||
ENABLE_IMAP=1
|
||||
|
||||
# Enables ClamAV, and anti-virus scanner.
|
||||
# 1 => Enabled
|
||||
# **0** => Disabled
|
||||
ENABLE_CLAMAV=0
|
||||
|
||||
# Add the value as a prefix to the mail subject when spam is detected.
|
||||
# NOTE: By default spam is delivered to a junk folder, reducing the value of a subject prefix for spam.
|
||||
# NOTE: When not using Docker Compose, other CRI may not support quote-wrapping the value here to preserve any trailing white-space.
|
||||
SPAM_SUBJECT=
|
||||
|
||||
# Enables Rspamd
|
||||
# **0** => Disabled
|
||||
# 1 => Enabled
|
||||
ENABLE_RSPAMD=0
|
||||
|
||||
# When `ENABLE_RSPAMD=1`, an internal Redis instance is enabled implicitly.
|
||||
# This setting provides an opt-out to allow using an external instance instead.
|
||||
# 0 => Disabled
|
||||
# 1 => Enabled
|
||||
ENABLE_RSPAMD_REDIS=
|
||||
|
||||
# When enabled,
|
||||
#
|
||||
# 1. the "[autolearning][rspamd-autolearn]" feature is turned on;
|
||||
# 2. the Bayes classifier will be trained when moving mails from or to the Junk folder (with the help of Sieve scripts).
|
||||
#
|
||||
# **0** => disabled
|
||||
# 1 => enabled
|
||||
RSPAMD_LEARN=0
|
||||
|
||||
# This settings controls whether checks should be performed on emails coming
|
||||
# from authenticated users (i.e. most likely outgoing emails). The default value
|
||||
# is `0` in order to align better with SpamAssassin. We recommend reading
|
||||
# through https://rspamd.com/doc/tutorials/scanning_outbound.html though to
|
||||
# decide for yourself whether you need and want this feature.
|
||||
#
|
||||
# Note that DKIM signing of e-mails will still happen.
|
||||
RSPAMD_CHECK_AUTHENTICATED=0
|
||||
|
||||
# Controls whether the Rspamd Greylisting module is enabled.
|
||||
# This module can further assist in avoiding spam emails by greylisting
|
||||
# e-mails with a certain spam score.
|
||||
#
|
||||
# **0** => disabled
|
||||
# 1 => enabled
|
||||
RSPAMD_GREYLISTING=0
|
||||
|
||||
# Can be used to enable or disable the Hfilter group module.
|
||||
#
|
||||
# - 0 => Disabled
|
||||
# - **1** => Enabled
|
||||
RSPAMD_HFILTER=1
|
||||
|
||||
# Can be used to control the score when the HFILTER_HOSTNAME_UNKNOWN symbol applies. A higher score is more punishing. Setting it to 15 is equivalent to rejecting the email when the check fails.
|
||||
#
|
||||
# Default: 6
|
||||
RSPAMD_HFILTER_HOSTNAME_UNKNOWN_SCORE=6
|
||||
|
||||
# Can be used to enable or disable the (still experimental) neural module.
|
||||
#
|
||||
# - **0** => Disabled
|
||||
# - 1 => Enabled
|
||||
RSPAMD_NEURAL=0
|
||||
|
||||
# Amavis content filter (used for ClamAV & SpamAssassin)
|
||||
# 0 => Disabled
|
||||
# 1 => Enabled
|
||||
ENABLE_AMAVIS=1
|
||||
|
||||
# -1/-2/-3 => Only show errors
|
||||
# **0** => Show warnings
|
||||
# 1/2 => Show default informational output
|
||||
# 3/4/5 => log debug information (very verbose)
|
||||
AMAVIS_LOGLEVEL=0
|
||||
|
||||
# This enables DNS block lists in Postscreen.
|
||||
# Note: Emails will be rejected, if they don't pass the block list checks!
|
||||
# **0** => DNS block lists are disabled
|
||||
# 1 => DNS block lists are enabled
|
||||
ENABLE_DNSBL=0
|
||||
|
||||
# If you enable Fail2Ban, don't forget to add the following lines to your `compose.yaml`:
|
||||
# cap_add:
|
||||
# - NET_ADMIN
|
||||
# Otherwise, `nftables` won't be able to ban IPs.
|
||||
ENABLE_FAIL2BAN=0
|
||||
|
||||
# Fail2Ban blocktype
|
||||
# drop => drop packet (send NO reply)
|
||||
# reject => reject packet (send ICMP unreachable)
|
||||
FAIL2BAN_BLOCKTYPE=drop
|
||||
|
||||
# 1 => Enables Managesieve on port 4190
|
||||
# empty => disables Managesieve
|
||||
ENABLE_MANAGESIEVE=
|
||||
|
||||
# **enforce** => Allow other tests to complete. Reject attempts to deliver mail with a 550 SMTP reply, and log the helo/sender/recipient information. Repeat this test the next time the client connects.
|
||||
# drop => Drop the connection immediately with a 521 SMTP reply. Repeat this test the next time the client connects.
|
||||
# ignore => Ignore the failure of this test. Allow other tests to complete. Repeat this test the next time the client connects. This option is useful for testing and collecting statistics without blocking mail.
|
||||
POSTSCREEN_ACTION=enforce
|
||||
|
||||
# empty => all daemons start
|
||||
# 1 => only launch postfix smtp
|
||||
SMTP_ONLY=
|
||||
|
||||
# Please read [the SSL page in the documentation](https://docker-mailserver.github.io/docker-mailserver/latest/config/security/ssl) for more information.
|
||||
#
|
||||
# empty => SSL disabled
|
||||
# letsencrypt => Enables Let's Encrypt certificates
|
||||
# custom => Enables custom certificates
|
||||
# manual => Let's you manually specify locations of your SSL certificates for non-standard cases
|
||||
# self-signed => Enables self-signed certificates
|
||||
SSL_TYPE=
|
||||
|
||||
# These are only supported with `SSL_TYPE=manual`.
|
||||
# Provide the path to your cert and key files that you've mounted access to within the container.
|
||||
SSL_CERT_PATH=
|
||||
SSL_KEY_PATH=
|
||||
# Optional: A 2nd certificate can be supported as fallback (dual cert support), eg ECDSA with an RSA fallback.
|
||||
# Useful for additional compatibility with older MTA and MUA (eg pre-2015).
|
||||
SSL_ALT_CERT_PATH=
|
||||
SSL_ALT_KEY_PATH=
|
||||
|
||||
# Set how many days a virusmail will stay on the server before being deleted
|
||||
# empty => 7 days
|
||||
VIRUSMAILS_DELETE_DELAY=
|
||||
|
||||
# Configure Postfix `virtual_transport` to deliver mail to a different LMTP client (default is a dovecot socket).
|
||||
# Provide any valid URI. Examples:
|
||||
#
|
||||
# empty => `lmtp:unix:/var/run/dovecot/lmtp` (default, configured in Postfix main.cf)
|
||||
# `lmtp:unix:private/dovecot-lmtp` (use socket)
|
||||
# `lmtps:inet:<host>:<port>` (secure lmtp with starttls)
|
||||
# `lmtp:<kopano-host>:2003` (use kopano as mailstore)
|
||||
POSTFIX_DAGENT=
|
||||
|
||||
# Set the mailbox size limit for all users. If set to zero, the size will be unlimited (default). Size is in bytes.
|
||||
#
|
||||
# empty => 0
|
||||
POSTFIX_MAILBOX_SIZE_LIMIT=
|
||||
|
||||
# See https://docker-mailserver.github.io/docker-mailserver/edge/config/user-management/accounts/#notes
|
||||
# 0 => Dovecot quota is disabled
|
||||
# 1 => Dovecot quota is enabled
|
||||
ENABLE_QUOTAS=1
|
||||
|
||||
# Set the message size limit for all users. If set to zero, the size will be unlimited (not recommended!). Size is in bytes.
|
||||
#
|
||||
# empty => 10240000 (~10 MB)
|
||||
POSTFIX_MESSAGE_SIZE_LIMIT=
|
||||
|
||||
# Mails larger than this limit won't be scanned.
|
||||
# ClamAV must be enabled (ENABLE_CLAMAV=1) for this.
|
||||
#
|
||||
# empty => 25M (25 MB)
|
||||
CLAMAV_MESSAGE_SIZE_LIMIT=
|
||||
|
||||
# Enables regular pflogsumm mail reports.
|
||||
# This is a new option. The old REPORT options are still supported for backwards compatibility. If this is not set and reports are enabled with the old options, logrotate will be used.
|
||||
#
|
||||
# not set => No report
|
||||
# daily_cron => Daily report for the previous day
|
||||
# logrotate => Full report based on the mail log when it is rotated
|
||||
PFLOGSUMM_TRIGGER=
|
||||
|
||||
# Recipient address for pflogsumm reports.
|
||||
#
|
||||
# not set => Use REPORT_RECIPIENT or POSTMASTER_ADDRESS
|
||||
# => Specify the recipient address(es)
|
||||
PFLOGSUMM_RECIPIENT=
|
||||
|
||||
# Sender address (`FROM`) for pflogsumm reports if pflogsumm reports are enabled.
|
||||
#
|
||||
# not set => Use REPORT_SENDER
|
||||
# => Specify the sender address
|
||||
PFLOGSUMM_SENDER=
|
||||
|
||||
# Interval for logwatch report.
|
||||
#
|
||||
# none => No report is generated
|
||||
# daily => Send a daily report
|
||||
# weekly => Send a report every week
|
||||
LOGWATCH_INTERVAL=
|
||||
|
||||
# Recipient address for logwatch reports if they are enabled.
|
||||
#
|
||||
# not set => Use REPORT_RECIPIENT or POSTMASTER_ADDRESS
|
||||
# => Specify the recipient address(es)
|
||||
LOGWATCH_RECIPIENT=
|
||||
|
||||
# Sender address (`FROM`) for logwatch reports if logwatch reports are enabled.
|
||||
#
|
||||
# not set => Use REPORT_SENDER
|
||||
# => Specify the sender address
|
||||
LOGWATCH_SENDER=
|
||||
|
||||
# Defines who receives reports if they are enabled.
|
||||
# **empty** => ${POSTMASTER_ADDRESS}
|
||||
# => Specify the recipient address
|
||||
REPORT_RECIPIENT=
|
||||
|
||||
# Defines who sends reports if they are enabled.
|
||||
# **empty** => mailserver-report@${DOMAINNAME}
|
||||
# => Specify the sender address
|
||||
REPORT_SENDER=
|
||||
|
||||
# Changes the interval in which log files are rotated
|
||||
# **weekly** => Rotate log files weekly
|
||||
# daily => Rotate log files daily
|
||||
# monthly => Rotate log files monthly
|
||||
#
|
||||
# Note: This Variable actually controls logrotate inside the container
|
||||
# and rotates the log files depending on this setting. The main log output is
|
||||
# still available in its entirety via `docker logs mail` (Or your
|
||||
# respective container name). If you want to control logrotation for
|
||||
# the Docker-generated logfile see:
|
||||
# https://docs.docker.com/config/containers/logging/configure/
|
||||
#
|
||||
# Note: This variable can also determine the interval for Postfix's log summary reports, see [`PFLOGSUMM_TRIGGER`](#pflogsumm_trigger).
|
||||
LOGROTATE_INTERVAL=weekly
|
||||
|
||||
# Defines how many log files are kept by logrorate
|
||||
LOGROTATE_COUNT=4
|
||||
|
||||
|
||||
# If enabled, employs `reject_unknown_client_hostname` to sender restrictions in Postfix's configuration.
|
||||
#
|
||||
# - **0** => Disabled
|
||||
# - 1 => Enabled
|
||||
POSTFIX_REJECT_UNKNOWN_CLIENT_HOSTNAME=0
|
||||
|
||||
# Choose TCP/IP protocols for postfix to use
|
||||
# **all** => All possible protocols.
|
||||
# ipv4 => Use only IPv4 traffic. Most likely you want this behind Docker.
|
||||
# ipv6 => Use only IPv6 traffic.
|
||||
#
|
||||
# Note: More details at http://www.postfix.org/postconf.5.html#inet_protocols
|
||||
POSTFIX_INET_PROTOCOLS=all
|
||||
|
||||
# Enables MTA-STS support for outbound mail.
|
||||
# More details: https://docker-mailserver.github.io/docker-mailserver/v13.3/config/best-practices/mta-sts/
|
||||
# - **0** ==> MTA-STS disabled
|
||||
# - 1 => MTA-STS enabled
|
||||
ENABLE_MTA_STS=0
|
||||
|
||||
# Choose TCP/IP protocols for dovecot to use
|
||||
# **all** => Listen on all interfaces
|
||||
# ipv4 => Listen only on IPv4 interfaces. Most likely you want this behind Docker.
|
||||
# ipv6 => Listen only on IPv6 interfaces.
|
||||
#
|
||||
# Note: More information at https://dovecot.org/doc/dovecot-example.conf
|
||||
DOVECOT_INET_PROTOCOLS=all
|
||||
|
||||
# -----------------------------------------------
|
||||
# --- SpamAssassin Section ----------------------
|
||||
# -----------------------------------------------
|
||||
|
||||
ENABLE_SPAMASSASSIN=0
|
||||
|
||||
# KAM is a 3rd party SpamAssassin ruleset, provided by the McGrail Foundation.
|
||||
# If SpamAssassin is enabled, KAM can be used in addition to the default ruleset.
|
||||
# - **0** => KAM disabled
|
||||
# - 1 => KAM enabled
|
||||
#
|
||||
# Note: only has an effect if `ENABLE_SPAMASSASSIN=1`
|
||||
ENABLE_SPAMASSASSIN_KAM=0
|
||||
|
||||
# deliver spam messages to the inbox (tagged using SPAM_SUBJECT)
|
||||
SPAMASSASSIN_SPAM_TO_INBOX=1
|
||||
|
||||
# spam messages will be moved in the Junk folder (SPAMASSASSIN_SPAM_TO_INBOX=1 required)
|
||||
MOVE_SPAM_TO_JUNK=1
|
||||
|
||||
# spam messages will be marked as read
|
||||
MARK_SPAM_AS_READ=0
|
||||
|
||||
# add 'spam info' headers at, or above this level
|
||||
SA_TAG=2.0
|
||||
|
||||
# add 'spam detected' headers at, or above this level
|
||||
SA_TAG2=6.31
|
||||
|
||||
# triggers spam evasive actions
|
||||
SA_KILL=10.0
|
||||
|
||||
# -----------------------------------------------
|
||||
# --- Fetchmail Section -------------------------
|
||||
# -----------------------------------------------
|
||||
|
||||
ENABLE_FETCHMAIL=0
|
||||
|
||||
# The interval to fetch mail in seconds
|
||||
FETCHMAIL_POLL=300
|
||||
# Use multiple fetchmail instances (1 per poll entry in fetchmail.cf)
|
||||
# Supports multiple IMAP IDLE connections when a server is used across multiple poll entries
|
||||
# https://otremba.net/wiki/Fetchmail_(Debian)#Immediate_Download_via_IMAP_IDLE
|
||||
FETCHMAIL_PARALLEL=0
|
||||
|
||||
# Enable or disable `getmail`.
|
||||
#
|
||||
# - **0** => Disabled
|
||||
# - 1 => Enabled
|
||||
ENABLE_GETMAIL=0
|
||||
|
||||
# The number of minutes for the interval. Min: 1; Max: 30.
|
||||
GETMAIL_POLL=5
|
||||
|
||||
# -----------------------------------------------
|
||||
# --- OAUTH2 Section ----------------------------
|
||||
# -----------------------------------------------
|
||||
|
||||
# empty => OAUTH2 authentication is disabled
|
||||
# 1 => OAUTH2 authentication is enabled
|
||||
ENABLE_OAUTH2=
|
||||
|
||||
# Specify the user info endpoint URL of the oauth2 provider
|
||||
# Example: https://oauth2.example.com/userinfo/
|
||||
OAUTH2_INTROSPECTION_URL=
|
||||
|
||||
# -----------------------------------------------
|
||||
# --- LDAP Section ------------------------------
|
||||
# -----------------------------------------------
|
||||
|
||||
# A second container for the ldap service is necessary (i.e. https://hub.docker.com/r/bitnami/openldap/)
|
||||
|
||||
# empty => no
|
||||
# yes => LDAP over TLS enabled for Postfix
|
||||
LDAP_START_TLS=
|
||||
|
||||
# empty => mail.example.com
|
||||
# Specify the `<dns-name>` / `<ip-address>` where the LDAP server is reachable via a URI like: `ldaps://mail.example.com`.
