Add traefik reverse proxy

This commit is contained in:
Francesco Antognazza 2023-02-03 18:01:35 +01:00
parent 1e42d41d1b
commit 654fc767fa
5 changed files with 189 additions and 0 deletions

View File

@ -0,0 +1,8 @@
http:
middlewares:
http-compress:
compress:
excludedContentTypes:
- "video/*"
- "image/*"
- "audio/*"

View File

@ -0,0 +1,2 @@
serversTransport:
insecureSkipVerify: true

View File

@ -0,0 +1,125 @@
---
- hosts: all
name: Traefik reverse proxy
tasks:
- name: Get containers UID
ansible.builtin.command: "id -u containers"
register: uid_containers
changed_when: uid_containers.rc != 0
- name: Permit traffic from any IP to http port
become: true
ansible.builtin.ufw:
direction: in
from_ip: any
proto: tcp
to_port: 80
rule: allow
- name: Permit traffic from any IP to https port
become: true
ansible.builtin.ufw:
direction: in
from_ip: any
proto: tcp
to_port: 443
rule: allow
- name: Pull traefik image
become_user: containers
become: true
containers.podman.podman_image:
name: docker.io/traefik:latest
- name: Change permission to traefik folder
become: true
ansible.builtin.file:
path: /etc/traefik
owner: containers
group: containers
mode: 0700
state: directory
- name: Copy config directory
become: true
ansible.builtin.copy:
src: files/
dest: /etc/traefik/
owner: containers
group: containers
mode: 0600
- name: Copy config files from templates
become: true
ansible.builtin.template:
src: "templates/{{ item }}.j2"
dest: "/etc/traefik/{{ item }}"
owner: containers
group: containers
mode: 0600
loop:
- traefik.yml
- conf/cockpit.yml
- name: Create podman networks
containers.podman.podman_network:
name: "{{ item }}"
recreate: false
state: "present"
disable_dns: true
become_user: containers
become: true
loop:
- traefik
- traefik-portainer
- traefik-nextcloud
- name: Create traefik instance
become_user: containers
become: true
containers.podman.podman_container:
name: traefik
image: docker.io/traefik:latest
state: present
ports:
- 80:80
- 443:443
security_opt:
- label=type:container_runtime_t
volume:
- /run/user/{{ uid_containers.stdout }}/podman/podman.sock:/var/run/docker.sock:z
- /etc/traefik/:/etc/traefik:Z
network:
- traefik
- traefik-portainer
- traefik-nextcloud
cap_add:
- NET_ADMIN
label:
io.containers.autoupdate: "registry"
traefik.enable: "true"
traefik.http.middlewares.traefik-auth.basicauth.users: "{{ vault_traefik_basic_auth }}"
traefik.http.routers.traefik.entrypoints: "https"
traefik.http.routers.traefik.rule: "Path(`/traefik`)"
traefik.http.routers.traefik.middlewares: "traefik-auth@docker"
traefik.http.routers.traefik.tls: "true"
traefik.http.routers.traefik.tls.certresolver: "wildcard"
traefik.http.routers.traefik.tls.domains[0].main: "{{ inventory_hostname }}"
traefik.http.routers.traefik.service: "api@internal"
generate_systemd:
path: /home/containers/.config/systemd/user/
restart_policy: on-failure
names: true
new: true
- name: Start containers at boot
become_user: containers
become: true
ansible.builtin.systemd:
scope: user
name: container-{{ item }}.service
enabled: true
state: started
daemon_reload: true
loop:
- traefik

View File

@ -0,0 +1,14 @@
http:
routers:
cockpit:
rule: "Path(`/cockpit`)"
entryPoints: https
service: cockpit
tls:
certresolver: wildcard
services:
cockpit:
loadBalancer:
servers:
- url: "http://131.175.120.208:9090"

View File

@ -0,0 +1,40 @@
log:
level: "ERROR"
api:
dashboard: true
accessLog:
filters:
statusCodes:
- "400-418"
- "500-508"
entryPoints:
http:
address: ":80"
http:
redirections:
entryPoint:
to: https
scheme: https
permanent: true
https:
address: ":443"
providers:
docker:
endpoint: "unix:///var/run/docker.sock"
exposedByDefault: false
file:
directory: "/etc/traefik/conf"
watch: true
certificatesResolvers:
wildcard:
acme:
email: {{ vault_acme_admin_email }}
storage: "/etc/traefik/acme_wildcard.json"
keyType: "EC256"
httpChallenge:
entryPoint: http