diff --git a/compose.coolify.yml b/compose.coolify.yml index 1e395a1..dcee7ad 100644 --- a/compose.coolify.yml +++ b/compose.coolify.yml @@ -8,18 +8,14 @@ services: PORT: 3000 HOST: 0.0.0.0 LOG_LEVEL: info - # Database connection (use Coolify-managed PostgreSQL) POSTGRES_HOST: ${POSTGRES_HOST:-postgres} POSTGRES_PORT: ${POSTGRES_PORT:-5432} POSTGRES_USER: ${POSTGRES_USER:-agenthub} POSTGRES_PASSWORD: ${POSTGRES_PASSWORD} POSTGRES_DB: ${POSTGRES_DB:-agenthub} - # Redis connection (use Coolify-managed Redis) REDIS_HOST: ${REDIS_HOST:-redis} REDIS_PORT: ${REDIS_PORT:-6379} - # JWT secret for authentication JWT_SECRET: ${JWT_SECRET} - # CORS allowed origins ALLOWED_ORIGINS: ${ALLOWED_ORIGINS:-https://agenthub.barodine.net} networks: - default @@ -31,17 +27,17 @@ services: condition: service_started restart: unless-stopped labels: - # Coolify labels for reverse proxy - 'coolify.managed=true' - 'coolify.name=agenthub' - 'coolify.type=application' - # Enable HTTPS and WebSocket support - 'traefik.enable=true' + # Tell Traefik which Docker network to use for routing + - 'traefik.docker.network=coolify' + # HTTPS router for agenthub.barodine.net - 'traefik.http.routers.agenthub.rule=Host(`agenthub.barodine.net`)' - 'traefik.http.routers.agenthub.entrypoints=websecure' - 'traefik.http.routers.agenthub.tls=true' - 'traefik.http.routers.agenthub.tls.certresolver=letsencrypt' - # WebSocket support - 'traefik.http.services.agenthub.loadbalancer.server.port=3000' - 'traefik.http.middlewares.agenthub-headers.headers.customrequestheaders.X-Forwarded-Proto=https' - 'traefik.http.routers.agenthub.middlewares=agenthub-headers' @@ -95,7 +91,6 @@ services: - 'coolify.managed=true' - 'coolify.type=database' - # Database backup service (optional, can be enabled in production) backup: build: context: . @@ -108,12 +103,10 @@ services: PGPASSWORD: ${POSTGRES_PASSWORD} BACKUP_DIR: /backups RETENTION_DAYS: ${BACKUP_RETENTION_DAYS:-14} - # Optional S3 upload S3_ENDPOINT: ${S3_ENDPOINT:-} S3_BUCKET: ${S3_BUCKET:-} AWS_ACCESS_KEY_ID: ${AWS_ACCESS_KEY_ID:-} AWS_SECRET_ACCESS_KEY: ${AWS_SECRET_ACCESS_KEY:-} - # Optional GPG encryption GPG_RECIPIENT_KEY: ${GPG_RECIPIENT_KEY:-} volumes: - backup_data:/backups @@ -126,7 +119,6 @@ services: labels: - 'coolify.managed=true' - 'coolify.type=service' - # Ofelia cron labels for scheduled backups - 'ofelia.enabled=true' - 'ofelia.job-exec.backup-daily.schedule=0 0 3 * * *' - 'ofelia.job-exec.backup-daily.command=/usr/local/bin/backup.sh'