feat(base): add socket-proxied Traefik, Portainer, and Watchtower infrastructure#593
Open
partyplatter08-lab wants to merge 3 commits into
Open
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
proxynetwork for downstream stacks and adds label-scoped Watchtower updates on the 03:00 schedule..env.examplecoverage forTRAEFIK_AUTH, ACME HTTP/DNS challenge selection, Docker API compatibility, and Watchtower notification settings.Notes
Traefik is pinned to
v3.6.1instead of the olderv3.1.6listed in the issue so Docker provider discovery works with current Docker Engine API minimums while still avoiding a floatinglatesttag.Validation
bash -npassed for the installer and stack scripts.git diff --checkpassed../install.shrun from no.envand noconfig/traefik/acme.jsoncompleted successfully, created prerequisites, validated dependencies, and launched the base stack.FAIL: 0.docker compose confighealthy.curl -I http://127.0.0.1redirected to HTTPS.401without BasicAuth and200with BasicAuth./api/statusreturned200through Traefik.traefik/whoami:v1.11.0container on the sharedproxynetwork was discovered and routed through Traefik.403for a write API request while allowing the read endpoints Traefik needs.logger://notification smoke ran with report mode, info level, and Docker API compatibility enabled.Closes #1