This commit captures the infrastructure state immediately following the "Post-Tyranny Tech" workshop on January 23rd, 2026. Infrastructure Status: - 13 client servers deployed (white, valk, zwaan, specht, das, uil, vos, haas, wolf, ree, mees, mus, mol, kikker) - Services: Authentik SSO, Nextcloud, Collabora Office, Traefik - Private network architecture with edge NAT gateway - OIDC integration between Authentik and Nextcloud - Automated recovery flows and invitation system - Container update monitoring with Diun - Uptime monitoring with Uptime Kuma Changes include: - Multiple new client host configurations - Network architecture improvements (private IPs + NAT) - DNS management automation - Container update notifications - Email configuration via Mailgun - SSH key generation for all clients - Encrypted secrets for all deployments - Health check and diagnostic scripts Known Issues to Address: - Nextcloud version pinned to v30 (should use 'latest' or v32) - Zitadel references in templates (migrated to Authentik but templates not updated) - Traefik dynamic config has obsolete static routes 🤖 Generated with Claude Code (https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
181 lines
6 KiB
Django/Jinja
181 lines
6 KiB
Django/Jinja
services:
|
|
# PostgreSQL Database for Nextcloud
|
|
nextcloud-db:
|
|
image: postgres:16-alpine
|
|
container_name: nextcloud-db
|
|
restart: unless-stopped
|
|
volumes:
|
|
- nextcloud-db-data:/var/lib/postgresql/data
|
|
environment:
|
|
POSTGRES_DB: {{ nextcloud_db_name }}
|
|
POSTGRES_USER: {{ nextcloud_db_user }}
|
|
POSTGRES_PASSWORD: {{ client_secrets.nextcloud_db_password }}
|
|
POSTGRES_INITDB_ARGS: "--auth-host=scram-sha-256"
|
|
command: >
|
|
postgres
|
|
-c shared_buffers=256MB
|
|
-c max_connections=200
|
|
-c shared_preload_libraries=''
|
|
healthcheck:
|
|
test: ["CMD-SHELL", "pg_isready -U {{ nextcloud_db_user }} -d {{ nextcloud_db_name }}"]
|
|
interval: 10s
|
|
timeout: 5s
|
|
retries: 5
|
|
networks:
|
|
- nextcloud-internal
|
|
|
|
# Redis for caching and file locking
|
|
nextcloud-redis:
|
|
image: redis:7-alpine
|
|
container_name: nextcloud-redis
|
|
restart: unless-stopped
|
|
command: redis-server --save 60 1 --loglevel warning
|
|
volumes:
|
|
- nextcloud-redis-data:/data
|
|
networks:
|
|
- nextcloud-internal
|
|
|
|
# Nextcloud cron (separate container for background jobs)
|
|
nextcloud-cron:
|
|
image: nextcloud:{{ nextcloud_version }}
|
|
container_name: nextcloud-cron
|
|
restart: unless-stopped
|
|
depends_on:
|
|
- nextcloud-db
|
|
- nextcloud-redis
|
|
volumes:
|
|
- nextcloud-app:/var/www/html
|
|
- /mnt/nextcloud-data/data:/var/www/html/data # User data on Hetzner Volume
|
|
entrypoint: /cron.sh
|
|
networks:
|
|
- nextcloud-internal
|
|
|
|
# Nextcloud application
|
|
nextcloud:
|
|
image: nextcloud:{{ nextcloud_version }}
|
|
container_name: nextcloud
|
|
restart: unless-stopped
|
|
depends_on:
|
|
- nextcloud-db
|
|
- nextcloud-redis
|
|
volumes:
|
|
- nextcloud-app:/var/www/html
|
|
- /mnt/nextcloud-data/data:/var/www/html/data # User data on Hetzner Volume
|
|
environment:
|
|
# Database configuration
|
|
POSTGRES_HOST: {{ nextcloud_db_host }}
|
|
POSTGRES_DB: {{ nextcloud_db_name }}
|
|
POSTGRES_USER: {{ nextcloud_db_user }}
|
|
POSTGRES_PASSWORD: {{ client_secrets.nextcloud_db_password }}
|
|
|
|
# Redis configuration
|
|
REDIS_HOST: {{ nextcloud_redis_host }}
|
|
REDIS_HOST_PORT: {{ nextcloud_redis_port }}
|
|
|
|
# Nextcloud configuration
|
|
NEXTCLOUD_ADMIN_USER: {{ nextcloud_admin_user }}
|
|
NEXTCLOUD_ADMIN_PASSWORD: {{ client_secrets.nextcloud_admin_password }}
|
|
