# Continuwuity - Behind Traefik Reverse Proxy services: homeserver: image: "forgejo.ellis.link/continuwuation/continuwuity:latest" restart: unless-stopped command: /sbin/conduwuit volumes: - db:/var/lib/continuwuity - ./continuwuity-resolv.conf:/etc/resolv.conf # use custom resolvers rather than Docker's #- ./continuwuity.toml:/etc/continuwuity.toml networks: - proxy labels: - "traefik.enable=true" - "traefik.http.routers.continuwuity.rule=(Host(`example.com`))" - "traefik.http.routers.continuwuity.entrypoints=websecure" # your HTTPS entry point - "traefik.http.routers.continuwuity.tls=true" - "traefik.http.routers.continuwuity.service=continuwuity" - "traefik.http.services.continuwuity.loadbalancer.server.port=8008" # possibly, depending on your config: # - "traefik.http.routers.continuwuity.tls.certresolver=letsencrypt" environment: CONTINUWUITY_SERVER_NAME: example.com CONTINUWUITY_DATABASE_PATH: /var/lib/continuwuity CONTINUWUITY_ADDRESS: 0.0.0.0 CONTINUWUITY_PORT: 8008 # This must match with traefik's loadbalancer label #CONTINUWUITY_CONFIG: '/etc/continuwuity.toml' # Uncomment if you mapped config toml above # Serve .well-known files to tell others to reach Continuwuity on port :443 CONTINUWUITY_WELL_KNOWN: | { client=https://example.com, server=example.com:443 } volumes: db: networks: # This must match the network name that Traefik listens on proxy: external: true