2026-04-17 15:41:20 +02:00
|
|
|
services:
|
|
|
|
|
kochwas:
|
2026-04-17 15:54:34 +02:00
|
|
|
# Image wird via Gitea Actions gebaut und in die Gitea-Container-Registry gepusht.
|
|
|
|
|
# Tag-Override per Umgebungsvariable: KOCHWAS_TAG=sha-abcd1234 docker compose pull
|
|
|
|
|
image: gitea.siegeln.net/claude/kochwas:${KOCHWAS_TAG:-latest}
|
|
|
|
|
pull_policy: always
|
2026-04-17 15:41:20 +02:00
|
|
|
volumes:
|
|
|
|
|
- ./data:/data
|
|
|
|
|
environment:
|
|
|
|
|
- DATABASE_PATH=/data/kochwas.db
|
|
|
|
|
- IMAGE_DIR=/data/images
|
|
|
|
|
- SEARXNG_URL=http://searxng:8080
|
|
|
|
|
- NODE_ENV=production
|
|
|
|
|
depends_on:
|
|
|
|
|
- searxng
|
|
|
|
|
restart: unless-stopped
|
2026-04-17 16:05:06 +02:00
|
|
|
networks:
|
2026-04-17 16:06:38 +02:00
|
|
|
- traefik_proxy
|
2026-04-17 16:05:06 +02:00
|
|
|
- internal
|
|
|
|
|
labels:
|
|
|
|
|
- "traefik.enable=true"
|
|
|
|
|
# Router for HTTPS traffic
|
|
|
|
|
- "traefik.http.routers.kochwas.rule=Host(`kochwas.siegeln.net`)"
|
|
|
|
|
- "traefik.http.routers.kochwas.entrypoints=websecure"
|
|
|
|
|
- "traefik.http.routers.kochwas.tls.certresolver=cloudflareResolver"
|
2026-04-18 13:06:14 +02:00
|
|
|
- "traefik.http.routers.kochwas.tls.domains[0].main=siegeln.net"
|
|
|
|
|
- "traefik.http.routers.kochwas.tls.domains[0].sans=*.siegeln.net"
|
2026-04-17 16:05:06 +02:00
|
|
|
# Specify which port Traefik should forward traffic to inside the container
|
|
|
|
|
- "traefik.http.services.kochwas.loadbalancer.server.port=3000"
|
|
|
|
|
# Explicitly tell Traefik which network to use (since kochwas is on two networks)
|
2026-04-17 16:06:38 +02:00
|
|
|
- "traefik.docker.network=traefik_proxy"
|
2026-04-17 15:41:20 +02:00
|
|
|
|
|
|
|
|
searxng:
|
2026-04-17 16:05:06 +02:00
|
|
|
# Absichtlich nur intern erreichbar — keine Traefik-Labels, kein externer Port.
|
2026-04-17 15:41:20 +02:00
|
|
|
image: searxng/searxng:latest
|
2026-04-18 13:56:18 +02:00
|
|
|
# settings.yml wird read-only gemountet und beim Start in eine beschreib-
|
|
|
|
|
# bare /etc/searxng-Kopie expandiert (${…}-Platzhalter → ENV-Werte),
|
|
|
|
|
# damit der Brave-API-Key aus .env eingesetzt werden kann, ohne ihn im
|
|
|
|
|
# Repo zu pflegen. SearXNG selbst hat kein !env-Tag, daher machen wir
|
|
|
|
|
# es per Python im Entrypoint-Hook. Das SearXNG-Image hat Python bereits
|
|
|
|
|
# installiert; envsubst fehlt im Alpine-Base.
|
2026-04-17 15:41:20 +02:00
|
|
|
volumes:
|
2026-04-18 13:56:18 +02:00
|
|
|
- ./searxng:/config-src:ro
|
2026-04-17 15:41:20 +02:00
|
|
|
environment:
|
|
|
|
|
- BASE_URL=http://searxng:8080/
|
|
|
|
|
- INSTANCE_NAME=kochwas-search
|
2026-04-18 13:03:17 +02:00
|
|
|
# Brave Search API-Key aus .env (auf dem Pi gepflegt, nicht im Repo).
|
2026-04-18 13:56:18 +02:00
|
|
|
# Leer oder fehlend → brave-Engine antwortet mit 401, andere Engines
|
|
|
|
|
# laufen normal weiter.
|
2026-04-18 13:03:17 +02:00
|
|
|
- BRAVE_API_KEY=${BRAVE_API_KEY:-}
|
2026-04-18 13:56:18 +02:00
|
|
|
- SEARXNG_SECRET=${SEARXNG_SECRET:-dev-secret-change-in-prod}
|
|
|
|
|
entrypoint:
|
|
|
|
|
- /bin/sh
|
|
|
|
|
- -c
|
|
|
|
|
- |
|
|
|
|
|
set -e
|
|
|
|
|
mkdir -p /etc/searxng
|
|
|
|
|
python3 -c "import os,sys; sys.stdout.write(os.path.expandvars(open('/config-src/settings.yml').read()))" > /etc/searxng/settings.yml
|
|
|
|
|
exec /usr/local/searxng/dockerfiles/docker-entrypoint.sh "$@"
|
|
|
|
|
- --
|
2026-04-17 15:41:20 +02:00
|
|
|
restart: unless-stopped
|
2026-04-17 16:05:06 +02:00
|
|
|
networks:
|
|
|
|
|
- internal
|
|
|
|
|
|
|
|
|
|
networks:
|
2026-04-17 16:06:38 +02:00
|
|
|
traefik_proxy:
|
|
|
|
|
# Dasselbe externe Netz wie bei deinem Gitea-Compose.
|
2026-04-17 16:05:06 +02:00
|
|
|
external: true
|
|
|
|
|
internal:
|
2026-04-17 16:06:38 +02:00
|
|
|
# Eigenes internes Netz für kochwas ↔ searxng, von außen nicht erreichbar.
|
2026-04-17 16:05:06 +02:00
|
|
|
driver: bridge
|