@@ -27,13 +27,6 @@ services:
27
27
# /var/firezone/private_key exists when Firezone starts, it is
28
28
# used as the WireGuard private. Otherwise, one is generated.
29
29
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/firezone:/var/firezone
30
- # labels:
31
- # - traefik.enable=true
32
- # - traefik.docker.network=dev
33
- # - traefik.http.routers.firezone_https.rule=Host(`firezone.example.com`)
34
- # - traefik.http.routers.firezone_https.tls=true
35
- # - traefik.http.services.firezone.loadbalancer.server.port=13000
36
- # #- traefik.http.routers.firezone.middlewares=local-ipwhitelist@file
37
30
cap_add :
38
31
# Needed for WireGuard and firewall support.
39
32
- NET_ADMIN
@@ -45,8 +38,15 @@ services:
45
38
- net.ipv6.conf.all.forwarding=1
46
39
depends_on :
47
40
- postgres
48
- networks :
49
- - dev
41
+ # networks:
42
+ # - proxy
43
+ # labels:
44
+ # - traefik.enable=true
45
+ # - traefik.docker.network=proxy
46
+ # - traefik.http.routers.firezone_https.rule=Host(`firezone.example.com`)
47
+ # - traefik.http.routers.firezone_https.tls=true
48
+ # - traefik.http.services.firezone.loadbalancer.server.port=13000
49
+ # #- traefik.http.routers.firezone.middlewares=local-ipwhitelist@file
50
50
51
51
deploy :
52
52
<< : *default-deploy
@@ -60,13 +60,13 @@ services:
60
60
POSTGRES_DB : ${DATABASE_NAME:-firezone}
61
61
POSTGRES_USER : ${DATABASE_USER:-postgres}
62
62
POSTGRES_PASSWORD : ${DATABASE_PASSWORD:?err}
63
- networks :
64
- - dev
65
63
deploy :
66
64
<< : *default-deploy
67
65
update_config :
68
66
order : stop-first
67
+ # networks:
68
+ # - proxy
69
69
70
- networks :
71
- dev :
72
- external : true
70
+ # networks:
71
+ # proxy :
72
+ # external: true
0 commit comments