This commit is contained in:
2026-03-01 12:22:51 +02:00
parent 28efc0b157
commit 65429cc431
5 changed files with 600 additions and 0 deletions

View File

@@ -0,0 +1,66 @@
version: "3.7"
########################### NETWORKS
# There is no need to create any networks outside this docker-compose file.
# You may customize the network subnets (192.168.90.0/24 and 91.0/24) below as you please.
# Docker Compose version 3.5 or higher required to define networks this way.
networks:
gl_proxy:
name: gl_proxy
driver: bridge
ipam:
config:
- subnet: $GL_PROXY_SUBNET
- gateway: $GL_PROXY_GATEWAY
default:
driver: bridge
gl_socket_proxy:
name: gl_socket_proxy
driver: bridge
ipam:
config:
- subnet: $GL_SOCKET_PROXY_SUBNET
- gateway: $GL_SOCKET_PROXY_GATEWAY
########################### SECRETS
#secrets:
# htpasswd:
# file: $SECRETSDIR/htpasswd
# authelia_jwt_secret:
# file: $SECRETSDIR/authelia_jwt_secret
# authelia_session_secret:
# file: $SECRETSDIR/authelia_session_secret
# authelia_storage_mysql_password:
# file: $DOCKERDIR/secrets/authelia_storage_mysql_password
# authelia_notifier_smtp_password:
# file: $DOCKERDIR/secrets/authelia_notifier_smtp_password
# authelia_duo_api_secret_key:
# file: $DOCKERDIR/secrets/authelia_duo_api_secret_key
########################### SERVICES
services:
$APP:
container_name: $CONTAINER_NAME
image: $IMAGE
restart: unless-stopped
networks:
gl_proxy:
ipv4_address: $APP_IP
security_opt:
- no-new-privileges:true
# ports:
# - "$HEIMDALL_PORT:80"
volumes:
- $DOCKERDIR/appdata/$APP:/config
environment:
- PUID=$PUID
- PGID=$PGID
- TZ=$TZ
labels:
- "traefik.enable=true"
## HTTP Routers
- "traefik.http.routers.$APP-rtr.entrypoints=https"
- "traefik.http.routers.$APP-rtr.rule=HostHeader(`$NAME.$DOMAINNAME0`)"
## Middlewares
- "traefik.http.routers.$APP-rtr.middlewares=chain-authelia@file"
## HTTP Services
- "traefik.http.routers.$APP-rtr.service=$APP-svc"
- "traefik.http.services.$APP-svc.loadbalancer.server.port=$PORT"

View File

@@ -0,0 +1,67 @@
version: "3.7"
########################### NETWORKS
# There is no need to create any networks outside this docker-compose file.
# You may customize the network subnets (192.168.90.0/24 and 91.0/24) below as you please.
# Docker Compose version 3.5 or higher required to define networks this way.
networks:
gl_proxy:
name: gl_proxy
driver: bridge
ipam:
config:
- subnet: $GL_PROXY_SUBNET
- gateway: $GL_PROXY_GATEWAY
default:
driver: bridge
gl_socket_proxy:
name: gl_socket_proxy
driver: bridge
ipam:
config:
- subnet: $GL_SOCKET_PROXY_SUBNET
- gateway: $GL_SOCKET_PROXY_GATEWAY
########################### SECRETS
#secrets:
# htpasswd:
# file: $SECRETSDIR/htpasswd
# authelia_jwt_secret:
# file: $SECRETSDIR/authelia_jwt_secret
# authelia_session_secret:
# file: $SECRETSDIR/authelia_session_secret
# authelia_storage_mysql_password:
# file: $DOCKERDIR/secrets/authelia_storage_mysql_password
# authelia_notifier_smtp_password:
# file: $DOCKERDIR/secrets/authelia_notifier_smtp_password
# authelia_duo_api_secret_key:
# file: $DOCKERDIR/secrets/authelia_duo_api_secret_key
########################### SERVICES
services:
adminer:
container_name: gl-adminer
image: adminer
restart: unless-stopped
networks:
gl_proxy:
ipv4_address: $ADMINER_IP
security_opt:
- no-new-privileges:true
# ports:
# - "$HEIMDALL_PORT:80"
#volumes:
# - $DOCKERDIR/appdata/$APP:/config
environment:
#- PUID=$PUID
#- PGID=$PGID
#- TZ=$TZ
- ADMINER_DEFAULT_SERVER=$DB_HOST
labels:
- "traefik.enable=true"
## HTTP Routers
- "traefik.http.routers.adminer-rtr.entrypoints=https"
- "traefik.http.routers.adminer-rtr.rule=HostHeader(`adminer.$DOMAINNAME0`)"
## Middlewares
- "traefik.http.routers.adminer-rtr.middlewares=chain-authelia@file"
## HTTP Services
- "traefik.http.routers.adminer-rtr.service=adminer-svc"
- "traefik.http.services.adminer-svc.loadbalancer.server.port=8080"

View File

@@ -0,0 +1,76 @@
version: "3.7"
