Replace secrets/configs with mounted files/folders
This commit is contained in:
@@ -21,17 +21,14 @@ services:
|
|||||||
- reverse-proxy
|
- reverse-proxy
|
||||||
volumes:
|
volumes:
|
||||||
- ${NASCOMPOSE_SERVICES?}/authentication/volumes/authelia_config/:/config/
|
- ${NASCOMPOSE_SERVICES?}/authentication/volumes/authelia_config/:/config/
|
||||||
configs:
|
# Configuration
|
||||||
- source: authelia_configuration
|
- ${NASCOMPOSE_SERVICES?}/authentication/configs/configuration.yml:/etc/authelia/configuration.yml:ro
|
||||||
target: /etc/authelia/configuration.yml
|
- ${NASCOMPOSE_SERVICES?}/authentication/configs/access.yml:/etc/authelia/access.yml:ro
|
||||||
- source: authelia_access
|
- ${NASCOMPOSE_SERVICES?}/authentication/configs/authentication.yml:/etc/authelia/authentication.yml:ro
|
||||||
target: /etc/authelia/access.yml
|
# Secrets
|
||||||
- source: authelia_authentication
|
- ${NASCOMPOSE_SERVICES?}/authentication/secrets/jwt_secret:/run/secrets/jwt_secret:ro
|
||||||
target: /etc/authelia/authentication.yml
|
- ${NASCOMPOSE_SERVICES?}/authentication/secrets/storage_key:/run/secrets/storage_key:ro
|
||||||
secrets:
|
- ${NASCOMPOSE_SERVICES?}/authentication/secrets/smtp_password:/run/secrets/smtp_password:ro
|
||||||
- jwt_secret
|
|
||||||
- storage_key
|
|
||||||
- smtp_password
|
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: true
|
traefik.enable: true
|
||||||
@@ -39,19 +36,3 @@ services:
|
|||||||
networks:
|
networks:
|
||||||
reverse-proxy:
|
reverse-proxy:
|
||||||
external: true
|
external: true
|
||||||
|
|
||||||
configs:
|
|
||||||
authelia_configuration:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/authentication/configs/configuration.yml
|
|
||||||
authelia_access:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/authentication/configs/access.yml
|
|
||||||
authelia_authentication:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/authentication/configs/authentication.yml
|
|
||||||
|
|
||||||
secrets:
|
|
||||||
jwt_secret:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/authentication/secrets/jwt_secret
|
|
||||||
storage_key:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/authentication/secrets/storage_key
|
|
||||||
smtp_password:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/authentication/secrets/smtp_password
|
|
||||||
|
|||||||
@@ -26,8 +26,8 @@ services:
|
|||||||
volumes:
|
volumes:
|
||||||
- /var/packages/Docker/var/docker/volumes/:/var/lib/docker/volumes/
|
- /var/packages/Docker/var/docker/volumes/:/var/lib/docker/volumes/
|
||||||
- ${NASCOMPOSE_SERVICES?}/bootstrap/volumes/portainer_data/:/data/
|
- ${NASCOMPOSE_SERVICES?}/bootstrap/volumes/portainer_data/:/data/
|
||||||
secrets:
|
# Secrets
|
||||||
- portainer_password
|
- ${NASCOMPOSE_SERVICES?}/bootstrap/secrets/portainer_password:/run/secrets/portainer_password:ro
|
||||||
depends_on:
|
depends_on:
|
||||||
- docker
|
- docker
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
@@ -39,7 +39,3 @@ networks:
|
|||||||
name: docker
|
name: docker
|
||||||
labels:
|
labels:
|
||||||
nas-compose.boostrap: true
|
nas-compose.boostrap: true
|
||||||
|
|
||||||
secrets:
|
|
||||||
portainer_password:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/bootstrap/secrets/portainer_password
|
|
||||||
|
|||||||
@@ -13,6 +13,9 @@ services:
|
|||||||
WATCHTOWER_NOTIFICATION_URL: /run/secrets/watchtower_notification_url
|
