Add traefik reverse proxy
This commit is contained in:
parent
1e42d41d1b
commit
654fc767fa
8
containers/traefik/files/conf/http_compress.yml
Normal file
8
containers/traefik/files/conf/http_compress.yml
Normal file
@ -0,0 +1,8 @@
|
||||
http:
|
||||
middlewares:
|
||||
http-compress:
|
||||
compress:
|
||||
excludedContentTypes:
|
||||
- "video/*"
|
||||
- "image/*"
|
||||
- "audio/*"
|
2
containers/traefik/files/conf/http_config.yml
Normal file
2
containers/traefik/files/conf/http_config.yml
Normal file
@ -0,0 +1,2 @@
|
||||
serversTransport:
|
||||
insecureSkipVerify: true
|
125
containers/traefik/tasks.yml
Normal file
125
containers/traefik/tasks.yml
Normal file
@ -0,0 +1,125 @@
|
||||
---
|
||||
- hosts: all
|
||||
name: Traefik reverse proxy
|
||||
tasks:
|
||||
- name: Get containers UID
|
||||
ansible.builtin.command: "id -u containers"
|
||||
register: uid_containers
|
||||
changed_when: uid_containers.rc != 0
|
||||
|
||||
- name: Permit traffic from any IP to http port
|
||||
become: true
|
||||
ansible.builtin.ufw:
|
||||
direction: in
|
||||
from_ip: any
|
||||
proto: tcp
|
||||
to_port: 80
|
||||
rule: allow
|
||||
|
||||
- name: Permit traffic from any IP to https port
|
||||
become: true
|
||||
ansible.builtin.ufw:
|
||||
direction: in
|
||||
from_ip: any
|
||||
proto: tcp
|
||||
to_port: 443
|
||||
rule: allow
|
||||
|
||||
- name: Pull traefik image
|
||||
become_user: containers
|
||||
become: true
|
||||
containers.podman.podman_image:
|
||||
name: docker.io/traefik:latest
|
||||
|
||||
- name: Change permission to traefik folder
|
||||
become: true
|
||||
ansible.builtin.file:
|
||||
path: /etc/traefik
|
||||
owner: containers
|
||||
group: containers
|
||||
mode: 0700
|
||||
state: directory
|
||||
|
||||
- name: Copy config directory
|
||||
become: true
|
||||
ansible.builtin.copy:
|
||||
src: files/
|
||||
dest: /etc/traefik/
|
||||
owner: containers
|
||||
group: containers
|
||||
mode: 0600
|
||||
|
||||
- name: Copy config files from templates
|
||||
become: true
|
||||
ansible.builtin.template:
|
||||
src: "templates/{{ item }}.j2"
|
||||
dest: "/etc/traefik/{{ item }}"
|
||||
owner: containers
|
||||
group: containers
|
||||
mode: 0600
|
||||
loop:
|
||||
- traefik.yml
|
||||
- conf/cockpit.yml
|
||||
|
||||
- name: Create podman networks
|
||||
containers.podman.podman_network:
|
||||
name: "{{ item }}"
|
||||
recreate: false
|
||||
state: "present"
|
||||
disable_dns: true
|
||||
become_user: containers
|
||||
become: true
|
||||
loop:
|
||||
- traefik
|
||||
- traefik-portainer
|
||||
- traefik-nextcloud
|
||||
|
||||
- name: Create traefik instance
|
||||
become_user: containers
|
||||
become: true
|
||||
containers.podman.podman_container:
|
||||
name: traefik
|
||||
image: docker.io/traefik:latest
|
||||
state: present
|
||||
ports:
|
||||
- 80:80
|
||||
- 443:443
|
||||
security_opt:
|
||||
- label=type:container_runtime_t
|
||||
volume:
|
||||
- /run/user/{{ uid_containers.stdout }}/podman/podman.sock:/var/run/docker.sock:z
|
||||
- /etc/traefik/:/etc/traefik:Z
|
||||
network:
|
||||
- traefik
|
||||
- traefik-portainer
|
||||
- traefik-nextcloud
|
||||
cap_add:
|
||||
- NET_ADMIN
|
||||
label:
|
||||
io.containers.autoupdate: "registry"
|
||||
traefik.enable: "true"
|
||||
traefik.http.middlewares.traefik-auth.basicauth.users: "{{ vault_traefik_basic_auth }}"
|
||||
traefik.http.routers.traefik.entrypoints: "https"
|
||||
traefik.http.routers.traefik.rule: "Path(`/traefik`)"
|
||||
traefik.http.routers.traefik.middlewares: "traefik-auth@docker"
|
||||
traefik.http.routers.traefik.tls: "true"
|
||||
traefik.http.routers.traefik.tls.certresolver: "wildcard"
|
||||
traefik.http.routers.traefik.tls.domains[0].main: "{{ inventory_hostname }}"
|
||||
traefik.http.routers.traefik.service: "api@internal"
|
||||
generate_systemd:
|
||||
path: /home/containers/.config/systemd/user/
|
||||
restart_policy: on-failure
|
||||
names: true
|
||||
new: true
|
||||
|
||||
- name: Start containers at boot
|
||||
become_user: containers
|
||||
become: true
|
||||
ansible.builtin.systemd:
|
||||
scope: user
|
||||
name: container-{{ item }}.service
|
||||
enabled: true
|
||||
state: started
|
||||
daemon_reload: true
|
||||
loop:
|
||||
- traefik
|
14
containers/traefik/templates/conf/cockpit.yml.j2
Normal file
14
containers/traefik/templates/conf/cockpit.yml.j2
Normal file
@ -0,0 +1,14 @@
|
||||
http:
|
||||
routers:
|
||||
cockpit:
|
||||
rule: "Path(`/cockpit`)"
|
||||
entryPoints: https
|
||||
service: cockpit
|
||||
tls:
|
||||
certresolver: wildcard
|
||||
|
||||
services:
|
||||
cockpit:
|
||||
loadBalancer:
|
||||
servers:
|
||||
- url: "http://131.175.120.208:9090"
|
40
containers/traefik/templates/traefik.yml.j2
Normal file
40
containers/traefik/templates/traefik.yml.j2
Normal file
@ -0,0 +1,40 @@
|
||||
log:
|
||||
level: "ERROR"
|
||||
|
||||
api:
|
||||
dashboard: true
|
||||
|
||||
accessLog:
|
||||
filters:
|
||||
statusCodes:
|
||||
- "400-418"
|
||||
- "500-508"
|
||||
|
||||
entryPoints:
|
||||
http:
|
||||
address: ":80"
|
||||
http:
|
||||
redirections:
|
||||
entryPoint:
|
||||
to: https
|
||||
scheme: https
|
||||
permanent: true
|
||||
https:
|
||||
address: ":443"
|
||||
|
||||
providers:
|
||||
docker:
|
||||
endpoint: "unix:///var/run/docker.sock"
|
||||
exposedByDefault: false
|
||||
file:
|
||||
directory: "/etc/traefik/conf"
|
||||
watch: true
|
||||
|
||||
certificatesResolvers:
|
||||
wildcard:
|
||||
acme:
|
||||
email: {{ vault_acme_admin_email }}
|
||||
storage: "/etc/traefik/acme_wildcard.json"
|
||||
keyType: "EC256"
|
||||
httpChallenge:
|
||||
entryPoint: http
|
Loading…
Reference in New Issue
Block a user