NEXTCLOUD_TRUSTED_DOMAINS: {{ nextcloud_domain }}
|
|
OVERWRITEPROTOCOL: https
|
|
OVERWRITEHOST: {{ nextcloud_domain }}
|
|
OVERWRITECLIURL: https://{{ nextcloud_domain }}
|
|
|
|
# PHP configuration
|
|
PHP_MEMORY_LIMIT: {{ nextcloud_php_memory_limit }}
|
|
PHP_UPLOAD_LIMIT: {{ nextcloud_php_upload_limit }}
|
|
|
|
# SMTP configuration (optional, can be configured via OIDC later)
|
|
# SMTP_HOST:
|
|
# SMTP_SECURE:
|
|
# SMTP_PORT:
|
|
# SMTP_NAME:
|
|
# SMTP_PASSWORD:
|
|
# MAIL_FROM_ADDRESS:
|
|
# MAIL_DOMAIN:
|
|
networks:
|
|
- traefik
|
|
- nextcloud-internal
|
|
labels:
|
|
- "traefik.enable=true"
|
|
- "traefik.docker.network=traefik"
|
|
|
|
# HTTP Router
|
|
- "traefik.http.routers.nextcloud.rule=Host(`{{ nextcloud_domain }}`)"
|
|
- "traefik.http.routers.nextcloud.entrypoints=websecure"
|
|
- "traefik.http.routers.nextcloud.tls=true"
|
|
- "traefik.http.routers.nextcloud.tls.certresolver=letsencrypt"
|
|
|
|
# Middleware for Nextcloud
|
|
- "traefik.http.routers.nextcloud.middlewares=nextcloud-headers,nextcloud-redirectregex"
|
|
|
|
# Security headers
|
|
- "traefik.http.middlewares.nextcloud-headers.headers.stsSeconds=31536000"
|
|
- "traefik.http.middlewares.nextcloud-headers.headers.stsIncludeSubdomains=true"
|
|
- "traefik.http.middlewares.nextcloud-headers.headers.stsPreload=true"
|
|
|
|
# CalDAV/CardDAV redirect
|
|
- "traefik.http.middlewares.nextcloud-redirectregex.redirectregex.permanent=true"
|
|
- "traefik.http.middlewares.nextcloud-redirectregex.redirectregex.regex=https://(.*)/.well-known/(card|cal)dav"
|
|
- "traefik.http.middlewares.nextcloud-redirectregex.redirectregex.replacement=https://$$1/remote.php/dav/"
|
|
|
|
# Service
|
|
- "traefik.http.services.nextcloud.loadbalancer.server.port=80"
|
|
|
|
# Collabora Office (online document editing)
|
|
collabora:
|
|
image: collabora/code:latest
|
|
container_name: collabora
|
|
restart: unless-stopped
|
|
# Required capabilities for optimal performance (bind-mount instead of copy)
|
|
cap_add:
|
|
- MKNOD
|
|
- SYS_CHROOT
|
|
environment:
|
|
- domain={{ nextcloud_domain | regex_replace('\.', '\\.') }}
|
|
- username={{ collabora_admin_user }}
|
|
- password={{ client_secrets.collabora_admin_password }}
|
|
# Performance tuning based on available CPU cores
|
|
# num_prespawn_children: Number of child processes to keep started (default: 1)
|
|
# per_document.max_concurrency: Max threads per document (should be <= CPU cores)
|
|
- extra_params=--o:ssl.enable=false --o:ssl.termination=true --o:num_prespawn_children=1 --o:per_document.max_concurrency=2
|
|
- MEMPROPORTION=60.0
|
|
- MAX_DOCUMENTS=10
|
|
- MAX_CONNECTIONS=20
|
|
deploy:
|
|
resources:
|
|
limits:
|
|
memory: 1g
|
|
cpus: '2'
|
|
reservations:
|
|
memory: 512m
|
|
networks:
|
|
- traefik
|
|
- nextcloud-internal
|
|
labels:
|
|
- "traefik.enable=true"
|
|
- "traefik.docker.network=traefik"
|
|
|
|
# HTTP Router
|
|
- "traefik.http.routers.collabora.rule=Host(`{{ collabora_domain }}`)"
|
|
- "traefik.http.routers.collabora.entrypoints=websecure"
|
|
- "traefik.http.routers.collabora.tls=true"
|
|
- "traefik.http.routers.collabora.tls.certresolver=letsencrypt"
|
|
|
|
# Service
|
|
- "traefik.http.services.collabora.loadbalancer.server.port=9980"
|
|
|
|
networks:
|
|
traefik:
|
|
external: true
|
|
nextcloud-internal:
|
|
name: nextcloud-internal
|
|
driver: bridge
|
|
|
|
volumes:
|
|
nextcloud-db-data:
|
|
name: nextcloud-db-data
|
|
nextcloud-redis-data:
|
|
name: nextcloud-redis-data
|
|
nextcloud-app:
|
|
name: nextcloud-app
|
|
# Note: nextcloud-data volume removed - user data now stored on Hetzner Volume at /mnt/nextcloud-data
|