seedbox/services/gluetun.yaml

34 lines
1.1 KiB
YAML
Executable File

services:
gluetun:
image: qmcgaw/gluetun
container_name: gluetun
restart: always
cap_add:
- NET_ADMIN
environment:
- PUID=${PUID}
- PGIDq=${PGID}
- TZ=${TZ}
- VPNSP=custom
- VPN_TYPE=wireguard
# For Wireguard
- VPN_ENDPOINT_IP=${WIREGUARD_ENDPOINT}
- VPN_ENDPOINT_PORT=${WIREGUARD_PORT}
- WIREGUARD_PUBLIC_KEY=${WIREGUARD_PUBLIC_KEY}
- WIREGUARD_PRIVATE_KEY=${WIREGUARD_PRIVATE_KEY}
- WIREGUARD_ADDRESS=${WIREGUARD_ADDRESS}
#labels:
# Control Panel
# - "traefik.enable=true"
# - "traefik.http.routers.gluetun.rule=Host(`gluetun.${TRAEFIK_DOMAIN}`)"
# - "traefik.http.routers.gluetun.middlewares=common-auth@file"
# - "traefik.http.routers.gluetun.service=gluetun"
# - "traefik.http.services.gluetun.loadbalancer.server.port=8000"
# Traefik rules for VPN-enabled services (which have ot be accessed through gluetun) are defined in the samples/ directory
# and are applied automatically in the update-all.sh script.
volumes:
configgluetun:
driver: local-persist
driver_opts:
mountpoint: $HOST_CONFIG_PATH/gluetun