|
||||
# Note: You must include the desired URI scheme (`ldap://`, `ldaps://`, `ldapi://`).
|
||||
LDAP_SERVER_HOST=
|
||||
|
||||
# empty => ou=people,dc=domain,dc=com
|
||||
# => e.g. LDAP_SEARCH_BASE=dc=mydomain,dc=local
|
||||
LDAP_SEARCH_BASE=
|
||||
|
||||
# empty => cn=admin,dc=domain,dc=com
|
||||
# => take a look at examples of SASL_LDAP_BIND_DN
|
||||
LDAP_BIND_DN=
|
||||
|
||||
# empty** => admin
|
||||
# => Specify the password to bind against ldap
|
||||
LDAP_BIND_PW=
|
||||
|
||||
# e.g. `"(&(mail=%s)(mailEnabled=TRUE))"`
|
||||
# => Specify how ldap should be asked for users
|
||||
LDAP_QUERY_FILTER_USER=
|
||||
|
||||
# e.g. `"(&(mailGroupMember=%s)(mailEnabled=TRUE))"`
|
||||
# => Specify how ldap should be asked for groups
|
||||
LDAP_QUERY_FILTER_GROUP=
|
||||
|
||||
# e.g. `"(&(mailAlias=%s)(mailEnabled=TRUE))"`
|
||||
# => Specify how ldap should be asked for aliases
|
||||
LDAP_QUERY_FILTER_ALIAS=
|
||||
|
||||
# e.g. `"(&(|(mail=*@%s)(mailalias=*@%s)(mailGroupMember=*@%s))(mailEnabled=TRUE))"`
|
||||
# => Specify how ldap should be asked for domains
|
||||
LDAP_QUERY_FILTER_DOMAIN=
|
||||
|
||||
# -----------------------------------------------
|
||||
# --- Dovecot Section ---------------------------
|
||||
# -----------------------------------------------
|
||||
|
||||
# empty => no
|
||||
# yes => LDAP over TLS enabled for Dovecot
|
||||
DOVECOT_TLS=
|
||||
|
||||
# e.g. `"(&(objectClass=PostfixBookMailAccount)(uniqueIdentifier=%n))"`
|
||||
DOVECOT_USER_FILTER=
|
||||
|
||||
# e.g. `"(&(objectClass=PostfixBookMailAccount)(uniqueIdentifier=%n))"`
|
||||
DOVECOT_PASS_FILTER=
|
||||
|
||||
# Define the mailbox format to be used
|
||||
# default is maildir, supported values are: sdbox, mdbox, maildir
|
||||
DOVECOT_MAILBOX_FORMAT=maildir
|
||||
|
||||
# empty => no
|
||||
# yes => Allow bind authentication for LDAP
|
||||
# https://wiki.dovecot.org/AuthDatabase/LDAP/AuthBinds
|
||||
DOVECOT_AUTH_BIND=
|
||||
|
||||
# -----------------------------------------------
|
||||
# --- Postgrey Section --------------------------
|
||||
# -----------------------------------------------
|
||||
|
||||
ENABLE_POSTGREY=0
|
||||
# greylist for N seconds
|
||||
POSTGREY_DELAY=300
|
||||
# delete entries older than N days since the last time that they have been seen
|
||||
POSTGREY_MAX_AGE=35
|
||||
# response when a mail is greylisted
|
||||
POSTGREY_TEXT="Delayed by Postgrey"
|
||||
# whitelist host after N successful deliveries (N=0 to disable whitelisting)
|
||||
POSTGREY_AUTO_WHITELIST_CLIENTS=5
|
||||
|
||||
# -----------------------------------------------
|
||||
# --- SASL Section ------------------------------
|
||||
# -----------------------------------------------
|
||||
|
||||
ENABLE_SASLAUTHD=0
|
||||
|
||||
# empty => pam
|
||||
# `ldap` => authenticate against ldap server
|
||||
# `shadow` => authenticate against local user db
|
||||
# `mysql` => authenticate against mysql db
|
||||
# `rimap` => authenticate against imap server
|
||||
# Note: can be a list of mechanisms like pam ldap shadow
|
||||
SASLAUTHD_MECHANISMS=
|
||||
|
||||
# empty => None
|
||||
# e.g. with SASLAUTHD_MECHANISMS rimap you need to specify the ip-address/servername of the imap server ==> xxx.xxx.xxx.xxx
|
||||
SASLAUTHD_MECH_OPTIONS=
|
||||
|
||||
# empty => Use value of LDAP_SERVER_HOST
|
||||
# Note: You must include the desired URI scheme (`ldap://`, `ldaps://`, `ldapi://`).
|
||||
SASLAUTHD_LDAP_SERVER=
|
||||
|
||||
# empty => Use value of LDAP_BIND_DN
|
||||
# specify an object with privileges to search the directory tree
|
||||
# e.g. active directory: SASLAUTHD_LDAP_BIND_DN=cn=Administrator,cn=Users,dc=mydomain,dc=net
|
||||
# e.g. openldap: SASLAUTHD_LDAP_BIND_DN=cn=admin,dc=mydomain,dc=net
|
||||
SASLAUTHD_LDAP_BIND_DN=
|
||||
|
||||
# empty => Use value of LDAP_BIND_PW
|
||||
SASLAUTHD_LDAP_PASSWORD=
|
||||
|
||||
# empty => Use value of LDAP_SEARCH_BASE
|
||||
# specify the search base
|
||||
SASLAUTHD_LDAP_SEARCH_BASE=
|
||||
|
||||
# empty => default filter `(&(uniqueIdentifier=%u)(mailEnabled=TRUE))`
|
||||
# e.g. for active directory: `(&(sAMAccountName=%U)(objectClass=person))`
|
||||
# e.g. for openldap: `(&(uid=%U)(objectClass=person))`
|
||||
SASLAUTHD_LDAP_FILTER=
|
||||
|
||||
# empty => no
|
||||
# yes => LDAP over TLS enabled for SASL
|
||||
# If set to yes, the protocol in SASLAUTHD_LDAP_SERVER must be ldap:// or missing.
|
||||
SASLAUTHD_LDAP_START_TLS=
|
||||
|
||||
# empty => no
|
||||
# yes => Require and verify server certificate
|
||||
# If yes you must/could specify SASLAUTHD_LDAP_TLS_CACERT_FILE or SASLAUTHD_LDAP_TLS_CACERT_DIR.
|
||||
SASLAUTHD_LDAP_TLS_CHECK_PEER=
|
||||
|
||||
# File containing CA (Certificate Authority) certificate(s).
|
||||
# empty => Nothing is added to the configuration
|
||||
# Any value => Fills the `ldap_tls_cacert_file` option
|
||||
SASLAUTHD_LDAP_TLS_CACERT_FILE=
|
||||
|
||||
# Path to directory with CA (Certificate Authority) certificates.
|
||||
# empty => Nothing is added to the configuration
|
||||
# Any value => Fills the `ldap_tls_cacert_dir` option
|
||||
SASLAUTHD_LDAP_TLS_CACERT_DIR=
|
||||
|
||||
# Specify what password attribute to use for password verification.
|
||||
# empty => Nothing is added to the configuration but the documentation says it is `userPassword` by default.
|
||||
# Any value => Fills the `ldap_password_attr` option
|
||||
SASLAUTHD_LDAP_PASSWORD_ATTR=
|
||||
|
||||
# empty => `bind` will be used as a default value
|
||||
# `fastbind` => The fastbind method is used
|
||||
# `custom` => The custom method uses userPassword attribute to verify the password
|
||||
SASLAUTHD_LDAP_AUTH_METHOD=
|
||||
|
||||
# Specify the authentication mechanism for SASL bind
|
||||
# empty => Nothing is added to the configuration
|
||||
# Any value => Fills the `ldap_mech` option
|
||||
SASLAUTHD_LDAP_MECH=
|
||||
|
||||
# -----------------------------------------------
|
||||
# --- SRS Section -------------------------------
|
||||
# -----------------------------------------------
|
||||
|
||||
# envelope_sender => Rewrite only envelope sender address (default)
|
||||
# header_sender => Rewrite only header sender (not recommended)
|
||||
# envelope_sender,header_sender => Rewrite both senders
|
||||
# An email has an "envelope" sender (indicating the sending server) and a
|
||||
# "header" sender (indicating who sent it). More strict SPF policies may require
|
||||
# you to replace both instead of just the envelope sender.
|
||||
SRS_SENDER_CLASSES=envelope_sender
|
||||
|
||||
# empty => Envelope sender will be rewritten for all domains
|
||||
# provide comma separated list of domains to exclude from rewriting
|
||||
SRS_EXCLUDE_DOMAINS=
|
||||
|
||||
# empty => generated when the image is built
|
||||
# provide a secret to use in base64
|
||||
# you may specify multiple keys, comma separated. the first one is used for
|
||||
# signing and the remaining will be used for verification. this is how you
|
||||
# rotate and expire keys
|
||||
SRS_SECRET=
|
||||
|
||||
# -----------------------------------------------
|
||||
# --- Default Relay Host Section ----------------
|
||||
# -----------------------------------------------
|
||||
|
||||
# Setup relaying all mail through a default relay host
|
||||
#
|
||||
# Set a default host to relay all mail through (optionally include a port)
|
||||
# Example: [mail.example.com]:587
|
||||
DEFAULT_RELAY_HOST=
|
||||
|
||||
# -----------------------------------------------
|
||||
# --- Multi-Domain Relay Section ----------------
|
||||
# -----------------------------------------------
|
||||
|
||||
# Setup relaying for multiple domains based on the domain name of the sender
|
||||
# optionally uses usernames and passwords in postfix-sasl-password.cf and relay host mappings in postfix-relaymap.cf
|
||||
#
|
||||
# Set a default host to relay mail through
|
||||
# Example: mail.example.com
|
||||
RELAY_HOST=
|
||||
|
||||
# empty => 25
|
||||
# default port to relay mail
|
||||
RELAY_PORT=25
|
||||
|
||||
# -----------------------------------------------
|
||||
# --- Relay Host Credentials Section ------------
|
||||
# -----------------------------------------------
|
||||
|
||||
# Configure a relay user and password to use with RELAY_HOST / DEFAULT_RELAY_HOST
|
||||
|
||||
# empty => no default
|
||||
RELAY_USER=
|
||||
|
||||
# empty => no default
|
||||
RELAY_PASSWORD=
|
5
.gitignore
vendored
5
.gitignore
vendored
|
@ -1,3 +1,6 @@
|
|||
.env
|
||||
.env.mail
|
||||
config/
|
||||
data/
|
||||
nginx/
|
||||
mail/
|
||||
nextcloud
|
||||
|
|
3
.gitmodules
vendored
3
.gitmodules
vendored
|
@ -1,3 +0,0 @@
|
|||
[submodule "sites/rittenhop/content/themes/rh-theme-v1"]
|
||||
path = sites/rittenhop/content/themes/rh-theme-v1
|
||||
url = git@github.com:b7s9/rh-theme-v1.git
|
24
README.md
24
README.md
|
@ -1,21 +1,9 @@
|
|||
# Docker Compose for my Media Server
|
||||
# media-server-docker-compose
|
||||
|
||||
A giant suite of web apps that I personally use on my local server. Some of them include:
|
||||
### ENV
|
||||
|
||||
* Arr - A collection of all the *arr apps like Radarr and Sonarr
|
||||
* Dashboard - Replies on Homarr and Dashdot for a top-level dashboard
|
||||
* Git Repo
|
||||
* Nextcloud - Cloud storage and sharing
|
||||
* Plex - The Plex media server with stats
|
||||
* Readers - Various media readers that can be accessed via the browser
|
||||
* Sites - Various static sites I have. All of them are using the Ghost CMS
|
||||
```
|
||||
PLEX_CLAIM=
|
||||
DOMAIN=
|
||||
|
||||
All the apps use Nginx-Proxy which handles reverse proxy and SSL certs for every app.
|
||||
|
||||
|
||||
## Adding a new app
|
||||
|
||||
Use this checklist if you're having issue getting the app to run:
|
||||
|
||||
* Allow ports on your machine (e.g. `ufw allow 80`)
|
||||
* Set port forwarding on your router
|
||||
```
|
|
@ -1,7 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
UID=1000
|
||||
GID=1000
|
||||
TZ=Etc/UTC
|
||||
CONFIG_LOCATION=./config
|
||||
DATA_LOCATION=./data
|
||||
EMAIL=example@mail.com
|
|
@ -1,219 +0,0 @@
|
|||
services:
|
||||
radarr:
|
||||
image: lscr.io/linuxserver/radarr:latest
|
||||
container_name: radarr
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=radarr.${DOMAIN},radar.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=radarr.${DOMAIN},radar.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
#- LETSENCRYPT_TEST=true
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/radarr:/config
|
||||
- ${DATA_LOCATION}/Movies:/movies
|
||||
- /media/seedbox:/downloads
|
||||
- ${DATA_LOCATION}/Downloads:/downloads-local
|
||||
expose:
|
||||
- "7878"
|
||||
ports:
|
||||
- 7878:7878
|
||||
restart: unless-stopped
|
||||
sonarr:
|
||||
image: lscr.io/linuxserver/sonarr:latest
|
||||
container_name: sonarr
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=sonarr.${DOMAIN},sonar.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=sonarr.${DOMAIN},sonar.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/sonarr:/config
|
||||
- ${DATA_LOCATION}/TV:/tv
|
||||
- /media/seedbox:/downloads
|
||||
- ${DATA_LOCATION}/Downloads:/downloads-local
|
||||
expose:
|
||||
- "8989"
|
||||
ports:
|
||||
- 8989:8989
|
||||
restart: unless-stopped
|
||||
flaresolverr:
|
||||
image: ghcr.io/flaresolverr/flaresolverr:latest
|
||||
container_name: flaresolverr
|
||||
restart: unless-stopped
|
||||
ports:
|
||||
- 8191:8191
|
||||
prowlarr:
|
||||
image: lscr.io/linuxserver/prowlarr:latest
|
||||
container_name: prowlarr
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=prowlarr.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=prowlarr.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/prowlarr:/config
|
||||
expose:
|
||||
- "9696"
|
||||
ports:
|
||||
- 9696:9696
|
||||
restart: unless-stopped
|
||||
bazarr:
|
||||
image: lscr.io/linuxserver/bazarr:latest
|
||||
container_name: bazarr
|
||||
environment:
|
||||
- PUID=1000
|
||||
- PGID=1000
|
||||
- TZ=Etc/UTC
|
||||
- VIRTUAL_HOST=bazarr.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=bazarr.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/bazarr:/config
|
||||
- ${DATA_LOCATION}/Movies:/movies #optional
|
||||
- ${DATA_LOCATION}/TV:/tv #optional
|
||||
expose:
|
||||
- "6767"
|
||||
ports:
|
||||
- 6767:6767
|
||||
restart: unless-stopped
|
||||
overseerr:
|
||||
image: lscr.io/linuxserver/overseerr:latest
|
||||
container_name: overseerr
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=overseerr.${DOMAIN},overseer.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=overseerr.${DOMAIN},overseer.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/overseerr:/config
|
||||
expose:
|
||||
- "5055"
|
||||
ports:
|
||||
- 5055:5055
|
||||
restart: unless-stopped
|
||||
lidarr:
|
||||
image: lscr.io/linuxserver/lidarr:latest
|
||||
container_name: lidarr
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=lidarr.${DOMAIN},lidar.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=lidarr.${DOMAIN},lidar.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/lidarr:/config
|
||||
- ${DATA_LOCATION}/Music:/music
|
||||
- /media/seedbox:/downloads
|
||||
- ${DATA_LOCATION}/Downloads:/downloads-local
|
||||
expose:
|
||||
- "8686"
|
||||
ports:
|
||||
- 8686:8686
|
||||
restart: unless-stopped
|
||||
mylar3:
|
||||
image: lscr.io/linuxserver/mylar3:latest
|
||||
container_name: mylar3
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=mylar.${DOMAIN},mylar3.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=mylar.${DOMAIN},mylar3.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/mylar3:/config
|
||||
- ${DATA_LOCATION}/Comics:/comics
|
||||
- /media/seedbox:/downloads
|
||||
- ${DATA_LOCATION}/Downloads:/downloads-local
|
||||
ports:
