Renovate Bot
cd603b54f3
This PR contains the following updates: | Package | Update | Change | |---|---|---| | redis | digest | `247eb51` -> `5799ed6` | --- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Enabled. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box --- This PR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate). <!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzNy4xNjcuMCIsInVwZGF0ZWRJblZlciI6IjM3LjE2Ny4wIiwidGFyZ2V0QnJhbmNoIjoibWFzdGVyIn0=--> Reviewed-on: #729 Co-authored-by: Renovate Bot <renovate@mgrote.net> Co-committed-by: Renovate Bot <renovate@mgrote.net>
122 lines
5 KiB
Django/Jinja
122 lines
5 KiB
Django/Jinja
version: '3.3'
|
|
services:
|
|
oci-registry:
|
|
restart: always
|
|
container_name: oci-registry
|
|
image: "registry:2.8.3@sha256:f4e1b878d4bc40a1f65532d68c94dcfbab56aa8cba1f00e355a206e7f6cc9111"
|
|
volumes:
|
|
- oci:/var/lib/registry
|
|
- ./htpasswd:/auth/htpasswd
|
|
networks:
|
|
- traefik
|
|
- intern
|
|
depends_on:
|
|
- oci-registry-ui
|
|
- oci-registry-redis
|
|
healthcheck:
|
|
test: ["CMD", "wget", "--quiet", "--tries=1", "--spider", "http://localhost:5000/v2/"]
|
|
interval: 30s
|
|
timeout: 10s
|
|
retries: 3
|
|
environment:
|
|
TZ: Europe/Berlin
|
|
REGISTRY_AUTH: none
|
|
REGISTRY_REDIS_ADDR: oci-registry-redis:6379
|
|
REGISTRY_REDIS_PASSWORD: "{{ lookup('keepass', 'oci-registry-redis-pw', 'password') }}"
|
|
REGISTRY_STORAGE_DELETE_ENABLED: true
|
|
REGISTRY_CATALOG_MAXENTRIES: 100000 # https://github.com/Joxit/docker-registry-ui/issues/306
|
|
# https://joxit.dev/docker-registry-ui/#using-cors
|
|
REGISTRY_HTTP_HEADERS_Access-Control-Allow-Origin: '[https://registry.mgrote.net/ui/]'
|
|
REGISTRY_HTTP_HEADERS_Access-Control-Allow-Methods: '[HEAD,GET,OPTIONS,DELETE]'
|
|
REGISTRY_HTTP_HEADERS_Access-Control-Allow-Credentials: '[true]'
|
|
REGISTRY_HTTP_HEADERS_Access-Control-Allow-Headers: '[Authorization,Accept,Cache-Control]'
|
|
REGISTRY_HTTP_HEADERS_Access-Control-Expose-Headers: '[Docker-Content-Digest]'
|
|
labels:
|
|
traefik.http.routers.registry.rule: Host(`registry.mgrote.net`)
|
|
traefik.enable: true
|
|
traefik.http.routers.registry.tls: true
|
|
traefik.http.routers.registry.tls.certresolver: resolver_letsencrypt
|
|
traefik.http.routers.registry.entrypoints: entry_https
|
|
traefik.http.services.registry.loadbalancer.server.port: 5000
|
|
|
|
traefik.http.routers.registry.middlewares: registry-ipallowlist
|
|
|
|
traefik.http.middlewares.registry-ipallowlist.ipallowlist.sourcerange: 192.168.2.0/24,10.25.25.0/24,192.168.48.0/24,172.18.0.0/16 # .48. ist Docker
|
|
traefik.http.middlewares.registry-ipallowlist.ipallowlist.ipstrategy.depth: 0 # https://doc.traefik.io/traefik/middlewares/http/ipallowlist/#ipstrategydepth
|
|
|
|
com.centurylinklabs.watchtower.depends-on: oci-registry-redis
|
|
com.centurylinklabs.watchtower.enable: true
|
|
|
|
