Compare commits

...

2 Commits

Author SHA1 Message Date
c76d0fda6b Progress dump before ai agent 2026-04-04 04:48:49 -04:00
1e64f8e321 Big progress dump 2026-02-22 18:35:22 -05:00
12 changed files with 745 additions and 28 deletions

238
ai/compose.yml Normal file
View File

@@ -0,0 +1,238 @@
services:
webui:
image: ghcr.io/open-webui/open-webui:main
volumes:
- /mnt/HoardingCow_docker_data/Ollama/open-webui:/app/backend/data
environment:
- OLLAMA_API_BASE_URL=http://ollama:11434/api
networks:
- traefik-net
labels:
- "traefik.enable=true"
# Router for HTTP + redirection to HTTPS
- "traefik.http.routers.webui-http.rule=Host(`ai.lazyworkhorse.net`)"
- "traefik.http.routers.webui-http.entrypoints=web"
- "traefik.http.routers.webui-http.middlewares=redirect-to-https"
# Router for HTTPS with TLS
- "traefik.http.routers.webui-https.rule=Host(`ai.lazyworkhorse.net`)"
- "traefik.http.routers.webui-https.entrypoints=websecure"
- "traefik.http.routers.webui-https.tls=true"
- "traefik.http.routers.webui-https.tls.certresolver=njalla"
# llama_cpp_devstral:
# image: ghcr.io/ggml-org/llama.cpp:server-rocm
# container_name: llama_cpp_devstral
# restart: unless-stopped
# ports:
# - "8300:8080"
# ipc: host
# devices:
# - "/dev/kfd:/dev/kfd"
# - "/dev/dri:/dev/dri"
# group_add:
# - "303" # video
# - "26" # render
# environment:
# HSA_OVERRIDE_GFX_VERSION: 9.0.6
# HIP_VISIBLE_DEVICES: 0,1
# LLAMA_CACHE: /models
# volumes:
# - /mnt/HoardingCow_docker_data/Llama_cpp/models:/models
# - /mnt/HoardingCow_docker_data/Llama_cpp/devstral-agent.jinja:/template.jinja
# command: >
# -hf unsloth/Devstral-Small-2-24B-Instruct-2512-GGUF:Devstral-Small-2-24B-Instruct-2512-Q8_0.gguf
# -a devstral-2-small-llama_cpp
# --chat-template-file /template.jinja
# --host 0.0.0.0
# --port 8080
# --n-gpu-layers 99
# --ctx-size 163840
# --batch-size 4096
# --ubatch-size 4096
# --cache-type-k f16
# --cache-type-v f16
# --cache-reuse 256
# --flash-attn on
# --context-shift
# --split-mode layer
# --no-mmap
# --n-predict -1
# --parallel 2
# vllm:
# image: nalanzeyu/vllm-gfx906:v0.9.0-rocm6.3
# container_name: vllm
# # Required for multi-GPU communication (NCCL)
# ipc: host
# init: true
# shm_size: '2g'
# networks:
# - traefik-net
# ports:
# - "8300:8000"
# devices:
# - "/dev/kfd:/dev/kfd"
# - "/dev/dri:/dev/dri"
# group_add:
# - "303"
# - "26"
# environment:
# HSA_OVERRIDE_GFX_VERSION: 9.0.6
# HSA_ENABLE_SDMA: 0
# HIP_VISIBLE_DEVICES: 0,1
# NCCL_P2P_DISABLE: 1
# VLLM_WORKER_MULTIPROC_METHOD: spawn
# VLLM_USE_TRITON_FLASH_ATTN: 0
# VLLM_USE_ROCM_CUSTOM_PAGED_ATTN: 0
# VLLM_ATTENTION_BACKEND: ROPE_NAIVE
# VLLM_SKIP_WARMUP: 1
# VLLM_USE_V1: 0
# HF_TOKEN: ${HF_TOKEN}
# command: >
# vllm serve "mistralai/Devstral-Small-2-24B-Instruct-2512"
# --tensor-parallel-size 2
# --max-model-len 8192
# --gpu-memory-utilization 0.90
# --tokenizer_mode mistral
# --config_format auto
# --load-format auto
# --enforce-eager
# --disable-custom-all-reduce
# --trust-remote-code
# --task generate
# --block-size 16
# volumes:
# - /mnt/HoardingCow_docker_data/vllm/models:/root/.cache/huggingface
# restart: unless-stopped
ollama:
image: ollama/ollama:latest
container_name: ollama
privileged: true
tty: true
restart: unless-stopped
ports:
- "127.0.0.1:11434:11434"
networks:
- traefik-net
volumes:
- /mnt/HoardingCow_docker_data/Ollama/ollama:/root/.ollama
