34 lines
1.1 KiB
YAML
Executable File
34 lines
1.1 KiB
YAML
Executable File
services:
|
|
gluetun:
|
|
image: qmcgaw/gluetun
|
|
container_name: gluetun
|
|
restart: always
|
|
cap_add:
|
|
- NET_ADMIN
|
|
environment:
|
|
- PUID=${PUID}
|
|
- PGIDq=${PGID}
|
|
- TZ=${TZ}
|
|
- VPNSP=custom
|
|
- VPN_TYPE=wireguard
|
|
# For Wireguard
|
|
- VPN_ENDPOINT_IP=${WIREGUARD_ENDPOINT}
|
|
- VPN_ENDPOINT_PORT=${WIREGUARD_PORT}
|
|
- WIREGUARD_PUBLIC_KEY=${WIREGUARD_PUBLIC_KEY}
|
|
- WIREGUARD_PRIVATE_KEY=${WIREGUARD_PRIVATE_KEY}
|
|
- WIREGUARD_ADDRESS=${WIREGUARD_ADDRESS}
|
|
#labels:
|
|
# Control Panel
|
|
# - "traefik.enable=true"
|
|
# - "traefik.http.routers.gluetun.rule=Host(`gluetun.${TRAEFIK_DOMAIN}`)"
|
|
# - "traefik.http.routers.gluetun.middlewares=common-auth@file"
|
|
# - "traefik.http.routers.gluetun.service=gluetun"
|
|
# - "traefik.http.services.gluetun.loadbalancer.server.port=8000"
|
|
# Traefik rules for VPN-enabled services (which have ot be accessed through gluetun) are defined in the samples/ directory
|
|
# and are applied automatically in the update-all.sh script.
|
|
|
|
volumes:
|
|
configgluetun:
|
|
driver: local-persist
|
|
driver_opts:
|
|
mountpoint: $HOST_CONFIG_PATH/gluetun |