diff --git a/infrastructure/terraform/docker/container-catalog.tf b/infrastructure/terraform/docker/container-catalog.tf index 2cce866..47536a5 100644 --- a/infrastructure/terraform/docker/container-catalog.tf +++ b/infrastructure/terraform/docker/container-catalog.tf @@ -543,7 +543,7 @@ locals { } } "searxng-webapp" = { - terraform_resource = "docker_container.searxng_webapp" + terraform_resource = "docker_container.searxng-webapp" compose_project = "core" compose_service = "searxng-webapp" compose_file = "apps/searxng/docker-compose.yml" diff --git a/infrastructure/terraform/docker/searxng-webapp.tf b/infrastructure/terraform/docker/searxng-webapp.tf index 9f54577..d8128e8 100644 --- a/infrastructure/terraform/docker/searxng-webapp.tf +++ b/infrastructure/terraform/docker/searxng-webapp.tf @@ -1,4 +1,4 @@ -resource "docker_container" "searxng_webapp" { +resource "docker_container" "searxng-webapp" { name = local.docker_containers["searxng-webapp"].container_name image = local.docker_containers["searxng-webapp"].image diff --git a/infrastructure/terraform/docker/traefik.tf b/infrastructure/terraform/docker/traefik.tf index 5fbffe4..9f35024 100644 --- a/infrastructure/terraform/docker/traefik.tf +++ b/infrastructure/terraform/docker/traefik.tf @@ -2,7 +2,62 @@ resource "docker_container" "traefik" { name = local.docker_containers["traefik"].container_name image = local.docker_containers["traefik"].image - restart = local.docker_containers["traefik"].restart_policy + restart = local.docker_containers["traefik"].restart_policy + network_mode = "core_traefik" + + ports { + internal = 80 + external = 80 + protocol = "tcp" + } + + ports { + internal = 443 + external = 443 + protocol = "tcp" + } + + mounts { + type = "bind" + source = "/home/nixos/docker/core/traefik/data/letsencrypt" + target = "/letsencrypt" + read_only = false + } + + mounts { + type = "bind" + source = "/home/nixos/docker/core/traefik/data/logs" + target = "/logs" + read_only = false + } + + mounts { + type = "bind" + source = "/home/nixos/docker/core/traefik/certs" + target = "/etc/traefik/certs" + read_only = true + } + + mounts { + type = "bind" + source = "/home/nixos/docker/core/traefik/dynamic.yml" + target = "/etc/traefik/dynamic.yml" + read_only = true + } + + mounts { + type = "bind" + source = "/home/nixos/docker/core/traefik/traefik.yml" + target = "/etc/traefik/traefik.yml" + read_only = true + } + + mounts { + type = "bind" + source = "/home/nixos/docker/core/traefik/data/plugins" + target = "/plugins-storage" + read_only = false + } lifecycle { ignore_changes = [