# registry aufräumen: docker exec -it oci-registry /bin/registry garbage-collect --delete-untagged=true /etc/docker/registry/config.yml
|
|
|
|
# testen mit:
|
|
# docker pull ubuntu
|
|
# docker image tag ubuntu registry.mgrote.net/myfirstimage
|
|
# docker push registry.mgrote.net/myfirstimage
|
|
# docker pull registry.mgrote.net/myfirstimage
|
|
|
|
oci-registry-redis:
|
|
image: "redis:7.2.4@sha256:5799ed6f60e1a501204a51e3b1b95b1648fe570562b883b69234f11e9816994b"
|
|
container_name: oci-registry-redis
|
|
networks:
|
|
- intern
|
|
restart: always
|
|
environment:
|
|
REDIS_PASSWORD: "{{ lookup('keepass', 'oci-registry-redis-pw', 'password') }}"
|
|
MAXMEMORY POLICY: allkeys-lru
|
|
labels:
|
|
com.centurylinklabs.watchtower.enable: true
|
|
healthcheck:
|
|
test: ["CMD", "redis-cli", "ping"]
|
|
interval: 30s
|
|
timeout: 10s
|
|
retries: 3
|
|
|
|
oci-registry-ui:
|
|
restart: always
|
|
# url: registry.mgrote.net/ui/index.html
|
|
image: "joxit/docker-registry-ui:2.5.6@sha256:ccb4b40737938050b2617b8c61d4287b1078c424ddafe0fcb81b5ce82a3a7198"
|
|
container_name: oci-registry-ui
|
|
environment:
|
|
DELETE_IMAGES: true
|
|
SINGLE_REGISTRY: true
|
|
NGINX_PROXY_PASS_URL: http://oci-registry:5000
|
|
SHOW_CONTENT_DIGEST: true # https://github.com/Joxit/docker-registry-ui/issues/297
|
|
SHOW_CATALOG_NB_TAGS: true
|
|
PULL_URL: registry.mgrote.net
|
|
networks:
|
|
- traefik
|
|
- intern
|
|
healthcheck:
|
|
test: ["CMD", "wget", "--quiet", "--tries=1", "--spider", "http://localhost"]
|
|
interval: 30s
|
|
timeout: 10s
|
|
retries: 3
|
|
labels:
|
|
traefik.http.routers.registry-ui.rule: Host(`registry.mgrote.net`)&&PathPrefix(`/ui`) # mache unter /ui erreichbar, damit wird demPfad dieser Prefix hinzugefügt, die Anwendung "hört" dort abrer nicht
|
|
traefik.http.routers.registry-ui.middlewares: registry-ui-strip-prefix,registry-ui-ipallowlist # also entferne den Prefix danach wieder
|
|
traefik.http.middlewares.registry-ui-strip-prefix.stripprefix.prefixes: /ui # hier ist die Middleware definiert
|
|
traefik.enable: true
|
|
traefik.http.routers.registry-ui.tls: true
|
|
traefik.http.routers.registry-ui.tls.certresolver: resolver_letsencrypt
|
|
traefik.http.routers.registry-ui.entrypoints: entry_https
|
|
traefik.http.services.registry-ui.loadbalancer.server.port: 80
|
|
|
|
traefik.http.middlewares.registry-ui-ipallowlist.ipallowlist.sourcerange: 192.168.2.0/24,10.25.25.0/24 # .48. ist Docker
|
|
traefik.http.middlewares.registry-ui-ipallowlist.ipallowlist.ipstrategy.depth: 0 # https://doc.traefik.io/traefik/middlewares/http/ipallowlist/#ipstrategydepth
|
|
|
|
|
|
com.centurylinklabs.watchtower.depends-on: oci-registry-redis,oci-registry
|
|
com.centurylinklabs.watchtower.enable: true
|
|
|
|
|
|
######## Networks ########
|
|
networks:
|
|
traefik:
|
|
external: true
|
|
intern:
|
|
|
|
|
|
######## Volumes ########
|
|
volumes:
|
|
oci:
|