|
||||
- 8090:8090
|
||||
restart: unless-stopped
|
||||
readarr:
|
||||
image: lscr.io/linuxserver/readarr:develop
|
||||
container_name: readarr
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=readarr.${DOMAIN},readar.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=readarr.${DOMAIN},readar.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/readarr:/config
|
||||
- ${DATA_LOCATION}/Books:/books
|
||||
- /media/seedbox:/downloads
|
||||
- ${DATA_LOCATION}/Downloads:/downloads-local
|
||||
expose:
|
||||
- "8787"
|
||||
ports:
|
||||
- 8787:8787
|
||||
restart: unless-stopped
|
||||
readarraudio:
|
||||
image: lscr.io/linuxserver/readarr:develop
|
||||
container_name: readarraudio
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=readarraudio.${DOMAIN},readaraudio.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=readarraudio.${DOMAIN},readaraudio.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/readarr-audio:/config
|
||||
- ${DATA_LOCATION}/Audiobooks:/audiobooks
|
||||
- /media/seedbox:/downloads
|
||||
- ${DATA_LOCATION}/Downloads:/downloads-local
|
||||
restart: unless-stopped
|
||||
calibre:
|
||||
image: lscr.io/linuxserver/calibre:latest
|
||||
container_name: calibre
|
||||
security_opt:
|
||||
- seccomp:unconfined #optional
|
||||
environment:
|
||||
- PUID=1000
|
||||
- PGID=1000
|
||||
- TZ=Etc/UTC
|
||||
# - PASSWORD= #optional
|
||||
# - CLI_ARGS= #optional
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/calibre:/config
|
||||
- ${DATA_LOCATION}/Books:/books
|
||||
- ${DATA_LOCATION}/Audiobooks:/audiobooks
|
||||
- /media/seedbox:/downloads
|
||||
- ${DATA_LOCATION}/Downloads:/downloads-local
|
||||
ports:
|
||||
- 8180:8080
|
||||
- 8281:8181
|
||||
- 8182:8081
|
||||
restart: unless-stopped
|
||||
calibre-web:
|
||||
image: lscr.io/linuxserver/calibre-web:latest
|
||||
container_name: calibre-web
|
||||
environment:
|
||||
- PUID=1000
|
||||
- PGID=1000
|
||||
- TZ=Etc/UTC
|
||||
- DOCKER_MODS=linuxserver/mods:universal-calibre #optional
|
||||
- OAUTHLIB_RELAX_TOKEN_SCOPE=1 #optional
|
||||
- VIRTUAL_HOST=books.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=books.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/calibre-web:/config
|
||||
- ${DATA_LOCATION}/Books:/books
|
||||
ports:
|
||||
- 8083:8083
|
||||
restart: unless-stopped
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,20 +0,0 @@
|
|||
services:
|
||||
pds:
|
||||
container_name: pds
|
||||
image: ghcr.io/bluesky-social/pds:0.4
|
||||
restart: unless-stopped
|
||||
volumes:
|
||||
- ./data:/pds
|
||||
env_file:
|
||||
- ./.env
|
||||
environment:
|
||||
- VIRTUAL_HOST=bluesky.${DOMAIN}
|
||||
- VIRTUAL_PORT=3005
|
||||
- LETSENCRYPT_HOST=bluesky.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
ports:
|
||||
- 3005:3005
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
1
client_max_body_size.conf
Normal file
1
client_max_body_size.conf
Normal file
|
@ -0,0 +1 @@
|
|||
client_max_body_size 10000m;
|
|
@ -1,7 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
UID=1000
|
||||
GID=1000
|
||||
TZ=Etc/UTC
|
||||
CONFIG_LOCATION=./config
|
||||
DATA_LOCATION=./data
|
||||
EMAIL=example@mail.com
|
1
dashboard/.gitignore
vendored
1
dashboard/.gitignore
vendored
|
@ -1 +0,0 @@
|
|||
data/
|
|
@ -1,40 +0,0 @@
|
|||
services:
|
||||
homarr:
|
||||
container_name: homarr
|
||||
image: ghcr.io/ajnart/homarr:latest
|
||||
restart: unless-stopped
|
||||
volumes:
|
||||
- /var/run/docker.sock:/var/run/docker.sock # Optional, only if you want docker integration
|
||||
- ${CONFIG_LOCATION}/homarr:/app/data/configs
|
||||
- ${DATA_LOCATION}/homarr/icons:/app/public/icons
|
||||
- ${DATA_LOCATION}/homarr:/data
|
||||
environment:
|
||||
- VIRTUAL_HOST=homarr.${DOMAIN}, ${DOMAIN}, www.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
expose:
|
||||
- "7575"
|
||||
ports:
|
||||
- '7575:7575'
|
||||
dashdot:
|
||||
image: mauricenino/dashdot
|
||||
container_name: dashdot
|
||||
restart: unless-stopped
|
||||
privileged: true
|
||||
environment:
|
||||
- VIRTUAL_HOST=dash.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=dash.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
- DASHDOT_ENABLE_CPU_TEMPS=true
|
||||
- DASHDOT_FS_DEVICE_FILTER=sda,sdb,sdc,sdd,sde,sdf
|
||||
- DASHDOT_FS_VIRTUAL_MOUNTS=tank/storage/media, psb29404@psb29404.seedbox.io:/files
|
||||
expose:
|
||||
- "3001"
|
||||
ports:
|
||||
- 3001:3001
|
||||
volumes:
|
||||
- /:/mnt/host:ro
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
384
docker-compose.yml
Normal file
384
docker-compose.yml
Normal file
|
@ -0,0 +1,384 @@
|
|||
services:
|
||||
nginx-proxy:
|
||||
image: jwilder/nginx-proxy
|
||||
ports:
|
||||
- "80:80"
|
||||
- "443:443"
|
||||
volumes:
|
||||
- /var/run/docker.sock:/tmp/docker.sock:ro
|
||||
- ./nginx/certs:/etc/nginx/certs
|
||||
- ./nginx/html:/usr/share/nginx/html
|
||||
- ./nginx/vhost.d:/etc/nginx/vhost.d
|
||||
- ./client_max_body_size.conf:/etc/nginx/conf.d/client_max_body_size.conf:ro
|
||||
nginx-letsencrypt:
|
||||
image: jrcs/letsencrypt-nginx-proxy-companion
|
||||
container_name: nginx-letsencrypt
|
||||
restart: always
|
||||
volumes_from:
|
||||
- nginx-proxy
|
||||
volumes:
|
||||
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||
environment:
|
||||
- DEFAULT_EMAIL=${EMAIL}
|
||||
redis:
|
||||
image: redis:alpine
|
||||
container_name: redis-dbcache
|
||||
restart: unless-stopped
|
||||
mailserver:
|
||||
image: ghcr.io/docker-mailserver/docker-mailserver:latest
|
||||
container_name: mailserver
|
||||
# Provide the FQDN of your mail server here (Your DNS MX record should point to this value)
|
||||
hostname: mail.${DOMAIN}
|
||||
# env_file:
|
||||
# - .env
|
||||
# - .env.mail
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- VIRTUAL_HOST=mail.${DOMAIN}
|
||||
- ENABLE_RSPAMD=1
|
||||
- ENABLE_CLAMAV=1
|
||||
- ENABLE_FAIL2BAN=1
|
||||
- ONE_DIR=1
|
||||
cap_add:
|
||||
- NET_ADMIN # For Fail2Ban to work
|
||||
# More information about the mail-server ports:
|
||||
# https://docker-mailserver.github.io/docker-mailserver/latest/config/security/understanding-the-ports/
|
||||
# To avoid conflicts with yaml base-60 float, DO NOT remove the quotation marks.
|
||||
ports:
|
||||
- "25:25" # SMTP (explicit TLS => STARTTLS, Authentication is DISABLED => use port 465/587 instead)
|
||||
- "143:143" # IMAP4 (explicit TLS => STARTTLS)
|
||||
- "465:465" # ESMTP (implicit TLS)
|
||||
- "587:587" # ESMTP (explicit TLS => STARTTLS)
|
||||
- "993:993" # IMAP4 (implicit TLS)
|
||||
expose:
|
||||
- "25"
|
||||
- "143"
|
||||
- "465"
|
||||
- "587"
|
||||
- "993"
|
||||
volumes:
|
||||
- ./mail/data/:/var/mail/
|
||||
- ./mail/state/:/var/mail-state/
|
||||
- ./mail/logs/:/var/log/mail/
|
||||
- ${CONFIG_LOCATION}/mail:/tmp/docker-mailserver/
|
||||
- /etc/localtime:/etc/localtime:ro
|
||||
restart: always
|
||||
stop_grace_period: 1m
|
||||
# Uncomment if using `ENABLE_FAIL2BAN=1`:
|
||||
# cap_add:
|
||||
# - NET_ADMIN
|
||||
healthcheck:
|
||||
test: "ss --listening --tcp | grep -P 'LISTEN.+:smtp' || exit 1"
|
||||
timeout: 3s
|
||||
retries: 0
|
||||
homarr:
|
||||
container_name: homarr
|
||||
image: ghcr.io/ajnart/homarr:latest
|
||||
restart: unless-stopped
|
||||
volumes:
|
||||
- /var/run/docker.sock:/var/run/docker.sock # Optional, only if you want docker integration
|
||||
- ${CONFIG_LOCATION}/homarr:/app/data/configs
|
||||
- ${DATA_LOCATION}/homarr/icons:/app/public/icons
|
||||
- ${DATA_LOCATION}/homarr:/data
|
||||
environment:
|
||||
- VIRTUAL_HOST=homarr.${DOMAIN}, ${DOMAIN}, www.${DOMAIN}
|
||||
- LETSENCRYPT_HOST="homarr.${DOMAIN}, ${DOMAIN}, www.${DOMAIN}"
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
expose:
|
||||
- "7575"
|
||||
ports:
|
||||
- '7575:7575'
|
||||
dashdot:
|
||||
image: mauricenino/dashdot
|
||||
container_name: dashdot
|
||||
restart: unless-stopped
|
||||
privileged: true
|
||||
environment:
|
||||
- VIRTUAL_HOST=dash.${DOMAIN}
|
||||
- DASHDOT_ENABLE_CPU_TEMPS=true
|
||||
- DASHDOT_FS_DEVICE_FILTER=sda,sdb,sdc,sdd,sde,sdf
|
||||
- DASHDOT_FS_VIRTUAL_MOUNTS=tank/storage/media, psb29404@psb29404.seedbox.io:/files
|
||||
expose:
|
||||
- "3001"
|
||||
ports:
|
||||
- 3001:3001
|
||||
volumes:
|
||||
- /:/mnt/host:ro
|
||||
plex:
|
||||
image: plexinc/pms-docker:latest
|
||||
container_name: plex
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=plex.${DOMAIN}
|
||||
- VERSION=docker
|
||||
- PLEX_CLAIM=${PLEX_CLAIM}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/plex:/config
|
||||
- ${DATA_LOCATION}/TV:/tv
|
||||
- ${DATA_LOCATION}/Movies:/movies
|
||||
expose:
|
||||
- "32400"
|
||||
ports:
|
||||
- 32400:32400
|
||||
restart: unless-stopped
|
||||
tautulli:
|
||||
image: lscr.io/linuxserver/tautulli:latest
|
||||
container_name: tautulli
|
||||
environment:
|
||||
- PUID=1000
|
||||
- PGID=1000
|
||||
- TZ=Etc/UTC
|
||||
- VIRTUAL_HOST=tautulli.${DOMAIN},plex-stats.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=tautulli.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/tautulli:/config
|
||||
ports:
|
||||
- 8181:8181
|
||||
restart: unless-stopped
|
||||
radarr:
|
||||
image: lscr.io/linuxserver/radarr:latest
|
||||
container_name: radarr
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=radarr.${DOMAIN},radar.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=radarr.${DOMAIN},radar.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/radarr:/config
|
||||
- ${DATA_LOCATION}/Movies:/movies
|
||||
- /media/seedbox:/downloads
|
||||
expose:
|
||||
- "7878"
|
||||
ports:
|
||||
- 7878:7878
|
||||
restart: unless-stopped
|
||||
sonarr:
|
||||
image: lscr.io/linuxserver/sonarr:latest
|
||||
container_name: sonarr
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=sonarr.${DOMAIN},sonar.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=sonarr.${DOMAIN},sonar.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/sonarr:/config
|
||||
- ${DATA_LOCATION}/TV:/tv
|
||||
- /media/seedbox:/downloads
|
||||
expose:
|
||||
- "8989"
|
||||
ports:
|
||||
- 8989:8989
|
||||
restart: unless-stopped
|
||||
prowlarr:
|
||||
image: lscr.io/linuxserver/prowlarr:latest
|
||||
container_name: prowlarr
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=prowlarr.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=prowlarr.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/prowlarr:/config
|
||||
expose:
|
||||
- "9696"
|
||||
ports:
|
||||
- 9696:9696
|
||||
restart: unless-stopped
|
||||
overseerr:
|
||||
image: lscr.io/linuxserver/overseerr:latest
|
||||
container_name: overseerr
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=overseerr.${DOMAIN},overseer.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=overseerr.${DOMAIN},overseer.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/overseerr:/config
|
||||
expose:
|
||||
- "5055"
|
||||
ports:
|
||||
- 5055:5055
|
||||
restart: unless-stopped
|
||||
lidarr:
|
||||
image: lscr.io/linuxserver/lidarr:latest
|
||||
container_name: lidarr
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=lidarr.${DOMAIN},lidar.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=lidarr.${DOMAIN},lidar.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/lidarr:/config
|
||||
- ${DATA_LOCATION}/Music:/music
|
||||
- /media/seedbox:/downloads
|
||||
expose:
|
||||
- "8686"
|
||||
ports:
|
||||
- 8686:8686
|
||||
restart: unless-stopped
|
||||
mylar3:
|
||||
image: lscr.io/linuxserver/mylar3:latest
|
||||
container_name: mylar3
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=mylar.${DOMAIN},mylar3.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=mylar.${DOMAIN},mylar3.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/mylar3:/config
|
||||
- ${DATA_LOCATION}/Comics:/comics
|
||||
- /media/seedbox:/downloads
|
||||
ports:
|
||||
- 8090:8090
|
||||
restart: unless-stopped
|
||||
ubooquity:
|
||||
image: lscr.io/linuxserver/ubooquity:latest
|
||||
container_name: ubooquity
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=ubooquity.${DOMAIN}
|
||||
- VIRTUAL_PORT=2202
|
||||
# - MAXMEM= #optional
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/ubooquity:/config
|
||||
- ${DATA_LOCATION}/Books:/books
|
||||
- ${DATA_LOCATION}/Comics:/comics
|
||||
# - /path/to/raw/files:/files
|
||||
expose:
|
||||
- "2202"
|
||||
- "2203"
|
||||
ports:
|
||||
- 2202:2202 #:2202/ubooquity
|
||||
- 2203:2203 #:2203/ubooquity/admin
|
||||
restart: unless-stopped
|
||||
audiobookshelf:
|
||||
image: ghcr.io/advplyr/audiobookshelf:latest
|
||||
ports:
|
||||
- 13378:80
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/audiobookshelf:/config
|
||||
- ${DATA_LOCATION}/Audiobooks:/audiobooks
|
||||
# - </path/to/podcasts>:/podcasts
|
||||
- ${DATA_LOCATION}/Audiobooks/metadata:/metadata
|
||||
environment:
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=audiobookshelf.${DOMAIN}
|
||||
readarr:
|
||||
image: lscr.io/linuxserver/readarr:develop
|
||||
container_name: readarr
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=readarr.${DOMAIN},readar.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=readarr.${DOMAIN},readar.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/readarr:/config
|
||||
- ${DATA_LOCATION}/Books:/books
|
||||
- /media/seedbox:/downloads
|
||||
expose:
|
||||
- "8787"
|
||||
ports:
|
||||
- 8787:8787
|
||||
restart: unless-stopped
|
||||
readarraudio:
|
||||
image: lscr.io/linuxserver/readarr:develop
|
||||
container_name: readarraudio
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=readarraudio.${DOMAIN},readaraudio.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=readarraudio.${DOMAIN},readaraudio.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/readarr-audio:/config
|
||||
- ${DATA_LOCATION}/Audiobooks:/audiobooks
|
||||
