chore: add traefik deployment and config generation

This commit is contained in:
Bert-Jan Fikse 2025-08-20 15:14:42 +02:00
parent aca6e8dac2
commit 5c5a0e9d51
Signed by: bert-jan
GPG key ID: C1E0AB516AC16D1A
6 changed files with 155 additions and 1 deletions

View file

@ -8,7 +8,7 @@ docker_compose_dir: "{{ docker_compose_base_dir }}/{{ service_name }}"
docker_volume_dir: "{{ docker_volume_base_dir }}/{{ service_name }}"
# Provider configuration
use_static_services: false # Use all_services from dynamic.yml for outward-facing proxies
use_static_services: false # Use all_services from services.yml for outward-facing proxies
use_docker_provider: true # Use Docker provider for service discovery via labels
use_ssl: false # Enable SSL termination with Let's Encrypt
enable_dashboard: true # Enable Traefik dashboard

View file

@ -1,3 +1,8 @@
#SPDX-License-Identifier: MIT-0
---
# handlers file for reverseproxy
- name: restart traefik
docker_compose:
project_src: "{{ docker_compose_dir }}"
restarted: yes

View file

@ -1,3 +1,57 @@
#SPDX-License-Identifier: MIT-0
---
# tasks file for reverseproxy
- name: Gather service information from all hosts
setup:
delegate_to: "{{ item }}"
delegate_facts: true
loop: "{{ groups['all_servers'] }}"
- name: Build service registry from all hosts
set_fact:
all_services: "{{ all_services | default([]) + hostvars[item].services | default([]) | map('combine', {'backend_host': item}) | list }}"
loop: "{{ groups['all_servers'] }}"
- name: Debug service registry
debug:
var: all_services
- name: Create docker compose directory
file:
path: "{{ docker_compose_dir }}"
state: directory
mode: '0755'
- name: Create docker volume directories
file:
path: "{{ docker_volume_dir }}/traefik/{{ item }}"
state: directory
mode: '0755'
loop:
- letsencrypt
- name: Generate traefik static configuration
template:
src: traefik.yml.j2
dest: "{{ docker_compose_dir }}/traefik.yml"
mode: '0644'
notify: restart traefik
- name: Generate traefik services configuration for discovered services
template:
src: services.yml.j2
dest: "{{ docker_compose_dir }}/services.yml"
mode: '0644'
notify: restart traefik
- name: Create docker-compose file for traefik
template:
src: docker-compose.yml.j2
dest: "{{ docker_compose_dir }}/docker-compose.yml"
mode: '0644'
- name: Start traefik container
docker_compose:
project_src: "{{ docker_compose_dir }}"
state: present

View file

@ -0,0 +1,23 @@
version: '3.8'
services:
traefik:
image: traefik:v3.5
container_name: traefik
restart: always
ports:
- "80:80"
- "443:443"
{% if enable_dashboard %}
- "8080:8080" # Dashboard
{% endif %}
volumes:
- {{ docker_volume_dir }}/traefik/etc/traefik:/etc/traefik:ro
- {{ docker_volume_dir }}/traefik/letsencrypt:/letsencrypt
- /var/run/docker.sock:/var/run/docker.sock:ro
networks:
- traefik
networks:
traefik:
external: true

View file

@ -0,0 +1,30 @@
{% if use_static_services | default(false) %}
http:
routers:
{% for service in all_services %}
{{ service.name }}:
rule: "Host(`{{ service.domain }}`)"
service: {{ service.name }}-service
entryPoints:
{% if use_ssl | default(false) %}
- websecure
tls:
certResolver: letsencrypt
{% else %}
- web
{% endif %}
{% endfor %}
services:
{% for service in all_services %}
{{ service.name }}-service:
loadBalancer:
servers:
- url: "{{ service.upstream_protocol }}://{{ service.backend_host }}:{{ service.port }}"
{% if service.health_check is defined %}
healthCheck:
path: "{{ service.health_check }}"
interval: "30s"
{% endif %}
{% endfor %}
{% endif %}

View file

@ -0,0 +1,42 @@
{% if enable_dashboard %}
api:
dashboard: true
insecure: true
{% endif %}
entryPoints:
web:
address: ":80"
{% if use_ssl %}
http:
redirections:
entryPoint:
to: websecure
scheme: https
{% endif %}
websecure:
address: ":443"
providers:
{% if use_static_services | default(false) %}
file:
filename: /etc/traefik/services.yml
watch: true
{% endif %}
{% if use_docker_provider | default(true) %}
docker:
endpoint: "unix:///var/run/docker.sock"
exposedByDefault: false
{% endif %}
certificatesResolvers:
letsencrypt:
acme:
email: admin@digitalboard.ch
storage: /letsencrypt/acme.json
httpChallenge:
entryPoint: web
global:
checkNewVersion: false
sendAnonymousUsage: false