########################### NETWORKS
# There is no need to create any networks outside this docker-compose file.
# You may customize the network subnets (192.168.90.0/24 and 91.0/24) below as you please.
# Docker Compose version 3.5 or higher required to define networks this way.
networks:
gl_proxy:
name: gl_proxy
driver: bridge
ipam:
config:
- subnet: $GL_PROXY_SUBNET
- gateway: $GL_PROXY_GATEWAY
default:
driver: bridge
gl_socket_proxy:
name: gl_socket_proxy
driver: bridge
ipam:
config:
- subnet: $GL_SOCKET_PROXY_SUBNET
- gateway: $GL_SOCKET_PROXY_GATEWAY
########################### SECRETS
secrets:
authelia_jwt_secret:
file: $SECRETSDIR/authelia_jwt_secret
authelia_session_secret:
file: $SECRETSDIR/authelia_session_secret
# authelia_storage_mysql_password:
# file: $DOCKERDIR/secrets/authelia_storage_mysql_password
# authelia_notifier_smtp_password:
# file: $DOCKERDIR/secrets/authelia_notifier_smtp_password
# authelia_duo_api_secret_key:
# file: $DOCKERDIR/secrets/authelia_duo_api_secret_key
########################### SERVICES
services:
# Authelia (Lite) - Self-Hosted Single Sign-On and Two-Factor Authentication
authelia:
container_name: gl-authelia
# Check this before upgrading: https://github.com/authelia/authelia/blob/master/BREAKING.md
image: authelia/authelia:latest
restart: always
networks:
gl_proxy:
ipv4_address: $AUTHELIA_IP # You can specify a static IP
default:
# ports:
# - "9091:9091"
volumes:
- $DOCKERDIR/appdata/authelia:/config
environment:
- TZ=$TZ
- AUTHELIA_JWT_SECRET_FILE=/run/secrets/authelia_jwt_secret
- AUTHELIA_SESSION_SECRET_FILE=/run/secrets/authelia_session_secret
# - AUTHELIA_STORAGE_MYSQL_PASSWORD_FILE=/run/secrets/authelia_storage_mysql_password
# - AUTHELIA_NOTIFIER_SMTP_PASSWORD_FILE=/run/secrets/authelia_notifier_smtp_password
# - AUTHELIA_DUO_API_SECRET_KEY_FILE=/run/secrets/authelia_duo_api_secret_key
secrets:
- authelia_jwt_secret
- authelia_session_secret
# - authelia_storage_mysql_password
# - authelia_notifier_smtp_password
# - authelia_duo_api_secret_key
labels:
- "traefik.enable=true"
## HTTP Routers
- "traefik.http.routers.authelia-rtr.entrypoints=https"
- "traefik.http.routers.authelia-rtr.rule=Host(`auth.$DOMAINNAME0`)"
- "traefik.http.routers.authelia-rtr.tls=true"
## Middlewares
- "traefik.http.routers.authelia-rtr.middlewares=chain-no-auth@file"
#chain-authelia@file"
## HTTP Services
- "traefik.http.routers.authelia-rtr.service=authelia-svc"
- "traefik.http.services.authelia-svc.loadbalancer.server.port=9091"

View File

@@ -0,0 +1,311 @@
version: "3.7"