- /media/seedbox:/downloads
|
||||
restart: unless-stopped
|
||||
wordpress-botc:
|
||||
depends_on:
|
||||
- db
|
||||
image: wordpress
|
||||
restart: always
|
||||
environment:
|
||||
WORDPRESS_DB_HOST: db
|
||||
WORDPRESS_DB_USER: root
|
||||
WORDPRESS_DB_PASSWORD: ${DBPASS}
|
||||
WORDPRESS_DB_NAME: clocktower
|
||||
VIRTUAL_HOST: "botc.${DOMAIN}, *.phillybotc.com"
|
||||
LETSENCRYPT_HOST: "botc.${DOMAIN}, *.phillybotc.com"
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
volumes:
|
||||
- wordpress-botc:/var/www/html
|
||||
# wordpress-home:
|
||||
# depends_on:
|
||||
# - db
|
||||
# image: wordpress
|
||||
# restart: always
|
||||
# environment:
|
||||
# WORDPRESS_DB_HOST: db
|
||||
# WORDPRESS_DB_USER: root
|
||||
# WORDPRESS_DB_PASSWORD: ${DBPASS}
|
||||
# WORDPRESS_DB_NAME: homepage
|
||||
# VIRTUAL_HOST: "${DOMAIN}, www.${DOMAIN}"
|
||||
# LETSENCRYPT_HOST: "www.brodin.rocks"
|
||||
# LETSENCRYPT_EMAIL: "bjageman@gmail.com"
|
||||
# volumes:
|
||||
# - wordpress-home:/var/www/html
|
||||
db:
|
||||
image: mysql:latest
|
||||
restart: always
|
||||
environment:
|
||||
MYSQL_ROOT_PASSWORD: ${DBPASS}
|
||||
volumes:
|
||||
- db:/var/lib/mysql
|
||||
- ./docker/provision/mysql/init:/docker-entrypoint-initdb.d
|
||||
#Nextcloud
|
||||
nextcloud:
|
||||
depends_on:
|
||||
- db
|
||||
image: lscr.io/linuxserver/nextcloud:latest
|
||||
container_name: nextcloud
|
||||
environment:
|
||||
PUID: "1000"
|
||||
PGID: "1000"
|
||||
TZ: "${TZ}"
|
||||
VIRTUAL_HOST: "nextcloud.${DOMAIN}"
|
||||
MYSQL_HOST: db
|
||||
MYSQL_DATABASE: nextcloud
|
||||
MYSQL_USER: root
|
||||
MYSQL_PASSWORD: ${DBPASS}
|
||||
REDIS_HOST: redis
|
||||
LETSENCRYPT_HOST: nextcloud.${DOMAIN}
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
# LETSENCRYPT_TEST: true
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/nextcloud:/config
|
||||
- ${DATA_LOCATION}/Cloud/Nextcloud:/data
|
||||
restart: unless-stopped
|
||||
volumes:
|
||||
# wordpress-home:
|
||||
wordpress-botc:
|
||||
db:
|
||||
|
||||
|
9
docker/provision/mysql/init/01-databases.sql
Normal file
9
docker/provision/mysql/init/01-databases.sql
Normal file
|
@ -0,0 +1,9 @@
|
|||
# create databases
|
||||
CREATE DATABASE IF NOT EXISTS `nextcloud`;
|
||||
CREATE DATABASE IF NOT EXISTS `homepage`;
|
||||
CREATE DATABASE IF NOT EXISTS `clocktower`;
|
||||
|
||||
-- # create root user and grant rights
|
||||
-- CREATE USER 'brodin'@'%' IDENTIFIED BY 'whiskey-wango-woxtrot';
|
||||
-- GRANT ALL PRIVILEGES ON *.* TO 'brodin'@'%' WITH GRANT OPTION;
|
||||
-- FLUSH PRIVILEGES;
|
|
@ -1,4 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
DBPASS=password
|
||||
EMAIL=example@mail.com
|
||||
TZ=America/New_York
|
4
docs/.gitignore
vendored
4
docs/.gitignore
vendored
|
@ -1,4 +0,0 @@
|
|||
.env
|
||||
config/*
|
||||
db/*
|
||||
|
|
@ -1,44 +0,0 @@
|
|||
services:
|
||||
bookstack:
|
||||
image: lscr.io/linuxserver/bookstack
|
||||
container_name: bookstack
|
||||
environment:
|
||||
- PUID=1000
|
||||
- PGID=1000
|
||||
- TZ=${TZ}
|
||||
- APP_URL=https://docs.${DOMAIN}
|
||||
- DB_HOST=bookstack_db
|
||||
- DB_PORT=3306
|
||||
- DB_USER=bookstack
|
||||
- DB_PASS=${DBPASS}
|
||||
- DB_DATABASE=bookstackapp
|
||||
- VIRTUAL_HOST=docs.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=docs.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ./config:/config
|
||||
ports:
|
||||
- 6875:80
|
||||
expose:
|
||||
- "6875"
|
||||
restart: unless-stopped
|
||||
depends_on:
|
||||
- bookstack_db
|
||||
bookstack_db:
|
||||
image: lscr.io/linuxserver/mariadb
|
||||
container_name: bookstack_db
|
||||
environment:
|
||||
- PUID=1000
|
||||
- PGID=1000
|
||||
- TZ=${TZ}
|
||||
- MYSQL_ROOT_PASSWORD=${DBPASS}
|
||||
- MYSQL_DATABASE=bookstackapp
|
||||
- MYSQL_USER=bookstack
|
||||
- MYSQL_PASSWORD=${DBPASS}
|
||||
volumes:
|
||||
- ./db:/config
|
||||
restart: unless-stopped
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,10 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
UID=1000
|
||||
GID=1000
|
||||
TZ=Etc/UTC
|
||||
CONFIG_LOCATION=./config
|
||||
DATA_LOCATION=./data
|
||||
EMAIL=example@mail.com
|
||||
DBUSER=example
|
||||
DBPASS=password
|
||||
RAWG_API_KEY=
|
1
games/.gitignore
vendored
1
games/.gitignore
vendored
|
@ -1 +0,0 @@
|
|||
db
|
|
@ -1,38 +0,0 @@
|
|||
services:
|
||||
gamevault-backend:
|
||||
image: phalcode/gamevault-backend:13.1.0
|
||||
restart: unless-stopped
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- DB_HOST=games-db-1
|
||||
- DB_USERNAME=${DBUSER}
|
||||
- DB_PASSWORD=${DBPASS}
|
||||
- VIRTUAL_HOST=gamevault.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=gamevault.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
# Uncomment and insert your RAWG API Key here if you have one (http://rawg.io/login?forward=developer)
|
||||
- RAWG_API_KEY=${RAWG_API_KEY}
|
||||
volumes:
|
||||
# Mount the folder where your games are
|
||||
- ${DATA_LOCATION}:/files
|
||||
# Mount the folder where GameVault should store its images
|
||||
- ${DATA_LOCATION}/images:/media
|
||||
expose:
|
||||
- "8080"
|
||||
ports:
|
||||
- 8080:8080
|
||||
db:
|
||||
image: postgres:16
|
||||
restart: unless-stopped
|
||||
environment:
|
||||
POSTGRES_USER: ${DBUSER}
|
||||
POSTGRES_PASSWORD: ${DBPASS}
|
||||
POSTGRES_DB: gamevault
|
||||
volumes:
|
||||
# Mount the folder where your PostgreSQL database files should land
|
||||
- ./db:/var/lib/postgresql/data
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,8 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
UID=1000
|
||||
GID=1000
|
||||
DBPASS=gitea
|
||||
TZ=Etc/UTC
|
||||
CONFIG_LOCATION=./config
|
||||
DATA_LOCATION=./data
|
||||
EMAIL=example@mail.com
|
3
gitea/.gitignore
vendored
3
gitea/.gitignore
vendored
|
@ -1,3 +0,0 @@
|
|||
config/*
|
||||
data/*
|
||||
db
|
|
@ -1,40 +0,0 @@
|
|||
services:
|
||||
server:
|
||||
image: gitea/gitea:latest-rootless
|
||||
container_name: gitea
|
||||
depends_on:
|
||||
- db
|
||||
environment:
|
||||
- GITEA__database__DB_TYPE=postgres
|
||||
- GITEA__database__HOST=gitea-db-1:5432
|
||||
- GITEA__database__NAME=gitea
|
||||
- GITEA__database__USER=gitea
|
||||
- GITEA__database__PASSWD=${DBPASS}
|
||||
- VIRTUAL_HOST=git.${DOMAIN},git.${DOMAIN}
|
||||
- VIRTUAL_PORT=3004
|
||||
- LETSENCRYPT_HOST=git.${DOMAIN},git.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
restart: always
|
||||
volumes:
|
||||
- ./data:/var/lib/gitea
|
||||
- ./config:/etc/gitea
|
||||
- /etc/timezone:/etc/timezone:ro
|
||||
- /etc/localtime:/etc/localtime:ro
|
||||
ports:
|
||||
- "3004:3004"
|
||||
- "2222:2222"
|
||||
expose:
|
||||
- "3004"
|
||||
db:
|
||||
image: postgres:14
|
||||
restart: always
|
||||
environment:
|
||||
- POSTGRES_USER=gitea
|
||||
- POSTGRES_PASSWORD=${DBPASS}
|
||||
- POSTGRES_DB=gitea
|
||||
volumes:
|
||||
- ./db:/var/lib/postgresql/data
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,23 +0,0 @@
|
|||
services:
|
||||
kiwix-serve:
|
||||
ports:
|
||||
- 8082:8082
|
||||
image: ghcr.io/kiwix/kiwix-serve:latest
|
||||
# uncomment next 4 lines to use it with local zim file in /tmp/zim
|
||||
volumes:
|
||||
- /tank/storage/media/Cloud/Kiwix:/data
|
||||
command:
|
||||
- 'wikipedia_en_all_maxi_2024-01.zim'
|
||||
# uncomment next 2 lines to use it with remote zim file
|
||||
environment:
|
||||
- PORT=8082
|
||||
- VIRTUAL_HOST=wiki.${DOMAIN}
|
||||
- VIRTUAL_PORT=8082
|
||||
- LETSENCRYPT_HOST=wiki.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
expose:
|
||||
- "8082"
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,7 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
UID=1000
|
||||
GID=1000
|
||||
TZ=Etc/UTC
|
||||
CONFIG_LOCATION=./config
|
||||
DATA_LOCATION=./data
|
||||
EMAIL=example@mail.com
|
|
@ -1,25 +0,0 @@
|
|||
services:
|
||||
lazylibrarian:
|
||||
image: lscr.io/linuxserver/lazylibrarian:latest
|
||||
container_name: lazylibrarian
|
||||
environment:
|
||||
PUID: 1000
|
||||
PGID: 1000
|
||||
TZ: Etc/UTC
|
||||
DOCKER_MODS: linuxserver/mods:universal-calibre|linuxserver/mods:lazylibrarian-ffmpeg #optional
|
||||
VIRTUAL_HOST: lazylib.brodin.rocks
|
||||
LETSENCRYPT_HOST: lazylib.brodin.rocks
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
volumes:
|
||||
- ./config/lazylibrarian:/config
|
||||
- /media/seedbox:/downloads
|
||||
- ${DATA_LOCATION}/Downloads:/downloads-local
|
||||
- ${DATA_LOCATION}/Audiobooks:/audiobooks
|
||||
- ${DATA_LOCATION}/Books:/books
|
||||
ports:
|
||||
- 5299:5299
|
||||
restart: unless-stopped
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,7 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
UID=1000
|
||||
GID=1000
|
||||
TZ=Etc/UTC
|
||||
CONFIG_LOCATION=./config
|
||||
DATA_LOCATION=./data
|
||||
EMAIL=example@mail.com
|
1
minecraft/.gitignore
vendored
1
minecraft/.gitignore
vendored
|
@ -1 +0,0 @@
|
|||
crafty/
|
|
@ -1,28 +0,0 @@
|
|||
services:
|
||||
crafty:
|
||||
container_name: crafty_container
|
||||
image: registry.gitlab.com/crafty-controller/crafty-4:latest
|
||||
restart: always
|
||||
environment:
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=minecraft.${DOMAIN}
|
||||
- VIRTUAL_PORT=8443
|
||||
- LETSENCRYPT_HOST=minecraft.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
- LETSENCRYPT_TEST=true
|
||||
ports:
|
||||
- "8443:8443" # HTTPS
|
||||
- "8123:8123" # DYNMAP
|
||||
- "19132:19132/udp" # BEDROCK
|
||||
- "25500-25600:25500-25600" # MC SERV PORT RANGE
|
||||
volumes:
|
||||
- ./crafty/backups:/crafty/backups
|
||||
- ./crafty/logs:/crafty/logs
|
||||
- ./crafty/servers:/crafty/servers
|
||||
- ./crafty/config:/crafty/app/config
|
||||
- ./crafty/import:/crafty/import
|
||||
- ${DATA_LOCATION}:/external
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,7 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
UID=1000
|
||||
GID=1000
|
||||
TZ=Etc/UTC
|
||||
CONFIG_LOCATION=./config
|
||||
DATA_LOCATION=./data
|
||||
EMAIL=example@mail.com
|
1
monitoring/.gitignore
vendored
1
monitoring/.gitignore
vendored
|
@ -1 +0,0 @@
|
|||
data/
|
|
@ -1,60 +0,0 @@
|
|||
services:
|
||||
cadvisor:
|
||||
image: gcr.io/cadvisor/cadvisor:latest
|
||||
container_name: cadvisor
|
||||
privileged: true
|
||||
restart: unless-stopped
|
||||
volumes:
|
||||
- /:/rootfs:ro
|
||||
- /var/run:/var/run:rw
|
||||
- /sys:/sys:ro
|
||||
- /var/lib/docker/:/var/lib/docker:ro
|
||||
prometheus:
|
||||
image: prom/prometheus
|
||||
container_name: prometheus
|
||||
user: '0'
|
||||
command:
|
||||
- '--config.file=/etc/prometheus/prometheus.yml'
|
||||
ports:
|
||||
- 9090:9090
|
||||
restart: unless-stopped
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/prometheus:/etc/prometheus
|
||||
- ${DATA_LOCATION}/prometheus:/prometheus
|
||||
node-exporter:
|
||||
image: quay.io/prometheus/node-exporter:latest
|
||||
container_name: node-exporter
|
||||
command:
|
||||
- '--path.rootfs=/host'
|
||||
ports:
|
||||
- 9100:9100
|
||||
pid: host
|
||||
restart: unless-stopped
|
||||
volumes:
|
||||
- '/:/host:ro,rslave'
|
||||
smartctl-exporter:
|
||||
image: prometheuscommunity/smartctl-exporter
|
||||
container_name: smartctl-exporter
|
||||
privileged: true
|
||||
user: root
|
||||
ports:
|
||||
- "9633:9633"
|
||||
grafana:
|
||||
image: grafana/grafana-enterprise
|
||||
container_name: grafana
|
||||
restart: unless-stopped
|
||||
user: '0'
|
||||
environment:
|
||||
- GF_SERVER_ROOT_URL=https://grafana.${DOMAIN}
|
||||
- GF_INSTALL_PLUGINS=grafana-clock-panel
|
||||
- VIRTUAL_HOST=grafana.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=grafana.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/grafana:/var/lib/grafana
|
||||
ports:
|
||||
- '3003:3000'
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,8 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
UID=1000
|
||||
GID=1000
|
||||
TZ=Etc/UTC
|
||||
DBPASS=password
|
||||
CONFIG_LOCATION=./config
|
||||
DATA_LOCATION=./data
|
||||
EMAIL=example@mail.com
|
2
nextcloud/.gitignore
vendored
2
nextcloud/.gitignore
vendored
|
@ -1,2 +0,0 @@
|
|||
data/*
|
||||
collabora
|
|
@ -1,341 +0,0 @@
|
|||
<!-- -*- nxml-child-indent: 4; tab-width: 4; indent-tabs-mode: nil -*- -->
|
||||
<config>
|
||||
|
||||
<!-- For more detailed documentation on typical configuration options please see:
|
||||
https://sdk.collaboraonline.com/docs/installation/Configuration.html -->
|
||||
|
||||
<!-- Note: 'default' attributes are used to document a setting's default value as well as to use as fallback. -->
|
||||
<!-- Note: When adding a new entry, a default must be set in WSD in case the entry is missing upon deployment. -->
|
||||
|
||||
<accessibility desc="Accessibility settings">
|
||||
<enable type="bool" desc="Controls whether accessibility support should be enabled or not." default="false">false</enable>
|
||||
</accessibility>
|
||||
|
||||
<allowed_languages desc="List of supported languages of Writing Aids (spell checker, grammar checker, thesaurus, hyphenation) on this instance. Allowing too many has negative effect on startup performance." default="de_DE en_GB en_US es_ES fr_FR it nl pt_BR pt_PT ru">de_DE en_GB en_US es_ES fr_FR it nl pt_BR pt_PT ru</allowed_languages>
|
||||
|
||||
<!--
|
||||
These are the settings of external (remote) spellchecker and grammar checker services. Currently LanguageTool and Duden Korrekturserver APIs are supported, you can
|
||||
set either of them. By default they are disabled. To turn the support on, please set "enabled" property to true. It works with self hosted or cloud services, free
|
||||
and premium as well. The "base_url" may be https://api.languagetoolplus.com/v2 if the cloud version of LanguageTool is used. Please note that your data in the
|
||||
document e.g. the text part of it will be sent to the cloud API. Please read the respective privacy policies, e.g. https://languagetool.org/legal/privacy.
