|
3 months ago | |
---|---|---|
.drone | 3 months ago | |
git-hooks | 4 months ago | |
my-nginx | 3 months ago | |
my-nginx-drone | 3 months ago | |
ngrok-gitea | 3 months ago | |
registry | 4 months ago | |
.gitignore | 5 months ago | |
.versionrc | 5 months ago | |
CHANGELOG.md | 3 months ago | |
README.md | 3 months ago | |
docker-compose-80-drone.yml | 3 months ago | |
docker-compose-80-git.yml | 3 months ago | |
docker-compose-443-drone.yml | 3 months ago | |
docker-compose-443-git.yml | 3 months ago | |
docker-compose-letsencrypt-drone.yml | 3 months ago | |
docker-compose-letsencrypt-git.yml | 3 months ago | |
docker-compose-letsencrypt-huginn.yml | 3 months ago | |
docker-compose-ngrok.yml | 3 months ago | |
docker-compose.yml | 3 months ago | |
make-ca.sh | 6 months ago | |
make-cert.sh | 3 months ago | |
package.json | 3 months ago | |
renovate.json | 5 months ago | |
yarn.lock | 5 months ago |
Nginx reverse proxies to expose other services on the internet. These use the https://letsencrypt.org/ service to obtain and expose ssl certificates.
Ngrok service tunneling to https://ngrok.com/ this allows services to be given public URLs even though they have no fixed public IP (ie behind NAT router).
A docker registry for internal use.
This is the email address to use with letsencrypt.
The domain that drone will be served on. If using ngrok this will need to be configured in ngrok and your dns.
eg “drone.sigyl.com”
Leave blank if you have no drone.
The domain that huggin will be served on. If using ngrok this will need to be configured in ngrok and your dns.
eg “huginn.sigyl.com”
Leave blank if you have no huginn.
The domain which all other services will be exposed on (either at the root or in sub folders.
eg “sigyl.com”
This is the dns address of the local registry service.
eg “registry.local-domain:5003/”
note the trailing slash.
Password for the local docker registry.
Whatever you want.
If using ngrok this is the auth-token needed to access it.
git clone [repo] /stack/proxy
nb you only need ngrok if you are behind a nat router (ie on ‘home network’).
you need to manually set up the above secrets as environment variables capitalising them and replacing hyphens with underscores.
(you can leave out huginn domain, in fact you can leave out any of them). (set REGISTRY_PASSWORD and NEW_REGISTRY_PASSWORD the same).
Note the trailing slash on LOCAL_DOCKER_REGISTRY.
If using ngrok the domains should be setup there.
export CERTBOT_EMAIL='your.name@example.com'
export DRONE_DOMAIN='drone.example.com'
export HUGINN_DOMAIN='huginn.example.com'
export GIT_DOMAIN='example.com'
export LOCAL_DOCKER_REGISTRY='pc-name.local-domain:5003/'
export NGROK_AUTH_TOKEN='get this from ngrok'
export REGISTRY_PASSWORD='make something up'
export NEW_REGISTRY_PASSWORD='make something up'
It makes a self signed certificate authority which gets copied to /etc/docker/certs.d for the registry domain and a tls certificate for the registry.
$REGISTRY_DOMAIN is the domain of the local registry eg registry.local-domain
sh make-ca.sh $REGISTRY_DOMAIN:5003
sh make-cert.sh $REGISTRY_DOMAIN registry
if you are going to use a self signed certificate to serve over the web:
(where $DOMAIN is the domain to be served - eg sigyl.com)
sh make-cert.sh $DOMAIN web
These are the images that are used in the stack.
sh .drone/build.sh
This is the network that links all the stack together
docker network create --driver=overlay --attachable externalnet
you’ll be the manager
where IP is the IP address you want to use to communicate with other nodes (if there are any)
docker swarm init --advertise-addr $IP
(get your node id)
docker node ls
docker node update --label-add com.sigyl.git-stack=yes [node id]
sh .drone/deploy.sh
curl to the domains you are using.
curl http://$GIT_DOMAIN