environment:
- OLLAMA_VULKAN=0
- HSA_OVERRIDE_GFX_VERSION=9.0.6
- HCC_AMDGPU_TARGET=gfx906
- HIP_VISIBLE_DEVICES=0,1
- ROCR_VISIBLE_DEVICES=0,1
- HSA_ENABLE_SDMA=0
- OLLAMA_HOST=0.0.0.0
- OLLAMA_DEBUG=1
- OLLAMA_FLASH_ATTENTION=0
- OLLAMA_NUM_PARALLEL=2
devices:
# Map the render nodes and KFD for ROCm to work inside the container
- /dev/kfd:/dev/kfd
- /dev/dri:/dev/dri
group_add:
- "303"
- "26"
# n8n:
# image: n8nio/n8n:latest
# container_name: n8n
# restart: unless-stopped
# networks:
# - traefik-net
# environment:
# - N8N_HOST=n8n.lazyworkhorse.net
# - N8N_PORT=5678
# - N8N_PROTOCOL=https
# - NODE_ENV=production
# - N8N_ENCRYPTION_KEY=${N8N_ENCRYPTION_KEY}
# - WEBHOOK_URL=https://n8n.lazyworkhorse.net/
# - GENERIC_TIMEZONE=America/New_York # Adjust to your timezone
# - N8N_BLOCK_EXTERNAL_STORAGE_ACCESS=false
# - N8N_NODES_PYTHON_CAN_IMPORT_MODULES=true
# - N8N_NATIVE_PYTHON_RUNNER=true
# - N8N_PYTHON_ALLOW_STDLIB=uuid,re,os,json
# - N8N_PYTHON_ALLOW_EXTERNAL=requests,pandas
# - NODE_FUNCTION_ALLOW_EXTERNAL=uuid,requests
# volumes:
# - /mnt/HoardingCow_docker_data/n8n:/home/node/.n8n
# labels:
# - "traefik.enable=true"
# # Router for HTTP + redirection to HTTPS
# - "traefik.http.routers.n8n-http.rule=Host(`n8n.lazyworkhorse.net`)"
# - "traefik.http.routers.n8n-http.entrypoints=web"
# - "traefik.http.routers.n8n-http.middlewares=redirect-to-https"
# # Router for HTTPS with TLS
# - "traefik.http.routers.n8n-https.rule=Host(`n8n.lazyworkhorse.net`)"
# - "traefik.http.routers.n8n-https.entrypoints=websecure"
# - "traefik.http.routers.n8n-https.tls=true"
# - "traefik.http.routers.n8n-https.tls.certresolver=njalla"
# # Service Loadbalancer (n8n default port)
# - "traefik.http.services.n8n.loadbalancer.server.port=5678"
openclaw:
image: coollabsio/openclaw:latest
container_name: openclaw
restart: unless-stopped
expose:
- "8080" # WebUI
- "18789" # Gateway/WebSocket
- "8788" # Nextcloud Webhook
networks:
- traefik-net
volumes:
- /mnt/HoardingCow_docker_data/openclaw/data:/data
- /home/gortium/infra:/data/workspace/infra
environment:
- TZ=America/Toronto
- OPENCLAW_GATEWAY_TOKEN=${OPENCLAW_GATEWAY_TOKEN}
- OPENROUTER_API_KEY=${OPENROUTER_API_KEY}
# Point to the sidecar browser
- BROWSER_CDP_URL=http://openclaw-browser:9222
- BROWSER_EVALUATE_ENABLED=true
- OPENCLAW_GATEWAY_HOST=0.0.0.0
- OPENCLAW_ALLOWED_ORIGINS=https://claw.lazyworkhorse.net
labels:
- "traefik.enable=true"
- "traefik.http.routers.openclaw-http.rule=Host(`claw.lazyworkhorse.net`)"
- "traefik.http.routers.openclaw-http.entrypoints=web"
- "traefik.http.routers.openclaw-http.middlewares=redirect-to-https"
- "traefik.http.routers.openclaw-https.rule=Host(`claw.lazyworkhorse.net`)"
- "traefik.http.routers.openclaw-https.priority=50"
- "traefik.http.routers.openclaw-https.entrypoints=websecure"
- "traefik.http.routers.openclaw-https.tls=true"
- "traefik.http.routers.openclaw-https.tls.certresolver=njalla"
- "traefik.http.services.openclaw.loadbalancer.server.port=8080"
depends_on:
- openclaw-browser
openclaw-browser:
image: ghcr.io/browserless/chromium:latest
restart: always
expose:
- "3000"
environment:
- MAX_CONCURRENT_SESSIONS=10
- CONNECTION_TIMEOUT=300000
- PREBOOT_CHROME=true
- DEMO_MODE=false
networks:
traefik-net:
aliases:
- browser
networks:
traefik-net:
external: true