|
||||
-->
|
||||
<languagetool desc="Remote API settings for spell and grammar checking">
|
||||
<enabled desc="Enable Remote Spell and Grammar Checker" type="bool" default="false"></enabled>
|
||||
<base_url desc="HTTP endpoint for the API server, without /check or /languages postfix at the end." type="string" default=""></base_url>
|
||||
<user_name desc="LanguageTool or Duden account username for premium usage." type="string" default=""></user_name>
|
||||
<api_key desc="API key provided by LanguageTool or Duden account for premium usage." type="string" default=""></api_key>
|
||||
<ssl_verification desc="Enable or disable SSL verification. You may have to disable it in test environments with self-signed certificates." type="string" default="true"></ssl_verification>
|
||||
<rest_protocol desc="REST API protocol. For LanguageTool leave it blank, for Duden Korrekturserver use the string 'duden'." type="string" default=""></rest_protocol>
|
||||
</languagetool>
|
||||
|
||||
<deepl desc="DeepL API settings for translation service">
|
||||
<enabled desc="If true, shows translate option as a menu entry in the compact view and as an icon in the tabbed view." type="bool" default="false">false</enabled>
|
||||
<api_url desc="URL for the API" type="string" default=""></api_url>
|
||||
<auth_key desc="Auth Key generated by your account" type="string" default=""></auth_key>
|
||||
</deepl>
|
||||
|
||||
<sys_template_path desc="Path to a template tree with shared libraries etc to be used as source for chroot jails for child processes." type="path" relative="true" default="systemplate"></sys_template_path>
|
||||
<child_root_path desc="Path to the directory under which the chroot jails for the child processes will be created. Should be on the same file system as systemplate and lotemplate. Must be an empty directory." type="path" relative="true" default="jails"></child_root_path>
|
||||
<mount_jail_tree desc="Controls whether the systemplate and lotemplate contents are mounted or not, which is much faster than the default of linking/copying each file." type="bool" default="true"></mount_jail_tree>
|
||||
<mount_namespaces desc="Use mount namespaces instead of coolmount." type="bool" default="true"></mount_namespaces>
|
||||
|
||||
<server_name desc="External hostname:port of the server running coolwsd. If empty, it's derived from the request (please set it if this doesn't work). May be specified when behind a reverse-proxy or when the hostname is not reachable directly." type="string" default=""></server_name>
|
||||
<file_server_root_path desc="Path to the directory that should be considered root for the file server. This should be the directory containing cool." type="path" relative="true" default="browser/../"></file_server_root_path>
|
||||
<hexify_embedded_urls desc="Enable to protect encoded URLs from getting decoded by intermediate hops. Particularly useful on Azure deployments" type="bool" default="false"></hexify_embedded_urls>
|
||||
<experimental_features desc="Enable/Disable experimental features" type="bool" default="true">true</experimental_features>
|
||||
|
||||
<memproportion desc="The maximum percentage of available memory consumed by all of the Collabora Online Development Edition processes, after which we start cleaning up idle documents. If cgroup memory limits are set, this is the maximum percentage of that limit to consume." type="double" default="80.0"></memproportion>
|
||||
<num_prespawn_children desc="Number of child processes to keep started in advance and waiting for new clients." type="uint" default="4">4</num_prespawn_children>
|
||||
<!-- <fetch_update_check desc="Every number of hours will fetch latest version data. Defaults to 10 hours." type="uint" default="10">10</fetch_update_check> -->
|
||||
<!-- <allow_update_popup desc="Allows notification about an update in the editor" type="bool" default="true">true</allow_update_popup> -->
|
||||
<per_document desc="Document-specific settings, including LO Core settings.">
|
||||
<max_concurrency desc="The maximum number of threads to use while processing a document." type="uint" default="4">4</max_concurrency>
|
||||
<batch_priority desc="A (lower) priority for use by batch eg. convert-to processes to avoid starving interactive ones" type="uint" default="5">5</batch_priority>
|
||||
<bgsave_priority desc="A (lower) priority for use by background save processes to free time for interactive ones" type="uint" default="5">5</bgsave_priority>
|
||||
<redlining_as_comments desc="If true show red-lines as comments" type="bool" default="false">false</redlining_as_comments>
|
||||
<pdf_resolution_dpi desc="The resolution, in DPI, used to render PDF documents as image. Memory consumption grows proportionally. Must be a positive value less than 385. Defaults to 96." type="uint" default="96">96</pdf_resolution_dpi>
|
||||
<idle_timeout_secs desc="The maximum number of seconds before unloading an idle document. Defaults to 1 hour." type="uint" default="3600">3600</idle_timeout_secs>
|
||||
<idlesave_duration_secs desc="The number of idle seconds after which document, if modified, should be saved. Disabled when 0. Defaults to 30 seconds." type="uint" default="30">30</idlesave_duration_secs>
|
||||
<autosave_duration_secs desc="The number of seconds after which document, if modified, should be saved. Disabled when 0. Defaults to 5 minutes." type="uint" default="300">300</autosave_duration_secs>
|
||||
<background_autosave desc="Allow auto-saves to occur in a forked background process where possible." type="bool" default="true">true</background_autosave>
|
||||
<background_manualsave desc="Allow manual save to occur in a forked background process where possible" type="bool" default="true">true</background_manualsave>
|
||||
<always_save_on_exit desc="On exiting the last editor, always perform a save and upload if the document had been modified. This is to allow the storage to store the document, if it had skipped doing so, previously, as an optimization." type="bool" default="false">false</always_save_on_exit>
|
||||
<limit_virt_mem_mb desc="The maximum virtual memory allowed to each document process. 0 for unlimited." type="uint">0</limit_virt_mem_mb>
|
||||
<limit_stack_mem_kb desc="The maximum stack size allowed to each document process. 0 for unlimited." type="uint">8000</limit_stack_mem_kb>
|
||||
<limit_file_size_mb desc="The maximum file size allowed to each document process to write. 0 for unlimited." type="uint">0</limit_file_size_mb>
|
||||
<limit_num_open_files desc="The maximum number of files allowed to each document process to open. 0 for unlimited." type="uint">0</limit_num_open_files>
|
||||
<limit_load_secs desc="Maximum number of seconds to wait for a document load to succeed. 0 for unlimited." type="uint" default="100">100</limit_load_secs>
|
||||
<limit_store_failures desc="Maximum number of consecutive save-and-upload to storage failures when unloading the document. 0 for unlimited (not recommended)." type="uint" default="5">5</limit_store_failures>
|
||||
<limit_convert_secs desc="Maximum number of seconds to wait for a document conversion to succeed. 0 for unlimited." type="uint" default="100">100</limit_convert_secs>
|
||||
<min_time_between_saves_ms desc="Minimum number of milliseconds between saving the document on disk." type="uint" default="500">500</min_time_between_saves_ms>
|
||||
<min_time_between_uploads_ms desc="Minimum number of milliseconds between uploading the document to storage." type="uint" default="5000">5000</min_time_between_uploads_ms>
|
||||
<cleanup desc="Checks for resource consuming (bad) documents and kills associated kit process. A document is considered resource consuming (bad) if is in idle state for idle_time_secs period and memory usage passed limit_dirty_mem_mb or CPU usage passed limit_cpu_per" enable="true">
|
||||
<cleanup_interval_ms desc="Interval between two checks" type="uint" default="10000">10000</cleanup_interval_ms>
|
||||
<bad_behavior_period_secs desc="Minimum time period for a document to be in bad state before associated kit process is killed. If in this period the condition for bad document is not met once then this period is reset" type="uint" default="60">60</bad_behavior_period_secs>
|
||||
<idle_time_secs desc="Minimum idle time for a document to be candidate for bad state" type="uint" default="300">300</idle_time_secs>
|
||||
<limit_dirty_mem_mb desc="Minimum memory usage for a document to be candidate for bad state" type="uint" default="3072">3072</limit_dirty_mem_mb>
|
||||
<limit_cpu_per desc="Minimum CPU usage for a document to be candidate for bad state" type="uint" default="85">85</limit_cpu_per>
|
||||
<lost_kit_grace_period_secs desc="The minimum grace period for a lost kit process (not referenced by coolwsd) to resolve its lost status before it is terminated. To disable the cleanup of lost kits use value 0" default="120">120</lost_kit_grace_period_secs>
|
||||
</cleanup>
|
||||
</per_document>
|
||||
|
||||
<per_view desc="View-specific settings.">
|
||||
<out_of_focus_timeout_secs desc="The maximum number of seconds before dimming and stopping updates when the browser tab is no longer in focus. Defaults to 300 seconds." type="uint" default="300">300</out_of_focus_timeout_secs>
|
||||
<idle_timeout_secs desc="The maximum number of seconds before dimming and stopping updates when the user is no longer active (even if the browser is in focus). Defaults to 15 minutes." type="uint" default="900">900</idle_timeout_secs>
|
||||
<custom_os_info desc="Custom string shown as OS version in About dialog, get from system if empty." type="string" default=""></custom_os_info>
|
||||
</per_view>
|
||||
|
||||
<ver_suffix desc="Appended to etags to allow easy refresh of changed files during development" type="string" default=""></ver_suffix>
|
||||
|
||||
<logging>
|
||||
<color type="bool">true</color>
|
||||
<!--
|
||||
Note to developers: When you do "make run", the logging.level will be set on the
|
||||
coolwsd command line, so if you want to change it for your testing, do it in
|
||||
Makefile.am, not here.
|
||||
-->
|
||||
<level type="string" desc="Can be 0-8 (with the lowest numbers being the least verbose), or none (turns off logging), fatal, critical, error, warning, notice, information, debug, trace" default="warning">warning</level>
|
||||
<level_startup type="string" desc="As for level - but for the initial startup phase which is most problematic, logging reverts to level configured above when startup is complete" default="trace">trace</level_startup>
|
||||
<disabled_areas type="string" desc="High verbosity logging ie. info to trace are disable-able, comma separated: Generic, Pixel, Socket, WebSocket, Http, WebServer, Storage, WOPI, Admin, Javascript" default="Socket,WebSocket,Admin">Socket,WebSocket,Admin,Pixel</disabled_areas>
|
||||
<most_verbose_level_settable_from_client type="string" desc="A loggingleveloverride message from the client can not set a more verbose log level than this" default="notice">notice</most_verbose_level_settable_from_client>
|
||||
<least_verbose_level_settable_from_client type="string" desc="A loggingleveloverride message from a client can not set a less verbose log level than this" default="fatal">fatal</least_verbose_level_settable_from_client>
|
||||
<protocol type="bool" desc="Enable minimal client-site JS protocol logging from the start">false</protocol>
|
||||
<!-- lokit_sal_log example: Log WebDAV-related messages, that is interesting for debugging Insert - Image operation: "+TIMESTAMP+INFO.ucb.ucp.webdav+WARN.ucb.ucp.webdav"
|
||||
See also: https://docs.libreoffice.org/sal/html/sal_log.html -->
|
||||
<lokit_sal_log type="string" desc="Fine tune log messages from LOKit. Default is to suppress log messages from LOKit." default="-INFO-WARN">-INFO-WARN</lokit_sal_log>
|
||||
<file enable="false">
|
||||
<!-- If you use other path than /var/log and you run coolwsd from systemd, make sure that you enable that path in coolwsd.service (ReadWritePaths). -->
|
||||
<property name="path" desc="Log file path.">/var/log/coolwsd.log</property>
|
||||
<property name="rotation" desc="Log file rotation strategy. See Poco FileChannel.">never</property>
|
||||
<property name="archive" desc="Append either timestamp or number to the archived log filename.">timestamp</property>
|
||||
<property name="compress" desc="Enable/disable log file compression.">true</property>
|
||||
<property name="purgeAge" desc="The maximum age of log files to preserve. See Poco FileChannel.">10 days</property>
|
||||
<property name="purgeCount" desc="The maximum number of log archives to preserve. Use 'none' to disable purging. See Poco FileChannel.">10</property>
|
||||
<property name="rotateOnOpen" desc="Enable/disable log file rotation on opening.">true</property>
|
||||
<property name="flush" desc="Enable/disable flushing after logging each line. May harm performance. Note that without flushing after each line, the log lines from the different processes will not appear in chronological order.">false</property>
|
||||
</file>
|
||||
<anonymize>
|
||||
<anonymize_user_data type="bool" desc="Enable to anonymize/obfuscate of user-data in logs. If default is true, it was forced at compile-time and cannot be disabled." default="false">false</anonymize_user_data>
|
||||
<anonymization_salt type="uint" desc="The salt used to anonymize/obfuscate user-data in logs. Use a secret 64-bit random number." default="82589933">82589933</anonymization_salt>
|
||||
</anonymize>
|
||||
<docstats type="bool" desc="Enable to see document handling information in logs." default="false">false</docstats>
|
||||
<userstats desc="Enable user stats. i.e: logs the details of a file and user" type="bool" default="false">false</userstats>
|
||||
<disable_server_audit type="bool" desc="Disabled server audit dialog and notification. Admin will no longer see warnings in the application user interface. This doesn't affect log file." default="false">false</disable_server_audit>
|
||||
</logging>
|
||||
|
||||
<!--
|
||||
Note to developers: When you do "make run", the trace_event[@enable] will be set on the
|
||||
coolwsd command line, so if you want to change it for your testing, do it in Makefile.am,
|
||||
not here.
|
||||
-->
|
||||
<trace_event desc="The possibility to turn on generation of a Chrome Trace Event file" enable="false">
|
||||
<path desc="Output path for the Trace Event file, to which they will be written if turned on at run-time" type="string" default="/var/log/coolwsd.trace.json">/var/log/coolwsd.trace.json</path>
|
||||
</trace_event>
|
||||
|
||||
<browser_logging desc="Logging in the browser console" default="false">false</browser_logging>
|
||||
|
||||
<trace desc="Dump commands and notifications for replay. When 'snapshot' is true, the source file is copied to the path first." enable="false">
|
||||
<path desc="Output path to hold trace file and docs. Use '%' for timestamp to avoid overwriting. For example: /some/path/to/cooltrace-%.gz" compress="true" snapshot="false"></path>
|
||||
<filter>
|
||||
<message desc="Regex pattern of messages to exclude"></message>
|
||||
</filter>
|
||||
<outgoing>
|
||||
<record desc="Whether or not to record outgoing messages" default="false">false</record>
|
||||
</outgoing>
|
||||
</trace>
|
||||
|
||||
<net desc="Network settings">
|
||||
<!-- On systems where localhost resolves to IPv6 [::1] address first, when net.proto is all and net.listen is loopback, coolwsd unexpectedly listens on [::1] only.