WATCHTOWER_NOTIFICATION_URL: /run/secrets/watchtower_notification_url
|
||||||
networks:
|
networks:
|
||||||
- docker
|
- docker
|
||||||
|
volumes:
|
||||||
|
# Secrets
|
||||||
|
- ${NASCOMPOSE_SERVICES?}/docker-monitoring/secrets/notification_url:/run/secrets/watchtower_notification_url:ro
|
||||||
secrets:
|
secrets:
|
||||||
- watchtower_notification_url
|
- watchtower_notification_url
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
@@ -20,7 +23,3 @@ services:
|
|||||||
networks:
|
networks:
|
||||||
docker:
|
docker:
|
||||||
external: true
|
external: true
|
||||||
|
|
||||||
secrets:
|
|
||||||
watchtower_notification_url:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/docker-monitoring/secrets/notification_url
|
|
||||||
|
|||||||
@@ -7,10 +7,7 @@ services:
|
|||||||
environment:
|
environment:
|
||||||
- SUBDOMAINS=${NASCOMPOSE_DUCKDNS_DOMAIN?}
|
- SUBDOMAINS=${NASCOMPOSE_DUCKDNS_DOMAIN?}
|
||||||
- FILE__TOKEN=/run/secrets/duckdns_token
|
- FILE__TOKEN=/run/secrets/duckdns_token
|
||||||
secrets:
|
volumes:
|
||||||
- duckdns_token
|
# Secrets
|
||||||
|
- ${NASCOMPOSE_SERVICES?}/dynamic-dns/secrets/duckdns_token:/run/secrets/duckdns_token:ro
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
|
|
||||||
secrets:
|
|
||||||
duckdns_token:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/dynamic-dns/secrets/duckdns_token
|
|
||||||
|
|||||||
@@ -6,18 +6,7 @@ services:
|
|||||||
networks:
|
networks:
|
||||||
macvlan:
|
macvlan:
|
||||||
ipv4_address: ${NASCOMPOSE_MACVLAN_TRAEFIK_IP?}
|
ipv4_address: ${NASCOMPOSE_MACVLAN_TRAEFIK_IP?}
|
||||||
configs:
|
|
||||||
- source: traefik_synology
|
|
||||||
target: /etc/traefik/dynamic/synology.yml
|
|
||||||
- source: traefik_portainer
|
|
||||||
target: /etc/traefik/dynamic/portainer.yml
|
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
macvlan:
|
macvlan:
|
||||||
external: true
|
external: true
|
||||||
|
|
||||||
configs:
|
|
||||||
traefik_synology:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/reverse-proxy/configs/dynamic/synology.yml
|
|
||||||
traefik_portainer:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/reverse-proxy/configs/dynamic/portainer.yml
|
|
||||||
|
|||||||
@@ -9,24 +9,12 @@ services:
|
|||||||
networks:
|
networks:
|
||||||
- reverse-proxy
|
- reverse-proxy
|
||||||
- docker
|
- docker
|
||||||
configs:
|
volumes:
|
||||||
- source: traefik_static
|
# Config
|
||||||
target: /etc/traefik/traefik.yml
|
- ${NASCOMPOSE_SERVICES?}/reverse-proxy/configs/:/etc/traefik:ro
|
||||||
|
# Secrets
|
||||||
- source: traefik_dynamic
|
- ${NASCOMPOSE_SERVICES?}/reverse-proxy/secrets/traefik.cert:/run/secrets/traefik_tls_cert:ro
|
||||||
target: /etc/traefik/dynamic/traefik.yml
|
- ${NASCOMPOSE_SERVICES?}/reverse-proxy/secrets/traefik.key:/run/secrets/traefik_tls_key:ro
|
||||||
- source: traefik_tls
|
|
||||||
target: /etc/traefik/dynamic/tls.yml
|
|
||||||
- source: traefik_hsts
|
|
||||||
target: /etc/traefik/dynamic/hsts.yml
|
|
||||||
|
|
||||||
- source: traefik_authelia
|
|
||||||
target: /etc/traefik/dynamic/authelia.yml
|
|
||||||
- source: traefik_transmission-api
|
|
||||||
target: /etc/traefik/dynamic/transmission-api.yml
|
|
||||||
secrets:
|
|
||||||
- traefik_tls_cert
|
|
||||||
- traefik_tls_key
|
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: true
|
traefik.enable: true
|
||||||
@@ -39,23 +27,3 @@ networks:
|
|||||||
|
|
||||||
docker:
|
docker:
|
||||||
external: true
|