View File

@@ -0,0 +1,35 @@
version: "3.8"
services:
authelia:
image: authelia/authelia:latest
container_name: authelia
volumes:
- /mnt/HoardingCow_docker_data/Authelia:/config
networks:
- traefik-net
restart: unless-stopped
labels:
- "traefik.enable=true"
# HTTP router
- "traefik.http.routers.authelia-http.rule=Host(`auth.lazyworkhorse.net`)"
- "traefik.http.routers.authelia-http.entrypoints=web"
- "traefik.http.routers.authelia-http.middlewares=redirect-to-https"
# HTTPS router
- "traefik.http.routers.authelia-https.rule=Host(`auth.lazyworkhorse.net`)"
- "traefik.http.routers.authelia-https.entrypoints=websecure"
- "traefik.http.routers.authelia-https.tls=true"
- "traefik.http.routers.authelia-https.tls.certresolver=njalla"
- "traefik.http.services.authelia.loadbalancer.server.port=9091"
# forward auth middleware definition
- "traefik.http.middlewares.authelia.forwardauth.address=http://authelia:9091/api/verify?rd=https://auth.lazyworkhorse.net"
- "traefik.http.middlewares.authelia.forwardauth.trustForwardHeader=true"
- "traefik.http.middlewares.authelia.forwardauth.authResponseHeaders=Remote-User,Remote-Groups,Remote-Name,Remote-Email"
networks:
traefik-net:
external: true

55
backup/compose.yml Normal file
View File

@@ -0,0 +1,55 @@
version: "3.8"
services:
kopia:
image: kopia/kopia:latest
container_name: kopia
restart: unless-stopped
# We explicitly run as root (0:0) to solve the CHDIR issue,
# OR we make sure the host folders match UID 1000.
user: "0:0"
command:
- server
- start
- --address=0.0.0.0:51515
- --server-username=${KOPIA_SERVER_USER}
- --server-password=${KOPIA_SERVER_PASSWORD}
- --config-file=/app/config/repository.config
- --disable-csrf-token-checks
- --insecure
environment:
- TZ=America/Montreal
- KOPIA_PASSWORD=${KOPIA_PASSWORD}
- USER=${KOPIA_USER}
volumes:
- /mnt/HoardingCow_docker_data/Kopia/config:/app/config
- /mnt/HoardingCow_docker_data/Kopia/cache:/app/cache
- /mnt/HoardingCow_docker_data/Kopia/repository:/repository
# Required if you want to use the 'Mount' feature later
- /tmp:/tmp:shared
# Required for mounting backups as drives
cap_add:
- SYS_ADMIN
devices:
- /dev/fuse:/dev/fuse
networks:
- traefik-net
labels:
- "traefik.enable=true"
# 1. HTTP to HTTPS Redirect
- "traefik.http.routers.kopia-http.rule=Host(`backup.lazyworkhorse.net`)"
- "traefik.http.routers.kopia-http.entrypoints=web"
- "traefik.http.routers.kopia-http.middlewares=redirect-to-https@docker"
# 2. HTTPS Configuration
- "traefik.http.routers.kopia.rule=Host(`backup.lazyworkhorse.net`)"
- "traefik.http.routers.kopia.entrypoints=websecure"
- "traefik.http.routers.kopia.tls=true"
- "traefik.http.routers.kopia.tls.certresolver=njalla"
# 3. Backend Service Config
- "traefik.http.services.kopia.loadbalancer.server.port=51515"
networks:
traefik-net:
external: true

