-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathdocker-compose.yml
More file actions
135 lines (128 loc) · 4.75 KB
/
docker-compose.yml
File metadata and controls
135 lines (128 loc) · 4.75 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
# =============================================================================
# eigenstack — core + vaultwarden
# Usage:
# make up → start all services
# make down → stop all services
# make logs → follow logs
# make status → show running containers
# =============================================================================
networks:
eigen-web:
name: eigen-web
eigen-docker-proxy:
name: eigen-docker-proxy
internal: true # no internet access — security
volumes:
vaultwarden-data:
services:
# ---------------------------------------------------------------------------
# docker-socket-proxy
# Prevents direct /var/run/docker.sock exposure to Traefik
# Only exposes read-only container/network APIs
# ---------------------------------------------------------------------------
socket-proxy:
image: tecnativa/docker-socket-proxy:latest
container_name: eigenstack-socket-proxy
restart: unless-stopped
networks:
- eigen-docker-proxy
volumes:
- /var/run/docker.sock:/var/run/docker.sock:ro
environment:
CONTAINERS: 1
NETWORKS: 1
SERVICES: 1
TASKS: 1
# Everything else denied by default
POST: 0
security_opt:
- no-new-privileges:true
# ---------------------------------------------------------------------------
# Traefik v3
# Reverse proxy + automatic TLS (mkcert locally, Let's Encrypt on prod)
# ---------------------------------------------------------------------------
traefik:
image: traefik:v3.6.1
container_name: eigenstack-traefik
restart: unless-stopped
depends_on:
- socket-proxy
networks:
- eigen-web
- eigen-docker-proxy
ports:
- "80:80"
- "443:443"
volumes:
- ./traefik/traefik.yml:/traefik.yml:ro
- ./traefik/dynamic/:/dynamic/:ro
- ./traefik/certs:/certs:ro
- /var/run/docker.sock:/var/run/docker.sock:ro
environment:
- TZ=${TZ}
- DOCKER_API_VERSION=1.54
labels:
- "traefik.enable=true"
- "traefik.http.routers.dashboard.rule=Host(`${TRAEFIK_DASHBOARD_HOST}`)"
- "traefik.http.routers.dashboard.service=api@internal"
- "traefik.http.routers.dashboard.tls=true"
- "traefik.http.routers.dashboard.middlewares=dashboard-auth"
- "traefik.http.middlewares.dashboard-auth.basicauth.users=${TRAEFIK_DASHBOARD_AUTH}"
- "traefik.http.routers.dashboard.entrypoints=websecure"
security_opt:
- no-new-privileges:true
# ---------------------------------------------------------------------------
# Whoami — test service
# Verify Traefik routing works before adding real apps
# Remove after validation
# ---------------------------------------------------------------------------
# whoami service disabled for production mode
# whoami:
# image: traefik/whoami:latest
# container_name: eigenstack-whoami
# restart: unless-stopped
# networks:
# - eigen-web
# labels:
# - "traefik.enable=true"
# - "traefik.http.routers.whoami.rule=Host(`whoami.${BASE_DOMAIN}`)"
# - "traefik.http.routers.whoami.tls=true"
# - "traefik.http.routers.whoami.entrypoints=websecure"
# security_opt:
# - no-new-privileges:true
# ---------------------------------------------------------------------------
# Vaultwarden
# Self-hosted Bitwarden-compatible password manager
# Lightweight (~10MB), DSGVO-friendly
# ---------------------------------------------------------------------------
vaultwarden:
image: vaultwarden/server:latest
container_name: eigenstack-vaultwarden
restart: unless-stopped
networks:
- eigen-web
volumes:
- vaultwarden-data:/data
environment:
- TZ=${TZ}
- DOMAIN=https://${VAULTWARDEN_HOST}
- ADMIN_TOKEN=${VAULTWARDEN_ADMIN_TOKEN}
- SIGNUPS_ALLOWED=false # disable public registration
- WEBSOCKET_ENABLED=true
- LOG_LEVEL=warn
labels:
- "traefik.enable=true"
# Main UI
- "traefik.http.routers.vaultwarden.rule=Host(`${VAULTWARDEN_HOST}`)"
- "traefik.http.routers.vaultwarden.tls=true"
- "traefik.http.routers.vaultwarden.entrypoints=websecure"
- "traefik.http.routers.vaultwarden.service=vaultwarden"
- "traefik.http.services.vaultwarden.loadbalancer.server.port=80"
# WebSocket (needed for live sync)
- "traefik.http.routers.vaultwarden-ws.rule=Host(`${VAULTWARDEN_HOST}`) && Path(`/notifications/hub`)"
- "traefik.http.routers.vaultwarden-ws.tls=true"
- "traefik.http.routers.vaultwarden-ws.entrypoints=websecure"
- "traefik.http.routers.vaultwarden-ws.service=vaultwarden-ws"
- "traefik.http.services.vaultwarden-ws.loadbalancer.server.port=3012"
security_opt:
- no-new-privileges:true