diff --git a/examples/firezone/docker-compose.yml b/examples/firezone/docker-compose.yml index 5cb3498..bc771fa 100644 --- a/examples/firezone/docker-compose.yml +++ b/examples/firezone/docker-compose.yml @@ -15,6 +15,9 @@ services: container_name: firezone-web ports: - 51820:51820/udp + - 127.0.0.1:13000:13000/tcp + expose: + - 13000 env_file: # This should contain a list of env vars for configuring Firezone. # See https://docs.firezone.dev/reference/env-vars for more info. @@ -24,13 +27,13 @@ services: # /var/firezone/private_key exists when Firezone starts, it is # used as the WireGuard private. Otherwise, one is generated. - ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/firezone:/var/firezone - labels: - - traefik.enable=true - - traefik.docker.network=dev - - traefik.http.routers.firezone_https.rule=Host(`firezone.example.com`) - - traefik.http.routers.firezone_https.tls=true - - traefik.http.services.firezone.loadbalancer.server.port=13000 - #- traefik.http.routers.firezone.middlewares=local-ipwhitelist@file + #labels: + # - traefik.enable=true + # - traefik.docker.network=dev + # - traefik.http.routers.firezone_https.rule=Host(`firezone.example.com`) + # - traefik.http.routers.firezone_https.tls=true + # - traefik.http.services.firezone.loadbalancer.server.port=13000 + # #- traefik.http.routers.firezone.middlewares=local-ipwhitelist@file cap_add: # Needed for WireGuard and firewall support. - NET_ADMIN