78
cloudstorage/compose.yml Normal file
View File

@@ -0,0 +1,78 @@
version: "3.9"
services:
nextcloud:
image: nextcloud:latest
container_name: nextcloud
restart: always
networks:
- traefik-net
environment:
- PUID=1000
- PGID=1000
- TZ=America/Toronto
# Database connection
- MYSQL_HOST=nextcloud_mariadb
- MYSQL_DATABASE=nextcloud
- MYSQL_USER=nextcloud
- MYSQL_PASSWORD=${NEXTCLOUD_MYSQL_PASSWORD}
# Reverse Proxy Overrides (Crucial for HTTPS behind Traefik)
- OVERWRITEPROTOCOL=https
- OVERWRITECLIURL=https://cloud.lazyworkhorse.net
- NEXTCLOUD_TRUSTED_DOMAINS=cloud.lazyworkhorse.net
volumes:
- /mnt/HoardingCow_docker_data/NextCloud/data:/var/www/html:rw
depends_on:
- nextcloud_mariadb
labels:
- "traefik.enable=true"
# Router for HTTP -> HTTPS Redirection (Matching your Gitea style)
- "traefik.http.routers.nextcloud-http.rule=Host(`cloud.lazyworkhorse.net`)"
- "traefik.http.routers.nextcloud-http.entrypoints=web"
- "traefik.http.routers.nextcloud-http.middlewares=redirect-to-https"
# Router for HTTPS
- "traefik.http.routers.nextcloud-https.rule=Host(`cloud.lazyworkhorse.net`)"
- "traefik.http.routers.nextcloud-https.entrypoints=websecure"
- "traefik.http.routers.nextcloud-https.tls=true"
- "traefik.http.routers.nextcloud-https.tls.certresolver=njalla"
# Middlewares: Redirection + Nextcloud DAV fixes
- "traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https"
- "traefik.http.middlewares.nextcloud-dav.redirectregex.permanent=true"
- "traefik.http.middlewares.nextcloud-dav.redirectregex.regex=https://(.*)/.well-known/(card|cal)dav"
- "traefik.http.middlewares.nextcloud-dav.redirectregex.replacement=https://$$1/remote.php/dav/"
# Apply both redirection and DAV fixes
- "traefik.http.routers.nextcloud-https.middlewares=nextcloud-dav"
nextcloud_cron:
image: nextcloud:latest
container_name: nextcloud_cron
restart: always
networks:
- traefik-net
entrypoint: /cron.sh
volumes:
- /mnt/HoardingCow_docker_data/NextCloud/data:/var/www/html:rw
depends_on:
- nextcloud
nextcloud_mariadb:
image: mariadb:latest
container_name: nextcloud_mariadb
restart: always
networks:
- traefik-net
environment:
- MYSQL_RANDOM_ROOT_PASSWORD=yes
- MYSQL_USER=nextcloud
- MYSQL_PASSWORD=${NEXTCLOUD_MYSQL_PASSWORD}
- MYSQL_DATABASE=nextcloud
volumes:
- /mnt/HoardingCow_docker_data/NextCloud/database:/var/lib/mysql:rw
# command: ["--innodb-force-recovery=6"]
networks:
traefik-net:
external: true