external: true
|
||||||
|
|
||||||
configs:
|
|
||||||
traefik_static:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/reverse-proxy/configs/traefik.yml
|
|
||||||
traefik_dynamic:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/reverse-proxy/configs/dynamic/traefik.yml
|
|
||||||
traefik_tls:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/reverse-proxy/configs/dynamic/tls.yml
|
|
||||||
traefik_hsts:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/reverse-proxy/configs/dynamic/hsts.yml
|
|
||||||
traefik_authelia:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/reverse-proxy/configs/dynamic/authelia.yml
|
|
||||||
traefik_transmission-api:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/reverse-proxy/configs/dynamic/transmission-api.yml
|
|
||||||
|
|
||||||
secrets:
|
|
||||||
traefik_tls_cert:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/reverse-proxy/secrets/traefik.cert
|
|
||||||
traefik_tls_key:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/reverse-proxy/secrets/traefik.key
|
|
||||||
|
|||||||
@@ -20,9 +20,9 @@ services:
|
|||||||
- scrobbler
|
- scrobbler
|
||||||
volumes:
|
volumes:
|
||||||
- ${NASCOMPOSE_SERVICES?}/scrobbler/volumes/plaxt_keystore/:/app/keystore/
|
- ${NASCOMPOSE_SERVICES?}/scrobbler/volumes/plaxt_keystore/:/app/keystore/
|
||||||
secrets:
|
# Secrets
|
||||||
- trakt_id
|
- ${NASCOMPOSE_SERVICES?}/scrobbler/secrets/trakt_id:/run/secrets/trakt_id:ro
|
||||||
- trakt_secret
|
- ${NASCOMPOSE_SERVICES?}/scrobbler/secrets/trakt_secret:/run/secrets/trakt_secret:ro
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: true
|
traefik.enable: true
|
||||||
@@ -34,9 +34,3 @@ networks:
|
|||||||
|
|
||||||
reverse-proxy:
|
reverse-proxy:
|
||||||
external: true
|
external: true
|
||||||
|
|
||||||
secrets:
|
|
||||||
trakt_id:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/scrobbler/secrets/trakt_id
|
|
||||||
trakt_secret:
|
|
||||||
file: ${NASCOMPOSE_SERVICES?}/scrobbler/secrets/trakt_secret
|
|
||||||
|
|||||||
@@ -20,11 +20,13 @@ services:
|
|||||||
volumes:
|
volumes:
|
||||||
- ${NASCOMPOSE_SERVICES?}/torrents/volumes/qbittorrent_config/:/config/
|
- ${NASCOMPOSE_SERVICES?}/torrents/volumes/qbittorrent_config/:/config/
|
||||||
- ${NASCOMPOSE_DATA?}/torrents/:/data/
|
- ${NASCOMPOSE_DATA?}/torrents/:/data/
|
||||||
- ${NASCOMPOSE_SERVICES?}/torrents/secrets/wg0.conf:/config/wireguard/wg0.conf:ro
|
# Configuration
|
||||||
- ${NASCOMPOSE_SERVICES?}/torrents/config/set_port.sh:/bin/set_port.sh:ro
|
- ${NASCOMPOSE_SERVICES?}/torrents/config/set_port.sh:/bin/set_port.sh:ro
|
||||||
- ${NASCOMPOSE_SERVICES?}/torrents/config/01-natpmp-install:/etc/cont-init.d/01-natpmp-install:ro
|
- ${NASCOMPOSE_SERVICES?}/torrents/config/01-natpmp-install:/etc/cont-init.d/01-natpmp-install:ro
|
||||||
- ${NASCOMPOSE_SERVICES?}/torrents/config/98-gateway-setup:/etc/cont-init.d/98-gateway-setup:ro
|
- ${NASCOMPOSE_SERVICES?}/torrents/config/98-gateway-setup:/etc/cont-init.d/98-gateway-setup:ro
|
||||||
- ${NASCOMPOSE_SERVICES?}/torrents/config/99-cron-start:/etc/cont-init.d/99-cron-start:ro
|
- ${NASCOMPOSE_SERVICES?}/torrents/config/99-cron-start:/etc/cont-init.d/99-cron-start:ro
|
||||||
|
# Secrets
|
||||||
|
- ${NASCOMPOSE_SERVICES?}/torrents/secrets/wg0.conf:/config/wireguard/wg0.conf:ro
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: true
|
traefik.enable: true
|
||||||
|
|||||||
Reference in New Issue
Block a user