|
||||
You need to change net.proto to IPv4, if you want to use 127.0.0.1. -->
|
||||
<proto type="string" default="all" desc="Protocol to use IPv4, IPv6 or all for both">all</proto>
|
||||
<listen type="string" default="any" desc="Listen address that coolwsd binds to. Can be 'any' or 'loopback'.">any</listen>
|
||||
<!-- this allows you to shift all of our URLs into a sub-path from
|
||||
https://my.com/browser/a123... to https://my.com/my/sub/path/browser/a123... -->
|
||||
<service_root type="path" default="" desc="Prefix all the pages, websockets, etc. with this path."></service_root>
|
||||
<post_allow desc="Allow/deny client IP address for POST(REST)." allow="true">
|
||||
<host desc="The IPv4 private 192.168 block as plain IPv4 dotted decimal addresses.">192\.168\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="Ditto, but as IPv4-mapped IPv6 addresses">::ffff:192\.168\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="The IPv4 loopback (localhost) address.">127\.0\.0\.1</host>
|
||||
<host desc="Ditto, but as IPv4-mapped IPv6 address">::ffff:127\.0\.0\.1</host>
|
||||
<host desc="The IPv6 loopback (localhost) address.">::1</host>
|
||||
<host desc="The IPv4 private 172.16.0.0/12 subnet part 1.">172\.1[6789]\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="Ditto, but as IPv4-mapped IPv6 addresses">::ffff:172\.1[6789]\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="The IPv4 private 172.16.0.0/12 subnet part 2.">172\.2[0-9]\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="Ditto, but as IPv4-mapped IPv6 addresses">::ffff:172\.2[0-9]\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="The IPv4 private 172.16.0.0/12 subnet part 3.">172\.3[01]\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="Ditto, but as IPv4-mapped IPv6 addresses">::ffff:172\.3[01]\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="The IPv4 private 10.0.0.0/8 subnet (Podman).">10\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="Ditto, but as IPv4-mapped IPv6 addresses">::ffff:10\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
</post_allow>
|
||||
<lok_allow desc="Allowed hosts as an external data source inside edited files. All allowed post_allow.host and storage.wopi entries are also considered to be allowed as a data source. Used for example in: PostMessage Action_InsertGraphics, =WEBSERVICE() function, external reference in the cell.">
|
||||
<host desc="The IPv4 private 192.168 block as plain IPv4 dotted decimal addresses.">192\.168\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="Ditto, but as IPv4-mapped IPv6 addresses">::ffff:192\.168\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="The IPv4 loopback (localhost) address.">127\.0\.0\.1</host>
|
||||
<host desc="Ditto, but as IPv4-mapped IPv6 address">::ffff:127\.0\.0\.1</host>
|
||||
<host desc="The IPv6 loopback (localhost) address.">::1</host>
|
||||
<host desc="The IPv4 private 172.16.0.0/12 subnet part 1.">172\.1[6789]\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="Ditto, but as IPv4-mapped IPv6 addresses">::ffff:172\.1[6789]\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="The IPv4 private 172.16.0.0/12 subnet part 2.">172\.2[0-9]\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="Ditto, but as IPv4-mapped IPv6 addresses">::ffff:172\.2[0-9]\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="The IPv4 private 172.16.0.0/12 subnet part 3.">172\.3[01]\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="Ditto, but as IPv4-mapped IPv6 addresses">::ffff:172\.3[01]\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="The IPv4 private 10.0.0.0/8 subnet (Podman).">10\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="Ditto, but as IPv4-mapped IPv6 addresses">::ffff:10\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}</host>
|
||||
<host desc="Localhost access by name">localhost</host>
|
||||
</lok_allow>
|
||||
<content_security_policy desc="Customize the CSP header by specifying one or more policy-directive, separated by semicolons. See w3.org/TR/CSP2"></content_security_policy>
|
||||
<frame_ancestors desc="OBSOLETE: Use content_security_policy. Specify who is allowed to embed the Collabora Online iframe (coolwsd and WOPI host are always allowed). Separate multiple hosts by space."></frame_ancestors>
|
||||
<connection_timeout_secs desc="Specifies the connection, send, recv timeout in seconds for connections initiated by coolwsd (such as WOPI connections)." type="int" default="30"></connection_timeout_secs>
|
||||
|
||||
<!-- this setting radically changes how online works, it should not be used in a production environment -->
|
||||
<proxy_prefix type="bool" default="false" desc="Enable a ProxyPrefix to be passed int through which to redirect requests"></proxy_prefix>
|
||||
</net>
|
||||
|
||||
<ssl desc="SSL settings">
|
||||
<!-- switches from https:// + wss:// to http:// + ws:// -->
|
||||
<enable type="bool" desc="Controls whether SSL encryption between coolwsd and the network is enabled (do not disable for production deployment). If default is false, must first be compiled with SSL support to enable." default="true">false</enable>
|
||||
<!-- SSL off-load can be done in a proxy, if so disable SSL, and enable termination below in production -->
|
||||
<termination desc="Connection via proxy where coolwsd acts as working via https, but actually uses http." type="bool" default="true">true</termination>
|
||||
<cert_file_path desc="Path to the cert file" relative="false">/etc/coolwsd/cert.pem</cert_file_path>
|
||||
<key_file_path desc="Path to the key file" relative="false">/etc/coolwsd/key.pem</key_file_path>
|
||||
<ca_file_path desc="Path to the ca file" relative="false">/etc/coolwsd/ca-chain.cert.pem</ca_file_path>
|
||||
<ssl_verification desc="Enable or disable SSL verification of hosts remote to coolwsd. If true SSL verification will be strict, otherwise certs of hosts will not be verified. You may have to disable it in test environments with self-signed certificates." type="string" default="false">false</ssl_verification>
|
||||
<cipher_list desc="List of OpenSSL ciphers to accept" default="ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH"></cipher_list>
|
||||
<hpkp desc="Enable HTTP Public key pinning" enable="false" report_only="false">
|
||||
<max_age desc="HPKP's max-age directive - time in seconds browser should remember the pins" enable="true">1000</max_age>
|
||||
<report_uri desc="HPKP's report-uri directive - pin validation failure are reported at this URL" enable="false"></report_uri>
|
||||
<pins desc="Base64 encoded SPKI fingerprints of keys to be pinned">
|
||||
<pin></pin>
|
||||
</pins>
|
||||
</hpkp>
|
||||
<sts desc="Strict-Transport-Security settings, per rfc6797. Subdomains are always included.">
|
||||
<enabled desc="Whether or not Strict-Transport-Security is enabled. Enable only when ready for production. Cannot be disabled without resetting the browsers." type="bool" default="false">false</enabled>
|
||||
<max_age desc="Strict-Transport-Security max-age directive, in seconds. 0 is allowed; please see rfc6797 for details. Defaults to 1 year." type="int" default="31536000">31536000</max_age>
|
||||
</sts>
|
||||
</ssl>
|
||||
|
||||
<security desc="Altering these defaults potentially opens you to significant risk">
|
||||
<seccomp desc="Should we use the seccomp system call filtering." type="bool" default="true">true</seccomp>
|
||||
<capabilities desc="Should we require capabilities to isolate processes into chroot jails" type="bool" default="true">true</capabilities>
|
||||
<jwt_expiry_secs desc="Time in seconds before the Admin Console's JWT token expires" type="int" default="1800">1800</jwt_expiry_secs>
|
||||
<enable_macros_execution desc="Specifies whether the macro execution is enabled in general. This will enable Basic and Python scripts to execute both installed and from documents. If it is set to false, the macro_security_level is ignored. If it is set to true, the mentioned entry specified the level of macro security." type="bool" default="false">false</enable_macros_execution>
|
||||
<macro_security_level desc="Level of Macro security. 1 (Medium) Confirmation required before executing macros from untrusted sources. 0 (Low, not recommended) All macros will be executed without confirmation." type="int" default="1">1</macro_security_level>
|
||||
<enable_websocket_urp desc="Should we enable URP (UNO remote protocol) communication over the websocket. This allows full control of the Kit child server to anyone with access to the websocket including executing macros without confirmation or running arbitrary shell commands in the jail." type="bool" default="false">false</enable_websocket_urp>
|
||||
<enable_metrics_unauthenticated desc="When enabled, the /cool/getMetrics endpoint will not require authentication." type="bool" default="false">false</enable_metrics_unauthenticated>
|
||||
</security>
|
||||
|
||||
<certificates>
|
||||
<database_path type="string" desc="Path to the NSS certificates that are used for signing documents" default=""></database_path>
|
||||
</certificates>
|
||||
|
||||
<watermark>
|
||||
<opacity desc="Opacity of on-screen watermark from 0.0 to 1.0" type="double" default="0.2"></opacity>
|
||||
<text desc="Watermark text to be displayed on the document if entered" type="string"></text>
|
||||
</watermark>
|
||||
|
||||
|
||||
<user_interface>
|
||||
<mode type="string" desc="Controls the user interface style. The 'default' means: Take the value from ui_defaults, or decide for one of compact or tabbed (default|compact|tabbed)" default="default">default</mode>
|
||||
<use_integration_theme desc="Use theme from the integrator" type="bool" default="true">true</use_integration_theme>
|
||||
</user_interface>
|
||||
|
||||
<storage desc="Backend storage">
|
||||
<filesystem allow="false" />
|
||||
<wopi desc="Allow/deny wopi storage." allow="true">
|
||||
<max_file_size desc="Maximum document size in bytes to load. 0 for unlimited." type="uint">0</max_file_size>
|
||||
<locking desc="Locking settings">
|
||||
<refresh desc="How frequently we should re-acquire a lock with the storage server, in seconds (default 15 mins) or 0 for no refresh" type="int" default="900">900</refresh>
|
||||
</locking>
|
||||
|
||||
<alias_groups desc="default mode is 'first' it allows only the first host when groups are not defined. set mode to 'groups' and define group to allow multiple host and its aliases" mode="first">
|
||||
<!-- If you need to use multiple wopi hosts, please change the mode to "groups" and
|
||||
add the hosts below. If one host is accessible under multiple ip addresses
|
||||
or names, add them as aliases. -->
|
||||
<!--<group>
|
||||
<host desc="hostname to allow or deny." allow="true">scheme://hostname:port</host>
|
||||
<alias desc="regex pattern of aliasname">scheme://aliasname1:port</alias>
|
||||
<alias desc="regex pattern of aliasname">scheme://aliasname2:port</alias>
|
||||
|
||||
</group>-->
|
||||
<!-- More "group"s possible here -->
|
||||
</alias_groups>
|
||||
|
||||
<is_legacy_server desc="Set to true for legacy server that need deprecated headers." type="bool" default="false"></is_legacy_server>
|
||||
</wopi>
|
||||
<ssl desc="SSL settings">
|
||||
<as_scheme type="bool" default="true" desc="When set we exclusively use the WOPI URI's scheme to enable SSL for storage">true</as_scheme>
|
||||
<enable type="bool" desc="If as_scheme is false or not set, this can be set to force SSL encryption between storage and coolwsd. When empty this defaults to following the ssl.enable setting"></enable>
|
||||
<cert_file_path desc="Path to the cert file. When empty this defaults to following the ssl.cert_file_path setting" relative="false"></cert_file_path>
|
||||
<key_file_path desc="Path to the key file. When empty this defaults to following the ssl.key_file_path settinge" relative="false"></key_file_path>
|
||||
<ca_file_path desc="Path to the ca file. When empty this defaults to following the ssl.ca_file_path setting" relative="false"></ca_file_path>
|
||||
<cipher_list desc="List of OpenSSL ciphers to accept. If empty the defaults are used. These can be overridden only if absolutely needed."></cipher_list>
|
||||
</ssl>
|
||||
</storage>
|
||||
|
||||
<admin_console desc="Web admin console settings.">
|
||||
<enable desc="Enable the admin console functionality" type="bool" default="true">true</enable>
|
||||
<enable_pam desc="Enable admin user authentication with PAM" type="bool" default="false">false</enable_pam>
|
||||
<username desc="The username of the admin console. Ignored if PAM is enabled."></username>
|
||||
<password desc="The password of the admin console. Deprecated on most platforms. Instead, use PAM or coolconfig to set up a secure password."></password>
|
||||
<logging desc="Log admin activities irrespective of logging.level">
|
||||
<admin_login desc="log when an admin logged into the console" type="bool" default="true">true</admin_login>
|
||||
<metrics_fetch desc="log when metrics endpoint is accessed and metrics endpoint authentication is enabled" type="bool" default="true">true</metrics_fetch>
|
||||
<monitor_connect desc="log when external monitor gets connected" type="bool" default="true">true</monitor_connect>
|
||||
<admin_action desc="log when admin does some action for example killing a process" type="bool" default="true">true</admin_action>
|
||||
</logging>
|
||||
</admin_console>
|
||||
|
||||
<monitors desc="Addresses of servers we connect to on start for monitoring">
|
||||
<!-- <monitor desc="Address of the monitor and interval after which it should try reconnting after disconnect" retryInterval="20">wss://foobar:234/ws</monitor> -->
|
||||
</monitors>
|
||||
|
||||
<quarantine_files desc="Files are stored here to be examined later in cases of crashes or similar situation." default="false" enable="false">
|
||||
<limit_dir_size_mb desc="Maximum directory size, in MBs. On exceeding the specified limit, older files will be deleted." default="250" type="uint"></limit_dir_size_mb>
|
||||
<max_versions_to_maintain desc="How many versions of the same file to keep." default="5" type="uint"></max_versions_to_maintain>
|
||||
<path desc="Absolute path of the directory under which quarantined files will be stored. Do not use a relative path." type="path" relative="false"></path>
|
||||
<expiry_min desc="Time in mins after quarantined files will be deleted." type="int" default="3000"></expiry_min>
|
||||
</quarantine_files>
|
||||
|
||||
<remote_config>
|
||||
<remote_url desc="remote server to which you will send request to get remote config in response" type="string" default=""></remote_url>
|
||||
</remote_config>
|
||||
|
||||
<stop_on_config_change desc="Stop coolwsd whenever config files change." type="bool" default="false">false</stop_on_config_change>
|
||||
|
||||
<remote_font_config>
|
||||
<url desc="URL of optional JSON file that lists fonts to be included in Online" type="string" default=""></url>
|
||||
</remote_font_config>
|
||||
|
||||
<home_mode>
|
||||
<enable desc="Enable more configuration options for home users" type="bool" default="false">false</enable>
|
||||
</home_mode>
|
||||
|
||||
<fonts_missing>
|
||||
<handling desc="How to handle fonts mising in a document: 'report', 'log', 'both', or 'ignore'" type="string" default="log">log</handling>
|
||||
</fonts_missing>
|
||||
|
||||
<indirection_endpoint>
|
||||
<url desc="URL endpoint to server which servers routeToken in json format" default=""></url>
|
||||
<migration_timeout_secs desc="The maximum number of seconds waiting for shutdown migration message from indirection server before unloading an document. Defaults to 180 second." type="uint" default="180"></migration_timeout_secs>
|
||||
</indirection_endpoint>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<zotero desc="Zotero plugin configuration. For more details about Zotero visit https://www.zotero.org/">
|
||||
<enable desc="Enable Zotero plugin." type="bool" default="true">true</enable>
|
||||
</zotero>
|
||||
|
||||
<help_url desc="The Help root URL, or empty for no help (hides the Help buttons)" type="string" default="https://help.collaboraoffice.com/help.html?">https://help.collaboraoffice.com/help.html?</help_url>
|
||||
|
||||
<overwrite_mode>
|
||||
<enable desc="Enable overwrite mode (user can use insert key)" type="bool" default="true">true</enable>
|
||||
</overwrite_mode>
|
||||
|
||||
<wasm desc="WASM-specific settings">
|
||||
<enable desc="Enable WASM support" type="bool" default="false"></enable>
|
||||
<force desc="When enabled, all requests are redirected to WASM." type="bool" default="false"></force>
|
||||
</wasm>
|
||||
|
||||
</config>
|
|
@ -1,66 +0,0 @@
|
|||
services:
|
||||
collabora:
|
||||
image: collabora/code:latest
|
||||
restart: always
|
||||
cap_add:
|
||||
- MKNOD
|
||||
# volumes:
|
||||
# - ./collabora:/etc/coolwsd/
|
||||
environment:
|
||||
DOMAIN: "collabora.${DOMAIN}"
|
||||
VIRTUAL_HOST: "collabora.${DOMAIN}"
|
||||
EXTRA_PARAMS: "--o:ssl.enable=false --o:ssl.termination=true"
|
||||
ALIASGROUP2: "https://collabora.${DOMAIN}:443"
|
||||
ALIASGROUP3: "https://nextcloud.${DOMAIN}:443"
|
||||
ALIASGROUP1: "http://192.168.86.30:9980"
|
||||
SERVER_NAME: "collabora.${DOMAIN}"
|
||||
USERNAME: "admin"
|
||||
PASSWORD: "pass"
|
||||
LETSENCRYPT_HOST: collabora.${DOMAIN}
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
# ports:
|
||||
# - 127.0.0.1:9980:9980
|
||||
redis:
|
||||
# user: "${UID}:${GID}"
|
||||
image: redis:alpine
|
||||
container_name: redis-dbcache
|
||||
restart: unless-stopped
|
||||
db:
|
||||
image: mysql:latest
|
||||
restart: always
|
||||
command: --transaction-isolation=READ-COMMITTED --log-bin=binlog --binlog-format=ROW --log_bin_trust_function_creators=true
|
||||
# user: ${UID}:${GID}
|
||||
volumes:
|
||||
- ${DB_LOCATION}:/var/lib/mysql
|
||||
environment:
|
||||
- MYSQL_ROOT_PASSWORD=ROOT_ACCESS_PASSWORD
|
||||
- MYSQL_PASSWORD=${DBPASS}
|
||||
- MYSQL_DATABASE=nextcloud
|
||||
- MYSQL_USER=nextcloud
|
||||
nextcloud:
|
||||
image: nextcloud:29.0.0
|
||||
container_name: nextcloud
|
||||
# user: "${UID}:${GID}"
|