46
coms/compose.yml Normal file
View File

@@ -0,0 +1,46 @@
version: "3.9"
services:
nomadnet:
image: ghcr.io/markqvist/nomadnet:master
container_name: nomadnet
restart: unless-stopped
volumes:
- /mnt/HoardingCow_docker_data/Nomadnet:/root/.nomadnetwork
- /mnt/HoardingCow_docker_data/Reticulum:/root/.reticulum
# Reticulum transport must be reachable directly (NOT through Traefik)
ports:
- "4242:4242"
# rbrowser:
# build:
# context: https://github.com/fr33n0w/rBrowser.git#main
# container_name: rbrowser
# restart: unless-stopped
# user: "1000:1000"
# depends_on:
# - nomadnet
# volumes:
# # share Reticulum identity + network state
# - /mnt/HoardingCow_docker_data/Reticulum:/home/appuser/.reticulum
# networks:
# - traefik-net
# labels:
# - "traefik.enable=true"
#
# # HTTP → HTTPS
# - "traefik.http.routers.rns-http.rule=Host(`nomad.lazyworkhorse.net`)"
# - "traefik.http.routers.rns-http.entrypoints=web"
# - "traefik.http.routers.rns-http.middlewares=redirect-to-https"
#
# # HTTPS protected by Authelia
# - "traefik.http.routers.rns-https.rule=Host(`nomad.lazyworkhorse.net`)"
# - "traefik.http.routers.rns-https.entrypoints=websecure"
# - "traefik.http.routers.rns-https.tls=true"
# - "traefik.http.routers.rns-https.tls.certresolver=njalla"
# - "traefik.http.routers.rns-https.middlewares=authelia-auth"
#
# - "traefik.http.services.rns.loadbalancer.server.port=5000"
networks:
traefik-net:
external: true

45
finance/compose.yml Normal file
View File

@@ -0,0 +1,45 @@
version: "3.9"
services:
fava:
image: yegle/fava
container_name: fava
environment:
- BEANCOUNT_FILE=/data/beancount_finance_vault/ledger/main/tpouplier.beancount
volumes:
- /mnt/HoardingCow_docker_data/Fava:/data
networks:
- traefik-net
restart: unless-stopped
labels:
- "traefik.enable=true"
# HTTP → HTTPS redirect
- "traefik.http.routers.fava-http.rule=Host(`money.lazyworkhorse.net`)"
- "traefik.http.routers.fava-http.entrypoints=web"
- "traefik.http.routers.fava-http.middlewares=redirect-to-https"
- "traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https"
# HTTPS router protected by Authelia
- "traefik.http.routers.fava-https.rule=Host(`money.lazyworkhorse.net`)"
- "traefik.http.routers.fava-https.entrypoints=websecure"
- "traefik.http.routers.fava-https.tls=true"
- "traefik.http.routers.fava-https.tls.certresolver=njalla"
- "traefik.http.routers.fava-https.middlewares=fava-auth"
# Authelia forwardAuth
- "traefik.http.middlewares.fava-auth.forwardauth.address=http://authelia:9091/api/verify?rd=https://auth.lazyworkhorse.net/"
- "traefik.http.middlewares.fava-auth.forwardauth.trustforwardheader=true"
- "traefik.http.middlewares.fava-auth.forwardauth.authresponseheaders=X-Forwarded-User,X-Forwarded-Groups"
# Internal port
- "traefik.http.services.fava.loadbalancer.server.port=5000"
networks:
traefik-net:
external: true