########################### NETWORKS
# There is no need to create any networks outside this docker-compose file.
# You may customize the network subnets (192.168.90.0/24 and 91.0/24) below as you please.
# Docker Compose version 3.5 or higher required to define networks this way.
networks:
proxy:
name: proxy
driver: bridge
ipam:
config:
- subnet: $PROXY_SUBNET
gateway: $PROXY_GATEWAY
#default:
# driver: bridge
socket_proxy:
name: socket_proxy
driver: bridge
ipam:
config:
- subnet: $SOCKET_PROXY_SUBNET
gateway: $SOCKET_PROXY_GATEWAY
########################### VOLUMES
volumes:
traefik-logs: {}
traefik-acme: {}
portainer-data: {}
########################### SECRETS
secrets:
htpasswd:
file: $SECRETSDIR/htpasswd
cloudflare_email:
file: $SECRETSDIR/cloudflare_email
cloudflare_api_key:
file: $SECRETSDIR/cloudflare_api_key
cloudflare_api_token:
file: $SECRETSDIR/cloudflare_api_token
authelia_jwt_secret:
file: $SECRETSDIR/authelia_jwt_secret
authelia_session_secret:
file: $SECRETSDIR/authelia_session_secret
authelia_ldap_password:
file: $SECRETSDIR/authelia_ldap_password
authelia_storage_encryption_key:
file: $SECRETSDIR/authelia_storage_encryption_key
authelia_storage_mysql_password:
file: $DOCKERDIR/secrets/authelia_storage_mysql_password
# authelia_notifier_smtp_password:
# file: $DOCKERDIR/secrets/authelia_notifier_smtp_password
# authelia_duo_api_secret_key:
# file: $DOCKERDIR/secrets/authelia_duo_api_secret_key
########################### SERVICES
services:
# Traefik 2 - Reverse Proxy
# Touch (create empty files) traefik.log and acme/acme.json. Set acme.json permissions to 600.
# touch $DOCKERDIR/traefik2/acme/acme.json
# chmod 600 $DOCKERDIR/traefik2/acme/acme.json
# touch $DOCKERDIR/traefik2/traefik.log
traefik:
container_name: traefik
image: traefik:latest
restart: always
command: # CLI arguments
- --global.checkNewVersion=true
- --global.sendAnonymousUsage=false
- --entryPoints.http.address=:80
- --entryPoints.https.address=:443
- --entrypoints.https.forwardedHeaders.trustedIPs=$CLOUDFLARE_IP_RANGES
- --entryPoints.traefik.address=:8080
- --entryPoints.metrics.address=:8082
- --entryPoints.gelf.address=:12201
- --entryPoints.syslog.address=:15514
- --entryPoints.beats.address=:5050
- --metrics.prometheus.entryPoint=metrics
#- --entryPoints.ping.address=:8081
- --api=true
#- --api.insecure=true
- --api.dashboard=true
#- --ping=true
#- --ping.entryPoint=ping
#- --pilot.token=$TRAEFIK_PILOT_TOKEN
- --serversTransport.insecureSkipVerify=true
- --log=true
- --log.filePath=/var/log/traefik/debug.log
- --log.format=json
- --log.level=WARN # (Default: error) DEBUG, INFO, WARN, ERROR, FATAL, PANIC
- --accessLog=true
- --accessLog.filePath=/var/log/traefik/access.log
- --accessLog.format=json
#- --accessLog.bufferingSize=100 # Configuring a buffer of 100 lines
#- --accessLog.filters.statusCodes=400-499
- --providers.docker=true
- --providers.docker.endpoint=$DOCKER_ENDPOINT # Use Docker Socket Proxy instead for improved security
# Automatically set Host rule for services
# - --providers.docker.defaultrule=Host(`{{ index .Labels "com.docker.compose.service" }}.$DOMAINNAME0`)
- --providers.docker.exposedByDefault=false
# - --entrypoints.https.http.middlewares=chain-oauth@file
- --entrypoints.https.http.tls.options=tls-opts@file
# Add dns-cloudflare as default certresolver for all services. Also enables TLS and no need to specify on individual services
- --entrypoints.https.http.tls.certresolver=$CERTRESOLVER
- --entrypoints.https.http.tls.domains[0].main=$DOMAINNAME0
- --entrypoints.https.http.tls.domains[0].sans=*.$DOMAINNAME0
- --entrypoints.https.http.tls.domains[1].main=$DOMAINNAME1 # Pulls main cert for second domain