||||
depends_on:
|
||||
- db
|
||||
links:
|
||||
- db
|
||||
environment:
|
||||
TZ: "${TZ}"
|
||||
VIRTUAL_HOST: "nextcloud.${DOMAIN}"
|
||||
MYSQL_HOST: db
|
||||
MYSQL_DATABASE: nextcloud
|
||||
MYSQL_USER: nextcloud
|
||||
MYSQL_PASSWORD: ${DBPASS}
|
||||
REDIS_HOST: redis
|
||||
LETSENCRYPT_HOST: nextcloud.${DOMAIN}
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
# LETSENCRYPT_TEST: true
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}:/var/www/html/config:rw
|
||||
- ${DATA_LOCATION}/Cloud/Nextcloud:/var/www/html/data:rw
|
||||
restart: unless-stopped
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1 +0,0 @@
|
|||
docker exec --user root nextcloud bash -c "apt update && apt -y install libmagickcore-6.q16-6-extra smbclient iputils-ping nmap mc btop net-tools ncdu java-common default-jre graphicsmagick ffmpeg ghostscript"
|
|
@ -1,2 +0,0 @@
|
|||
EMAIL=example@mail.com
|
||||
TZ=America/New_York
|
|
@ -1,29 +0,0 @@
|
|||
services:
|
||||
nginx-proxy:
|
||||
image: jwilder/nginx-proxy
|
||||
ports:
|
||||
- "80:80"
|
||||
- "81:81"
|
||||
- "443:443"
|
||||
volumes:
|
||||
- /var/run/docker.sock:/tmp/docker.sock:ro
|
||||
- ./nginx/certs:/etc/nginx/certs
|
||||
- ./nginx/html:/usr/share/nginx/html
|
||||
- ./nginx/vhost.d:/etc/nginx/vhost.d
|
||||
- ./settings.conf:/etc/nginx/conf.d/settings.conf:ro
|
||||
# - ./keepalive_requests.conf:/etc/nginx/conf.d/keepalive_requests.conf:ro
|
||||
nginx-letsencrypt:
|
||||
image: jrcs/letsencrypt-nginx-proxy-companion
|
||||
container_name: nginx-letsencrypt
|
||||
restart: always
|
||||
volumes_from:
|
||||
- nginx-proxy
|
||||
volumes:
|
||||
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||
environment:
|
||||
- DEFAULT_EMAIL=${EMAIL}
|
||||
- TZ=${TZ}
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
2
nginx-proxy/nginx/.gitignore
vendored
2
nginx-proxy/nginx/.gitignore
vendored
|
@ -1,2 +0,0 @@
|
|||
certs/
|
||||
html/
|
|
@ -1,2 +0,0 @@
|
|||
client_max_body_size 100000m;
|
||||
keepalive_requests 1000000;
|
|
@ -1,40 +0,0 @@
|
|||
services:
|
||||
plex:
|
||||
image: plexinc/pms-docker:latest
|
||||
container_name: plex
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=plex.${DOMAIN}
|
||||
- VERSION=docker
|
||||
- PLEX_CLAIM=${PLEX_CLAIM}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/plex:/config
|
||||
- ${DATA_LOCATION}/TV:/tv
|
||||
- ${DATA_LOCATION}/Movies:/movies
|
||||
- ${DATA_LOCATION}/Music:/music
|
||||
expose:
|
||||
- "32400"
|
||||
ports:
|
||||
- 32400:32400
|
||||
restart: unless-stopped
|
||||
tautulli:
|
||||
image: lscr.io/linuxserver/tautulli:latest
|
||||
container_name: tautulli
|
||||
environment:
|
||||
- PUID=1000
|
||||
- PGID=1000
|
||||
- TZ=Etc/UTC
|
||||
- VIRTUAL_HOST=tautulli.${DOMAIN},plex-stats.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=tautulli.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/tautulli:/config
|
||||
ports:
|
||||
- 8181:8181
|
||||
restart: unless-stopped
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,7 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
UID=1000
|
||||
GID=1000
|
||||
TZ=Etc/UTC
|
||||
CONFIG_LOCATION=./config
|
||||
DATA_LOCATION=./data
|
||||
EMAIL=example@mail.com
|
|
@ -1,63 +0,0 @@
|
|||
services:
|
||||
navidrome:
|
||||
image: deluan/navidrome:latest
|
||||
user: 1000:1000 # should be owner of volumes
|
||||
ports:
|
||||
- "4533:4533"
|
||||
expose:
|
||||
- "4533"
|
||||
restart: unless-stopped
|
||||
environment:
|
||||
# Optional: put your config options customization here. Examples:
|
||||
ND_SCANSCHEDULE: 1h
|
||||
ND_LOGLEVEL: info
|
||||
ND_SESSIONTIMEOUT: 24h
|
||||
ND_BASEURL: ""
|
||||
VIRTUAL_HOST: "navidrome.${DOMAIN}"
|
||||
LETSENCRYPT_HOST: "navidrome.${DOMAIN}"
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
volumes:
|
||||
- "${DATA_LOCATION}:/data"
|
||||
- "${DATA_LOCATION}/Music:/music:ro"
|
||||
ubooquity:
|
||||
image: lscr.io/linuxserver/ubooquity:latest
|
||||
container_name: ubooquity
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=comics.${DOMAIN}
|
||||
- VIRTUAL_PORT=2202
|
||||
- LETSENCRYPT_HOST=comics.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL= ${EMAIL}
|
||||
# - MAXMEM= #optional
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/ubooquity:/config
|
||||
- ${DATA_LOCATION}/Books:/books
|
||||
- ${DATA_LOCATION}/Comics:/comics
|
||||
# - /path/to/raw/files:/files
|
||||
expose:
|
||||
- "2202"
|
||||
- "2203"
|
||||
ports:
|
||||
- 2202:2202 #:2202/ubooquity
|
||||
- 2203:2203 #:2203/ubooquity/admin
|
||||
restart: unless-stopped
|
||||
audiobookshelf:
|
||||
image: ghcr.io/advplyr/audiobookshelf:latest
|
||||
ports:
|
||||
- 13378:80
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/audiobookshelf:/config
|
||||
- ${DATA_LOCATION}/Audiobooks:/audiobooks
|
||||
# - </path/to/podcasts>:/podcasts
|
||||
- ${DATA_LOCATION}/Audiobooks/metadata:/metadata
|
||||
environment:
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=audiobookshelf.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=audiobookshelf.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL= ${EMAIL}
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,16 +0,0 @@
|
|||
DOMAIN=
|
||||
EMAIl=
|
||||
|
||||
# random secret key, use for example `base64 /dev/urandom | head -c50` to generate one
|
||||
SECRET_KEY=
|
||||
|
||||
# allowed hosts (see documentation), should be set to your hostname(s) but might be * (default) for some proxies/providers
|
||||
# ALLOWED_HOSTS=recipes.mydomain.com
|
||||
|
||||
# add only a database password if you want to run with the default postgres, otherwise change settings accordingly
|
||||
DB_ENGINE=django.db.backends.postgresql
|
||||
POSTGRES_HOST=db_recipes
|
||||
POSTGRES_DB=djangodb
|
||||
POSTGRES_PORT=5432
|
||||
POSTGRES_USER=djangouser
|
||||
POSTGRES_PASSWORD=
|
|
@ -1,33 +0,0 @@
|
|||
services:
|
||||
db:
|
||||
container_name: db-recipes
|
||||
restart: always
|
||||
image: postgres:16-alpine
|
||||
volumes:
|
||||
- ./data:/var/lib/postgresql/data
|
||||
env_file:
|
||||
- ./.env
|
||||
app:
|
||||
restart: always
|
||||
image: vabene1111/recipes
|
||||
env_file:
|
||||
- ./.env
|
||||
environment:
|
||||
VIRTUAL_HOST: "recipes.${DOMAIN}"
|
||||
LETSENCRYPT_HOST: "recipes.${DOMAIN}"
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
volumes:
|
||||
- ./config/staticfiles:/opt/recipes/staticfiles
|
||||
# Do not make this a bind mount, see https://docs.tandoor.dev/install/docker/#volumes-vs-bind-mounts
|
||||
- nginx_config:/opt/recipes/nginx/conf.d
|
||||
- ./config/mediafiles:/opt/recipes/mediafiles
|
||||
ports:
|
||||
- 8075:8080
|
||||
depends_on:
|
||||
- db
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
||||
volumes:
|
||||
nginx_config:
|
|
@ -1,40 +0,0 @@
|
|||
#!/bin/bash
|
||||
|
||||
# cd nginx-proxy
|
||||
# sudo docker compose restart
|
||||
cd ../arr
|
||||
sudo docker compose restart
|
||||
cd ../dashboard
|
||||
sudo docker compose restart
|
||||
cd ../games
|
||||
sudo docker compose restart
|
||||
cd ../gita
|
||||
sudo docker compose restart
|
||||
cd ../lazylibrarian
|
||||
sudo docker compose restart
|
||||
cd ../nextcloud
|
||||
sudo docker compose restart
|
||||
cd ../plex
|
||||
sudo docker compose restart
|
||||
cd ../readers
|
||||
sudo docker compose restart
|
||||
cd ../recipes
|
||||
sudo docker compose restart
|
||||
cd ../rss-reader
|
||||
sudo docker compose restart
|
||||
cd ../sites
|
||||
cd botc
|
||||
sudo docker compose restart
|
||||
cd ../fusiondance
|
||||
sudo docker compose restart
|
||||
cd ../gamesclub
|
||||
sudo docker compose restart
|
||||
cd ../photos
|
||||
sudo docker compose restart
|
||||
cd ..
|
||||
cd ../stats
|
||||
sudo docker compose restart
|
||||
cd ../vnc
|
||||
sudo docker compose restart
|
||||
cd ../wiki
|
||||
sudo docker compose restart
|
|
@ -1,19 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
UID=1000
|
||||
GID=1000
|
||||
TZ=Etc/UTC
|
||||
DBUSER=freshrss
|
||||
DBPASS=password
|
||||
CONFIG_LOCATION=./config
|
||||
DATA_LOCATION=./data
|
||||
EMAIL=example@mail.com
|
||||
# ADMIN_EMAIL=admin@example.net
|
||||
# ADMIN_PASSWORD=freshrss
|
||||
# ADMIN_API_PASSWORD=freshrss
|
||||
# # Published port if running locally
|
||||
# PUBLISHED_PORT=8080
|
||||
# # Database credentials (not relevant if using default SQLite database)
|
||||
# DB_HOST=freshrss-db
|
||||
# DB_BASE=freshrss
|
||||
# DB_PASSWORD=freshrss
|
||||
# DB_USER=freshrss
|
|
@ -1,47 +0,0 @@
|
|||
services:
|
||||
freshrss:
|
||||
image: freshrss/freshrss:edge
|
||||
container_name: freshrss
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- VIRTUAL_HOST=rss.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=rss.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/freshrss:/config
|
||||
- ./extensions:/var/www/FreshRSS/extensions
|
||||
expose:
|
||||
- "8085"
|
||||
ports:
|
||||
- 8085:80
|
||||
restart: unless-stopped
|
||||
db:
|
||||
image: lscr.io/linuxserver/mariadb:latest
|
||||
environment:
|
||||
- PUID=${UID}
|
||||
- PGID=${GID}
|
||||
- TZ=${TZ}
|
||||
- MYSQL_ROOT_PASSWORD=ROOT_ACCESS_PASSWORD
|
||||
- MYSQL_DATABASE=freshrss #optional
|
||||
- MYSQL_USER=freshrss #optional
|
||||
- MYSQL_PASSWORD=freshrss #optional
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/mariadb:/config
|
||||
restart: unless-stopped
|
||||
rss-bridge:
|
||||
image: rssbridge/rss-bridge:latest
|
||||
environment:
|
||||
- VIRTUAL_HOST=rss-bridge.${DOMAIN}
|
||||
- LETSENCRYPT_HOST=rss-bridge.${DOMAIN}
|
||||
- LETSENCRYPT_EMAIL=${EMAIL}
|
||||
volumes:
|
||||
- ${CONFIG_LOCATION}/rss-bridge:/config:rw
|
||||
ports:
|
||||
- 3002:80
|
||||
restart: unless-stopped
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1 +0,0 @@
|
|||
Subproject commit bc4648940633919d5a8b7d6713a074d2a197b0a3
|
|
@ -1,17 +0,0 @@
|
|||
<form action="<?php echo _url('extension', 'configure', 'e', urlencode($this->getName())); ?>" method="post">
|
||||
<input type="hidden" name="_csrf" value="<?php echo FreshRSS_Auth::csrfToken(); ?>" />
|
||||
|
||||
<div class="form-group">
|
||||
<label for="refresh-rate" class="group-name"><?= _t('ext.auto_refresh.refresh_rate'); ?></label>
|
||||
<div class="group-controls">
|
||||
<input type="number" name="refresh-rate" id="refresh-rate" min="1" value="<?= $this->getRefreshRate() ?>">
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="form-group form-actions">
|
||||
<div class="group-controls">
|
||||
<button type="submit" class="btn btn-important"><?php echo _t('gen.action.submit'); ?></button>
|
||||
<button type="reset" class="btn"><?php echo _t('gen.action.cancel'); ?></button>
|
||||
</div>
|
||||
</div>
|
||||
</form>
|
|
@ -1,34 +0,0 @@
|
|||
<?php
|
||||
|
||||
class AutoRefreshExtension extends Minz_Extension {
|
||||
const DEFAULT_REFRESH_RATE = 1;
|
||||
|
||||
public function init() {
|
||||
Minz_View::appendScript($this->getFileUrl('script.js', 'js'),'','','');
|
||||
|
||||
$this->registerHook('js_vars', [$this, 'addVariables']);
|
||||
}
|
||||
|
||||
public function addVariables($vars) {
|
||||
$vars[$this->getName()]['configuration'] = [
|
||||
'refresh-rate' => $this->getRefreshRate(),
|
||||
];
|
||||
|
||||
return $vars;
|
||||
}
|
||||
|
||||
public function handleConfigureAction() {
|
||||
$this->registerTranslates();
|
||||
|
||||
if (Minz_Request::isPost()) {
|
||||
$configuration = [
|
||||
'refresh-rate' => Minz_Request::param('refresh-rate', self::DEFAULT_REFRESH_RATE),
|
||||
];
|
||||
$this->setUserConfiguration($configuration);
|
||||
}
|
||||
}
|
||||
|
||||
public function getRefreshRate() {
|
||||
return $this->getUserConfigurationValue('refresh-rate', static::DEFAULT_REFRESH_RATE);
|
||||
}
|
||||
}
|
|
@ -1,7 +0,0 @@
|
|||
<?php
|
||||
|
||||
return [
|
||||
'auto_refresh' => [
|
||||
'refresh_rate' => 'Seiten-Aktualisierung jede x Minuten',
|
||||
],
|
||||
];
|
|
@ -1,7 +0,0 @@
|
|||
<?php
|
||||
|
||||
return [
|
||||
'auto_refresh' => [
|
||||
'refresh_rate' => 'Refresh rate in minutes',
|
||||
],
|
||||
];
|
|
@ -1,7 +0,0 @@
|
|||
<?php
|
||||
|
||||
return [
|
||||
'auto_refresh' => [
|
||||
'refresh_rate' => 'Fréquence de rafraîchissement en minutes',
|
||||
],
|
||||
];
|
|
@ -1,8 +0,0 @@
|
|||
{
|
||||
"name": "Auto Refresh",
|
||||
"author": "Essa AlAwadi",
|
||||
"description": "Automatically refreshes the RSS feed when there is no activity",
|
||||
"version": 1.3,
|
||||
"entrypoint": "AutoRefresh",
|
||||
"type": "user"
|
||||
}
|
|
@ -1,34 +0,0 @@
|
|||
'use strict';
|
||||
|
||||
const getNewTime = () => {
|
||||
return new Date().getTime();
|
||||
};
|
||||
|
||||
const resetTimer = () => {
|
||||
time = getNewTime();
|
||||
};
|
||||
|
||||
var time = getNewTime();
|
||||
const initTimer = () => {
|
||||
if ('undefined' === typeof context) {
|
||||
console.log('wait');
|
||||
return setTimeout(initTimer, 50);
|
||||
}
|
||||
|
||||
if (document.getElementById('nav_menu_views')) {
|
||||
const refreshRate = context.extensions["Auto Refresh"].configuration["refresh-rate"];
|
||||
setInterval(() => {
|
||||
if (getNewTime() - time >= refreshRate * 60000) {
|
||||
window.location.reload();
|
||||
}
|
||||
}, refreshRate * 30000);
|
||||
|
||||
document.addEventListener("touchmove", resetTimer);
|
||||
document.addEventListener("mousemove", resetTimer);
|
||||
document.addEventListener("keypress", resetTimer);
|
||||
}
|
||||
}
|
||||
|
||||
window.onload = () => {
|
||||
initTimer();
|
||||
}
|
40
run_all.sh
40
run_all.sh
|
@ -1,40 +0,0 @@
|
|||
#!/bin/bash
|
||||
|
||||
cd nginx-proxy
|
||||
sudo docker compose up -d
|
||||
cd ../arr
|
||||
sudo docker compose up -d
|
||||
cd ../dashboard
|
||||
sudo docker compose up -d
|
||||
cd ../games
|
||||
sudo docker compose up -d
|
||||
cd ../gita
|
||||
sudo docker compose up -d
|
||||
cd ../lazylibrarian
|
||||
sudo docker compose up -d
|
||||
cd ../nextcloud
|
||||
sudo docker compose up -d
|
||||
cd ../plex
|
||||
sudo docker compose up -d
|
||||
cd ../readers
|
||||
sudo docker compose up -d
|
||||
cd ../recipes
|
||||
sudo docker compose up -d
|
||||
cd ../rss-reader
|
||||
sudo docker compose up -d
|
||||
cd ../sites
|
||||
cd botc
|
||||
sudo docker compose up -d
|
||||
cd ../fusiondance
|
||||
sudo docker compose up -d
|
||||
cd ../gamesclub
|
||||
sudo docker compose up -d
|
||||
cd ../photos
|
||||
sudo docker compose up -d
|
||||
cd ..
|
||||
cd ../stats
|
||||
sudo docker compose up -d
|
||||
cd ../vnc
|
||||
sudo docker compose up -d
|
||||
cd ../wiki
|
||||
sudo docker compose up -d
|
|
@ -1,12 +0,0 @@
|
|||
EMAIL=example@gmail.com
|
||||
DOMAIN=example.com
|
||||
|
||||
DATABASE_URL=postgresql://umami_user:umami_pass@db:5432/umami_db
|
||||
DATABASE_TYPE=postgresql
|
||||
HASH_SALT=generate_a_random_salt
|
||||
|
||||
POSTGRES_DB=umami_db
|
||||
POSTGRES_USER=umami_user
|
||||
POSTGRES_PASSWORD=umami_pass
|
||||
|
||||
APP_SECRET=random-string
|
|
@ -1,33 +0,0 @@
|
|||
services:
|
||||
umami:
|
||||
image: ghcr.io/umami-software/umami:postgresql-latest
|
||||
env_file: .env
|
||||
environment:
|
||||
TRACKER_SCRIPT_NAME: getinfo
|
||||
API_COLLECT_ENDPOINT: all
|
||||
VIRTUAL_HOST: "analytics.${DOMAIN}"
|
||||
VIRTUAL_PORT: 3000
|
||||
CLIENT_IP_HEADER: x-real-ip
|
||||
# HOSTNAME: "analytics.${DOMAIN}"
|
||||
# PORT: 3004
|
||||
# FORCE_SSL: 0
|
||||
LETSENCRYPT_HOST: "analytics.${DOMAIN}"
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
depends_on:
|
||||
- db
|
||||
restart: always
|
||||
ports:
|
||||
- 3000:3000
|
||||
expose:
|
||||
- 3000
|
||||
db:
|
||||
container_name: umami-db
|
||||
image: postgres:15-alpine
|
||||
env_file: .env
|
||||
volumes:
|
||||
- ./data:/var/lib/postgresql/data
|
||||
restart: always
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,5 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
DBPASS=password
|
||||
EMAIL=example@mail.com
|
||||
DOMAIN=example.com
|
||||
|
3
sites/botc/.gitignore
vendored
3
sites/botc/.gitignore
vendored
|
@ -1,3 +0,0 @@
|
|||
db/*
|
||||
content/*
|
||||
config.*.json
|
|
@ -1,30 +0,0 @@
|
|||
{
|
||||
"url": "http://localhost:2371",
|
||||
"server": {
|
||||
"port": 2371,
|
||||
"host": "::"
|
||||
},
|
||||
"mail": {
|
||||
"transport": "SMTP",
|
||||
"options": {
|
||||
"service": "Sendgrid",
|
||||
"host": "smtp.sendgrid.net",
|
||||
"port": 587,
|
||||
"secure": true,
|
||||
"auth": {
|
||||
"user": "apikey",
|
||||
"pass": "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"
|
||||
}
|
||||
}
|
||||
},
|
||||
"logging": {
|
||||
"transports": [
|
||||
"file",
|
||||
"stdout"
|
||||
]
|
||||
},
|
||||
"process": "systemd",
|
||||
"paths": {
|
||||
"contentPath": "/var/lib/ghost/content"
|
||||
}
|
||||
}
|
|
@ -1,42 +0,0 @@
|
|||
services:
|
||||
ghost:
|
||||
image: ghost:5
|
||||
restart: always
|
||||
ports:
|
||||
- 2371:2368
|
||||
expose:
|
||||
- 2371
|
||||
environment:
|
||||
# see https://ghost.org/docs/config/#configuration-options
|
||||
database__client: mysql
|
||||
database__connection__host: botc-db-1
|
||||
database__connection__user: root
|
||||
database__connection__password: ${DBPASS}
|
||||
database__connection__database: ghost
|
||||
# VIRTUAL_HOST: "www.${DOMAIN}, ${DOMAIN}"
|
||||
VIRTUAL_HOST: "www.phillybotc.com, phillybotc.com"
|
||||
VIRTUAL_PORT: 2371
|
||||
# LETSENCRYPT_HOST: "${DOMAIN}, www.${DOMAIN}"
|
||||
LETSENCRYPT_HOST: "www.phillybotc.com, phillybotc.com"
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
# url: http://0.0.0.0:2371 #Dev
|
||||
url: "https://phillybotc.com" #Prod
|
||||
# contrary to the default mentioned in the linked documentation, this image defaults to NODE_ENV=production (so development mode needs to be explicitly specified if desired)
|
||||
NODE_ENV: production
|
||||
volumes:
|
||||
- ./content:/var/lib/ghost/content
|
||||
# - ./themes:/var/lib/ghost/current/content/themes:rw
|
||||
db:
|
||||
image: mysql:8.0
|
||||
restart: always
|
||||
environment:
|
||||
MYSQL_DATABASE: ghost
|
||||
MYSQL_ROOT_PASSWORD: ${DBPASS}
|
||||
volumes:
|
||||
- ./data:/var/lib/mysql
|
||||
volumes:
|
||||
db:
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,2 +0,0 @@
|
|||
sudo docker cp config.development.json botc-ghost-1:/var/lib/ghost/.