View File

@@ -0,0 +1,91 @@
services:
homeassistant:
image: ghcr.io/home-assistant/home-assistant:stable
container_name: homeassistant
restart: unless-stopped
privileged: true
# Was needed for someting.. but dont remember. Deactivated for now.
# network_mode: host # Discovery (mDNS/Bluetooth) requires this
environment:
- TZ=America/Toronto
volumes:
- /mnt/HoardingCow_docker_data/Home_Assistant:/config:rw
networks:
- traefik-net
labels:
- "traefik.enable=true"
- "traefik.http.routers.hass-http.rule=Host(`home.lazyworkhorse.net`)"
- "traefik.http.routers.hass-http.entrypoints=web"
- "traefik.http.routers.hass-http.middlewares=redirect-to-https"
- "traefik.http.routers.hass-https.rule=Host(`home.lazyworkhorse.net`)"
- "traefik.http.routers.hass-https.entrypoints=websecure"
- "traefik.http.routers.hass-https.tls.certresolver=njalla"
- "traefik.http.services.hass.loadbalancer.server.port=8123"
- "traefik.http.services.hass.loadbalancer.server.scheme=http"
# Trusted proxy defined in configuration.yml
mosquitto:
image: eclipse-mosquitto
volumes:
- /mnt/HoardingCow_docker_data/Mosquitto:/mosquitto
networks:
- traefik-net
# ports:
# - 1883:1883
# - 9001:9001
hydroqc2mqtt:
image: registry.gitlab.com/hydroqc/hydroqc2mqtt:1.3.0
restart: always
networks:
- traefik-net
environment:
MQTT_USERNAME: hass
MQTT_PASSWORD: ${MQTT_PASSWORD}
MQTT_HOST: 192.168.1.3
MQTT_PORT: 1883
HQ2M_CONTRACTS_0_NAME: maison
HQ2M_CONTRACTS_0_USERNAME: thierrypouplier@gmail.com
HQ2M_CONTRACTS_0_PASSWORD: ${HQ2M_CONTRACTS_0_PASSWORD}
HQ2M_CONTRACTS_0_CUSTOMER: ${HQ2M_CONTRACTS_0_CUSTOMER}
HQ2M_CONTRACTS_0_ACCOUNT: ${HQ2M_CONTRACTS_0_ACCOUNT}
HQ2M_CONTRACTS_0_CONTRACT: ${HQ2M_CONTRACTS_0_CONTRACT}
HQ2M_CONTRACTS_0_RATE: 'D'
HQ2M_CONTRACTS_0_RATE_OPTION: 'NONE'
HQ2M_CONTRACTS_0_SYNC_HOURLY_CONSUMPTION_ENABLED: "true"
HQ2M_CONTRACTS_0_HOME_ASSISTANT_WEBSOCKET_URL: http://homeassistant:8123/api/websocket
HQ2M_CONTRACTS_0_HOME_ASSISTANT_TOKEN: ${HQ2M_CONTRACTS_0_HOME_ASSISTANT_TOKEN}
# grocy:
# entrypoint:
# - /init
# environment:
# - PUID=1000
# - PGID=1000
# - TZ=America/Toronto
# image: lscr.io/linuxserver/grocy
# ports:
# - 9283:80/tcp
# restart: unless-stopped
# volumes:
# - /mnt/HoardingCow_docker_data/Grocy/config:/config:rw
# node-red:
# image: nodered/node-red:latest
# environment:
# - NODE_RED_UID=1000
# - NODE_RED_GID=1000
# - TZ=UTC
# ports:
# - "1880:1880"
# volumes:
# - /mnt/HoardingCow_docker_data/Node-Red/data:/data
# restart: unless-stopped
networks:
traefik-net:
external: true

41
homepage/compose.yml Normal file
View File

@@ -0,0 +1,41 @@
services:
homer:
image: b4bz/homer
container_name: homer
environment:
- UID=1000
- GID=1000
- TZ=America/Toronto
- PORT=8080
volumes:
- /mnt/HoardingCow_docker_data/Homer/assets:/www/assets:rw
restart: unless-stopped
networks:
- traefik-net
labels:
- "traefik.enable=true"
# HTTP → HTTPS redirect
- "traefik.http.routers.homer-http.rule=Host(`lazyworkhorse.net`)"
- "traefik.http.routers.homer-http.entrypoints=web"
- "traefik.http.routers.homer-http.middlewares=redirect-to-https"
- "traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https"
# HTTPS router protected by Authelia
- "traefik.http.routers.homer-https.rule=Host(`lazyworkhorse.net`)"
- "traefik.http.routers.homer-https.entrypoints=websecure"
- "traefik.http.routers.homer-https.tls=true"
- "traefik.http.routers.homer-https.tls.certresolver=njalla"
- "traefik.http.routers.homer-https.middlewares=homer-auth"
# Authelia forwardAuth
- "traefik.http.middlewares.homer-auth.forwardauth.address=http://authelia:9091/api/verify?rd=https://auth.lazyworkhorse.net/"
- "traefik.http.middlewares.homer-auth.forwardauth.trustforwardheader=true"
- "traefik.http.middlewares.homer-auth.forwardauth.authresponseheaders=X-Forwarded-User,X-Forwarded-Groups"
# Internal port
- "traefik.http.services.homer.loadbalancer.server.port=8080"
networks:
traefik-net:
external: true