- --entrypoints.https.http.tls.domains[1].sans=*.$DOMAINNAME1 # Pulls wildcard cert for second domain
- --providers.docker.network=proxy
- --providers.docker.swarmMode=false
- --providers.file.directory=/rules # Load dynamic configuration from one or more .toml or .yml files in a directory
# - --providers.file.filename=/path/to/file # Load dynamic configuration from a file
- --providers.file.watch=true # Only works on top level files in the rules folder
#- --certificatesResolvers.$CERTRESOLVER.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory # LetsEncrypt Staging Server - uncomment when testing
- --certificatesResolvers.$CERTRESOLVER.acme.email=$CLOUDFLARE_EMAIL
- --certificatesResolvers.$CERTRESOLVER.acme.storage=/etc/traefik/acme/acme.json
- --certificatesresolvers.$CERTRESOLVER.acme.dnschallenge=true
- --certificatesResolvers.$CERTRESOLVER.acme.dnsChallenge.provider=$DNS_PROVIDER
- --certificatesResolvers.$CERTRESOLVER.acme.dnsChallenge.resolvers=$RESOLVER0 #,$RESOLVER1
- --certificatesResolvers.$CERTRESOLVER.acme.dnsChallenge.delayBeforeCheck=90 # To delay DNS check and reduce LE hitrate
networks:
proxy:
ipv4_address: $TRAEFIK_PROXY_IP # You can specify a static IP
socket_proxy:
ipv4_address: $TRAEFIK_SOCKET_PROXY_IP
security_opt:
- no-new-privileges:true
#healthcheck:
# test: wget --quiet --tries=1 --spider http://ping.127.0.0.1.nip.io/ping || exit 1
# interval: 10s
# timeout: 1s
# retries: 3
# start_period: 10s
#test: ["CMD", "traefik", "healthcheck", "--ping"]
#interval: 5s
#retries: 3
ports:
- "80:80"
- "443:443"
- "8080:8080"
#- "8081:8081"
- "8082:8082"
- "12201:12201"
- "5050:5050"
- "15514:15514"
volumes:
- /etc/localtime:/etc/localtime:ro
- $DOCKERDIR/appdata/traefik2/rules:/rules # file provider directory
- traefik-logs:/var/log/traefik
- traefik-acme:/etc/traefik/acme
#- $DOCKERDIR/appdata/traefik2/acme/acme.json:/acme.json # cert location - you must touch this file and change permissions to 600
#- $DOCKERDIR/appdata/traefik2/traefik.log:/traefik.log # for fail2ban - make sure to touch file before starting container
- $DOCKERDIR/shared:/shared
environment:
- TZ=$TZ
- CF_API_EMAIL_FILE=/run/secrets/cloudflare_email
- CF_API_KEY_FILE=/run/secrets/cloudflare_api_key
- CF_DNS_API_TOKEN_FILE=/run/secrets/cloudflare_api_token
- HTPASSWD_FILE=/run/secrets/htpasswd # HTPASSWD_FILE can be whatever as it is not used/called anywhere.
secrets:
- cloudflare_email
- cloudflare_api_key
- cloudflare_api_token
- htpasswd
labels:
#- "autoheal=true"
- "traefik.enable=true"
# HTTP-to-HTTPS Redirect
- "traefik.http.routers.http-catchall.entrypoints=http"
- "traefik.http.routers.http-catchall.rule=HostRegexp(`{host:.+}`)"
- "traefik.http.routers.http-catchall.middlewares=redirect-to-https"
- "traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https"
# HTTP Routers
- "traefik.http.routers.traefik-rtr.entrypoints=https"
- "traefik.http.routers.traefik-rtr.rule=Host(`$TRAEFIK_HOSTNAME$DOMAINNAME1`)"
## Services - API
- "traefik.http.routers.traefik-rtr.service=api@internal"
## Healthcheck/ping
#- "traefik.http.routers.ping.rule=Host(`ping.127.0.0.1.nip.io) && Path(`/ping`)"
#- "traefik.http.routers.ping.service=ping@internal"
#- "traefik.http.routers.ping.tls=false"
#- "traefik.http.routers.ping.entrypoints=ping"
## Middlewares
- "traefik.http.routers.traefik-rtr.middlewares=chain-no-auth@file"
#- "traefik.http.routers.traefik-rtr.middlewares=chain-authelia@file"
# Docker Socket Proxy - Security Enchanced Proxy for Docker Socket
socket-proxy:
container_name: socket-proxy
image: ghcr.io/tecnativa/docker-socket-proxy:edge
restart: always
networks:
socket_proxy:
ipv4_address: $SOCKET_PROXY_IP # You can specify a static IP
privileged: true
#ports:
