48 lines
1.8 KiB
YAML
48 lines
1.8 KiB
YAML
services:
|
|
rego-tunnel-linux:
|
|
container_name: rego-tunnel-linux
|
|
image: qemux/qemu:latest
|
|
restart: unless-stopped
|
|
devices:
|
|
- /dev/kvm
|
|
- /dev/net/tun
|
|
cap_add:
|
|
- NET_ADMIN
|
|
stop_grace_period: 2m
|
|
ports:
|
|
- ${APP_PORT}:8006
|
|
environment:
|
|
BOOT: ${LINUX_DISTRO}
|
|
RAM_SIZE: ${LINUX_RAM_GB}G
|
|
CPU_CORES: ${LINUX_CPU_CORES}
|
|
DISK_SIZE: ${LINUX_DISK_SIZE_GB}G
|
|
DHCP: "Y"
|
|
volumes:
|
|
- ${APP_DATA_DIR}/data/storage:/storage
|
|
- ${APP_DATA_DIR}/data/shared:/shared
|
|
- /etc/runtipi/repos/runtipi/apps/rego-tunnel-linux/vpn_scripts:/vpn_scripts:ro
|
|
networks:
|
|
- tipi_main_network
|
|
sysctls:
|
|
- net.ipv4.ip_forward=1
|
|
labels:
|
|
generated: true
|
|
traefik.enable: true
|
|
traefik.docker.network: runtipi_tipi_main_network
|
|
traefik.http.middlewares.rego-tunnel-linux-runtipi-web-redirect.redirectscheme.scheme: https
|
|
traefik.http.services.rego-tunnel-linux-runtipi.loadbalancer.server.port: "8006"
|
|
traefik.http.routers.rego-tunnel-linux-runtipi-insecure.rule: Host(`${APP_DOMAIN}`)
|
|
traefik.http.routers.rego-tunnel-linux-runtipi-insecure.entrypoints: web
|
|
traefik.http.routers.rego-tunnel-linux-runtipi-insecure.service: rego-tunnel-linux-runtipi
|
|
traefik.http.routers.rego-tunnel-linux-runtipi-insecure.middlewares: rego-tunnel-linux-runtipi-web-redirect
|
|
traefik.http.routers.rego-tunnel-linux-runtipi.rule: Host(`${APP_DOMAIN}`)
|
|
traefik.http.routers.rego-tunnel-linux-runtipi.entrypoints: websecure
|
|
traefik.http.routers.rego-tunnel-linux-runtipi.service: rego-tunnel-linux-runtipi
|
|
traefik.http.routers.rego-tunnel-linux-runtipi.tls.certresolver: myresolver
|
|
runtipi.managed: true
|
|
runtipi.appurn: rego-tunnel-linux:runtipi
|
|
networks:
|
|
tipi_main_network:
|
|
name: runtipi_tipi_main_network
|
|
external: true
|