View File

@@ -73,7 +73,7 @@ networks:
# - PGID=1000
# - TZ=America/Toronto
# - SUBDOMAINS=aziworkhorse
# - TOKEN=$[DUCKDNS_TOKEN]
# - TOKEN=${DUCKDNS_TOKEN}
# image: lscr.io/linuxserver/duckdns
# labels:
# - "traefik.enable=false"

View File

@@ -18,27 +18,19 @@ services:
labels:
- "traefik.enable=true"
# Router for HTTP + redirection to HTTPS
- "traefik.http.routers.bitwarden-http.rule=Host(`pass.lazyworkhorse.net`)"
- "traefik.http.routers.bitwarden-http.entrypoints=web"
- "traefik.http.routers.bitwarden-http.middlewares=redirect-to-https"
# HTTP → HTTPS
- "traefik.http.routers.pass-http.rule=Host(`pass.lazyworkhorse.net`)"
- "traefik.http.routers.pass-http.entrypoints=web"
- "traefik.http.routers.pass-http.middlewares=redirect-to-https"
# Router for HTTPS with TLS
- "traefik.http.routers.bitwarden-https.rule=Host(`pass.lazyworkhorse.net`)"
- "traefik.http.routers.bitwarden-https.entrypoints=websecure"
- "traefik.http.routers.bitwarden-https.tls=true"
- "traefik.http.routers.bitwarden-https.tls.certresolver=njalla"
# Wildcard
# - "traefik.http.routers.bitwarden-https.tls.domains[0].main=lazyworkhorse.net"
# - "traefik.http.routers.bitwarden-https.tls.domains[0].sans=*.lazyworkhorse.net"
# Middleware for redirect HTTP -> HTTPS
- "traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https"
# Websocket support (port 80 du container)
- "traefik.http.services.bitwarden.loadbalancer.server.port=80"
# HTTPS
- "traefik.http.routers.pass-https.rule=Host(`pass.lazyworkhorse.net`)"
- "traefik.http.routers.pass-https.entrypoints=websecure"
- "traefik.http.routers.pass-https.tls=true"
- "traefik.http.routers.pass-https.tls.certresolver=njalla"
# Internal service
- "traefik.http.services.pass.loadbalancer.server.port=80"
networks:
traefik-net:
external: true