# - "127.0.0.1:2375:2375" # Port 2375 should only ever get exposed to the internal network. When possible use this line.
# I use the next line instead, as I want portainer to manage multiple docker endpoints within my home network.
# - "2375:2375"
volumes:
- "/var/run/docker.sock:/var/run/docker.sock"
environment:
- LOG_LEVEL=info # debug,info,notice,warning,err,crit,alert,emerg
## Variables match the URL prefix (i.e. AUTH blocks access to /auth/* parts of the API, etc.).
# 0 to revoke access.
# 1 to grant access.
## Granted by Default
- EVENTS=1
- PING=1
- VERSION=1
## Revoked by Default
# Security critical
- AUTH=0
- SECRETS=0
- POST=1 # Ouroboros
# Not always needed
- BUILD=0
- COMMIT=0
- CONFIGS=0
- CONTAINERS=1 # Traefik, portainer, etc.
- DISTRIBUTION=0
- EXEC=1
- IMAGES=1 # Portainer
- INFO=1 # Portainer
- NETWORKS=1 # Portainer
- NODES=0
- PLUGINS=0
- SERVICES=1 # Portainer
- SESSION=0
- SWARM=0
- SYSTEM=0
- TASKS=1 # Portaienr
- VOLUMES=1 # Portainer
# Portainer - WebUI for Containers
portainer:
container_name: portainer
image: portainer/portainer-ce:latest
restart: unless-stopped
command: -H $DOCKER_ENDPOINT # Use Docker Socket Proxy instead for improved security
networks:
proxy:
ipv4_address: $PORTAINER_PROXY_IP
socket_proxy:
ipv4_address: $PORTAINER_SOCKET_PROXY_IP
security_opt:
- no-new-privileges:true
ports:
- "9020:9000"
volumes:
- portainer-data:/data
# - $DOCKERDIR/appdata/portainer:/data # Change to local directory if you want to save/transfer config locally
environment:
- TZ=$TZ
labels:
- "traefik.enable=true"
## HTTP Routers
- "traefik.http.routers.portainer-rtr.entrypoints=https"
- "traefik.http.routers.portainer-rtr.rule=Host(`$PORTAINER_HOSTNAME$DOMAINNAME1`)"
## Middlewares
- "traefik.http.routers.portainer-rtr.middlewares=chain-authelia@file"
#- "traefik.http.routers.portainer-rtr.middlewares=chain-no-auth@file"
## HTTP Services
- "traefik.http.routers.portainer-rtr.service=portainer-svc"
- "traefik.http.services.portainer-svc.loadbalancer.server.port=9000"
# Authelia (Lite) - Self-Hosted Single Sign-On and Two-Factor Authentication
authelia:
container_name: authelia
# Check this before upgrading: https://github.com/authelia/authelia/blob/master/BREAKING.md
image: authelia/authelia:latest
restart: always
networks:
proxy:
ipv4_address: $AUTHELIA_IP # You can specify a static IP
#default:
# ports:
# - "9091:9091"
volumes:
- $DOCKERDIR/appdata/authelia:/config
environment:
- TZ=$TZ
- AUTHELIA_JWT_SECRET_FILE=/run/secrets/authelia_jwt_secret
- AUTHELIA_SESSION_SECRET_FILE=/run/secrets/authelia_session_secret
- AUTHELIA_STORAGE_ENCRYPTION_KEY_FILE=/run/secrets/authelia_storage_encryption_key
- AUTHELIA_AUTHENTICATION_BACKEND_LDAP_PASSWORD_FILE=/run/secrets/authelia_ldap_password
- AUTHELIA_STORAGE_MYSQL_PASSWORD_FILE=/run/secrets/authelia_storage_mysql_password
# - AUTHELIA_NOTIFIER_SMTP_PASSWORD_FILE=/run/secrets/authelia_notifier_smtp_password
# - AUTHELIA_DUO_API_SECRET_KEY_FILE=/run/secrets/authelia_duo_api_secret_key
# - AUTHELIA_TLS_KEY_FILE
# - AUTHELIA_STORAGE_POSTGRES_PASSWORD_FILE
# - AUTHELIA_SESSION_REDIS_PASSWORD_FILE
# - AUTHELIA_REDIS_HIGH_AVAILABILITY_SENTINEL_PASSWORD_FILE
# - AUTHELIA_IDENTITY_PROVIDERS_OIDC_ISSUER_PRIVATE_KEY_FILE
# - AUTHELIA_IDENTITY_PROVIDERS_OIDC_HMAC_SECRET_FILE
secrets:
- authelia_jwt_secret
- authelia_session_secret
- authelia_storage_encryption_key
- authelia_ldap_password
- authelia_storage_mysql_password
# - authelia_notifier_smtp_password
# - authelia_duo_api_secret_key
labels:
- "traefik.enable=true"
## HTTP Routers
- "traefik.http.routers.authelia-rtr.entrypoints=https"
- "traefik.http.routers.authelia-rtr.rule=Host(`$AUTHELIA_HOSTNAME$DOMAINNAME1`)"
- "traefik.http.routers.authelia-rtr.tls=true"
## Middlewares
- "traefik.http.routers.authelia-rtr.middlewares=chain-no-auth@file"
#chain-authelia@file"
## HTTP Services
- "traefik.http.routers.authelia-rtr.service=authelia-svc"
- "traefik.http.services.authelia-svc.loadbalancer.server.port=9091"

View File

@@ -0,0 +1,80 @@
version: "3.7"
########################### NETWORKS
# There is no need to create any networks outside this docker-compose file.
# You may customize the network subnets (192.168.90.0/24 and 91.0/24) below as you please.
# Docker Compose version 3.5 or higher required to define networks this way.
networks:
gl_proxy:
name: gl_proxy
driver: bridge
ipam:
config:
- subnet: $GL_PROXY_SUBNET
- gateway: $GL_PROXY_GATEWAY
default:
driver: bridge
gl_socket_proxy:
name: gl_socket_proxy
driver: bridge
ipam:
config:
- subnet: $GL_SOCKET_PROXY_SUBNET
- gateway: $GL_SOCKET_PROXY_GATEWAY
########################### SECRETS
#secrets:
# htpasswd:
# file: $SECRETSDIR/htpasswd
# authelia_jwt_secret:
# file: $SECRETSDIR/authelia_jwt_secret
# authelia_session_secret:
# file: $SECRETSDIR/authelia_session_secret
# authelia_storage_mysql_password:
# file: $DOCKERDIR/secrets/authelia_storage_mysql_password
# authelia_notifier_smtp_password:
# file: $DOCKERDIR/secrets/authelia_notifier_smtp_password
# authelia_duo_api_secret_key:
# file: $DOCKERDIR/secrets/authelia_duo_api_secret_key
########################### SERVICES
services:
certdumper:
container_name: gl-traefik_certdumper
image: ldez/traefik-certs-dumper:latest
restart: unless-stopped
command: file \
--source /acme.json
--dest /dump
--version v2
--domain-subdir=true
--crt-ext=.pem
--key-ext=.pem
--watch
security_opt:
- no-new-privileges:true
volumes:
- $DOCKERDIR/appdata/traefik2/acme/acme.json:/acme.json:ro
- $DOCKERDIR/shared/certs:/dump:rw
networks:
gl_proxy:
ipv4_address: $CERTDUMPER_IP
#network_mode: none
#environment:
# DOMAIN: $DOMAINNAME0
#labels:
# - "traefik.enable=true"
## HTTP Routers
# - "traefik.http.routers.$APP-rtr.entrypoints=https"
# - "traefik.http.routers.$APP-rtr.rule=HostHeader(`$NAME.$DOMAINNAME0`)"
## Middlewares
# - "traefik.http.routers.$APP-rtr.middlewares=chain-authelia@file"
## HTTP Services
# - "traefik.http.routers.$APP-rtr.service=$APP-svc"
# - "traefik.http.services.$APP-svc.loadbalancer.server.port=$PORT"
# Traefik Certs Dumper - Extract LetsEncrypt Certificates - Traefik2 Compatible
# - /var/run/docker.sock:/var/run/docker.sock:ro # Only needed if restarting containers (use Docker Socket Proxy instead)