|
||||
sudo docker cp config.production.json botc-ghost-1:/var/lib/ghost/.
|
|
@ -1,5 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
DBPASS=password
|
||||
EMAIL=example@mail.com
|
||||
DOMAIN=example.com
|
||||
|
3
sites/fusiondance/.gitignore
vendored
3
sites/fusiondance/.gitignore
vendored
|
@ -1,3 +0,0 @@
|
|||
db/*
|
||||
content/*
|
||||
config.*.json
|
|
@ -1,41 +0,0 @@
|
|||
services:
|
||||
|
||||
ghost:
|
||||
image: ghost:5
|
||||
restart: always
|
||||
ports:
|
||||
- 2368:2368
|
||||
expose:
|
||||
- 2368
|
||||
environment:
|
||||
# see https://ghost.org/docs/config/#configuration-options
|
||||
database__client: mysql
|
||||
database__connection__host: ghost-fusiondance-db-1
|
||||
database__connection__user: root
|
||||
database__connection__password: ${DBPASS}
|
||||
database__connection__database: ghost
|
||||
VIRTUAL_HOST: "www.${DOMAIN}, ${DOMAIN}"
|
||||
VIRTUAL_PORT: 2368
|
||||
LETSENCRYPT_HOST: "${DOMAIN}, www.${DOMAIN}"
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
# url: http://0.0.0.0:2368 #Dev
|
||||
url: https://libertyfusiondance.com #Prod
|
||||
# contrary to the default mentioned in the linked documentation, this image defaults to NODE_ENV=production (so development mode needs to be explicitly specified if desired)
|
||||
# NODE_ENV: development
|
||||
volumes:
|
||||
- ./content:/var/lib/ghost/content
|
||||
# - ./themes:/var/lib/ghost/current/content/themes:rw
|
||||
db:
|
||||
image: mysql:8.0
|
||||
restart: always
|
||||
environment:
|
||||
MYSQL_DATABASE: ghost
|
||||
MYSQL_ROOT_PASSWORD: ${DBPASS}
|
||||
volumes:
|
||||
- db:/var/lib/mysql
|
||||
volumes:
|
||||
db:
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1 +0,0 @@
|
|||
sudo docker cp config.production.json fusiondance-ghost-1:/var/lib/ghost/.
|
|
@ -1,5 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
DBPASS=password
|
||||
EMAIL=example@mail.com
|
||||
DOMAIN=example.com
|
||||
|
3
sites/gamesclub/.gitignore
vendored
3
sites/gamesclub/.gitignore
vendored
|
@ -1,3 +0,0 @@
|
|||
db/*
|
||||
content/*
|
||||
config.*.json
|
|
@ -1,41 +0,0 @@
|
|||
services:
|
||||
|
||||
ghost:
|
||||
image: ghost:5
|
||||
restart: always
|
||||
ports:
|
||||
- 2369:2368
|
||||
expose:
|
||||
- 2369
|
||||
environment:
|
||||
# see https://ghost.org/docs/config/#configuration-options
|
||||
database__client: mysql
|
||||
database__connection__host: gamesclub-db-1
|
||||
database__connection__user: root
|
||||
database__connection__password: ${DBPASS}
|
||||
database__connection__database: ghost
|
||||
VIRTUAL_HOST: "${DOMAIN}, www.${DOMAIN}"
|
||||
VIRTUAL_PORT: 2369
|
||||
LETSENCRYPT_HOST: "${DOMAIN}, www.${DOMAIN}"
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
# url: http://0.0.0.0:2369 #Dev
|
||||
url: "https://${DOMAIN}" #Prod
|
||||
# contrary to the default mentioned in the linked documentation, this image defaults to NODE_ENV=production (so development mode needs to be explicitly specified if desired)
|
||||
# NODE_ENV: development
|
||||
volumes:
|
||||
- ./content:/var/lib/ghost/content
|
||||
# - ./themes:/var/lib/ghost/current/content/themes:rw
|
||||
db:
|
||||
image: mysql:8.0
|
||||
restart: always
|
||||
environment:
|
||||
MYSQL_DATABASE: ghost
|
||||
MYSQL_ROOT_PASSWORD: ${DBPASS}
|
||||
volumes:
|
||||
- db:/var/lib/mysql
|
||||
volumes:
|
||||
db:
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,2 +0,0 @@
|
|||
sudo docker cp config.development.json gamesclub-ghost-1:/var/lib/ghost/.
|
||||
sudo docker cp config.production.json gamesclub-ghost-1:/var/lib/ghost/.
|
|
@ -1,5 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
DBPASS=password
|
||||
EMAIL=example@mail.com
|
||||
DOMAIN=example.com
|
||||
|
3
sites/photos/.gitignore
vendored
3
sites/photos/.gitignore
vendored
|
@ -1,3 +0,0 @@
|
|||
db/*
|
||||
content/*
|
||||
config.*.json
|
|
@ -1,42 +0,0 @@
|
|||
services:
|
||||
ghost:
|
||||
image: ghost:5
|
||||
restart: always
|
||||
ports:
|
||||
- 2370:2368
|
||||
expose:
|
||||
- 2370
|
||||
environment:
|
||||
# see https://ghost.org/docs/config/#configuration-options
|
||||
database__client: mysql
|
||||
database__connection__host: photos-db-1
|
||||
database__connection__user: root
|
||||
database__connection__password: ${DBPASS}
|
||||
database__connection__database: ghost
|
||||
# VIRTUAL_HOST: "www.${DOMAIN}, ${DOMAIN}"
|
||||
VIRTUAL_HOST: "photos.${DOMAIN}"
|
||||
VIRTUAL_PORT: 2370
|
||||
# LETSENCRYPT_HOST: "${DOMAIN}, www.${DOMAIN}"
|
||||
LETSENCRYPT_HOST: "photos.${DOMAIN}"
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
# url: http://0.0.0.0:2370 #Dev
|
||||
url: "https://photos.${DOMAIN}" #Prod
|
||||
# contrary to the default mentioned in the linked documentation, this image defaults to NODE_ENV=production (so development mode needs to be explicitly specified if desired)
|
||||
NODE_ENV: production
|
||||
volumes:
|
||||
- ./content:/var/lib/ghost/content
|
||||
# - ./themes:/var/lib/ghost/current/content/themes:rw
|
||||
db:
|
||||
image: mysql:8.0
|
||||
restart: always
|
||||
environment:
|
||||
MYSQL_DATABASE: ghost
|
||||
MYSQL_ROOT_PASSWORD: ${DBPASS}
|
||||
volumes:
|
||||
- db:/var/lib/mysql
|
||||
volumes:
|
||||
db:
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,2 +0,0 @@
|
|||
sudo docker cp config.development.json photos-ghost-1:/var/lib/ghost/.
|
||||
sudo docker cp config.production.json photos-ghost-1:/var/lib/ghost/.
|
|
@ -1,5 +0,0 @@
|
|||
DOMAIN=example.com
|
||||
DBPASS=password
|
||||
EMAIL=example@mail.com
|
||||
DOMAIN=example.com
|
||||
|
3
sites/techblog/.gitignore
vendored
3
sites/techblog/.gitignore
vendored
|
@ -1,3 +0,0 @@
|
|||
db/*
|
||||
content/*
|
||||
config.*.json
|
|
@ -1,40 +0,0 @@
|
|||
services:
|
||||
ghost:
|
||||
image: ghost:5
|
||||
restart: always
|
||||
ports:
|
||||
- 2373:2368
|
||||
expose:
|
||||
- 2373
|
||||
environment:
|
||||
# see https://ghost.org/docs/config/#configuration-options
|
||||
database__client: mysql
|
||||
database__connection__host: techblog-db-1
|
||||
database__connection__user: root
|
||||
database__connection__password: ${DBPASS}
|
||||
database__connection__database: ghost
|
||||
VIRTUAL_HOST: "blog.${DOMAIN}"
|
||||
VIRTUAL_PORT: 2373
|
||||
LETSENCRYPT_HOST: "blog.${DOMAIN}"
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
# url: http://0.0.0.0:2373 #Dev
|
||||
url: "https://blog.${DOMAIN}" #Prod
|
||||
# contrary to the default mentioned in the linked documentation, this image defaults to NODE_ENV=production (so development mode needs to be explicitly specified if desired)
|
||||
# NODE_ENV: development
|
||||
volumes:
|
||||
- ./content:/var/lib/ghost/content
|
||||
# - ./themes:/var/lib/ghost/current/content/themes:rw
|
||||
db:
|
||||
image: mysql:8.0
|
||||
restart: always
|
||||
environment:
|
||||
MYSQL_DATABASE: ghost
|
||||
MYSQL_ROOT_PASSWORD: ${DBPASS}
|
||||
volumes:
|
||||
- db:/var/lib/mysql
|
||||
volumes:
|
||||
db:
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
|
@ -1,2 +0,0 @@
|
|||
sudo docker cp config.development.json techblog-ghost-1:/var/lib/ghost/.
|
||||
sudo docker cp config.production.json techblog-ghost-1:/var/lib/ghost/.
|
|
@ -1,48 +0,0 @@
|
|||
DBPASS=password
|
||||
REDISPASS=password
|
||||
EMAIL=bjageman@gmail.com
|
||||
TZ=America/New_York
|
||||
DOMAIN=brodin.rocks
|
||||
|
||||
# For all variables, see https://docs.lightdash.com/self-host/customize-deployment/environment-variables
|
||||
|
||||
PORT=4018
|
||||
|
||||
SITE_URL=http://localhost:4018
|
||||
|
||||
PGHOST=metabase-db
|
||||
PGPORT=5432
|
||||
PGUSER=postgres
|
||||
PGDATABASE=postgres
|
||||
PGPASSWORD="password"
|
||||
LIGHTDASH_SECRET="not very secret"
|
||||
|
||||
SECURE_COOKIES=false
|
||||
TRUST_PROXY=false
|
||||
LIGHTDASH_LOG_LEVEL=debug
|
||||
LIGHTDASH_QUERY_MAX_LIMIT=5000
|
||||
|
||||
|
||||
NODE_ENV=production
|
||||
LIGHTDASH_LOG_LEVEL=debug
|
||||
LIGHTDASH_QUERY_MAX_LIMIT=5000
|
||||
|
||||
ALLOW_MULTIPLE_ORGS=false
|
||||
|
||||
DBT_PROJECT_DIR=./dbt
|
||||
|
||||
SCHEDULER_ENABLED=true
|
||||
LIGHTDASH_MAX_PAYLOAD=5mb
|
||||
|
||||
#AUTH_DISABLE_PASSWORD_AUTHENTICATION=
|
||||
#AUTH_GOOGLE_OAUTH2_CLIENT_ID=
|
||||
#AUTH_GOOGLE_OAUTH2_CLIENT_SECRET=
|
||||
|
||||
#EMAIL_SMTP_HOST=
|
||||
#EMAIL_SMTP_PORT=
|
||||
#EMAIL_SMTP_SECURE=
|
||||
#EMAIL_SMTP_USER=
|
||||
#EMAIL_SMTP_PASSWORD=
|
||||
#EMAIL_SMTP_ALLOW_INVALID_CERT=
|
||||
#EMAIL_SMTP_SENDER_NAME=
|
||||
#EMAIL_SMTP_SENDER_EMAIL=
|
1
stats/.gitignore
vendored
1
stats/.gitignore
vendored
|
@ -1 +0,0 @@
|
|||
noco/
|
|
@ -1,65 +0,0 @@
|
|||
services:
|
||||
share-db:
|
||||
environment:
|
||||
POSTGRES_DB: share-db
|
||||
POSTGRES_PASSWORD: password
|
||||
POSTGRES_USER: postgres
|
||||
image: postgres
|
||||
restart: always
|
||||
volumes:
|
||||
- ./data/sharedb:/var/lib/postgresql/data
|
||||
noco:
|
||||
container_name: noco
|
||||
image: nocodb/nocodb:latest
|
||||
depends_on:
|
||||
- noco-db
|
||||
ports:
|
||||
- 3006:8080
|
||||
environment:
|
||||
NC_DB: pg://noco-db:5432?u=postgres&p=password&d=database-noco
|
||||
VIRTUAL_HOST: sheets.phillybotc.com
|
||||
LETSENCRYPT_HOST: sheets.phillybotc.com
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
volumes:
|
||||
- ./noco:/usr/app/data
|
||||
noco-db:
|
||||
environment:
|
||||
POSTGRES_DB: database-noco
|
||||
POSTGRES_PASSWORD: password
|
||||
POSTGRES_USER: postgres
|
||||
image: postgres
|
||||
restart: always
|
||||
volumes:
|
||||
- ./data/nocodb:/var/lib/postgresql/data
|
||||
metabase:
|
||||
container_name: metabase
|
||||
image: metabase/metabase:latest
|
||||
depends_on:
|
||||
- metabase-db
|
||||
ports:
|
||||
- 4018:3000
|
||||
environment:
|
||||
JAVA_OPTS: "-Xmx1g" #-XX:+HeapDumpOnOutOfMemoryError -XX:HeapDumpPath=/path/to/directory
|
||||
MB_DB_TYPE: postgres
|
||||
MB_DB_DBNAME: ${PGDATABASE:-postgres}
|
||||
MB_DB_PORT: 5432
|
||||
MB_DB_USER: ${PGUSER:-postgres}
|
||||
MB_DB_PASS: ${PGPASSWORD}
|
||||
MB_DB_HOST: ${PGHOST}
|
||||
VIRTUAL_HOST: "dash.phillybotc.com"
|
||||
LETSENCRYPT_HOST: "dash.phillybotc.com"
|
||||
LETSENCRYPT_EMAIL: ${EMAIL}
|
||||
metabase-db:
|
||||
container_name: metabase-db
|
||||
image: postgres:15.4
|
||||
restart: always
|
||||
environment:
|
||||
POSTGRES_PASSWORD: ${PGPASSWORD}
|
||||
POSTGRES_USER: ${PGUSER:-postgres}
|
||||
POSTGRES_DB: ${PGDATABASE:-postgres}
|
||||
volumes:
|
||||
- ./data/metabase:/var/lib/postgresql/data
|
||||
networks:
|
||||
default:
|
||||
name: nginx-proxy
|
||||
external: true
|
1
vnc/.gitignore
vendored
1
vnc/.gitignore
vendored
|
@ -1 +0,0 @@
|
|||
data/*
|
|
@ -1,21 +0,0 @@
|
|||
services:
|
||||
hbbs:
|
||||
container_name: hbbs
|
||||
image: rustdesk/rustdesk-server:latest
|
||||
command: hbbs
|
||||
volumes:
|
||||
- ./data:/root
|
||||
network_mode: "host"
|
||||
|
||||
depends_on:
|
||||
- hbbr
|
||||
restart: unless-stopped
|
||||
|
||||
hbbr:
|
||||
container_name: hbbr
|
||||
image: rustdesk/rustdesk-server:latest
|
||||
command: hbbr
|
||||
volumes:
|
||||
- ./data:/root
|
||||
network_mode: "host"
|
||||
restart: unless-stopped
|
Loading…
Reference in New Issue
Block a user