mirror of
https://github.com/chatmail/relay.git
synced 2026-05-14 09:54:38 +00:00
Add traefik config files
https://github.com/chatmail/relay/pull/614#discussion_r2269887232
This commit is contained in:
@@ -88,105 +88,6 @@ Mandatory variables for deployment via Docker:
|
||||
docker compose build chatmail
|
||||
```
|
||||
|
||||
<details>
|
||||
<summary>Additional steps for configuring with traefik</summary>
|
||||
|
||||
> [!note]
|
||||
> If you are using the default installation without traefik – skip these steps and go to step 7 (running docker compose).
|
||||
|
||||
Before starting traefik, configuration files must be prepared; otherwise, it will not start correctly.
|
||||
|
||||
First, run these commands in the console, replacing their values with the correct ones:
|
||||
|
||||
```shell
|
||||
export YOUR_EMAIL=your_email@gmail.com
|
||||
mkdir -p "./data/traefik"
|
||||
cd "./data/traefik"
|
||||
```
|
||||
|
||||
1. Create a traefik configuration file:
|
||||
|
||||
```shell
|
||||
cat > config.yaml << EOF
|
||||
log:
|
||||
level: TRACE
|
||||
|
||||
entryPoints:
|
||||
web:
|
||||
address: ":80"
|
||||
http:
|
||||
redirections:
|
||||
entryPoint:
|
||||
to: websecure
|
||||
permanent: true
|
||||
websecure:
|
||||
address: ":443"
|
||||
|
||||
providers:
|
||||
docker:
|
||||
endpoint: "unix:///var/run/docker.sock"
|
||||
exposedByDefault: false
|
||||
file:
|
||||
directory: /dynamic/conf
|
||||
watch: true
|
||||
|
||||
serverstransport:
|
||||
insecureskipverify: true
|
||||
|
||||
certificatesResolvers:
|
||||
letsEncrypt:
|
||||
acme:
|
||||
email: $YOUR_EMAIL
|
||||
storage: /acme.json
|
||||
caServer: "https://acme-v02.api.letsencrypt.org/directory"
|
||||
tlschallenge: true
|
||||
httpChallenge:
|
||||
entryPoint: web
|
||||
EOF
|
||||
```
|
||||
|
||||
2. Create a post-hook script:
|
||||
|
||||
```shell
|
||||
cat > post-hook.sh << 'EOF'
|
||||
CERTS_DIR=${CERTS_DIR:-"/data/letsencrypt/certs"}
|
||||
|
||||
for dir in "$CERTS_DIR"/*/; do
|
||||
cd "$dir"
|
||||
if [ -f "certificate.crt" ]; then
|
||||
ln -sf certificate.crt fullchain
|
||||
fi
|
||||
if [ -f "privatekey.key" ]; then
|
||||
ln -sf privatekey.key privkey
|
||||
fi
|
||||
cd -
|
||||
done
|
||||
EOF
|
||||
```
|
||||
|
||||
3. Create the `acme.json` file:
|
||||
|
||||
```shell
|
||||
touch acme.json
|
||||
sudo chown 0:0 ./acme.json # required
|
||||
sudo chmod 600 ./acme.json # required
|
||||
```
|
||||
|
||||
4. Create insecure config:
|
||||
|
||||
```shell
|
||||
mkdir dynamic-configs
|
||||
cat > ./dynamic-configs/insecure.yaml << 'EOF'
|
||||
http:
|
||||
serversTransports:
|
||||
insecure:
|
||||
insecureSkipVerify: true
|
||||
EOF
|
||||
cd ../..
|
||||
```
|
||||
|
||||
</details>
|
||||
|
||||
7. Start docker compose and wait for the installation to finish:
|
||||
|
||||
```shell
|
||||
|
||||
@@ -78,101 +78,6 @@ sudo sysctl --system
|
||||
docker compose build chatmail
|
||||
```
|
||||
|
||||
<details>
|
||||
|
||||
<summary>Дополнительные шаги для конфигурации работы с traefik</summary>
|
||||
|
||||
> [!note]
|
||||
> Если вы используете default установку, без использования traefik - пропустите эти шаги и переходите к шагу 7 (запуск docker compose)
|
||||
|
||||
Перед запуском traefik необходимо подготовить файлы конфигурации, иначе он запустится некорректно.
|
||||
|
||||
Сначала выполните эти команды в консоли, заменив значения в них на корректные.
|
||||
```shell
|
||||
export YOUR_EMAIL=your_email@gmail.com
|
||||
mkdir -p "./data/traefik"
|
||||
cd "./data/traefik"
|
||||
```
|
||||
|
||||
1. Создать файл конфигурации traefik
|
||||
```shell
|
||||
cat > config.yaml << EOF
|
||||
log:
|
||||
level: TRACE
|
||||
|
||||
entryPoints:
|
||||
web:
|
||||
address: ":80"
|
||||
http:
|
||||
redirections:
|
||||
entryPoint:
|
||||
to: websecure
|
||||
permanent: true
|
||||
websecure:
|
||||
address: ":443"
|
||||
|
||||
providers:
|
||||
docker:
|
||||
endpoint: "unix:///var/run/docker.sock"
|
||||
exposedByDefault: false
|
||||
file:
|
||||
directory: /dynamic/conf
|
||||
watch: true
|
||||
|
||||
serverstransport:
|
||||
insecureskipverify: true
|
||||
|
||||
certificatesResolvers:
|
||||
letsEncrypt:
|
||||
acme:
|
||||
email: $YOUR_EMAIL
|
||||
storage: /acme.json
|
||||
caServer: "https://acme-v02.api.letsencrypt.org/directory"
|
||||
tlschallenge: true
|
||||
httpChallenge:
|
||||
entryPoint: web
|
||||
EOF
|
||||
```
|
||||
|
||||
2. Создать post-hook скрипт
|
||||
```shell
|
||||
cat > post-hook.sh << 'EOF'
|
||||
CERTS_DIR=${CERTS_DIR:-"/data/letsencrypt/certs"}
|
||||
|
||||
for dir in "$CERTS_DIR"/*/; do
|
||||
cd "$dir"
|
||||
if [ -f "certificate.crt" ]; then
|
||||
ln -sf certificate.crt fullchain
|
||||
fi
|
||||
if [ -f "privatekey.key" ]; then
|
||||
ln -sf privatekey.key privkey
|
||||
fi
|
||||
cd -
|
||||
done
|
||||
EOF
|
||||
```
|
||||
|
||||
3. Создать `acme.json` файл
|
||||
```shell
|
||||
touch acme.json
|
||||
sudo chown 0:0 ./acme.json # это обязательно
|
||||
sudo chmod 600 ./acme.json # это обязательно
|
||||
```
|
||||
|
||||
4. Создать insecure config
|
||||
```shell
|
||||
mkdir dynamic-configs
|
||||
cat > ./dynamic-configs/insecure.yaml << 'EOF'
|
||||
http:
|
||||
serversTransports:
|
||||
insecure:
|
||||
insecureSkipVerify: true
|
||||
EOF
|
||||
cd ../..
|
||||
```
|
||||
|
||||
</details>
|
||||
|
||||
7. Запустить docker compose и дождаться завершения установки
|
||||
```shell
|
||||
docker compose up -d # запуск сервиса
|
||||
|
||||
Reference in New Issue
Block a user