forked from sheikyerbouti100/kosuke-core
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathdocker-compose.yml
More file actions
114 lines (107 loc) · 3.27 KB
/
docker-compose.yml
File metadata and controls
114 lines (107 loc) · 3.27 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
services:
traefik:
image: traefik:v3.0
container_name: kosuke_traefik
restart: unless-stopped
ports:
- '80:80'
- '443:443'
- '8080:8080'
volumes:
- /var/run/docker.sock:/var/run/docker.sock:ro
- ./traefik/traefik.yml:/etc/traefik/traefik.yml:ro
- ./traefik/dynamic.yml:/etc/traefik/dynamic.yml:ro
- traefik_certs:/certs
networks:
- kosuke_network
labels:
- 'traefik.enable=true'
- 'traefik.http.routers.traefik.rule=Host(`traefik.${MAIN_DOMAIN}`)'
- 'traefik.http.routers.traefik.tls.certresolver=letsencrypt'
- 'traefik.http.services.traefik.loadbalancer.server.port=8080'
environment:
- CLOUDFLARE_EMAIL=${CLOUDFLARE_EMAIL}
- CLOUDFLARE_API_KEY=${CLOUDFLARE_API_KEY}
- MAIN_DOMAIN=${MAIN_DOMAIN}
- SANDBOX_BASE_DOMAIN=${SANDBOX_BASE_DOMAIN}
postgres:
image: postgres:16.4-alpine
container_name: kosuke_postgres
env_file:
- .env
ports:
- '5432:5432'
volumes:
- postgres_data:/var/lib/postgresql/data
networks:
- kosuke_network
redis:
image: redis:7-alpine
container_name: kosuke_redis
restart: unless-stopped
ports:
- '6379:6379'
volumes:
- redis_data:/data
networks:
- kosuke_network
command: redis-server --appendonly yes --requirepass ${REDIS_PASSWORD}
nextjs:
image: ghcr.io/kosuke-org/kosuke-core:${IMAGE_TAG:-latest}
container_name: kosuke_nextjs
env_file:
- .env
volumes:
- /var/run/docker.sock:/var/run/docker.sock
networks:
- kosuke_network
labels:
- 'traefik.enable=true'
- 'traefik.http.routers.main.rule=Host(`app.${MAIN_DOMAIN}`) || Host(`www.app.${MAIN_DOMAIN}`)'
- 'traefik.http.routers.main.tls.certresolver=letsencrypt'
- 'traefik.http.services.main.loadbalancer.server.port=3000'
# Request wildcard certificate for preview domain
- 'traefik.http.routers.wildcard-cert.rule=Host(`${SANDBOX_BASE_DOMAIN}`)'
- 'traefik.http.routers.wildcard-cert.tls.certresolver=letsencrypt'
- 'traefik.http.routers.wildcard-cert.tls.domains[0].main=${SANDBOX_BASE_DOMAIN}'
- 'traefik.http.routers.wildcard-cert.tls.domains[0].sans=*.${SANDBOX_BASE_DOMAIN}'
depends_on:
- postgres
worker:
image: ghcr.io/kosuke-org/kosuke-core:${IMAGE_TAG:-latest}
container_name: kosuke_worker
env_file:
- .env
command: npx tsx src/worker.ts
volumes:
- /var/run/docker.sock:/var/run/docker.sock
networks:
- kosuke_network
depends_on:
- redis
- postgres
restart: unless-stopped
portainer:
image: portainer/portainer-ce:latest
container_name: kosuke_portainer
restart: unless-stopped
volumes:
- /var/run/docker.sock:/var/run/docker.sock
- portainer_data:/data
networks:
- kosuke_network
labels:
- 'traefik.enable=true'
- 'traefik.http.routers.portainer.rule=Host(`portainer.${MAIN_DOMAIN}`)'
- 'traefik.http.routers.portainer.tls.certresolver=letsencrypt'
- 'traefik.http.services.portainer.loadbalancer.server.port=9000'
volumes:
postgres_data:
traefik_certs:
portainer_data:
redis_data:
networks:
kosuke_network:
name: kosuke_network
driver: bridge
attachable: true