95
tak/compose.yml Normal file
View File

@@ -0,0 +1,95 @@
services:
freetakserver:
image: ghcr.io/freetakteam/freetakserver:master
container_name: freetakserver
hostname: freetakserver
restart: unless-stopped
networks:
- traefik-net
volumes:
- /mnt/HoardingCow_docker_data/TAK/fts_data:/opt/fts:z,rw
ports:
- 8087:8087
- 8089:8089
- 8443:8443
- 9000:9000
- 19023:19023
environment:
FTS_FED_PASSWORD: "${FTS_FED_PASSWORD}"
FTS_CLIENT_CERT_PASSWORD: "${FTS_CLIENT_CERT_PASSWORD}"
FTS_WEBSOCKET_KEY: "${FTS_WEBSOCKET_KEY}"
FTS_SECRET_KEY: "${FTS_SECRET_KEY}"
FTS_CONNECTION_MESSAGE: "Welcome to FreeTAKServer. The Parrot is not dead. It's just resting"
FTS_COT_PORT: 8087
FTS_SSLCOT_PORT: 8089
FTS_API_PORT: 19023
FTS_FED_PORT: 9000
FTS_DP_ADDRESS: 'freetakserver'
FTS_USER_ADDRESS: 'freetakserver'
FTS_API_ADDRESS: 'freetakserver'
FTS_ROUTING_PROXY_SUBSCRIBE_PORT: 19030
FTS_ROUTING_PROXY_SUBSCRIBE_IP: 'freetakserver'
FTS_ROUTING_PROXY_PUBLISHER_PORT: 19032
FTS_ROUTING_PROXY_PUBLISHER_IP: 'freetakserver'
FTS_ROUTING_PROXY_SERVER_PORT: 19031
FTS_ROUTING_PROXY_SERVER_IP: 'freetakserver'
FTS_INTEGRATION_MANAGER_PULLER_PORT: 19033
FTS_INTEGRATION_MANAGER_PULLER_ADDRESS: 'freetakserver'
FTS_INTEGRATION_MANAGER_PUBLISHER_PORT: 19034
FTS_INTEGRATION_MANAGER_PUBLISHER_ADDRESS: 'freetakserver'
FTS_OPTIMIZE_API: "True"
FTS_DATA_RECEPTION_BUFFER: 1024
FTS_MAX_RECEPTION_TIME: 4
FTS_NUM_ROUTING_WORKERS: 3
FTS_COT_TO_DB: "True"
FTS_MAINLOOP_DELAY: 100
FTS_EMERGENCY_RADIUS: 0
FTS_LOG_LEVEL: "info"
freetakserver-ui:
image: ghcr.io/freetakteam/ui:latest
container_name: freetakserver-ui
hostname: freetakserver-ui
restart: unless-stopped
networks:
- traefik-net
ports:
- 5000:5000
volumes:
- /mnt/HoardingCow_docker_data/TAK/fts_ui_data:/home/freetak/data:z,rw
environment:
FTS_IP: "freetakserver"
FTS_API_PORT: 19023
FTS_API_PROTO: 'http'
FTS_UI_EXPOSED_IP: 'freetakserver-ui'
FTS_MAP_EXPOSED_IP: '127.0.0.1'
FTS_MAP_PORT: 8000
FTS_MAP_PROTO: 'http'
FTS_UI_PORT: 5000
FTS_UI_WSKEY: "${FTS_WEBSOCKET_KEY}"
FTS_API_KEY: 'Bearer token'
FTS_UI_SQLALCHEMY_DATABASE_URI: 'sqlite:////home/freetak/data/FTSServer-UI.db'
labels:
- "traefik.enable=true"
- "traefik.docker.network=traefik-net"
# HTTP -> HTTPS Redirect
- "traefik.http.routers.fts-ui-http.rule=Host(`tak.lazyworkhorse.net`)"
- "traefik.http.routers.fts-ui-http.entrypoints=web"
- "traefik.http.routers.fts-ui-http.middlewares=redirect-to-https"
# HTTPS Router
- "traefik.http.routers.fts-ui-https.rule=Host(`tak.lazyworkhorse.net`)"
- "traefik.http.routers.fts-ui-https.entrypoints=websecure"
- "traefik.http.routers.fts-ui-https.tls=true"
- "traefik.http.routers.fts-ui-https.tls.certresolver=njalla"
# Service & Port
- "traefik.http.services.fts-ui.loadbalancer.server.port=5000"
# Reuse your existing redirect middleware
- "traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https"
networks:
traefik-net:
external: true

View File

@@ -19,24 +19,25 @@ services:
labels:
- "traefik.enable=true"
# Router for HTTP + redirection to HTTPS
# HTTP -> HTTPS Redirect
- "traefik.http.routers.gitea-http.rule=Host(`code.lazyworkhorse.net`)"
- "traefik.http.routers.gitea-http.entrypoints=web"
- "traefik.http.routers.gitea-http.middlewares=redirect-to-https"
- "traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https"
# Router for HTTPS with TLS
# HTTPS Router
- "traefik.http.routers.gitea-https.rule=Host(`code.lazyworkhorse.net`)"
- "traefik.http.routers.gitea-https.entrypoints=websecure"
- "traefik.http.routers.gitea-https.tls=true"
- "traefik.http.routers.gitea-https.tls.certresolver=njalla"
- "traefik.http.routers.gitea-https.middlewares=gitea-home-redirect"
# Wildcard
# - "traefik.http.routers.gitea-https.tls.domains[0].main=lazyworkhorse.net"
# - "traefik.http.routers.gitea-https.tls.domains[0].sans=*.lazyworkhorse.net"
# Middleware for redirect HTTP -> HTTPS
- "traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https"
# The Redirect Logic - Using single quotes to allow backslashes
- 'traefik.http.middlewares.gitea-home-redirect.redirectregex.regex=^https://code\.lazyworkhorse\.net/?$$'
- 'traefik.http.middlewares.gitea-home-redirect.redirectregex.replacement=https://code.lazyworkhorse.net/gortium'
- "traefik.http.middlewares.gitea-home-redirect.redirectregex.permanent=true"
# Internal Routing
- "traefik.http.services.gitea.loadbalancer.server.port=3000"
networks: