[
  {
    "path": ".env.example",
    "content": "PUID='1000'\nPGID='1000'\nPRIMARY_USERNAME='anand'\nTZ='Europe/Zurich'\nUSERDIR='/home/anand'\nDOCKERDIR='/home/anand/docker'\nLOCAL_IPS='127.0.0.1/32,10.0.0.0/8,192.168.0.0/16,172.16.0.0/12'\nCLOUDFLARE_IPS='173.245.48.0/20,103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,141.101.64.0/18,108.162.192.0/18,190.93.240.0/20,188.114.96.0/20,197.234.240.0/22,198.41.128.0/17,162.158.0.0/15,104.16.0.0/13,104.24.0.0/14,172.64.0.0/13,131.0.72.0/22'\nHOSTNAME='hs'\nSERVER_LAN_IP='192.168.5.112'\nDOCKER0_IP='172.17.0.1'\nDOMAINNAME_1='example.com'\nDOWNLOADSDIR='/media/ssd/downloads'\nDATADIR1='/media/nas/data'\nDATADIR2='/media/nas/data2'\nMEDIADIR1='/media/nas/data/media'\nMEDIADIR2='/media/nas/data2/media'\nDOCKER_HOST='tcp://socket-proxy:2375'\nDEPLOYRRDASHBOARD_PORT='3050'\nTRAEFIK_PORT='8080'\nADMINER_PORT='8081'\n..."
  },
  {
    "path": ".github/FUNDING.yml",
    "content": "# These are supported funding model platforms\n\ngithub: # [SimpleHomelab]\ncustom: ['https://www.simplehomelab.com/geek-army/join/', 'https://www.buymeacoffee.com/simplehomelab'] # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2']\npatreon: \nopen_collective: # Replace with a single Open Collective username\nko_fi: SimpleHomelab # Replace with a single Ko-fi username\ntidelift: # Replace with a single Tidelift platform-name/package-name e.g., npm/babel\ncommunity_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry\nliberapay: # Replace with a single Liberapay username\nissuehunt: # Replace with a single IssueHunt username\notechie: # Replace with a single Otechie username\nlfx_crowdfunding: # Replace with a single LFX Crowdfunding project-name e.g., cloud-foundry\n"
  },
  {
    "path": ".gitignore",
    "content": "*\n*/\n\n!.gitignore\n!README.md\n!LICENSE\n!.env.example\n\n!docker-compose-hs.yml\n!docker-compose-mds.yml\n!docker-compose-ds918.yml\n!docker-compose-ws-arm.yml\n\n!.github\n.github/*\n!.github/FUNDING.yml\n\n!shared\nshared/*\n!shared/*.example\n!shared/config\nshared/config/*\n!shared/config/*.example\n!shared/config/udms_bash_aliases\n\n!secrets_example\n!secrets_example/*\n\n!archives\narchives/*\n!archives/**\n\n!scripts\nscripts/*\n!scripts/*.example\n!scripts/hs\nscripts/hs/*\n!scripts/hs/*.example\n!scripts/mds\nscripts/mds/*\n!scripts/mds/*.example\n!scripts/systemd\nscripts/systemd/*\n!scripts/systemd/*.example\n!scripts/ds918\nscripts/ds918/*\n!scripts/ds918/*.example\n!scripts/ws-arm\nscripts/ws-arm/*\n!scripts/ws-arm/*.example\n\n!compose\ncompose/*\n!compose/**\n\n!commits\n!commits/**\n\n!appdata\nappdata/*\n\n!appdata/authelia\nappdata/authelia/*\n!appdata/authelia/*.example\n\n!appdata/picard\nappdata/picard/*\n!appdata/picard/*.example\n\n!appdata/rclone\nappdata/rclone/*\n!appdata/rclone/*.example\n\n!appdata/php\n!appdata/php/**\n\n!appdata/nginx\n!appdata/nginx/**\n\n!appdata/traefik3\nappdata/traefik3/*\n!appdata/traefik3/*.example\n!appdata/traefik3/rules\nappdata/traefik3/rules/*\n!appdata/traefik3/rules/*.example\n!appdata/traefik3/rules/ws-arm\nappdata/traefik3/rules/ws-arm/*\n!appdata/traefik3/rules/ws-arm/*.example\n!appdata/traefik3/rules/toml\nappdata/traefik3/rules/toml/*\n!appdata/traefik3/rules/toml/*.example\n!appdata/traefik3/rules/ds918\nappdata/traefik3/rules/ds918/*\n!appdata/traefik3/rules/ds918/*.example\n!appdata/traefik3/rules/ds918/tls-opts.yml\n!appdata/traefik3/rules/ds918/middlewares-*.yml\n!appdata/traefik3/rules/ds918/chain-*.yml\n!appdata/traefik3/rules/hs\nappdata/traefik3/rules/hs/*\n!appdata/traefik3/rules/hs/*.example\n!appdata/traefik3/rules/hs/tls-opts.yml\n!appdata/traefik3/rules/hs/middlewares-*.yml\n!appdata/traefik3/rules/hs/chain-*.yml\n!appdata/traefik3/rules/ws-arm\nappdata/traefik3/rules/ws-arm/*\n!appdata/traefik3/rules/ws-arm/*.example\n!appdata/traefik3/rules/ws-arm/tls-opts.yml\n!appdata/traefik3/rules/ws-arm/middlewares-*.yml\n!appdata/traefik3/rules/ws-arm/chain-*.yml\n\n!appdata/traefik2\nappdata/traefik2/*\n!appdata/traefik2/*.example\n!appdata/traefik2/rules\nappdata/traefik2/rules/*\n!appdata/traefik2/rules/*.example\n!appdata/traefik2/rules/ws\nappdata/traefik2/rules/ws/*\n!appdata/traefik2/rules/ws/*.example\n!appdata/traefik2/rules/toml\nappdata/traefik2/rules/toml/*\n!appdata/traefik2/rules/toml/*.example\n!appdata/traefik2/rules/ds918\nappdata/traefik2/rules/ds918/*\n!appdata/traefik2/rules/ds918/*.example\n!appdata/traefik2/rules/ds918/tls-opts.yml\n!appdata/traefik2/rules/ds918/middlewares-*.yml\n!appdata/traefik2/rules/ds918/chain-*.yml\n!appdata/traefik2/rules/hs\nappdata/traefik2/rules/hs/*\n!appdata/traefik2/rules/hs/*.example\n!appdata/traefik2/rules/hs/tls-opts.yml\n!appdata/traefik2/rules/hs/middlewares-*.yml\n!appdata/traefik2/rules/hs/chain-*.yml\n!appdata/traefik2/rules/ws\nappdata/traefik2/rules/ws/*\n!appdata/traefik2/rules/ws/*.example\n!appdata/traefik2/rules/ws/tls-opts.yml\n!appdata/traefik2/rules/ws/middlewares-*.yml\n!appdata/traefik2/rules/ws/chain-*.yml\n\n"
  },
  {
    "path": "LICENSE",
    "content": "MIT License\n\nCopyright (c) 2019 SmartHomeBeginner\n\nPermission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the Software is\nfurnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all\ncopies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\nSOFTWARE.\n"
  },
  {
    "path": "README.md",
    "content": "# 🐳 Ultimate Docker-Traefik Repo by Anand\n\n> **Real-world Docker configurations** from Anand at [SimpleHomelab.com](https://www.simplehomelab.com/) (formerly SmartHomeBeginner.com)\n\n[![Deployrr](https://img.shields.io/badge/Powered%20by-Deployrr-blue?style=flat-square)](https://www.simplehomelab.com/deployrr/)\n[![UDMS Series](https://img.shields.io/badge/UDMS-Series-green?style=flat-square)](https://www.simplehomelab.com/ultimate-docker-media-server-udms-01/)\n[![150+ Apps](https://img.shields.io/badge/Apps-150%2B-orange?style=flat-square)](#-featured-applications)\n\n---\n\n## 🎯 What This Repository Offers\n\nThis repository contains my **actual production Docker setups** that power my homelab infrastructure. Unlike theoretical guides, these are real-world configurations that I use daily.\n\nMy setup is based on [Deployrr](https://www.simplehomelab.com/deployrr/) and [Ultimate Docker Media Server](https://www.simplehomelab.com/ultimate-docker-media-server-udms-01/) series. \n\n### 🎯 Repository Purpose\n1. **Share actual setups** - Real configurations I use in production\n2. **Extend Deployrr capabilities** - Examples beyond standard Deployrr templates\n\n---\n\n## 🖥️ Infrastructure Overview\n\nI believe in **simple, energy-efficient homelab** design that maximizes performance while minimizing complexity.\n\n### 🏠 Networking Architecture\n- **OPNsense** home firewall running on Proxmox VM (DMZed on ISP router)\n- **Tailscale** mesh networking connecting all hosts\n\n### 📊 Hardware Specifications\n\n| Component | Specifications | Purpose |\n|-----------|---------------|---------|\n| **TopTon V700 Mini PC** | Intel i7-13800H, 64GB RAM, 2×2TB NVMe ZFS RAID1, 4TB SATA SSD | Proxmox host that runs my Home Server, Media/Database Server, Home Assistant, Proxmox Backup Server, etc. |\n| **Synology DS918+** | DX517 Expansion Unit, 8GB RAM, 4×18TB SHR2 (×2 volumes) | Primary use is storage. But I tinker with Docker on it. |\n| **Oracle Ampere A1** | 4 vCPU ARM64, 24GB RAM, 200GB storage | Web server and automations |\n\n---\n\n## 🐳 Docker Hosts\n\nAll Docker configurations are organized by host with clear naming conventions. I pool them together and push them to this repository. \n\n### 🏠 Home Server (prefix/suffix: `hs`)\n```yaml\nPlatform: Ubuntu 24.04 LXC on Proxmox\nResources: 8 vCPU, 8GB RAM, 4GB Swap\nStorage: 64GB OS + 32GB Docker data\nPurpose: Core homelab services and support my tinkering habits\n```\n\n### 🎬 Media Database Server (prefix/suffix: `mds`)\n```yaml\nPlatform: Ubuntu 24.04 LXC on Proxmox  \nResources: 12 vCPU, 12GB RAM, 4GB Swap\nStorage: 64GB OS + 72GB Docker data\nPurpose: Media servers and databases - Separate so they are not affected by my tinkering\n```\n\n### 🌐 Web Server (prefix/suffix: `ws-arm`)\n```yaml\nPlatform: Ubuntu 24.04 ARM64 on Oracle Cloud\nResources: 4 vCPU, 24GB RAM\nStorage: 100GB OS + 100GB data\nPurpose: Web Server (Nginx, PHP-FPM 8, WordPress, etc.), n8n, Flowise, and more\n```\n\n### 💾 Synology NAS (prefix/suffix: `ds918`)\n```yaml\nPlatform: DSM 7.X\nResources: 8GB RAM, DX517 Expansion Unit, Volume1 - 4x18TB SHR2, Volume 2 - 4x18TB SHR2\nPurpose: I use this only for tinkering with Docker\n```\n\n### 📁 Archives\nLegacy configurations in `archives` folder - not actively maintained but useful as reference.\n\n---\n\n## 📚 Learning Resources\n\n### 🎥 Ultimate Docker Media Server Guides and Videos\n\n#### 🚀 Getting Started\n1. [Introduction and Overview](https://www.simplehomelab.com/udms-01-introduction-and-overview/)\n2. [Hardware: NAS, Mini PC, or VPS (FREE!). Which one?](https://www.simplehomelab.com/udms-02-hardware-nas-minipc-vps/)\n3. [Best Home Server OS, Proxmox LXC vs VM](https://www.simplehomelab.com/udms-03-best-home-server-os/)\n\n#### ⚙️ Infrastructure Setup\n4. [Install Proxmox on Mini PC with ZFS RAID1 Mirror + 3 Tweaks](https://www.simplehomelab.com/udms-04-install-proxmox-on-mini-pc/) [📹](https://youtu.be/2nIPY7D-UA0)\n5. [Installing and Prepping Ubuntu/Debian](https://www.simplehomelab.com/udms-05-installing-ubuntu-on-proxmox/) [📹](https://youtu.be/-ZSQdJ62r-Q)\n6. [Mounting Remote Folders using Rclone](https://youtu.be/D-XS0biLP14) [📹](https://youtu.be/D-XS0biLP14)\n7. Mounting Remote Folders using SMB/CIFS *(Coming Soon)*\n8. Mounting Remote Folders using NFS *(Coming Soon)*\n9. Binding Mounting on Proxmox Unprivileged LXC *(Coming Soon)*\n\n#### 🔧 Advanced Configuration\n10. [Proxmox Unprivileged LXC Network Node Passthrough](https://www.simplehomelab.com/udms-10-proxmox-lxc-network-device-passthrough/) [📹](https://youtu.be/r0nGMFs5pCY)\n11. [Proxmox Unprivileged LXC iGPU Node Passthrough](https://www.simplehomelab.com/udms-11-gpu-passthrough-on-proxmox-lxc/) [📹](https://youtu.be/kvnJYyyLoIk)\n\n#### 🐳 Docker Fundamentals\n12. [Installing Docker and Docker Compose on Ubuntu/Debian](https://www.simplehomelab.com/udms-12-install-docker-and-docker-compose/)\n13. [Essential Docker Commands & Time-Saving Aliases](https://www.simplehomelab.com/udms-13-docker-and-docker-compose-commands/)\n14. [Kickass Docker Media Server with 150+ Apps](https://www.simplehomelab.com/udms-14-docker-media-server/) [📹](https://youtu.be/THuLgGwq0vg)\n15. Best Docker Containers for Homelab *(Coming Soon)*\n\n#### 🌐 Remote Access & Security\n16. [Exposing Apps to the Internet: Tailscale](https://www.simplehomelab.com/udms-part-16-tailscale-homelab-remote-access/) [📹](https://youtu.be/M6GMp4FJrB8)\n17. Exposing Apps to the Internet: Nginx Proxy Manager *(Coming Soon)*\n18. [Exposing Apps to the Internet: Traefik Reverse Proxy](https://www.simplehomelab.com/udms-18-traefik-docker-compose-guide/) [📹](https://www.youtube.com/playlist?list=PL1Hno7tIbSWUGrZSqeB9aCsdAuoeVwvgh)\n\n#### 🔐 Authentication & Security\n19. [Authentication for Docker Apps - Authelia](https://www.simplehomelab.com/udms-19-authelia-docker-compose/) [📹](https://youtu.be/UIq8PLZHBtk)\n20. [Authentication for Docker Apps - Google OAuth 2](https://youtu.be/SCKALXprTQE) [📹](https://youtu.be/SCKALXprTQE)\n21. [Authentication for Docker Apps - Authentik](https://youtu.be/GoUmJAe1MKc) [📹](https://youtu.be/GoUmJAe1MKc)\n22. [CrowdSec Docker Compose – Bulletproof IPS for Homelabs](https://www.simplehomelab.com/udms-22-crowdsec-docker-compose/)\n23. [Setting up Crowdsec Cloudflare Bouncer](https://www.simplehomelab.com/udms-23-crowdsec-cloudflare-bouncer/)\n24. [Setting up Crowdsec Traefik Bouncer](https://www.simplehomelab.com/udms-24-crowdsec-traefik-bouncer/)\n\n#### 🚀 Advanced Topics\n25. Advanced Topics: Traefik Plugins *(Coming Soon)*\n26. Advanced Topics: Traefik Multiple Domains *(Coming Soon)*\n27. Advanced Topics: Traefik Domain Passthrough *(Coming Soon)*\n28. Advanced Topics: [Traefik Conditional Auth Bypass](https://www.simplehomelab.com/udms-28-traefik-auth-bypass/)\n29. Advanced Topics: [CrowdSec Multiserver Setup](https://www.simplehomelab.com/udms-29-crowdsec-multiserver/)\n30. Closing Thoughts and Options to Level Up *(Coming Soon)*\n\n### 📖 Additional Guides\n\n#### 🏢 Synology NAS\n- [Ultimate Synology NAS Docker Compose Media Server 2022](https://www.simplehomelab.com/synology-nas-docker-media-server-2022/) *(Update Pending)*\n\n#### 🌐 Web Server\n- [WordPress on Docker with Nginx, Traefik, LE SSL, Security, and Speed](https://www.simplehomelab.com/wordpress-on-docker-traefik/) *(Update Pending)*\n\n#### 🤖 Automation\n- [Deployrr: Automate Docker Compose based Homelab Setup](https://www.simplehomelab.com/deployrr/) [📹](https://youtu.be/OnoKy73b-w4)\n\n---\n\n## 🚀 Featured Applications\n\n**150+ Docker applications** ready for deployment, sourced from the [Deployrr Repository](https://github.com/SimpleHomelab/Deployrr/blob/main/APPS.md):\n\nAdminer, Airsonic-Advanced, Authentik, Audiobookshelf, Authelia, Baikal, Bazarr, Beets, Bookstack, cAdvisor, Calibre, Calibre-Web, Change Detection, Chromium, Cleanuparr, Cloud Commander, Cloudflare Tunnel, CrowdSec, CrowdSec Firewall Bouncer, CyberChef, Dashy, DDNS Updater, DeUnhealth, DigiKam, Dockwatch, Docker Garbage Collection, DokuWiki, Double Commander, Dozzle, Dozzle Agent, DweebUI, Emby, ESPHome, FileZilla, Flame, Flaresolverr, Flowise, FreshRSS, Funkwhale, GameVault, Glances, Gluetun, Gonic, Gotenberg, GPTWOL, Grafana, Grocy, Guacamole, Heimdall, Homarr, Home Assistant Core, Homebridge, Homer, Homepage, Huntarr, Immich, InfluxDB, IT-Tools, Jackett, Jellyfin, Jellyseerr, Kasm, Kavita, Kometa, Komga, Lidarr, Lollypop, Maintainerr, MariaDB, Mosquitto, MQTTX Web, Mylar3, n8n, Navidrome, Netdata, Nextcloud, Node Exporter, Node-RED, Notifiarr, OAuth, Ollama, Ombi, OpenHands, Open-WebUI, Organizr, Overseerr, Paperless-AI, Paperless-NGX, PdfDing, PgAdmin, phpMyAdmin, Pi-hole, Piwigo, Plex, Portainer, PostgreSQL, Privatebin, Prometheus, Prowlarr, qBittorrent, qBittorrent with VPN, Qdrant, Radarr, Redis, Redis Commander, Remmina, Resilio Sync, SABnzbd, Scrutiny, SearXNG, ShellInABox, Smokeping, Socket Proxy, Sonarr, Speedtest-Tracker, SSHwifty, Stirling PDF, Tailscale, Tautulli, The Lounge, Theme Park, Tika, TinyAuth, Traefik, Traefik Access Logs, Traefik Bouncer, Traefik Certs Dumper, Traefik Error Logs, Transmission, Trilium Next, Uptime-Kuma, Vaultwarden, Vikunja, Visual Studio Code Server, Wallos, Watchtower, Weaviate, WG-Easy, What's Up Docker (WUD), WikiDocs, Wireguard, and ZeroTier.\n\n**Custom Apps** not supported by Deployrr yet (e.g. Nginx, PHP, etc.)\n\n---\n\n## ⚡ Quick Start Commands\n\n### 🎯 Essential Docker Aliases\n\nI use **Bash Aliases** installed via Deployrr for streamlined Docker management:\n\n| Command | Description |\n|---------|-------------|\n| `dcup` | Start Docker stack |\n| `dcdown` | Stop Docker stack |\n| `dcrec` | Start or recreate specific service/full stack |\n| `dcstop` | Stop specific service/full stack |\n| `dcrestart` | Restart specific service/full stack |\n| `dclogs` | View real-time logs for stack/service |\n| `dcpull` | Pull new images for stack/service |\n\n> 📖 **Learn More**: [Essential Docker Commands & Time-Saving Aliases](https://www.simplehomelab.com/udms-13-docker-and-docker-compose-commands/) | [Bash Aliases in Deployrr](https://docs.deployrr.app/operating-system/bash-aliases-explained)\n\n---\n\n## 🤝 Support & Community\n\n**Documenting, writing guides, and maintaining this repository** requires hundreds of hours of dedicated work. Your support helps keep this project alive and continuously updated.\n\n### 🎖️ Join the Geek Army\n<div style=\"text-align:center;margin:20px\">\n<a href=\"https://www.simplehomelab.com/geek-army/join/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">\n<img src=\"https://www.simplehomelab.com/images/2024/01/become-a-member.png\" alt=\"Join the Geek Army\" width=\"258\" height=\"76\" />\n</a>\n</div>\n\n### 💬 Join the Discord Community\n<div style=\"text-align:center;margin:20px\">\n<a href=\"https://www.simplehomelab.com/discord-github/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">\n<img src=\"https://www.simplehomelab.com/images/2022/05/join-discord-300x75.png\" alt=\"Join Discord\" width=\"300\" height=\"75\" />\n</a>\n</div>"
  },
  {
    "path": "appdata/authelia/configuration.yml.example",
    "content": "###############################################################\n#                   Authelia configuration                    #\n###############################################################\n \nserver:\n  address: tcp://0.0.0.0:9091/\n  buffers:\n    read: 4096\n    write: 4096\n  endpoints:\n    enable_pprof: false\n    enable_expvars: false\n  disable_healthcheck: false\n  tls:\n    key: \"\"\n    certificate: \"\"\n \n# https://www.authelia.com/configuration/miscellaneous/logging/\nlog:\n  level: info\n  format: text\n  file_path: /config/authelia.log\n  keep_stdout: true\n \n# https://www.authelia.com/configuration/second-factor/time-based-one-time-password/\ntotp:\n  issuer: example.com\n  period: 30\n  skew: 1\n \n# AUTHELIA_DUO_PLACEHOLDER\n \n# https://www.authelia.com/reference/guides/passwords/\nauthentication_backend:\n  password_reset:\n    disable: false\n  refresh_interval: 5m\n  file:\n    path: /config/users.yml\n    password:\n      algorithm: argon2id\n      iterations: 1\n      salt_length: 16\n      parallelism: 8\n      memory: 256 # blocks this much of the RAM\n \n# https://www.authelia.com/overview/authorization/access-control/\naccess_control:\n  default_policy: deny\n  rules:\n    # - domain:\n    #     - \"*.example.com\"\n    #     - \"example.com\"\n    #   policy: bypass\n    #   networks: # bypass authentication for local networks\n    #     - 10.0.0.0/8\n    #     - 192.168.0.0/16\n    #     - 172.16.0.0/12\n    - domain:\n        - \"*.example.com\"\n        - \"example.com\"\n      policy: two_factor\n \n# https://www.authelia.com/configuration/session/introduction/\nsession:\n  name: authelia_session\n  same_site: lax\n  expiration: 7h\n  inactivity: 5m\n  remember_me: 1M\n  cookies:\n    - domain: 'example.com'\n      authelia_url: 'https://authelia.example.com'\n      default_redirection_url: 'https://example.com'\n  # AUTHELIA_REDIS_PLACEHOLDER\n \n# https://www.authelia.com/configuration/security/regulation/\nregulation:\n  max_retries: 3\n  find_time: 10m\n  ban_time: 12h\n   \n# https://www.authelia.com/configuration/storage/introduction/\nstorage:\n  # For local storage, uncomment lines below and comment out mysql. https://docs.authelia.com/configuration/storage/sqlite.html\n  # This is good for the beginning. If you have a busy site then switch to other databases.\n  local:\n   path: /config/db.sqlite3\n \n# https://www.authelia.com/configuration/notifications/introduction/\nnotifier:\n  disable_startup_check: false\n  # For testing purposes, notifications can be sent in a file. Be sure to map the volume in docker-compose.\n  filesystem:\n    filename: /config/notifications.txt"
  },
  {
    "path": "appdata/authelia/users.yml.example",
    "content": "###############################################################\n#                         Users Database                      #\n###############################################################\n\n# This file can be used if you do not have an LDAP set up.\n\n# CREATE NEW HASHED PASSWORD\n# sudo docker run -v /home/user/docker/appdata/authelia/configuration.yml:/configuration.yml -it authelia/authelia:4.39.4 authelia crypto hash generate --config /configuration.yml --password MYSTRONGPASSWORD\n\n# https://www.authelia.com/reference/guides/passwords/\n\n# List of users\nusers:\n  user1:\n    displayname: \"John_Doe_1\"\n    password: \"HASHED_PASSWORD\"\n    email: USER_EMAIL\n    groups:\n      - admins\n#  user2:\n#    displayname: \"John_Doe_2\"\n#    password: \"HASHED_PASSWORD\"\n#    email: USER_EMAIL\n#    groups:\n#      - users"
  },
  {
    "path": "appdata/nginx/common/acl.conf",
    "content": "# EasyEngine (ee) protect locations using\n# HTTP authentication || IP address\nsatisfy any;\nauth_basic \"Restricted Area\";\nauth_basic_user_file /var/run/secrets/htpasswd;\n# Allowed IP Address List\nallow 127.0.0.1;\ndeny all;\n"
  },
  {
    "path": "appdata/nginx/common/disabled/commentspam.conf.disabled",
    "content": "# Deny Access for comments to No Referrer Requests - spam protection\nlocation ~* (wp-comments-post)\\.php$ {\n\tif ($http_cookie !~* \"_gat\"){\n\t\treturn 405;\n\t}\n\tif ($http_referer !~ ^(simplehomelab.com|www.simplehomelab.com) )           {\n\t      return 405;\n           }\n}\n\n#Return 410 for the 404s for spammy backlinks\n#http://webmasters.stackexchange.com/questions/84317/help-to-remove-spam-links-leading-to-404-page\n#http://serverfault.com/questions/646154/return-error-410-for-location-regex-in-nginx?rq=1\nlocation = / {\n        if ($query_string ~ ^p=1459955773) {\n                return 410;\n        }\n        if ($query_string ~ ^p=1461920860) {\n                return 410;\n        }        \n}\n"
  },
  {
    "path": "appdata/nginx/common/disabled/hack-protection.conf.disabled",
    "content": "#http://serverfault.com/questions/811912/can-nginx-location-blocks-match-a-url-query-string\nif ( $args ~ \"subid=\" ) { return 403; }\nif ( $args ~ \"link=\" ) { return 403; }\nif ( $args ~ \"q=\" ) { return 403; }\n\n#location = /raio-raspberry-pi-easier/ {\n    #\treturn 403;\n    #}\n"
  },
  {
    "path": "appdata/nginx/common/disabled/php5.conf.disabled",
    "content": "# PHP NGINX CONFIGURATION\n# DO NOT MODIFY, ALL CHANGES LOST AFTER UPDATE EasyEngine (ee)\nlocation / {\n  try_files $uri $uri/ /index.php?$args;\n}\nlocation ~ \\.php$ {\n  try_files $uri =404;\n  include fastcgi.conf;\n  fastcgi_pass php5;\n}\n"
  },
  {
    "path": "appdata/nginx/common/disabled/redis-php7.conf.disabled",
    "content": "# Redis NGINX CONFIGURATION\n# DO NOT MODIFY, ALL CHANGES LOST AFTER UPDATE EasyEngine (ee)\nset $skip_cache 0;\n# POST requests and URL with a query string should always go to php\nif ($request_method = POST) {\n  set $skip_cache 1;\n}\nif ($query_string != \"\") {\n  set $skip_cache 1;\n}\n# Don't cache URL containing the following segments\nif ($request_uri ~* \"(/wp-admin/|/xmlrpc.php|wp-.*\\.php|index.php|/feed/|.*sitemap.*\\.xml)\") {\n  set $skip_cache 1;\n}\n# Don't use the cache for logged in users or recent commenter or customer with items in cart\nif ($http_cookie ~* \"comment_author|wordpress_[a-f0-9]+|wp-postpass|wordpress_no_cache|wordpress_logged_in|[a-z0-9]+_items_in_cart\") {\n  set $skip_cache 1;\n}\n# Use cached or actual file if they exists, Otherwise pass request to WordPress\nlocation / {\n  try_files $uri $uri/ /index.php?$args;\n}\n\nlocation /redis-fetch {\n    internal  ;\n    set  $redis_key $args;\n    redis_pass  redis;\n}\nlocation /redis-store {\n    internal  ;\n    set_unescape_uri $key $arg_key ;\n    redis2_query  set $key $echo_request_body;\n    redis2_query expire $key 14400;\n    redis2_pass  redis;\n}\n\nlocation ~ \\.php$ {\n  set $key \"nginx-cache:$scheme$request_method$host$request_uri\";\n  try_files $uri =404;\n\n  srcache_fetch_skip $skip_cache;\n  srcache_store_skip $skip_cache;\n\n  srcache_response_cache_control off;\n\n  set_escape_uri $escaped_key $key;\n\n  srcache_fetch GET /redis-fetch $key;\n  srcache_store PUT /redis-store key=$escaped_key;\n\n  more_set_headers 'X-SRCache-Fetch-Status $srcache_fetch_status';\n  more_set_headers 'X-SRCache-Store-Status $srcache_store_status';\n\n  include fastcgi_params;\n  fastcgi_pass php7;\n}\n"
  },
  {
    "path": "appdata/nginx/common/disabled/selfhosted-cdn.conf.disabled",
    "content": "# Comment: The section below allows only images, JS, and CSS files to be available to self-hosted CDN subdomains. Avoids duplicate availability of other content through subdomains.\n    if ($request_uri ~* \"\\.(jpe?g|gif|png)$\") {\n        rewrite ^(.*) https://cdn.simplehomelab.com$1 permanent;\n    }\n                                \n"
  },
  {
    "path": "appdata/nginx/common/disabled/shb-ssl.conf.disabled",
    "content": "    ssl_certificate /etc/nginx/certs/shb/shb_com-unified.crt;\n    ssl_certificate_key /etc/nginx/certs/shb/shb20180213.key;\n    ssl_dhparam /etc/nginx/certs/shb/dhparam2048.pem;    \n\n\tssl_stapling on;\n\tssl_stapling_verify on;\n\tssl_trusted_certificate /etc/nginx/certs/shb/shb_com-ca-bundle-trusted.crt;"
  },
  {
    "path": "appdata/nginx/common/hotlink.conf",
    "content": "#Prevent hotlinking\nlocation ~* \\.(gif|png|jpe?g|apk|zip)$ {\n  expires 7d;\n  add_header Pragma public;\n  add_header Cache-Control \"public, must-revalidate, proxy-revalidate\";\n\n  # prevent hotlink\n  valid_referers none blocked ~.simplehomelab. ~.google. ~.bing. ~.yahoo.  server_names ~($host);\n  if ($invalid_referer) {\n        return 403;\n  }\n}"
  },
  {
    "path": "appdata/nginx/common/nonwp-common-php.conf",
    "content": "# WordPress COMMON SETTINGS\n# DO NOT MODIFY, ALL CHANGES LOST AFTER UPDATE EasyEngine (ee)\n# Limit access to avoid brute force attack\n\n# Disable WP Login\nlocation = /wp-login.php {\n  deny all;\n  access_log off;\n  log_not_found off;\n}\n\n# Disable wp-config.txt\nlocation = /wp-config.txt {\n  deny all;\n  access_log off;\n  log_not_found off;\n}\n\n# Disable xmlrpc\nlocation = /xmlrpc.php {\n  deny all;\n  access_log off;\n  log_not_found off;\n}\n\n# Disallow php in upload folder\n#location /wp-content/uploads/ {\nlocation /images/ {\n  location ~ \\.php$ {\n    #Prevent Direct Access Of PHP Files From Web Browsers\n    deny all;\n  }\n}\n"
  },
  {
    "path": "appdata/nginx/common/php7/nonwp-locations-php.conf",
    "content": "# NGINX CONFIGURATION FOR COMMON LOCATION\n# DO NOT MODIFY, ALL CHANGES LOST AFTER UPDATE EasyEngine (ee)\n# Basic locations files\n\nlocation = /favicon.ico {\n  access_log off;\n  log_not_found off;\n  expires max;\n}\n\nlocation = /robots.txt {\n  # Refer #340 issue\n  try_files $uri $uri/ /index.php?$args;\n  access_log off;\n  log_not_found off;\n}\n\n# Cache static files\nlocation ~* \\.(ogg|ogv|svg|svgz|eot|otf|woff|mp4|ttf|css|rss|atom|js|jpg|jpeg|gif|png|ico|zip|tgz|gz|rar|bz2|doc|xls|exe|ppt|tar|mid|midi|wav|bmp|rtf|swf|webp|avif)$ {\n  add_header \"Access-Control-Allow-Origin\" \"*\";\n  access_log off;\n  log_not_found off;\n  expires max;\n}\n\n# Security settings for better privacy\n# Deny hidden files\nlocation ~ /\\.well-known {\n  allow all;\n}\n\nlocation ~ /\\. {\n  deny all;\n  access_log off;\n  log_not_found off;\n}\n\n# Deny backup extensions & log files\nlocation ~* ^.+\\.(bak|log|old|orig|original|php#|php~|php_bak|save|swo|swp|sql)$ {\n  deny all;\n  access_log off;\n  log_not_found off;\n}\n\n# Return 403 forbidden for readme.(txt|html) or license.(txt|html) or example.(txt|html)\nif ($uri ~* \"^.+(readme|license|example)\\.(txt|html)$\") {\n  return 403;\n}\n\n# # Status pages\n# location /nginx_status {\n#   stub_status on;\n#   access_log off;\n#   include common/acl.conf;\n# }\n# location ~ ^/(status|ping) {\n#   include fastcgi.conf;\n#   fastcgi_pass php7;\n#   include common/acl.conf;\n# }\n"
  },
  {
    "path": "appdata/nginx/common/php7/nonwp-nfc-php.conf",
    "content": "# WPFC NGINX CONFIGURATION\n# DO NOT MODIFY, ALL CHANGES LOST AFTER UPDATE EasyEngine (ee)\n\n# Enable Nginx FastCGI Cache\n#set $skip_cache 0;\n# Disable Nginx FastCGI Cache\nset $skip_cache 1;\n\n# POST requests and URL with a query string should always go to php\nif ($request_method = POST) {\n  set $skip_cache 1;\n}\nif ($query_string != \"\") {\n  set $skip_cache 1;\n}\n\n# Use cached or actual file if they exists, Otherwise pass request to WordPress\nlocation / {\n  try_files $uri $uri/ /index.php?$args;\n}\n\nlocation ~ \\.php$ {\n#  include common/hbgauthor.conf;\n  try_files $uri =404;\n  include fastcgi.conf;\n  fastcgi_pass php7;\n  fastcgi_cache_bypass $skip_cache;\n  fastcgi_no_cache $skip_cache;\n  fastcgi_cache WORDPRESS;\n}\n\n# Not available - Nginx Commercial Subscription Required\n# location ~ /purge(/.*) {\n#  fastcgi_cache_purge WORDPRESS \"$scheme$request_method$host$1\";\n#  access_log off;\n#}\n"
  },
  {
    "path": "appdata/nginx/common/php7/wp-common-php.conf",
    "content": "# WordPress COMMON SETTINGS\n\n# Limit access to avoid brute force attack\nlocation = /wp-login.php {\n  #include common/acl.conf;\n  limit_req zone=one burst=1 nodelay;\n  include fastcgi.conf;\n  fastcgi_pass php7;   \n}\n# Disable wp-config.txt\nlocation = /wp-config.txt {\n  deny all;\n  access_log off;\n  log_not_found off;\n}\n\n# Disable xmlrpc\nlocation = /xmlrpc.php {\n  deny all;\n  access_log off;\n  log_not_found off;\n}\n\n# Disallow php in upload folder\n#location /wp-content/uploads/ {\nlocation /images/ {\n  location ~ \\.php$ {\n    #Prevent Direct Access Of PHP Files From Web Browsers\n    deny all;\n  }\n}\n"
  },
  {
    "path": "appdata/nginx/common/php7/wp-nfc-php-beta.conf",
    "content": "# WPFC NGINX CONFIGURATION\n# DO NOT MODIFY, ALL CHANGES LOST AFTER UPDATE EasyEngine (ee)\n\n# Enable Nginx FastCGI Cache\nset $skip_cache 1;\n# Disable Nginx FastCGI Cache\n#set $skip_cache 1;\n\n# POST requests and URL with a query string should always go to php\nif ($request_method = POST) {\n  set $skip_cache 1;\n}\nif ($query_string != \"\") {\n  set $skip_cache 1;\n}\n# Don't cache URL containing the following segments\nif ($request_uri ~* \"(/wp-admin/|/xmlrpc.php|wp-.*\\.php|index.php|/feed/|.*sitemap_index.*\\.xml|.*sitemap.*\\.xml)\") {\n  set $skip_cache 1;\n}\n# Don't use the cache for logged in users or recent commenter or customer with items in cart\nif ($http_cookie ~* \"comment_author|wordpress_[a-f0-9]+|wp-postpass|wordpress_no_cache|wordpress_logged_in|[a-z0-9]+_items_in_cart\") {\n  set $skip_cache 1;\n}\n# Use cached or actual file if they exists, Otherwise pass request to WordPress\nlocation / {\n  try_files $uri $uri/ /index.php?$args;\n}\n\nlocation ~ \\.php$ {\n  try_files $uri =404;\n  include fastcgi.conf;\n  fastcgi_pass php8;\n  fastcgi_cache_bypass $skip_cache;\n  fastcgi_no_cache $skip_cache;\n  fastcgi_cache WORDPRESS;\n}\n\n# Not available - Nginx Commercial Subscription Required\n# location ~ /purge(/.*) {\n#  fastcgi_cache_purge WORDPRESS \"$scheme$request_method$host$1\";\n#  access_log off;\n#}\n"
  },
  {
    "path": "appdata/nginx/common/php7/wp-nfc-php.conf",
    "content": "# WPFC NGINX CONFIGURATION\n# DO NOT MODIFY, ALL CHANGES LOST AFTER UPDATE EasyEngine (ee)\n\n# Enable Nginx FastCGI Cache\nset $skip_cache 1;\n# Disable Nginx FastCGI Cache\n#set $skip_cache 1;\n\n# POST requests and URL with a query string should always go to php\nif ($request_method = POST) {\n  set $skip_cache 1;\n}\nif ($query_string != \"\") {\n  set $skip_cache 1;\n}\n# Don't cache URL containing the following segments\nif ($request_uri ~* \"(/wp-admin/|/xmlrpc.php|wp-.*\\.php|index.php|/feed/|.*sitemap_index.*\\.xml|.*sitemap.*\\.xml)\") {\n  set $skip_cache 1;\n}\n# Don't use the cache for logged in users or recent commenter or customer with items in cart\nif ($http_cookie ~* \"comment_author|wordpress_[a-f0-9]+|wp-postpass|wordpress_no_cache|wordpress_logged_in|[a-z0-9]+_items_in_cart\") {\n  set $skip_cache 1;\n}\n# Use cached or actual file if they exists, Otherwise pass request to WordPress\nlocation / {\n  try_files $uri $uri/ /index.php?$args;\n}\n\nlocation ~ \\.php$ {\n  try_files $uri =404;\n  include fastcgi.conf;\n  fastcgi_pass php7;\n  fastcgi_cache_bypass $skip_cache;\n  fastcgi_no_cache $skip_cache;\n  fastcgi_cache WORDPRESS;\n}\n\n# Not available - Nginx Commercial Subscription Required\n# location ~ /purge(/.*) {\n#  fastcgi_cache_purge WORDPRESS \"$scheme$request_method$host$1\";\n#  access_log off;\n#}\n"
  },
  {
    "path": "appdata/nginx/common/php8/nonwp-locations-php.conf",
    "content": "# NGINX CONFIGURATION FOR COMMON LOCATION\n# DO NOT MODIFY, ALL CHANGES LOST AFTER UPDATE EasyEngine (ee)\n# Basic locations files\n\nlocation = /favicon.ico {\n  access_log off;\n  log_not_found off;\n  expires max;\n}\n\nlocation = /robots.txt {\n  # Refer #340 issue\n  try_files $uri $uri/ /index.php?$args;\n  access_log off;\n  log_not_found off;\n}\n\n# Cache static files\nlocation ~* \\.(ogg|ogv|svg|svgz|eot|otf|woff|mp4|ttf|css|rss|atom|js|jpg|jpeg|gif|png|ico|zip|tgz|gz|rar|bz2|doc|xls|exe|ppt|tar|mid|midi|wav|bmp|rtf|swf|webp|avif)$ {\n  add_header \"Access-Control-Allow-Origin\" \"*\";\n  access_log off;\n  log_not_found off;\n  expires max;\n}\n\n# Security settings for better privacy\n# Deny hidden files\nlocation ~ /\\.well-known {\n  allow all;\n}\n\nlocation ~ /\\. {\n  deny all;\n  access_log off;\n  log_not_found off;\n}\n\n# Deny backup extensions & log files\nlocation ~* ^.+\\.(bak|log|old|orig|original|php#|php~|php_bak|save|swo|swp|sql)$ {\n  deny all;\n  access_log off;\n  log_not_found off;\n}\n\n# Return 403 forbidden for readme.(txt|html) or license.(txt|html) or example.(txt|html)\nif ($uri ~* \"^.+(readme|license|example)\\.(txt|html)$\") {\n  return 403;\n}\n"
  },
  {
    "path": "appdata/nginx/common/php8/nonwp-nfc-php.conf",
    "content": "# WPFC NGINX CONFIGURATION\n# DO NOT MODIFY, ALL CHANGES LOST AFTER UPDATE EasyEngine (ee)\n\n# Enable Nginx FastCGI Cache\n#set $skip_cache 0;\n# Disable Nginx FastCGI Cache\nset $skip_cache 1;\n\n# POST requests and URL with a query string should always go to php\nif ($request_method = POST) {\n  set $skip_cache 1;\n}\nif ($query_string != \"\") {\n  set $skip_cache 1;\n}\n\n# Use cached or actual file if they exists, Otherwise pass request to WordPress\nlocation / {\n  try_files $uri $uri/ /index.php?$args;\n}\n\nlocation ~ \\.php$ {\n#  include common/hbgauthor.conf;\n  try_files $uri =404;\n  include fastcgi.conf;\n  fastcgi_pass php8;\n  fastcgi_cache_bypass $skip_cache;\n  fastcgi_no_cache $skip_cache;\n  fastcgi_cache WORDPRESS;\n}\n\n# Not available - Nginx Commercial Subscription Required\n# location ~ /purge(/.*) {\n#  fastcgi_cache_purge WORDPRESS \"$scheme$request_method$host$1\";\n#  access_log off;\n#}\n"
  },
  {
    "path": "appdata/nginx/common/php8/wp-common-php.conf",
    "content": "# WordPress COMMON SETTINGS\n\n# Limit access to avoid brute force attack\n# Also Managed Challenge on Cloudflare WAF\nlocation = /wp-login.php {\n  #include common/acl.conf;\n  limit_req zone=one burst=1 nodelay;\n  include fastcgi.conf;\n  fastcgi_pass php8wp;  \n}\n# Disable wp-config.txt\nlocation = /wp-config.txt {\n  deny all;\n  access_log off;\n  log_not_found off;\n}\n\n# Managed challenge on Cloudflare WAF\n# Disable xmlrpc\nlocation = /xmlrpc.php {\n  deny all;\n  access_log off;\n  log_not_found off;\n}\n\n# Disallow php in upload folder\n#location /wp-content/uploads/ {\nlocation /images/ {\n  location ~ \\.php$ {\n    #Prevent Direct Access Of PHP Files From Web Browsers\n    deny all;\n  }\n}\n"
  },
  {
    "path": "appdata/nginx/common/php8/wp-nfc-php.conf",
    "content": "# WPFC NGINX CONFIGURATION\n# DO NOT MODIFY, ALL CHANGES LOST AFTER UPDATE EasyEngine (ee)\n\n# Enable Nginx FastCGI Cache\nset $skip_cache 0;\n# Disable Nginx FastCGI Cache\n#set $skip_cache 1;\n\n# POST requests and URL with a query string should always go to php\nif ($request_method = POST) {\n  set $skip_cache 1;\n}\nif ($query_string != \"\") {\n  set $skip_cache 1;\n}\n# Don't cache URL containing the following segments\nif ($request_uri ~* \"(/wp-admin/|/xmlrpc.php|wp-.*\\.php|index.php|/feed/|.*sitemap_index.*\\.xml|.*sitemap.*\\.xml)\") {\n  set $skip_cache 1;\n}\n# Don't use the cache for logged in users or recent commenter or customer with items in cart\nif ($http_cookie ~* \"comment_author|wordpress_[a-f0-9]+|wp-postpass|wordpress_no_cache|wordpress_logged_in|[a-z0-9]+_items_in_cart\") {\n  set $skip_cache 1;\n}\n# Use cached or actual file if they exists, Otherwise pass request to WordPress\nlocation / {\n  try_files $uri $uri/ /index.php?$args;\n}\n\nlocation ~ \\.php$ {\n  try_files $uri =404;\n  include fastcgi.conf;\n  fastcgi_pass php8wp;\n  fastcgi_cache_bypass $skip_cache;\n  fastcgi_no_cache $skip_cache;\n  fastcgi_cache WORDPRESS;\n}\n\n"
  },
  {
    "path": "appdata/nginx/common/wp-404-rewrites.conf",
    "content": "#Rewrite to fix /mobile /GPT_URL 404 errors\n# https://stackoverflow.com/questions/39377750/nginx-location-rewrite-url-with-or-without-trailing-slash\n\n    # redirect /mobile/ and /mobile to parent url\n    rewrite ^(.*/)mobile/?$ $1 permanent;\n    # redirect /amp/ and /amp to parent url\n    rewrite ^(.*/)amp/?$ $1 permanent;\n    # redirect /null/ and /null to parent url\n    rewrite ^(.*/)null/?$ $1 permanent;\n    # redirect /href/ and /href to parent url\n    rewrite ^(.*/)href/?$ $1 permanent;\n    # redirect /comment-subscriptions/, /comment-3341/, etc. to parent url\n    rewrite ^(.*/)comment-(.*/?)$ $1/#disqus_thread permanent;\n    # redirect /feeds/ to /feed/\n    rewrite ^(.*/)feeds/?$ $1/feed/ permanent;\n    # redirect /post-slug/feed/ to /feed/\n    rewrite ^(.*/)(.*/)feed/?$ $1/feed/ permanent;\n    # deleted posts\n    rewrite ^(.*/)htpc-news-roundup(.*)$ $1 permanent; #forward htpc news roundups to homepage    \n    rewrite ^(.*/)smart-home-news-roundup(.*)$ $1 permanent; #forward htpc news roundups to homepage    \n    rewrite ^(.*/)openelec-4(.*)$ $1/openelec-released-raspberry-pi-update-instructions/ permanent;\n    rewrite ^(.*/)openelec-3(.*)$ $1/openelec-released-raspberry-pi-update-instructions/ permanent;\n    rewrite ^(.*/)openelec-6(.*)$ $1/openelec-released-raspberry-pi-update-instructions/ permanent;\n    rewrite ^(.*/)openelec-5(.*)$ $1/openelec-released-raspberry-pi-update-instructions/ permanent;\n    rewrite ^(.*/)qbittorrent-3(.*)$ $1/qbittorrent-released-installation-and-upgrade/ permanent;\n    rewrite ^(.*/)qbittorrent-v3(.*)$ $1/qbittorrent-released-installation-and-upgrade/ permanent;\n    rewrite ^(.*/)transmission-2(.*)$ $1/transmission-released-installation-and-upgrade/ permanent;\n    rewrite ^(.*/)sabnzbd-0(.*)$ $1/sabnzbd-released-installation-upgrade/ permanent;\n    rewrite ^(.*/)sabnzbd-1(.*)$ $1/sabnzbd-released-installation-upgrade/ permanent;\n    rewrite ^(.*/)webmin-1(.*)$ $1/webmin-released-installation-and-upgrade/ permanent;\n    rewrite ^(.*/)phpmyadmin-4(.*)$ $1/phpmyadmin-released-installation-and-upgrade/ permanent;\n    rewrite ^(.*/)deluge-torrent-1(.*)$ $1/deluge-torrent-released-installation-and-upgrade/ permanent;\n    rewrite ^(.*/)adbfire-201(.*)$ $1/install-and-configure-adblink-for-amazon-fire-tv/ permanent;\n    rewrite ^(.*/)minidlna-1(.*)$ $1/install-minidlna-on-ubuntu-ultimate-guide/ permanent;\n    # add to any 404s /slug/\\\"https:\\/\\/www.addtoany.com\\/share\\\n    # enable this # rewrite ^(/.*/.*)addtoany(.*)$ https://www.simplehomelab.com/$1 permanent; \n    # remove weird characters at the end of 404s\n    # enable this # rewrite ^(/.*/.*)t3=(.*)$ https://www.simplehomelab.com/$1 permanent; # ,t3=nav... and '',t3=nav\n    # rewrite ^(.*/\\'/)$ $1 permanent; # /single quote/\n    # #rewrite ^(.*/)*5C*m3=$ $1 permanent;\n    # #rewrite ^(.*/)admin/$ $1/wp-admin/ permanent;\n    # #the one below does not seem to work\n    # #rewrite ^(.*/)[GPT_URL]$ $1 permanent;\n\n\n\n    #rewrite ^(/.*/.*)m3=(.*)$ https://www.simplehomelab.com/$1 permanent; # ,m3= and '',m3="
  },
  {
    "path": "appdata/nginx/common/wp-locations-php.conf",
    "content": "# NGINX CONFIGURATION FOR COMMON LOCATION\n\n# From WP Cloudflare Super Page cache Plugin - June 14, 2021\nlocation ~* \\.(xml|xsl)$ { add_header Cache-Control \"no-cache, no-store, must-revalidate, max-age=0\"; expires -1; }\nlocation /robots.txt { add_header Cache-Control \"no-cache, no-store, must-revalidate, max-age=0\"; expires -1; }\nlocation /wp-cron.php { add_header Cache-Control \"no-cache, no-store, must-revalidate, max-age=0\"; expires -1; }\n#location = /wp-content/wp-cloudflare-super-page-cache/www.simplehomelab.com/debug.log { access_log off; deny all; }\n\n# Cache static files\nlocation ~* \\.(ogg|ogv|svg|svgz|eot|otf|woff|mp4|ttf|css|js|gif|ico|zip|tgz|gz|rar|bz2|doc|xls|exe|ppt|tar|mid|midi|wav|bmp|rtf|swf)$ {\n  add_header Pragma \"public\";\n  add_header Cache-Control \"public\";\n  access_log off;\n  log_not_found off;\n  expires 1y;\n}\n\n# https://shortpixel.com/knowledge-base/article/111-configure-nginx-to-transparently-serve-webp-files-when-supported\nlocation ~* ^(/images/.+)\\.(png|jpg|jpeg)$ {\n    set $base $1;\n    set $webp_uri $base$webp_suffix;\n    set $webp_old_uri $base.$2$webp_suffix;\n    set $root \"/var/www/html/simplehomelab\";\n    root $root;\n    add_header Vary Accept;\n    add_header Pragma \"public\";\n    add_header Cache-Control \"public\";\n    access_log off;\n    log_not_found off;\n    expires 1y;\n    if ( !-f $root$webp_uri ) {\n        add_header X_WebP_SP_Miss $root$webp_uri;\n    }\n    try_files $webp_uri $webp_old_uri $uri =404;\n}\n\n# Feed\nlocation ~* \\.(?:rss|atom)$ {\n  add_header Pragma \"public\";\n  add_header Cache-Control \"public\";\n  access_log off;\n  log_not_found off;\n  expires 5d;\n}\n\n# Security settings for better privacy\n# Deny hidden files\nlocation ~ /\\.well-known {\n  allow all;\n}\n\nlocation ~ /\\. {\n  deny all;\n  access_log off;\n  log_not_found off;\n}\n\n# Deny backup extensions & log files\nlocation ~* ^.+\\.(bak|log|old|orig|original|php#|php~|php_bak|save|swo|swp|sql)$ {\n  deny all;\n  access_log off;\n  log_not_found off;\n}\n\n# Return 403 forbidden for readme.(txt|html) or license.(txt|html) or example.(txt|html)\n# Added build.xml based on 404 data on redirection plugin - 9/21/2020\nif ($uri ~* \"^.+(readme|license|example|build)\\.(txt|html|xml)$\") {\n  return 403;\n}\n"
  },
  {
    "path": "appdata/nginx/common/wp-rankmath-sitemap-config.conf",
    "content": "# Sitemap Config\nlocation ~ ([^/]*)sitemap(.*)\\.x(m|s)l$ {\n  # Basic Config\n  rewrite ^.*/sitemap_index\\.xml$ /index.php?sitemap=1 last;\n  rewrite ^.*/([^/]+?)-sitemap([0-9]+)?\\.xml$ /index.php?sitemap=$1&sitemap_n=$2 last;\n  # Sitemap Styling - Blank Sitemap error or \"Error loading stylesheet: Parsing an XSLT stylesheet failed.\"\n  rewrite ^/([a-z]+)?-?sitemap\\.xsl$ /index.php?xsl=$1 last;\n  # Redirect sitemap to sitemap_index\n  rewrite ^/sitemap\\.xml$ /sitemap_index.xml permanent;\n  access_log off;  \n}"
  },
  {
    "path": "appdata/nginx/common/wp-yoast-sitemap-config.conf",
    "content": "# Yoast sitemap\nlocation ~ ([^/]*)sitemap(.*)\\.x(m|s)l$ {\n  rewrite ^/sitemap\\.xml$ /sitemap_index.xml permanent;\n  rewrite ^/([a-z]+)?-?sitemap\\.xsl$ /index.php?xsl=$1 last;\n  # Rules for yoast sitemap with wp|wpsubdir|wpsubdomain\n  rewrite ^.*/sitemap_index\\.xml$ /index.php?sitemap=1 last;\n  rewrite ^.*/([^/]+?)-sitemap([0-9]+)?\\.xml$ /index.php?sitemap=$1&sitemap_n=$2 last;\n  # Following lines are options. Needed for WordPress seo addons\n  rewrite ^/news_sitemap\\.xml$ /index.php?sitemap=wpseo_news last;\n  rewrite ^/locations\\.kml$ /index.php?sitemap=wpseo_local_kml last;\n  rewrite ^/geo_sitemap\\.xml$ /index.php?sitemap=wpseo_local last;\n  rewrite ^/video-sitemap\\.xsl$ /index.php?xsl=video last;\n  access_log off;\n}"
  },
  {
    "path": "appdata/nginx/conf.d/blockips.conf",
    "content": "# Block IP Address\n# deny 1.1.1.1;\n"
  },
  {
    "path": "appdata/nginx/conf.d/fastcgi.conf",
    "content": "# FastCGI cache settings\nfastcgi_cache_path /var/run/nginx-cache levels=1:2 keys_zone=WORDPRESS:50m inactive=60m;\nfastcgi_cache_key \"$scheme$request_method$host$request_uri\";\nfastcgi_cache_use_stale error timeout invalid_header updating http_500 http_503;\nfastcgi_cache_valid 200 301 302 404 1h;\nfastcgi_buffers 16 16k;\nfastcgi_buffer_size 32k;\nfastcgi_param SERVER_NAME $http_host;\nfastcgi_ignore_headers Cache-Control Expires Set-Cookie;\nfastcgi_keep_conn on;\n"
  },
  {
    "path": "appdata/nginx/conf.d/optimizations.conf",
    "content": "# Custom Configs\n# Prevent iframe or clickjacking https://gist.github.com/plentz/6737338\n# add_header X-Frame-Options SAMEORIGIN; # Added by Traefik\n\n# Custom Sizes https://www.digitalocean.com/community/articles/how-to-optimize-nginx-configuration\n# http://www.narga.net/recommended-nginx-configuration-high-traffic-wordpress/2/\nclient_body_buffer_size 10K;\nclient_header_buffer_size 1k;\nclient_max_body_size 8m;\nlarge_client_header_buffers 4 32k; # 400 Bad Request - increased from 2 8k.\n\n# Caches information about open FDs, freqently accessed files.\n# Changing this setting, in my environment, brought performance up from 560k req/sec, to 904k req/sec.\n# I recommend using some varient of these options, though not the specific values listed below.\n# http://www.narga.net/recommended-nginx-configuration-high-traffic-wordpress/2/\nopen_file_cache max=1000 inactive=20s;\nopen_file_cache_valid 30s;\nopen_file_cache_min_uses 2;\nopen_file_cache_errors on;\n\n# Time Outs https://www.digitalocean.com/community/articles/how-to-optimize-nginx-configuration\n# http://www.narga.net/recommended-nginx-configuration-high-traffic-wordpress/2/\n# send the client a \"request timed out\" if the body is not loaded by this time. Default 60.\nclient_body_timeout 12;\nclient_header_timeout 12;\n\n# If the client stops reading data, free up the stale client connection after this much time. Default 60.\nsend_timeout 10;\n\n#  How long an idle keepalive connection remains open.\nkeepalive_timeout 15;\n"
  },
  {
    "path": "appdata/nginx/conf.d/upstream.conf",
    "content": "upstream php8 {\n  server php8:9000;\n}\n\nupstream php8wp {\n  server php8:9001;\n}\n"
  },
  {
    "path": "appdata/nginx/conf.d/webp.conf",
    "content": "# Insert this block before the server directive, which creates the $webp_suffix if the browser supports WebP\nmap $http_accept $webp_suffix {\n   default \"\";\n   \"~*webp\" \".webp\";\n}"
  },
  {
    "path": "appdata/nginx/fastcgi.conf",
    "content": "fastcgi_param  QUERY_STRING       $query_string;\nfastcgi_param  REQUEST_METHOD     $request_method;\nfastcgi_param  CONTENT_TYPE       $content_type;\nfastcgi_param  CONTENT_LENGTH     $content_length;\n\nfastcgi_param  SCRIPT_FILENAME\t\t$request_filename;\nfastcgi_param  SCRIPT_NAME        $fastcgi_script_name;\nfastcgi_param  REQUEST_URI        $request_uri;\nfastcgi_param  DOCUMENT_URI       $document_uri;\nfastcgi_param  DOCUMENT_ROOT      $document_root;\nfastcgi_param  SERVER_PROTOCOL    $server_protocol;\nfastcgi_param  HTTPS              $https if_not_empty;\n\nfastcgi_param  GATEWAY_INTERFACE  CGI/1.1;\nfastcgi_param  SERVER_SOFTWARE    nginx/$nginx_version;\n\nfastcgi_param  REMOTE_ADDR        $remote_addr;\nfastcgi_param  REMOTE_PORT        $remote_port;\nfastcgi_param  SERVER_ADDR        $server_addr;\nfastcgi_param  SERVER_PORT        $server_port;\nfastcgi_param  SERVER_NAME        $server_name;\n\n# PHP only, required if PHP was built with --enable-force-cgi-redirect\nfastcgi_param  REDIRECT_STATUS    200;\n\n# To fix CGI application vulnerability - https://httpoxy.org\nfastcgi_param   HTTP_PROXY      \"\";\n"
  },
  {
    "path": "appdata/nginx/mime.types",
    "content": "\ntypes {\n    text/html                             html htm shtml;\n    text/css                              css;\n    text/xml                              xml;\n    image/gif                             gif;\n    image/jpeg                            jpeg jpg;\n    application/javascript                js;\n    application/atom+xml                  atom;\n    application/rss+xml                   rss;\n\n    text/mathml                           mml;\n    text/plain                            txt;\n    text/vnd.sun.j2me.app-descriptor      jad;\n    text/vnd.wap.wml                      wml;\n    text/x-component                      htc;\n\n    image/png                             png;\n    image/tiff                            tif tiff;\n    image/vnd.wap.wbmp                    wbmp;\n    image/x-icon                          ico;\n    image/x-jng                           jng;\n    image/x-ms-bmp                        bmp;\n    image/svg+xml                         svg svgz;\n    image/webp                            webp;\n\n    application/font-woff                 woff;\n    application/java-archive              jar war ear;\n    application/json                      json;\n    application/mac-binhex40              hqx;\n    application/msword                    doc;\n    application/pdf                       pdf;\n    application/postscript                ps eps ai;\n    application/rtf                       rtf;\n    application/vnd.apple.mpegurl         m3u8;\n    application/vnd.ms-excel              xls;\n    application/vnd.ms-fontobject         eot;\n    application/vnd.ms-powerpoint         ppt;\n    application/vnd.wap.wmlc              wmlc;\n    application/vnd.google-earth.kml+xml  kml;\n    application/vnd.google-earth.kmz      kmz;\n    application/x-7z-compressed           7z;\n    application/x-cocoa                   cco;\n    application/x-java-archive-diff       jardiff;\n    application/x-java-jnlp-file          jnlp;\n    application/x-makeself                run;\n    application/x-perl                    pl pm;\n    application/x-pilot                   prc pdb;\n    application/x-rar-compressed          rar;\n    application/x-redhat-package-manager  rpm;\n    application/x-sea                     sea;\n    application/x-shockwave-flash         swf;\n    application/x-stuffit                 sit;\n    application/x-tcl                     tcl tk;\n    application/x-x509-ca-cert            der pem crt;\n    application/x-xpinstall               xpi;\n    application/xhtml+xml                 xhtml;\n    application/xspf+xml                  xspf;\n    application/zip                       zip;\n\n    application/octet-stream              bin exe dll;\n    application/octet-stream              deb;\n    application/octet-stream              dmg;\n    application/octet-stream              iso img;\n    application/octet-stream              msi msp msm;\n\n    application/vnd.openxmlformats-officedocument.wordprocessingml.document    docx;\n    application/vnd.openxmlformats-officedocument.spreadsheetml.sheet          xlsx;\n    application/vnd.openxmlformats-officedocument.presentationml.presentation  pptx;\n\n    audio/midi                            mid midi kar;\n    audio/mpeg                            mp3;\n    audio/ogg                             ogg;\n    audio/x-m4a                           m4a;\n    audio/x-realaudio                     ra;\n\n    video/3gpp                            3gpp 3gp;\n    video/mp2t                            ts;\n    video/mp4                             mp4;\n    video/mpeg                            mpeg mpg;\n    video/quicktime                       mov;\n    video/webm                            webm;\n    video/x-flv                           flv;\n    video/x-m4v                           m4v;\n    video/x-mng                           mng;\n    video/x-ms-asf                        asx asf;\n    video/x-ms-wmv                        wmv;\n    video/x-msvideo                       avi;\n}\n"
  },
  {
    "path": "appdata/nginx/nginx.conf",
    "content": "worker_processes auto; # use \" grep processor /proc/cpuinfo | wc -l \" and type the number here, or stay with automatic configuration\n\nevents {\n  worker_connections  1024; # use \" ulimit -n\" and type the number here\n  multi_accept on;\n}\n\nhttp {\n\n############# NGINX conf\n  include /etc/nginx/mime.types;\n  default_type application/octet-stream; \n\n  sendfile     on;\n  tcp_nopush   on;\n  tcp_nodelay  on;\n  server_names_hash_bucket_size 128;\n\n  types_hash_max_size 2048;\n  server_tokens off;\n  reset_timedout_connection on;\n  fastcgi_read_timeout 300;\n\n  # Logging Settings\n  access_log /var/log/nginx/access.log;\n  error_log /var/log/nginx/error.log;\n\n  # Log format Settings\n  #log_format rt_cache '$remote_addr $upstream_response_time $upstream_cache_status [$time_local] '\n  #'$http_host \"$request\" $status $body_bytes_sent '\n  #'\"$http_referer\" \"$http_user_agent\"';\n\n\t# Proxy Settings\n  real_ip_header X-Forwarded-For;\n  set_real_ip_from 192.168.90.0/24; # Your internal Traefik network cidr\n\n  # Limit Request\n  limit_req_status 403;\n  limit_req_zone $binary_remote_addr zone=one:10m rate=1r/s;\n  \n  # Headers\n  # add_header Strict-Transport-Security \"max-age=15768000; includeSubDomains\" always;    \n  add_header Fastcgi-Cache $upstream_cache_status;\n\n  # Gzip Compression  Settings\n  gzip on;\n  gzip_static on;\n  gzip_disable \"msie6\";\n\n  gzip_vary on;\n  gzip_proxied any;\n  gzip_comp_level 6;\n  gzip_buffers 16 8k;\n  gzip_http_version 1.1;\n\n  gzip_types\n    application/atom+xml\n    application/javascript\n    application/json\n    application/rss+xml\n    application/vnd.ms-fontobject\n    application/x-font-ttf\n    application/x-web-app-manifest+json\n    application/xhtml+xml\n    application/xml\n    font/opentype\n    image/svg+xml\n    image/x-icon\n    text/css\n    text/plain\n    text/x-component\n    text/xml\n    text/javascript;\n\n  # Virtual Host Configs\n  include /etc/nginx/conf.d/*.conf;\n  include /etc/nginx/sites/*.conf;\n}"
  },
  {
    "path": "appdata/nginx/sites/dash.conf",
    "content": "server {\n    listen 80;\n    server_name dash.simplehomelab.com;\n\n    root /var/www/html/dash;\n    index index.php;\n\n    access_log /var/log/nginx/dash-access.log;\n    error_log /var/log/nginx/dash-error.log;\n\n    # Turn on directory listing\n    autoindex on;\n\n    include common/php8/nonwp-nfc-php.conf;\n    include common/nonwp-common-php.conf;\n    include common/php8/nonwp-locations-php.conf;\n}"
  },
  {
    "path": "appdata/nginx/sites/deployrr.conf",
    "content": "server {\n    listen 80;\n\tserver_name deployrr.app;\n\treturn 301 $scheme://www.deployrr.app$request_uri;\n}\n\nserver {\n    listen 80;\n    server_name www.deployrr.app;\n\n    root /var/www/html/deployrr;\n    index index.php;\n\n    access_log /var/log/nginx/deployrr-access.log;\n    error_log /var/log/nginx/deployrr-error.log;\n\n    include common/php8/nonwp-nfc-php.conf;\n    include common/nonwp-common-php.conf;\n    include common/php8/nonwp-locations-php.conf;\n}"
  },
  {
    "path": "appdata/nginx/sites/khub.conf",
    "content": "server {\n    listen 80;\n        server_name khub.info;\n        return 301 $scheme://www.khub.info$request_uri;\n}\n\nserver {\n    listen 80;\n    server_name www.khub.info;\n\n    root /var/www/html/khub;\n    index index.php;\n\n    access_log /var/log/nginx/khub-access.log;\n    error_log /var/log/nginx/khub-error.log;\n\n    include common/php8/nonwp-nfc-php.conf;\n    include common/nonwp-common-php.conf;\n    include common/php8/nonwp-locations-php.conf;\n}"
  },
  {
    "path": "appdata/nginx/sites/simplehomelab.conf",
    "content": "server {\n    listen 80;\n\tserver_name simplehomelab.com;\n\treturn 301 $scheme://www.simplehomelab.com$request_uri;\n}\n\nserver {\n    listen 80;\n    server_name www.simplehomelab.com;\n\n    root /var/www/html/simplehomelab;\n    index index.php;\n\n    access_log /var/log/nginx/simplehomelab-access.log;\n    error_log /var/log/nginx/simplehomelab-error.log;\n\n    # #include common/hotlink.conf;\n    include common/wp-rankmath-sitemap-config.conf;\n    include common/wp-404-rewrites.conf;\n\n    include common/php8/wp-nfc-php.conf;\n    include common/php8/wp-common-php.conf;\n    include common/wp-locations-php.conf;\n}\n"
  },
  {
    "path": "appdata/php/php7/conf.d/extensions.ini",
    "content": "zend_extension=opcache\nextension=amqp\nextension=bcmath\nextension=bz2\nextension=calendar\nextension=event\nextension=exif\nextension=gd\nextension=gettext\nextension=imagick\nextension=intl\nextension=ldap\nextension=mysqli\nextension=pdo_mysql\nextension=pdo_pgsql\nextension=pgsql\nextension=redis\nextension=soap\nextension=sockets\nextension=xsl\nextension=zip"
  },
  {
    "path": "appdata/php/php7/conf.d/opcache.ini",
    "content": "opcache.enable=0\n; 0 means it will check on every request\n;Development = 0. Production = 1 or comment out (default 1)\n#opcache.revalidate_freq=1\n; 0 is irrelevant if opcache.validate_timestamps=0 which is desirable in production\n;Development = 1. Production = 0 or comment out (default 0)\n#opcache.validate_timestamps=0\n;Development = 1. Production =0 or comment out (default 0)\n#opcache.consistency_checks=0\n\nopcache.max_accelerated_files=20000\nopcache.memory_consumption=128\nopcache.max_wasted_percentage=10\nopcache.interned_strings_buffer=16\nopcache.fast_shutdown=1\n"
  },
  {
    "path": "appdata/php/php7/php.ini",
    "content": "[PHP]\n\n;;;;;;;;;;;;;;;;;;;\n; About php.ini   ;\n;;;;;;;;;;;;;;;;;;;\n; PHP's initialization file, generally called php.ini, is responsible for\n; configuring many of the aspects of PHP's behavior.\n\n; PHP attempts to find and load this configuration from a number of locations.\n; The following is a summary of its search order:\n; 1. SAPI module specific location.\n; 2. The PHPRC environment variable. (As of PHP 5.2.0)\n; 3. A number of predefined registry keys on Windows (As of PHP 5.2.0)\n; 4. Current working directory (except CLI)\n; 5. The web server's directory (for SAPI modules), or directory of PHP\n; (otherwise in Windows)\n; 6. The directory from the --with-config-file-path compile time option, or the\n; Windows directory (usually C:\\windows)\n; See the PHP docs for more specific information.\n; http://php.net/configuration.file\n\n; The syntax of the file is extremely simple.  Whitespace and lines\n; beginning with a semicolon are silently ignored (as you probably guessed).\n; Section headers (e.g. [Foo]) are also silently ignored, even though\n; they might mean something in the future.\n\n; Directives following the section heading [PATH=/www/mysite] only\n; apply to PHP files in the /www/mysite directory.  Directives\n; following the section heading [HOST=www.example.com] only apply to\n; PHP files served from www.example.com.  Directives set in these\n; special sections cannot be overridden by user-defined INI files or\n; at runtime. Currently, [PATH=] and [HOST=] sections only work under\n; CGI/FastCGI.\n; http://php.net/ini.sections\n\n; Directives are specified using the following syntax:\n; directive = value\n; Directive names are *case sensitive* - foo=bar is different from FOO=bar.\n; Directives are variables used to configure PHP or PHP extensions.\n; There is no name validation.  If PHP can't find an expected\n; directive because it is not set or is mistyped, a default value will be used.\n\n; The value can be a string, a number, a PHP constant (e.g. E_ALL or M_PI), one\n; of the INI constants (On, Off, True, False, Yes, No and None) or an expression\n; (e.g. E_ALL & ~E_NOTICE), a quoted string (\"bar\"), or a reference to a\n; previously set variable or directive (e.g. ${foo})\n\n; Expressions in the INI file are limited to bitwise operators and parentheses:\n; |  bitwise OR\n; ^  bitwise XOR\n; &  bitwise AND\n; ~  bitwise NOT\n; !  boolean NOT\n\n; Boolean flags can be turned on using the values 1, On, True or Yes.\n; They can be turned off using the values 0, Off, False or No.\n\n; An empty string can be denoted by simply not writing anything after the equal\n; sign, or by using the None keyword:\n\n; foo =         ; sets foo to an empty string\n; foo = None    ; sets foo to an empty string\n; foo = \"None\"  ; sets foo to the string 'None'\n\n; If you use constants in your value, and these constants belong to a\n; dynamically loaded extension (either a PHP extension or a Zend extension),\n; you may only use these constants *after* the line that loads the extension.\n\n;;;;;;;;;;;;;;;;;;;\n; About this file ;\n;;;;;;;;;;;;;;;;;;;\n; PHP comes packaged with two INI files. One that is recommended to be used\n; in production environments and one that is recommended to be used in\n; development environments.\n\n; php.ini-production contains settings which hold security, performance and\n; best practices at its core. But please be aware, these settings may break\n; compatibility with older or less security conscience applications. We\n; recommending using the production ini in production and testing environments.\n\n; php.ini-development is very similar to its production variant, except it is\n; much more verbose when it comes to errors. We recommend using the\n; development version only in development environments, as errors shown to\n; application users can inadvertently leak otherwise secure information.\n\n; This is the php.ini-production INI file.\n\n;;;;;;;;;;;;;;;;;;;\n; Quick Reference ;\n;;;;;;;;;;;;;;;;;;;\n; The following are all the settings which are different in either the production\n; or development versions of the INIs with respect to PHP's default behavior.\n; Please see the actual settings later in the document for more details as to why\n; we recommend these changes in PHP's behavior.\n\n; display_errors\n;   Default Value: On\n;   Development Value: On\n;   Production Value: Off\n\n; display_startup_errors\n;   Default Value: Off\n;   Development Value: On\n;   Production Value: Off\n\n; error_reporting\n;   Default Value: E_ALL & ~E_NOTICE & ~E_STRICT & ~E_DEPRECATED\n;   Development Value: E_ALL\n;   Production Value: E_ALL & ~E_DEPRECATED & ~E_STRICT\n\n; log_errors\n;   Default Value: Off\n;   Development Value: On\n;   Production Value: On\n\n; max_input_time\n;   Default Value: -1 (Unlimited)\n;   Development Value: 60 (60 seconds)\n;   Production Value: 60 (60 seconds)\n\n; output_buffering\n;   Default Value: Off\n;   Development Value: 4096\n;   Production Value: 4096\n\n; register_argc_argv\n;   Default Value: On\n;   Development Value: Off\n;   Production Value: Off\n\n; request_order\n;   Default Value: None\n;   Development Value: \"GP\"\n;   Production Value: \"GP\"\n\n; session.gc_divisor\n;   Default Value: 100\n;   Development Value: 1000\n;   Production Value: 1000\n\n; session.sid_bits_per_character\n;   Default Value: 4\n;   Development Value: 5\n;   Production Value: 5\n\n; short_open_tag\n;   Default Value: On\n;   Development Value: Off\n;   Production Value: Off\n\n; variables_order\n;   Default Value: \"EGPCS\"\n;   Development Value: \"GPCS\"\n;   Production Value: \"GPCS\"\n\n;;;;;;;;;;;;;;;;;;;;\n; php.ini Options  ;\n;;;;;;;;;;;;;;;;;;;;\n; Name for user-defined php.ini (.htaccess) files. Default is \".user.ini\"\n;user_ini.filename = \".user.ini\"\n\n; To disable this feature set this option to an empty value\n;user_ini.filename =\n\n; TTL for user-defined php.ini files (time-to-live) in seconds. Default is 300 seconds (5 minutes)\n;user_ini.cache_ttl = 300\n\n;;;;;;;;;;;;;;;;;;;;\n; Language Options ;\n;;;;;;;;;;;;;;;;;;;;\n\n; Enable the PHP scripting language engine under Apache.\n; http://php.net/engine\nengine = On\n\n; This directive determines whether or not PHP will recognize code between\n; <? and ?> tags as PHP source which should be processed as such. It is\n; generally recommended that <?php and ?> should be used and that this feature\n; should be disabled, as enabling it may result in issues when generating XML\n; documents, however this remains supported for backward compatibility reasons.\n; Note that this directive does not control the <?= shorthand tag, which can be\n; used regardless of this directive.\n; Default Value: On\n; Development Value: Off\n; Production Value: Off\n; http://php.net/short-open-tag\nshort_open_tag = Off\n\n; The number of significant digits displayed in floating point numbers.\n; http://php.net/precision\nprecision = 14\n\n; Output buffering is a mechanism for controlling how much output data\n; (excluding headers and cookies) PHP should keep internally before pushing that\n; data to the client. If your application's output exceeds this setting, PHP\n; will send that data in chunks of roughly the size you specify.\n; Turning on this setting and managing its maximum buffer size can yield some\n; interesting side-effects depending on your application and web server.\n; You may be able to send headers and cookies after you've already sent output\n; through print or echo. You also may see performance benefits if your server is\n; emitting less packets due to buffered output versus PHP streaming the output\n; as it gets it. On production servers, 4096 bytes is a good setting for performance\n; reasons.\n; Note: Output buffering can also be controlled via Output Buffering Control\n;   functions.\n; Possible Values:\n;   On = Enabled and buffer is unlimited. (Use with caution)\n;   Off = Disabled\n;   Integer = Enables the buffer and sets its maximum size in bytes.\n; Note: This directive is hardcoded to Off for the CLI SAPI\n; Default Value: Off\n; Development Value: 4096\n; Production Value: 4096\n; http://php.net/output-buffering\noutput_buffering = 4096\n\n; You can redirect all of the output of your scripts to a function.  For\n; example, if you set output_handler to \"mb_output_handler\", character\n; encoding will be transparently converted to the specified encoding.\n; Setting any output handler automatically turns on output buffering.\n; Note: People who wrote portable scripts should not depend on this ini\n;   directive. Instead, explicitly set the output handler using ob_start().\n;   Using this ini directive may cause problems unless you know what script\n;   is doing.\n; Note: You cannot use both \"mb_output_handler\" with \"ob_iconv_handler\"\n;   and you cannot use both \"ob_gzhandler\" and \"zlib.output_compression\".\n; Note: output_handler must be empty if this is set 'On' !!!!\n;   Instead you must use zlib.output_handler.\n; http://php.net/output-handler\n;output_handler =\n\n; URL rewriter function rewrites URL on the fly by using\n; output buffer. You can set target tags by this configuration.\n; \"form\" tag is special tag. It will add hidden input tag to pass values.\n; Refer to session.trans_sid_tags for usage.\n; Default Value: \"form=\"\n; Development Value: \"form=\"\n; Production Value: \"form=\"\n;url_rewriter.tags\n\n; URL rewriter will not rewrite absolute URL nor form by default. To enable\n; absolute URL rewrite, allowed hosts must be defined at RUNTIME.\n; Refer to session.trans_sid_hosts for more details.\n; Default Value: \"\"\n; Development Value: \"\"\n; Production Value: \"\"\n;url_rewriter.hosts\n\n; Transparent output compression using the zlib library\n; Valid values for this option are 'off', 'on', or a specific buffer size\n; to be used for compression (default is 4KB)\n; Note: Resulting chunk size may vary due to nature of compression. PHP\n;   outputs chunks that are few hundreds bytes each as a result of\n;   compression. If you prefer a larger chunk size for better\n;   performance, enable output_buffering in addition.\n; Note: You need to use zlib.output_handler instead of the standard\n;   output_handler, or otherwise the output will be corrupted.\n; http://php.net/zlib.output-compression\nzlib.output_compression = Off\n\n; http://php.net/zlib.output-compression-level\n;zlib.output_compression_level = -1\n\n; You cannot specify additional output handlers if zlib.output_compression\n; is activated here. This setting does the same as output_handler but in\n; a different order.\n; http://php.net/zlib.output-handler\n;zlib.output_handler =\n\n; Implicit flush tells PHP to tell the output layer to flush itself\n; automatically after every output block.  This is equivalent to calling the\n; PHP function flush() after each and every call to print() or echo() and each\n; and every HTML block.  Turning this option on has serious performance\n; implications and is generally recommended for debugging purposes only.\n; http://php.net/implicit-flush\n; Note: This directive is hardcoded to On for the CLI SAPI\nimplicit_flush = Off\n\n; The unserialize callback function will be called (with the undefined class'\n; name as parameter), if the unserializer finds an undefined class\n; which should be instantiated. A warning appears if the specified function is\n; not defined, or if the function doesn't include/implement the missing class.\n; So only set this entry, if you really want to implement such a\n; callback-function.\nunserialize_callback_func =\n\n; The unserialize_max_depth specifies the default depth limit for unserialized\n; structures. Setting the depth limit too high may result in stack overflows\n; during unserialization. The unserialize_max_depth ini setting can be\n; overridden by the max_depth option on individual unserialize() calls.\n; A value of 0 disables the depth limit.\n;unserialize_max_depth = 4096\n\n; When floats & doubles are serialized, store serialize_precision significant\n; digits after the floating point. The default value ensures that when floats\n; are decoded with unserialize, the data will remain the same.\n; The value is also used for json_encode when encoding double values.\n; If -1 is used, then dtoa mode 0 is used which automatically select the best\n; precision.\nserialize_precision = -1\n\n; open_basedir, if set, limits all file operations to the defined directory\n; and below.  This directive makes most sense if used in a per-directory\n; or per-virtualhost web server configuration file.\n; Note: disables the realpath cache\n; http://php.net/open-basedir\n;open_basedir =\n\n; This directive allows you to disable certain functions.\n; It receives a comma-delimited list of function names.\n; http://php.net/disable-functions\ndisable_functions =\n\n; This directive allows you to disable certain classes.\n; It receives a comma-delimited list of class names.\n; http://php.net/disable-classes\ndisable_classes =\n\n; Colors for Syntax Highlighting mode.  Anything that's acceptable in\n; <span style=\"color: ???????\"> would work.\n; http://php.net/syntax-highlighting\n;highlight.string  = #DD0000\n;highlight.comment = #FF9900\n;highlight.keyword = #007700\n;highlight.default = #0000BB\n;highlight.html    = #000000\n\n; If enabled, the request will be allowed to complete even if the user aborts\n; the request. Consider enabling it if executing long requests, which may end up\n; being interrupted by the user or a browser timing out. PHP's default behavior\n; is to disable this feature.\n; http://php.net/ignore-user-abort\n;ignore_user_abort = On\n\n; Determines the size of the realpath cache to be used by PHP. This value should\n; be increased on systems where PHP opens many files to reflect the quantity of\n; the file operations performed.\n; Note: if open_basedir is set, the cache is disabled\n; http://php.net/realpath-cache-size\n;realpath_cache_size = 4096k\n\n; Duration of time, in seconds for which to cache realpath information for a given\n; file or directory. For systems with rarely changing files, consider increasing this\n; value.\n; http://php.net/realpath-cache-ttl\n;realpath_cache_ttl = 120\n\n; Enables or disables the circular reference collector.\n; http://php.net/zend.enable-gc\nzend.enable_gc = On\n\n; If enabled, scripts may be written in encodings that are incompatible with\n; the scanner.  CP936, Big5, CP949 and Shift_JIS are the examples of such\n; encodings.  To use this feature, mbstring extension must be enabled.\n; Default: Off\n;zend.multibyte = Off\n\n; Allows to set the default encoding for the scripts.  This value will be used\n; unless \"declare(encoding=...)\" directive appears at the top of the script.\n; Only affects if zend.multibyte is set.\n; Default: \"\"\n;zend.script_encoding =\n\n; Allows to include or exclude arguments from stack traces generated for exceptions\n; Default: Off\n; In production, it is recommended to turn this setting on to prohibit the output \n; of sensitive information in stack traces\nzend.exception_ignore_args = On\n\n;;;;;;;;;;;;;;;;;\n; Miscellaneous ;\n;;;;;;;;;;;;;;;;;\n\n; Decides whether PHP may expose the fact that it is installed on the server\n; (e.g. by adding its signature to the Web server header).  It is no security\n; threat in any way, but it makes it possible to determine whether you use PHP\n; on your server or not.\n; http://php.net/expose-php\nexpose_php = On\n\n;;;;;;;;;;;;;;;;;;;\n; Resource Limits ;\n;;;;;;;;;;;;;;;;;;;\n\n; Maximum execution time of each script, in seconds\n; http://php.net/max-execution-time\n; Note: This directive is hardcoded to 0 for the CLI SAPI\n;max_execution_time = 30\nmax_execution_time = 600\n\n; Maximum amount of time each script may spend parsing request data. It's a good\n; idea to limit this time on productions servers in order to eliminate unexpectedly\n; long running scripts.\n; Note: This directive is hardcoded to -1 for the CLI SAPI\n; Default Value: -1 (Unlimited)\n; Development Value: 60 (60 seconds)\n; Production Value: 60 (60 seconds)\n; http://php.net/max-input-time\nmax_input_time = 60\n\n; Maximum input variable nesting level\n; http://php.net/max-input-nesting-level\n;max_input_nesting_level = 64\n\n; How many GET/POST/COOKIE input variables may be accepted\n;max_input_vars = 1000\nmax_input_vars = 25000\n\n; Maximum amount of memory a script may consume\n; http://php.net/memory-limit\n;memory_limit = 128M\nmemory_limit = 512M\n\n;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;\n; Error handling and logging ;\n;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;\n\n; This directive informs PHP of which errors, warnings and notices you would like\n; it to take action for. The recommended way of setting values for this\n; directive is through the use of the error level constants and bitwise\n; operators. The error level constants are below here for convenience as well as\n; some common settings and their meanings.\n; By default, PHP is set to take action on all errors, notices and warnings EXCEPT\n; those related to E_NOTICE and E_STRICT, which together cover best practices and\n; recommended coding standards in PHP. For performance reasons, this is the\n; recommend error reporting setting. Your production server shouldn't be wasting\n; resources complaining about best practices and coding standards. That's what\n; development servers and development settings are for.\n; Note: The php.ini-development file has this setting as E_ALL. This\n; means it pretty much reports everything which is exactly what you want during\n; development and early testing.\n;\n; Error Level Constants:\n; E_ALL             - All errors and warnings (includes E_STRICT as of PHP 5.4.0)\n; E_ERROR           - fatal run-time errors\n; E_RECOVERABLE_ERROR  - almost fatal run-time errors\n; E_WARNING         - run-time warnings (non-fatal errors)\n; E_PARSE           - compile-time parse errors\n; E_NOTICE          - run-time notices (these are warnings which often result\n;                     from a bug in your code, but it's possible that it was\n;                     intentional (e.g., using an uninitialized variable and\n;                     relying on the fact it is automatically initialized to an\n;                     empty string)\n; E_STRICT          - run-time notices, enable to have PHP suggest changes\n;                     to your code which will ensure the best interoperability\n;                     and forward compatibility of your code\n; E_CORE_ERROR      - fatal errors that occur during PHP's initial startup\n; E_CORE_WARNING    - warnings (non-fatal errors) that occur during PHP's\n;                     initial startup\n; E_COMPILE_ERROR   - fatal compile-time errors\n; E_COMPILE_WARNING - compile-time warnings (non-fatal errors)\n; E_USER_ERROR      - user-generated error message\n; E_USER_WARNING    - user-generated warning message\n; E_USER_NOTICE     - user-generated notice message\n; E_DEPRECATED      - warn about code that will not work in future versions\n;                     of PHP\n; E_USER_DEPRECATED - user-generated deprecation warnings\n;\n; Common Values:\n;   E_ALL (Show all errors, warnings and notices including coding standards.)\n;   E_ALL & ~E_NOTICE  (Show all errors, except for notices)\n;   E_ALL & ~E_NOTICE & ~E_STRICT  (Show all errors, except for notices and coding standards warnings.)\n;   E_COMPILE_ERROR|E_RECOVERABLE_ERROR|E_ERROR|E_CORE_ERROR  (Show only errors)\n; Default Value: E_ALL & ~E_NOTICE & ~E_STRICT & ~E_DEPRECATED\n; Development Value: E_ALL\n; Production Value: E_ALL & ~E_DEPRECATED & ~E_STRICT\n; http://php.net/error-reporting\nerror_reporting = E_ALL & ~E_DEPRECATED & ~E_STRICT\n\n; This directive controls whether or not and where PHP will output errors,\n; notices and warnings too. Error output is very useful during development, but\n; it could be very dangerous in production environments. Depending on the code\n; which is triggering the error, sensitive information could potentially leak\n; out of your application such as database usernames and passwords or worse.\n; For production environments, we recommend logging errors rather than\n; sending them to STDOUT.\n; Possible Values:\n;   Off = Do not display any errors\n;   stderr = Display errors to STDERR (affects only CGI/CLI binaries!)\n;   On or stdout = Display errors to STDOUT\n; Default Value: On\n; Development Value: On\n; Production Value: Off\n; http://php.net/display-errors\ndisplay_errors = Off\n\n; The display of errors which occur during PHP's startup sequence are handled\n; separately from display_errors. PHP's default behavior is to suppress those\n; errors from clients. Turning the display of startup errors on can be useful in\n; debugging configuration problems. We strongly recommend you\n; set this to 'off' for production servers.\n; Default Value: Off\n; Development Value: On\n; Production Value: Off\n; http://php.net/display-startup-errors\ndisplay_startup_errors = Off\n\n; Besides displaying errors, PHP can also log errors to locations such as a\n; server-specific log, STDERR, or a location specified by the error_log\n; directive found below. While errors should not be displayed on productions\n; servers they should still be monitored and logging is a great way to do that.\n; Default Value: Off\n; Development Value: On\n; Production Value: On\n; http://php.net/log-errors\nlog_errors = On\n\n; Set maximum length of log_errors. In error_log information about the source is\n; added. The default is 1024 and 0 allows to not apply any maximum length at all.\n; http://php.net/log-errors-max-len\nlog_errors_max_len = 1024\n\n; Do not log repeated messages. Repeated errors must occur in same file on same\n; line unless ignore_repeated_source is set true.\n; http://php.net/ignore-repeated-errors\nignore_repeated_errors = Off\n\n; Ignore source of message when ignoring repeated messages. When this setting\n; is On you will not log errors with repeated messages from different files or\n; source lines.\n; http://php.net/ignore-repeated-source\nignore_repeated_source = Off\n\n; If this parameter is set to Off, then memory leaks will not be shown (on\n; stdout or in the log). This is only effective in a debug compile, and if\n; error reporting includes E_WARNING in the allowed list\n; http://php.net/report-memleaks\nreport_memleaks = On\n\n; This setting is on by default.\n;report_zend_debug = 0\n\n; Store the last error/warning message in $php_errormsg (boolean). Setting this value\n; to On can assist in debugging and is appropriate for development servers. It should\n; however be disabled on production servers.\n; This directive is DEPRECATED.\n; Default Value: Off\n; Development Value: Off\n; Production Value: Off\n; http://php.net/track-errors\n;track_errors = Off\n\n; Turn off normal error reporting and emit XML-RPC error XML\n; http://php.net/xmlrpc-errors\n;xmlrpc_errors = 0\n\n; An XML-RPC faultCode\n;xmlrpc_error_number = 0\n\n; When PHP displays or logs an error, it has the capability of formatting the\n; error message as HTML for easier reading. This directive controls whether\n; the error message is formatted as HTML or not.\n; Note: This directive is hardcoded to Off for the CLI SAPI\n; http://php.net/html-errors\n;html_errors = On\n\n; If html_errors is set to On *and* docref_root is not empty, then PHP\n; produces clickable error messages that direct to a page describing the error\n; or function causing the error in detail.\n; You can download a copy of the PHP manual from http://php.net/docs\n; and change docref_root to the base URL of your local copy including the\n; leading '/'. You must also specify the file extension being used including\n; the dot. PHP's default behavior is to leave these settings empty, in which\n; case no links to documentation are generated.\n; Note: Never use this feature for production boxes.\n; http://php.net/docref-root\n; Examples\n;docref_root = \"/phpmanual/\"\n\n; http://php.net/docref-ext\n;docref_ext = .html\n\n; String to output before an error message. PHP's default behavior is to leave\n; this setting blank.\n; http://php.net/error-prepend-string\n; Example:\n;error_prepend_string = \"<span style='color: #ff0000'>\"\n\n; String to output after an error message. PHP's default behavior is to leave\n; this setting blank.\n; http://php.net/error-append-string\n; Example:\n;error_append_string = \"</span>\"\n\n; Log errors to specified file. PHP's default behavior is to leave this value\n; empty.\n; http://php.net/error-log\n; Example:\n;error_log = php_errors.log\n; Log errors to syslog (Event Log on Windows).\n;error_log = syslog\n\n; The syslog ident is a string which is prepended to every message logged\n; to syslog. Only used when error_log is set to syslog.\n;syslog.ident = php\n\n; The syslog facility is used to specify what type of program is logging\n; the message. Only used when error_log is set to syslog.\n;syslog.facility = user\n\n; Set this to disable filtering control characters (the default).\n; Some loggers only accept NVT-ASCII, others accept anything that's not\n; control characters. If your logger accepts everything, then no filtering\n; is needed at all.\n; Allowed values are:\n;   ascii (all printable ASCII characters and NL)\n;   no-ctrl (all characters except control characters)\n;   all (all characters)\n;   raw (like \"all\", but messages are not split at newlines)\n; http://php.net/syslog.filter\n;syslog.filter = ascii\n\n;windows.show_crt_warning\n; Default value: 0\n; Development value: 0\n; Production value: 0\n\n;;;;;;;;;;;;;;;;;\n; Data Handling ;\n;;;;;;;;;;;;;;;;;\n\n; The separator used in PHP generated URLs to separate arguments.\n; PHP's default setting is \"&\".\n; http://php.net/arg-separator.output\n; Example:\n;arg_separator.output = \"&amp;\"\n\n; List of separator(s) used by PHP to parse input URLs into variables.\n; PHP's default setting is \"&\".\n; NOTE: Every character in this directive is considered as separator!\n; http://php.net/arg-separator.input\n; Example:\n;arg_separator.input = \";&\"\n\n; This directive determines which super global arrays are registered when PHP\n; starts up. G,P,C,E & S are abbreviations for the following respective super\n; globals: GET, POST, COOKIE, ENV and SERVER. There is a performance penalty\n; paid for the registration of these arrays and because ENV is not as commonly\n; used as the others, ENV is not recommended on productions servers. You\n; can still get access to the environment variables through getenv() should you\n; need to.\n; Default Value: \"EGPCS\"\n; Development Value: \"GPCS\"\n; Production Value: \"GPCS\";\n; http://php.net/variables-order\nvariables_order = \"GPCS\"\n\n; This directive determines which super global data (G,P & C) should be\n; registered into the super global array REQUEST. If so, it also determines\n; the order in which that data is registered. The values for this directive\n; are specified in the same manner as the variables_order directive,\n; EXCEPT one. Leaving this value empty will cause PHP to use the value set\n; in the variables_order directive. It does not mean it will leave the super\n; globals array REQUEST empty.\n; Default Value: None\n; Development Value: \"GP\"\n; Production Value: \"GP\"\n; http://php.net/request-order\nrequest_order = \"GP\"\n\n; This directive determines whether PHP registers $argv & $argc each time it\n; runs. $argv contains an array of all the arguments passed to PHP when a script\n; is invoked. $argc contains an integer representing the number of arguments\n; that were passed when the script was invoked. These arrays are extremely\n; useful when running scripts from the command line. When this directive is\n; enabled, registering these variables consumes CPU cycles and memory each time\n; a script is executed. For performance reasons, this feature should be disabled\n; on production servers.\n; Note: This directive is hardcoded to On for the CLI SAPI\n; Default Value: On\n; Development Value: Off\n; Production Value: Off\n; http://php.net/register-argc-argv\nregister_argc_argv = Off\n\n; When enabled, the ENV, REQUEST and SERVER variables are created when they're\n; first used (Just In Time) instead of when the script starts. If these\n; variables are not used within a script, having this directive on will result\n; in a performance gain. The PHP directive register_argc_argv must be disabled\n; for this directive to have any effect.\n; http://php.net/auto-globals-jit\nauto_globals_jit = On\n\n; Whether PHP will read the POST data.\n; This option is enabled by default.\n; Most likely, you won't want to disable this option globally. It causes $_POST\n; and $_FILES to always be empty; the only way you will be able to read the\n; POST data will be through the php://input stream wrapper. This can be useful\n; to proxy requests or to process the POST data in a memory efficient fashion.\n; http://php.net/enable-post-data-reading\n;enable_post_data_reading = Off\n\n; Maximum size of POST data that PHP will accept.\n; Its value may be 0 to disable the limit. It is ignored if POST data reading\n; is disabled through enable_post_data_reading.\n; http://php.net/post-max-size\n;post_max_size = 8M\npost_max_size = 8M\n\n; Automatically add files before PHP document.\n; http://php.net/auto-prepend-file\nauto_prepend_file =\n\n; Automatically add files after PHP document.\n; http://php.net/auto-append-file\nauto_append_file =\n\n; By default, PHP will output a media type using the Content-Type header. To\n; disable this, simply set it to be empty.\n;\n; PHP's built-in default media type is set to text/html.\n; http://php.net/default-mimetype\ndefault_mimetype = \"text/html\"\n\n; PHP's default character set is set to UTF-8.\n; http://php.net/default-charset\ndefault_charset = \"UTF-8\"\n\n; PHP internal character encoding is set to empty.\n; If empty, default_charset is used.\n; http://php.net/internal-encoding\n;internal_encoding =\n\n; PHP input character encoding is set to empty.\n; If empty, default_charset is used.\n; http://php.net/input-encoding\n;input_encoding =\n\n; PHP output character encoding is set to empty.\n; If empty, default_charset is used.\n; See also output_buffer.\n; http://php.net/output-encoding\n;output_encoding =\n\n;;;;;;;;;;;;;;;;;;;;;;;;;\n; Paths and Directories ;\n;;;;;;;;;;;;;;;;;;;;;;;;;\n\n; UNIX: \"/path1:/path2\"\n;include_path = \".:/php/includes\"\n;\n; Windows: \"\\path1;\\path2\"\n;include_path = \".;c:\\php\\includes\"\n;\n; PHP's default setting for include_path is \".;/path/to/php/pear\"\n; http://php.net/include-path\n\n; The root of the PHP pages, used only if nonempty.\n; if PHP was not compiled with FORCE_REDIRECT, you SHOULD set doc_root\n; if you are running php as a CGI under any web server (other than IIS)\n; see documentation for security issues.  The alternate is to use the\n; cgi.force_redirect configuration below\n; http://php.net/doc-root\ndoc_root =\n\n; The directory under which PHP opens the script using /~username used only\n; if nonempty.\n; http://php.net/user-dir\nuser_dir =\n\n; Directory in which the loadable extensions (modules) reside.\n; http://php.net/extension-dir\n;extension_dir = \"./\"\n; On windows:\n;extension_dir = \"ext\"\n\n; Directory where the temporary files should be placed.\n; Defaults to the system default (see sys_get_temp_dir)\n;sys_temp_dir = \"/tmp\"\n\n; Whether or not to enable the dl() function.  The dl() function does NOT work\n; properly in multithreaded servers, such as IIS or Zeus, and is automatically\n; disabled on them.\n; http://php.net/enable-dl\nenable_dl = Off\n\n; cgi.force_redirect is necessary to provide security running PHP as a CGI under\n; most web servers.  Left undefined, PHP turns this on by default.  You can\n; turn it off here AT YOUR OWN RISK\n; **You CAN safely turn this off for IIS, in fact, you MUST.**\n; http://php.net/cgi.force-redirect\n;cgi.force_redirect = 1\n\n; if cgi.nph is enabled it will force cgi to always sent Status: 200 with\n; every request. PHP's default behavior is to disable this feature.\n;cgi.nph = 1\n\n; if cgi.force_redirect is turned on, and you are not running under Apache or Netscape\n; (iPlanet) web servers, you MAY need to set an environment variable name that PHP\n; will look for to know it is OK to continue execution.  Setting this variable MAY\n; cause security issues, KNOW WHAT YOU ARE DOING FIRST.\n; http://php.net/cgi.redirect-status-env\n;cgi.redirect_status_env =\n\n; cgi.fix_pathinfo provides *real* PATH_INFO/PATH_TRANSLATED support for CGI.  PHP's\n; previous behaviour was to set PATH_TRANSLATED to SCRIPT_FILENAME, and to not grok\n; what PATH_INFO is.  For more information on PATH_INFO, see the cgi specs.  Setting\n; this to 1 will cause PHP CGI to fix its paths to conform to the spec.  A setting\n; of zero causes PHP to behave as before.  Default is 1.  You should fix your scripts\n; to use SCRIPT_FILENAME rather than PATH_TRANSLATED.\n; http://php.net/cgi.fix-pathinfo\n;cgi.fix_pathinfo=1\n\n; if cgi.discard_path is enabled, the PHP CGI binary can safely be placed outside\n; of the web tree and people will not be able to circumvent .htaccess security.\n;cgi.discard_path=1\n\n; FastCGI under IIS supports the ability to impersonate\n; security tokens of the calling client.  This allows IIS to define the\n; security context that the request runs under.  mod_fastcgi under Apache\n; does not currently support this feature (03/17/2002)\n; Set to 1 if running under IIS.  Default is zero.\n; http://php.net/fastcgi.impersonate\n;fastcgi.impersonate = 1\n\n; Disable logging through FastCGI connection. PHP's default behavior is to enable\n; this feature.\n;fastcgi.logging = 0\n\n; cgi.rfc2616_headers configuration option tells PHP what type of headers to\n; use when sending HTTP response code. If set to 0, PHP sends Status: header that\n; is supported by Apache. When this option is set to 1, PHP will send\n; RFC2616 compliant header.\n; Default is zero.\n; http://php.net/cgi.rfc2616-headers\n;cgi.rfc2616_headers = 0\n\n; cgi.check_shebang_line controls whether CGI PHP checks for line starting with #!\n; (shebang) at the top of the running script. This line might be needed if the\n; script support running both as stand-alone script and via PHP CGI<. PHP in CGI\n; mode skips this line and ignores its content if this directive is turned on.\n; http://php.net/cgi.check-shebang-line\n;cgi.check_shebang_line=1\n\n;;;;;;;;;;;;;;;;\n; File Uploads ;\n;;;;;;;;;;;;;;;;\n\n; Whether to allow HTTP file uploads.\n; http://php.net/file-uploads\nfile_uploads = On\n\n; Temporary directory for HTTP uploaded files (will use system default if not\n; specified).\n; http://php.net/upload-tmp-dir\n;upload_tmp_dir =\n\n; Maximum allowed size for uploaded files.\n; http://php.net/upload-max-filesize\n;upload_max_filesize = 2M\nupload_max_filesize = 3M\n\n; Maximum number of files that can be uploaded via a single request\nmax_file_uploads = 20\n\n;;;;;;;;;;;;;;;;;;\n; Fopen wrappers ;\n;;;;;;;;;;;;;;;;;;\n\n; Whether to allow the treatment of URLs (like http:// or ftp://) as files.\n; http://php.net/allow-url-fopen\nallow_url_fopen = On\n\n; Whether to allow include/require to open URLs (like http:// or ftp://) as files.\n; http://php.net/allow-url-include\nallow_url_include = Off\n\n; Define the anonymous ftp password (your email address). PHP's default setting\n; for this is empty.\n; http://php.net/from\n;from=\"john@doe.com\"\n\n; Define the User-Agent string. PHP's default setting for this is empty.\n; http://php.net/user-agent\n;user_agent=\"PHP\"\n\n; Default timeout for socket based streams (seconds)\n; http://php.net/default-socket-timeout\ndefault_socket_timeout = 60\n\n; If your scripts have to deal with files from Macintosh systems,\n; or you are running on a Mac and need to deal with files from\n; unix or win32 systems, setting this flag will cause PHP to\n; automatically detect the EOL character in those files so that\n; fgets() and file() will work regardless of the source of the file.\n; http://php.net/auto-detect-line-endings\n;auto_detect_line_endings = Off\n\n;;;;;;;;;;;;;;;;;;;;;;\n; Dynamic Extensions ;\n;;;;;;;;;;;;;;;;;;;;;;\n\n; If you wish to have an extension loaded automatically, use the following\n; syntax:\n;\n;   extension=modulename\n;\n; For example:\n;\n;   extension=mysqli\n;\n; When the extension library to load is not located in the default extension\n; directory, You may specify an absolute path to the library file:\n;\n;   extension=/path/to/extension/mysqli.so\n;\n; Note : The syntax used in previous PHP versions ('extension=<ext>.so' and\n; 'extension='php_<ext>.dll') is supported for legacy reasons and may be\n; deprecated in a future PHP major version. So, when it is possible, please\n; move to the new ('extension=<ext>) syntax.\n;\n; Notes for Windows environments :\n;\n; - Many DLL files are located in the extensions/ (PHP 4) or ext/ (PHP 5+)\n;   extension folders as well as the separate PECL DLL download (PHP 5+).\n;   Be sure to appropriately set the extension_dir directive.\n;\n;extension=bz2\n;extension=curl\n;extension=ffi\n;extension=ftp\n;extension=fileinfo\n;extension=gd2\n;extension=gettext\n;extension=gmp\n;extension=intl\n;extension=imap\n;extension=ldap\n;extension=mbstring\n;extension=exif      ; Must be after mbstring as it depends on it\n;extension=mysqli\n;extension=oci8_12c  ; Use with Oracle Database 12c Instant Client\n;extension=odbc\n;extension=openssl\n;extension=pdo_firebird\n;extension=pdo_mysql\n;extension=pdo_oci\n;extension=pdo_odbc\n;extension=pdo_pgsql\n;extension=pdo_sqlite\n;extension=pgsql\n;extension=shmop\n\n; The MIBS data available in the PHP distribution must be installed.\n; See http://www.php.net/manual/en/snmp.installation.php\n;extension=snmp\n\n;extension=soap\n;extension=sockets\n;extension=sodium\n;extension=sqlite3\n;extension=tidy\n;extension=xmlrpc\n;extension=xsl\n\n;;;;;;;;;;;;;;;;;;;\n; Module Settings ;\n;;;;;;;;;;;;;;;;;;;\n\n[CLI Server]\n; Whether the CLI web server uses ANSI color coding in its terminal output.\ncli_server.color = On\n\n[Date]\n; Defines the default timezone used by the date functions\n; http://php.net/date.timezone\n;date.timezone =\ndate.timezone = America/New_York\n\n; http://php.net/date.default-latitude\n;date.default_latitude = 31.7667\n\n; http://php.net/date.default-longitude\n;date.default_longitude = 35.2333\n\n; http://php.net/date.sunrise-zenith\n;date.sunrise_zenith = 90.583333\n\n; http://php.net/date.sunset-zenith\n;date.sunset_zenith = 90.583333\n\n[filter]\n; http://php.net/filter.default\n;filter.default = unsafe_raw\n\n; http://php.net/filter.default-flags\n;filter.default_flags =\n\n[iconv]\n; Use of this INI entry is deprecated, use global input_encoding instead.\n; If empty, default_charset or input_encoding or iconv.input_encoding is used.\n; The precedence is: default_charset < input_encoding < iconv.input_encoding\n;iconv.input_encoding =\n\n; Use of this INI entry is deprecated, use global internal_encoding instead.\n; If empty, default_charset or internal_encoding or iconv.internal_encoding is used.\n; The precedence is: default_charset < internal_encoding < iconv.internal_encoding\n;iconv.internal_encoding =\n\n; Use of this INI entry is deprecated, use global output_encoding instead.\n; If empty, default_charset or output_encoding or iconv.output_encoding is used.\n; The precedence is: default_charset < output_encoding < iconv.output_encoding\n; To use an output encoding conversion, iconv's output handler must be set\n; otherwise output encoding conversion cannot be performed.\n;iconv.output_encoding =\n\n[imap]\n; rsh/ssh logins are disabled by default. Use this INI entry if you want to\n; enable them. Note that the IMAP library does not filter mailbox names before\n; passing them to rsh/ssh command, thus passing untrusted data to this function\n; with rsh/ssh enabled is insecure.\n;imap.enable_insecure_rsh=0\n\n[intl]\n;intl.default_locale =\n; This directive allows you to produce PHP errors when some error\n; happens within intl functions. The value is the level of the error produced.\n; Default is 0, which does not produce any errors.\n;intl.error_level = E_WARNING\n;intl.use_exceptions = 0\n\n[sqlite3]\n; Directory pointing to SQLite3 extensions\n; http://php.net/sqlite3.extension-dir\n;sqlite3.extension_dir =\n\n; SQLite defensive mode flag (only available from SQLite 3.26+)\n; When the defensive flag is enabled, language features that allow ordinary\n; SQL to deliberately corrupt the database file are disabled. This forbids\n; writing directly to the schema, shadow tables (eg. FTS data tables), or\n; the sqlite_dbpage virtual table.\n; https://www.sqlite.org/c3ref/c_dbconfig_defensive.html\n; (for older SQLite versions, this flag has no use)\n;sqlite3.defensive = 1\n\n[Pcre]\n; PCRE library backtracking limit.\n; http://php.net/pcre.backtrack-limit\n;pcre.backtrack_limit=100000\n\n; PCRE library recursion limit.\n; Please note that if you set this value to a high number you may consume all\n; the available process stack and eventually crash PHP (due to reaching the\n; stack size limit imposed by the Operating System).\n; http://php.net/pcre.recursion-limit\n;pcre.recursion_limit=100000\n\n; Enables or disables JIT compilation of patterns. This requires the PCRE\n; library to be compiled with JIT support.\n;pcre.jit=1\n\n[Pdo]\n; Whether to pool ODBC connections. Can be one of \"strict\", \"relaxed\" or \"off\"\n; http://php.net/pdo-odbc.connection-pooling\n;pdo_odbc.connection_pooling=strict\n\n;pdo_odbc.db2_instance_name\n\n[Pdo_mysql]\n; Default socket name for local MySQL connects.  If empty, uses the built-in\n; MySQL defaults.\npdo_mysql.default_socket=\n\n[Phar]\n; http://php.net/phar.readonly\n;phar.readonly = On\n\n; http://php.net/phar.require-hash\n;phar.require_hash = On\n\n;phar.cache_list =\n\n[mail function]\n; For Win32 only.\n; http://php.net/smtp\nSMTP = localhost\n; http://php.net/smtp-port\nsmtp_port = 25\n\n; For Win32 only.\n; http://php.net/sendmail-from\n;sendmail_from = me@example.com\n\n; For Unix only.  You may supply arguments as well (default: \"sendmail -t -i\").\n; http://php.net/sendmail-path\n;sendmail_path =\n\n; Force the addition of the specified parameters to be passed as extra parameters\n; to the sendmail binary. These parameters will always replace the value of\n; the 5th parameter to mail().\n;mail.force_extra_parameters =\n\n; Add X-PHP-Originating-Script: that will include uid of the script followed by the filename\nmail.add_x_header = Off\n\n; The path to a log file that will log all mail() calls. Log entries include\n; the full path of the script, line number, To address and headers.\n;mail.log =\n; Log mail to syslog (Event Log on Windows).\n;mail.log = syslog\n\n[ODBC]\n; http://php.net/odbc.default-db\n;odbc.default_db    =  Not yet implemented\n\n; http://php.net/odbc.default-user\n;odbc.default_user  =  Not yet implemented\n\n; http://php.net/odbc.default-pw\n;odbc.default_pw    =  Not yet implemented\n\n; Controls the ODBC cursor model.\n; Default: SQL_CURSOR_STATIC (default).\n;odbc.default_cursortype\n\n; Allow or prevent persistent links.\n; http://php.net/odbc.allow-persistent\nodbc.allow_persistent = On\n\n; Check that a connection is still valid before reuse.\n; http://php.net/odbc.check-persistent\nodbc.check_persistent = On\n\n; Maximum number of persistent links.  -1 means no limit.\n; http://php.net/odbc.max-persistent\nodbc.max_persistent = -1\n\n; Maximum number of links (persistent + non-persistent).  -1 means no limit.\n; http://php.net/odbc.max-links\nodbc.max_links = -1\n\n; Handling of LONG fields.  Returns number of bytes to variables.  0 means\n; passthru.\n; http://php.net/odbc.defaultlrl\nodbc.defaultlrl = 4096\n\n; Handling of binary data.  0 means passthru, 1 return as is, 2 convert to char.\n; See the documentation on odbc_binmode and odbc_longreadlen for an explanation\n; of odbc.defaultlrl and odbc.defaultbinmode\n; http://php.net/odbc.defaultbinmode\nodbc.defaultbinmode = 1\n\n[MySQLi]\n\n; Maximum number of persistent links.  -1 means no limit.\n; http://php.net/mysqli.max-persistent\nmysqli.max_persistent = -1\n\n; Allow accessing, from PHP's perspective, local files with LOAD DATA statements\n; http://php.net/mysqli.allow_local_infile\n;mysqli.allow_local_infile = On\n\n; Allow or prevent persistent links.\n; http://php.net/mysqli.allow-persistent\nmysqli.allow_persistent = On\n\n; Maximum number of links.  -1 means no limit.\n; http://php.net/mysqli.max-links\nmysqli.max_links = -1\n\n; Default port number for mysqli_connect().  If unset, mysqli_connect() will use\n; the $MYSQL_TCP_PORT or the mysql-tcp entry in /etc/services or the\n; compile-time value defined MYSQL_PORT (in that order).  Win32 will only look\n; at MYSQL_PORT.\n; http://php.net/mysqli.default-port\nmysqli.default_port = 3306\n\n; Default socket name for local MySQL connects.  If empty, uses the built-in\n; MySQL defaults.\n; http://php.net/mysqli.default-socket\nmysqli.default_socket =\n\n; Default host for mysqli_connect() (doesn't apply in safe mode).\n; http://php.net/mysqli.default-host\nmysqli.default_host =\n\n; Default user for mysqli_connect() (doesn't apply in safe mode).\n; http://php.net/mysqli.default-user\nmysqli.default_user =\n\n; Default password for mysqli_connect() (doesn't apply in safe mode).\n; Note that this is generally a *bad* idea to store passwords in this file.\n; *Any* user with PHP access can run 'echo get_cfg_var(\"mysqli.default_pw\")\n; and reveal this password!  And of course, any users with read access to this\n; file will be able to reveal the password as well.\n; http://php.net/mysqli.default-pw\nmysqli.default_pw =\n\n; Allow or prevent reconnect\nmysqli.reconnect = Off\n\n[mysqlnd]\n; Enable / Disable collection of general statistics by mysqlnd which can be\n; used to tune and monitor MySQL operations.\nmysqlnd.collect_statistics = On\n\n; Enable / Disable collection of memory usage statistics by mysqlnd which can be\n; used to tune and monitor MySQL operations.\nmysqlnd.collect_memory_statistics = Off\n\n; Records communication from all extensions using mysqlnd to the specified log\n; file.\n; http://php.net/mysqlnd.debug\n;mysqlnd.debug =\n\n; Defines which queries will be logged.\n;mysqlnd.log_mask = 0\n\n; Default size of the mysqlnd memory pool, which is used by result sets.\n;mysqlnd.mempool_default_size = 16000\n\n; Size of a pre-allocated buffer used when sending commands to MySQL in bytes.\n;mysqlnd.net_cmd_buffer_size = 2048\n\n; Size of a pre-allocated buffer used for reading data sent by the server in\n; bytes.\n;mysqlnd.net_read_buffer_size = 32768\n\n; Timeout for network requests in seconds.\n;mysqlnd.net_read_timeout = 31536000\n\n; SHA-256 Authentication Plugin related. File with the MySQL server public RSA\n; key.\n;mysqlnd.sha256_server_public_key =\n\n[OCI8]\n\n; Connection: Enables privileged connections using external\n; credentials (OCI_SYSOPER, OCI_SYSDBA)\n; http://php.net/oci8.privileged-connect\n;oci8.privileged_connect = Off\n\n; Connection: The maximum number of persistent OCI8 connections per\n; process. Using -1 means no limit.\n; http://php.net/oci8.max-persistent\n;oci8.max_persistent = -1\n\n; Connection: The maximum number of seconds a process is allowed to\n; maintain an idle persistent connection. Using -1 means idle\n; persistent connections will be maintained forever.\n; http://php.net/oci8.persistent-timeout\n;oci8.persistent_timeout = -1\n\n; Connection: The number of seconds that must pass before issuing a\n; ping during oci_pconnect() to check the connection validity. When\n; set to 0, each oci_pconnect() will cause a ping. Using -1 disables\n; pings completely.\n; http://php.net/oci8.ping-interval\n;oci8.ping_interval = 60\n\n; Connection: Set this to a user chosen connection class to be used\n; for all pooled server requests with Oracle 11g Database Resident\n; Connection Pooling (DRCP).  To use DRCP, this value should be set to\n; the same string for all web servers running the same application,\n; the database pool must be configured, and the connection string must\n; specify to use a pooled server.\n;oci8.connection_class =\n\n; High Availability: Using On lets PHP receive Fast Application\n; Notification (FAN) events generated when a database node fails. The\n; database must also be configured to post FAN events.\n;oci8.events = Off\n\n; Tuning: This option enables statement caching, and specifies how\n; many statements to cache. Using 0 disables statement caching.\n; http://php.net/oci8.statement-cache-size\n;oci8.statement_cache_size = 20\n\n; Tuning: Enables statement prefetching and sets the default number of\n; rows that will be fetched automatically after statement execution.\n; http://php.net/oci8.default-prefetch\n;oci8.default_prefetch = 100\n\n; Compatibility. Using On means oci_close() will not close\n; oci_connect() and oci_new_connect() connections.\n; http://php.net/oci8.old-oci-close-semantics\n;oci8.old_oci_close_semantics = Off\n\n[PostgreSQL]\n; Allow or prevent persistent links.\n; http://php.net/pgsql.allow-persistent\npgsql.allow_persistent = On\n\n; Detect broken persistent links always with pg_pconnect().\n; Auto reset feature requires a little overheads.\n; http://php.net/pgsql.auto-reset-persistent\npgsql.auto_reset_persistent = Off\n\n; Maximum number of persistent links.  -1 means no limit.\n; http://php.net/pgsql.max-persistent\npgsql.max_persistent = -1\n\n; Maximum number of links (persistent+non persistent).  -1 means no limit.\n; http://php.net/pgsql.max-links\npgsql.max_links = -1\n\n; Ignore PostgreSQL backends Notice message or not.\n; Notice message logging require a little overheads.\n; http://php.net/pgsql.ignore-notice\npgsql.ignore_notice = 0\n\n; Log PostgreSQL backends Notice message or not.\n; Unless pgsql.ignore_notice=0, module cannot log notice message.\n; http://php.net/pgsql.log-notice\npgsql.log_notice = 0\n\n[bcmath]\n; Number of decimal digits for all bcmath functions.\n; http://php.net/bcmath.scale\nbcmath.scale = 0\n\n[browscap]\n; http://php.net/browscap\n;browscap = extra/browscap.ini\n\n[Session]\n; Handler used to store/retrieve data.\n; http://php.net/session.save-handler\nsession.save_handler = files\n\n; Argument passed to save_handler.  In the case of files, this is the path\n; where data files are stored. Note: Windows users have to change this\n; variable in order to use PHP's session functions.\n;\n; The path can be defined as:\n;\n;     session.save_path = \"N;/path\"\n;\n; where N is an integer.  Instead of storing all the session files in\n; /path, what this will do is use subdirectories N-levels deep, and\n; store the session data in those directories.  This is useful if\n; your OS has problems with many files in one directory, and is\n; a more efficient layout for servers that handle many sessions.\n;\n; NOTE 1: PHP will not create this directory structure automatically.\n;         You can use the script in the ext/session dir for that purpose.\n; NOTE 2: See the section on garbage collection below if you choose to\n;         use subdirectories for session storage\n;\n; The file storage module creates files using mode 600 by default.\n; You can change that by using\n;\n;     session.save_path = \"N;MODE;/path\"\n;\n; where MODE is the octal representation of the mode. Note that this\n; does not overwrite the process's umask.\n; http://php.net/session.save-path\n;session.save_path = \"/tmp\"\n\n; Whether to use strict session mode.\n; Strict session mode does not accept an uninitialized session ID, and\n; regenerates the session ID if the browser sends an uninitialized session ID.\n; Strict mode protects applications from session fixation via a session adoption\n; vulnerability. It is disabled by default for maximum compatibility, but\n; enabling it is encouraged.\n; https://wiki.php.net/rfc/strict_sessions\nsession.use_strict_mode = 0\n\n; Whether to use cookies.\n; http://php.net/session.use-cookies\nsession.use_cookies = 1\n\n; http://php.net/session.cookie-secure\n;session.cookie_secure =\n\n; This option forces PHP to fetch and use a cookie for storing and maintaining\n; the session id. We encourage this operation as it's very helpful in combating\n; session hijacking when not specifying and managing your own session id. It is\n; not the be-all and end-all of session hijacking defense, but it's a good start.\n; http://php.net/session.use-only-cookies\nsession.use_only_cookies = 1\n\n; Name of the session (used as cookie name).\n; http://php.net/session.name\nsession.name = PHPSESSID\n\n; Initialize session on request startup.\n; http://php.net/session.auto-start\nsession.auto_start = 0\n\n; Lifetime in seconds of cookie or, if 0, until browser is restarted.\n; http://php.net/session.cookie-lifetime\nsession.cookie_lifetime = 0\n\n; The path for which the cookie is valid.\n; http://php.net/session.cookie-path\nsession.cookie_path = /\n\n; The domain for which the cookie is valid.\n; http://php.net/session.cookie-domain\nsession.cookie_domain =\n\n; Whether or not to add the httpOnly flag to the cookie, which makes it\n; inaccessible to browser scripting languages such as JavaScript.\n; http://php.net/session.cookie-httponly\nsession.cookie_httponly =\n\n; Add SameSite attribute to cookie to help mitigate Cross-Site Request Forgery (CSRF/XSRF)\n; Current valid values are \"Strict\", \"Lax\" or \"None\". When using \"None\",\n; make sure to include the quotes, as `none` is interpreted like `false` in ini files.\n; https://tools.ietf.org/html/draft-west-first-party-cookies-07\nsession.cookie_samesite =\n\n; Handler used to serialize data. php is the standard serializer of PHP.\n; http://php.net/session.serialize-handler\nsession.serialize_handler = php\n\n; Defines the probability that the 'garbage collection' process is started on every\n; session initialization. The probability is calculated by using gc_probability/gc_divisor,\n; e.g. 1/100 means there is a 1% chance that the GC process starts on each request.\n; Default Value: 1\n; Development Value: 1\n; Production Value: 1\n; http://php.net/session.gc-probability\nsession.gc_probability = 1\n\n; Defines the probability that the 'garbage collection' process is started on every\n; session initialization. The probability is calculated by using gc_probability/gc_divisor,\n; e.g. 1/100 means there is a 1% chance that the GC process starts on each request.\n; For high volume production servers, using a value of 1000 is a more efficient approach.\n; Default Value: 100\n; Development Value: 1000\n; Production Value: 1000\n; http://php.net/session.gc-divisor\nsession.gc_divisor = 1000\n\n; After this number of seconds, stored data will be seen as 'garbage' and\n; cleaned up by the garbage collection process.\n; http://php.net/session.gc-maxlifetime\nsession.gc_maxlifetime = 1440\n\n; NOTE: If you are using the subdirectory option for storing session files\n;       (see session.save_path above), then garbage collection does *not*\n;       happen automatically.  You will need to do your own garbage\n;       collection through a shell script, cron entry, or some other method.\n;       For example, the following script is the equivalent of setting\n;       session.gc_maxlifetime to 1440 (1440 seconds = 24 minutes):\n;          find /path/to/sessions -cmin +24 -type f | xargs rm\n\n; Check HTTP Referer to invalidate externally stored URLs containing ids.\n; HTTP_REFERER has to contain this substring for the session to be\n; considered as valid.\n; http://php.net/session.referer-check\nsession.referer_check =\n\n; Set to {nocache,private,public,} to determine HTTP caching aspects\n; or leave this empty to avoid sending anti-caching headers.\n; http://php.net/session.cache-limiter\nsession.cache_limiter = nocache\n\n; Document expires after n minutes.\n; http://php.net/session.cache-expire\nsession.cache_expire = 180\n\n; trans sid support is disabled by default.\n; Use of trans sid may risk your users' security.\n; Use this option with caution.\n; - User may send URL contains active session ID\n;   to other person via. email/irc/etc.\n; - URL that contains active session ID may be stored\n;   in publicly accessible computer.\n; - User may access your site with the same session ID\n;   always using URL stored in browser's history or bookmarks.\n; http://php.net/session.use-trans-sid\nsession.use_trans_sid = 0\n\n; Set session ID character length. This value could be between 22 to 256.\n; Shorter length than default is supported only for compatibility reason.\n; Users should use 32 or more chars.\n; http://php.net/session.sid-length\n; Default Value: 32\n; Development Value: 26\n; Production Value: 26\nsession.sid_length = 26\n\n; The URL rewriter will look for URLs in a defined set of HTML tags.\n; <form> is special; if you include them here, the rewriter will\n; add a hidden <input> field with the info which is otherwise appended\n; to URLs. <form> tag's action attribute URL will not be modified\n; unless it is specified.\n; Note that all valid entries require a \"=\", even if no value follows.\n; Default Value: \"a=href,area=href,frame=src,form=\"\n; Development Value: \"a=href,area=href,frame=src,form=\"\n; Production Value: \"a=href,area=href,frame=src,form=\"\n; http://php.net/url-rewriter.tags\nsession.trans_sid_tags = \"a=href,area=href,frame=src,form=\"\n\n; URL rewriter does not rewrite absolute URLs by default.\n; To enable rewrites for absolute paths, target hosts must be specified\n; at RUNTIME. i.e. use ini_set()\n; <form> tags is special. PHP will check action attribute's URL regardless\n; of session.trans_sid_tags setting.\n; If no host is defined, HTTP_HOST will be used for allowed host.\n; Example value: php.net,www.php.net,wiki.php.net\n; Use \",\" for multiple hosts. No spaces are allowed.\n; Default Value: \"\"\n; Development Value: \"\"\n; Production Value: \"\"\n;session.trans_sid_hosts=\"\"\n\n; Define how many bits are stored in each character when converting\n; the binary hash data to something readable.\n; Possible values:\n;   4  (4 bits: 0-9, a-f)\n;   5  (5 bits: 0-9, a-v)\n;   6  (6 bits: 0-9, a-z, A-Z, \"-\", \",\")\n; Default Value: 4\n; Development Value: 5\n; Production Value: 5\n; http://php.net/session.hash-bits-per-character\nsession.sid_bits_per_character = 5\n\n; Enable upload progress tracking in $_SESSION\n; Default Value: On\n; Development Value: On\n; Production Value: On\n; http://php.net/session.upload-progress.enabled\n;session.upload_progress.enabled = On\n\n; Cleanup the progress information as soon as all POST data has been read\n; (i.e. upload completed).\n; Default Value: On\n; Development Value: On\n; Production Value: On\n; http://php.net/session.upload-progress.cleanup\n;session.upload_progress.cleanup = On\n\n; A prefix used for the upload progress key in $_SESSION\n; Default Value: \"upload_progress_\"\n; Development Value: \"upload_progress_\"\n; Production Value: \"upload_progress_\"\n; http://php.net/session.upload-progress.prefix\n;session.upload_progress.prefix = \"upload_progress_\"\n\n; The index name (concatenated with the prefix) in $_SESSION\n; containing the upload progress information\n; Default Value: \"PHP_SESSION_UPLOAD_PROGRESS\"\n; Development Value: \"PHP_SESSION_UPLOAD_PROGRESS\"\n; Production Value: \"PHP_SESSION_UPLOAD_PROGRESS\"\n; http://php.net/session.upload-progress.name\n;session.upload_progress.name = \"PHP_SESSION_UPLOAD_PROGRESS\"\n\n; How frequently the upload progress should be updated.\n; Given either in percentages (per-file), or in bytes\n; Default Value: \"1%\"\n; Development Value: \"1%\"\n; Production Value: \"1%\"\n; http://php.net/session.upload-progress.freq\n;session.upload_progress.freq =  \"1%\"\n\n; The minimum delay between updates, in seconds\n; Default Value: 1\n; Development Value: 1\n; Production Value: 1\n; http://php.net/session.upload-progress.min-freq\n;session.upload_progress.min_freq = \"1\"\n\n; Only write session data when session data is changed. Enabled by default.\n; http://php.net/session.lazy-write\n;session.lazy_write = On\n\n[Assertion]\n; Switch whether to compile assertions at all (to have no overhead at run-time)\n; -1: Do not compile at all\n;  0: Jump over assertion at run-time\n;  1: Execute assertions\n; Changing from or to a negative value is only possible in php.ini! (For turning assertions on and off at run-time, see assert.active, when zend.assertions = 1)\n; Default Value: 1\n; Development Value: 1\n; Production Value: -1\n; http://php.net/zend.assertions\nzend.assertions = -1\n\n; Assert(expr); active by default.\n; http://php.net/assert.active\n;assert.active = On\n\n; Throw an AssertionError on failed assertions\n; http://php.net/assert.exception\n;assert.exception = On\n\n; Issue a PHP warning for each failed assertion. (Overridden by assert.exception if active)\n; http://php.net/assert.warning\n;assert.warning = On\n\n; Don't bail out by default.\n; http://php.net/assert.bail\n;assert.bail = Off\n\n; User-function to be called if an assertion fails.\n; http://php.net/assert.callback\n;assert.callback = 0\n\n; Eval the expression with current error_reporting().  Set to true if you want\n; error_reporting(0) around the eval().\n; http://php.net/assert.quiet-eval\n;assert.quiet_eval = 0\n\n[COM]\n; path to a file containing GUIDs, IIDs or filenames of files with TypeLibs\n; http://php.net/com.typelib-file\n;com.typelib_file =\n\n; allow Distributed-COM calls\n; http://php.net/com.allow-dcom\n;com.allow_dcom = true\n\n; autoregister constants of a component's typlib on com_load()\n; http://php.net/com.autoregister-typelib\n;com.autoregister_typelib = true\n\n; register constants casesensitive\n; http://php.net/com.autoregister-casesensitive\n;com.autoregister_casesensitive = false\n\n; show warnings on duplicate constant registrations\n; http://php.net/com.autoregister-verbose\n;com.autoregister_verbose = true\n\n; The default character set code-page to use when passing strings to and from COM objects.\n; Default: system ANSI code page\n;com.code_page=\n\n[mbstring]\n; language for internal character representation.\n; This affects mb_send_mail() and mbstring.detect_order.\n; http://php.net/mbstring.language\n;mbstring.language = Japanese\n\n; Use of this INI entry is deprecated, use global internal_encoding instead.\n; internal/script encoding.\n; Some encoding cannot work as internal encoding. (e.g. SJIS, BIG5, ISO-2022-*)\n; If empty, default_charset or internal_encoding or iconv.internal_encoding is used.\n; The precedence is: default_charset < internal_encoding < iconv.internal_encoding\n;mbstring.internal_encoding =\n\n; Use of this INI entry is deprecated, use global input_encoding instead.\n; http input encoding.\n; mbstring.encoding_translation = On is needed to use this setting.\n; If empty, default_charset or input_encoding or mbstring.input is used.\n; The precedence is: default_charset < input_encoding < mbsting.http_input\n; http://php.net/mbstring.http-input\n;mbstring.http_input =\n\n; Use of this INI entry is deprecated, use global output_encoding instead.\n; http output encoding.\n; mb_output_handler must be registered as output buffer to function.\n; If empty, default_charset or output_encoding or mbstring.http_output is used.\n; The precedence is: default_charset < output_encoding < mbstring.http_output\n; To use an output encoding conversion, mbstring's output handler must be set\n; otherwise output encoding conversion cannot be performed.\n; http://php.net/mbstring.http-output\n;mbstring.http_output =\n\n; enable automatic encoding translation according to\n; mbstring.internal_encoding setting. Input chars are\n; converted to internal encoding by setting this to On.\n; Note: Do _not_ use automatic encoding translation for\n;       portable libs/applications.\n; http://php.net/mbstring.encoding-translation\n;mbstring.encoding_translation = Off\n\n; automatic encoding detection order.\n; \"auto\" detect order is changed according to mbstring.language\n; http://php.net/mbstring.detect-order\n;mbstring.detect_order = auto\n\n; substitute_character used when character cannot be converted\n; one from another\n; http://php.net/mbstring.substitute-character\n;mbstring.substitute_character = none\n\n; overload(replace) single byte functions by mbstring functions.\n; mail(), ereg(), etc are overloaded by mb_send_mail(), mb_ereg(),\n; etc. Possible values are 0,1,2,4 or combination of them.\n; For example, 7 for overload everything.\n; 0: No overload\n; 1: Overload mail() function\n; 2: Overload str*() functions\n; 4: Overload ereg*() functions\n; http://php.net/mbstring.func-overload\n;mbstring.func_overload = 0\n\n; enable strict encoding detection.\n; Default: Off\n;mbstring.strict_detection = On\n\n; This directive specifies the regex pattern of content types for which mb_output_handler()\n; is activated.\n; Default: mbstring.http_output_conv_mimetype=^(text/|application/xhtml\\+xml)\n;mbstring.http_output_conv_mimetype=\n\n; This directive specifies maximum stack depth for mbstring regular expressions. It is similar\n; to the pcre.recursion_limit for PCRE.\n; Default: 100000\n;mbstring.regex_stack_limit=100000\n\n; This directive specifies maximum retry count for mbstring regular expressions. It is similar\n; to the pcre.backtrack_limit for PCRE.\n; Default: 1000000\n;mbstring.regex_retry_limit=1000000\n\n[gd]\n; Tell the jpeg decode to ignore warnings and try to create\n; a gd image. The warning will then be displayed as notices\n; disabled by default\n; http://php.net/gd.jpeg-ignore-warning\n;gd.jpeg_ignore_warning = 1\n\n[exif]\n; Exif UNICODE user comments are handled as UCS-2BE/UCS-2LE and JIS as JIS.\n; With mbstring support this will automatically be converted into the encoding\n; given by corresponding encode setting. When empty mbstring.internal_encoding\n; is used. For the decode settings you can distinguish between motorola and\n; intel byte order. A decode setting cannot be empty.\n; http://php.net/exif.encode-unicode\n;exif.encode_unicode = ISO-8859-15\n\n; http://php.net/exif.decode-unicode-motorola\n;exif.decode_unicode_motorola = UCS-2BE\n\n; http://php.net/exif.decode-unicode-intel\n;exif.decode_unicode_intel    = UCS-2LE\n\n; http://php.net/exif.encode-jis\n;exif.encode_jis =\n\n; http://php.net/exif.decode-jis-motorola\n;exif.decode_jis_motorola = JIS\n\n; http://php.net/exif.decode-jis-intel\n;exif.decode_jis_intel    = JIS\n\n[Tidy]\n; The path to a default tidy configuration file to use when using tidy\n; http://php.net/tidy.default-config\n;tidy.default_config = /usr/local/lib/php/default.tcfg\n\n; Should tidy clean and repair output automatically?\n; WARNING: Do not use this option if you are generating non-html content\n; such as dynamic images\n; http://php.net/tidy.clean-output\ntidy.clean_output = Off\n\n[soap]\n; Enables or disables WSDL caching feature.\n; http://php.net/soap.wsdl-cache-enabled\nsoap.wsdl_cache_enabled=1\n\n; Sets the directory name where SOAP extension will put cache files.\n; http://php.net/soap.wsdl-cache-dir\nsoap.wsdl_cache_dir=\"/tmp\"\n\n; (time to live) Sets the number of second while cached file will be used\n; instead of original one.\n; http://php.net/soap.wsdl-cache-ttl\nsoap.wsdl_cache_ttl=86400\n\n; Sets the size of the cache limit. (Max. number of WSDL files to cache)\nsoap.wsdl_cache_limit = 5\n\n[sysvshm]\n; A default size of the shared memory segment\n;sysvshm.init_mem = 10000\n\n[ldap]\n; Sets the maximum number of open links or -1 for unlimited.\nldap.max_links = -1\n\n[dba]\n;dba.default_handler=\n\n[opcache]\n; Determines if Zend OPCache is enabled\n;opcache.enable=1\n\n; Determines if Zend OPCache is enabled for the CLI version of PHP\n;opcache.enable_cli=0\n\n; The OPcache shared memory storage size.\n;opcache.memory_consumption=128\n\n; The amount of memory for interned strings in Mbytes.\n;opcache.interned_strings_buffer=8\n\n; The maximum number of keys (scripts) in the OPcache hash table.\n; Only numbers between 200 and 1000000 are allowed.\n;opcache.max_accelerated_files=10000\n\n; The maximum percentage of \"wasted\" memory until a restart is scheduled.\n;opcache.max_wasted_percentage=5\n\n; When this directive is enabled, the OPcache appends the current working\n; directory to the script key, thus eliminating possible collisions between\n; files with the same name (basename). Disabling the directive improves\n; performance, but may break existing applications.\n;opcache.use_cwd=1\n\n; When disabled, you must reset the OPcache manually or restart the\n; webserver for changes to the filesystem to take effect.\n;opcache.validate_timestamps=1\n\n; How often (in seconds) to check file timestamps for changes to the shared\n; memory storage allocation. (\"1\" means validate once per second, but only\n; once per request. \"0\" means always validate)\n;opcache.revalidate_freq=2\n\n; Enables or disables file search in include_path optimization\n;opcache.revalidate_path=0\n\n; If disabled, all PHPDoc comments are dropped from the code to reduce the\n; size of the optimized code.\n;opcache.save_comments=1\n\n; Allow file existence override (file_exists, etc.) performance feature.\n;opcache.enable_file_override=0\n\n; A bitmask, where each bit enables or disables the appropriate OPcache\n; passes\n;opcache.optimization_level=0x7FFFBFFF\n\n;opcache.dups_fix=0\n\n; The location of the OPcache blacklist file (wildcards allowed).\n; Each OPcache blacklist file is a text file that holds the names of files\n; that should not be accelerated. The file format is to add each filename\n; to a new line. The filename may be a full path or just a file prefix\n; (i.e., /var/www/x  blacklists all the files and directories in /var/www\n; that start with 'x'). Line starting with a ; are ignored (comments).\n;opcache.blacklist_filename=\n\n; Allows exclusion of large files from being cached. By default all files\n; are cached.\n;opcache.max_file_size=0\n\n; Check the cache checksum each N requests.\n; The default value of \"0\" means that the checks are disabled.\n;opcache.consistency_checks=0\n\n; How long to wait (in seconds) for a scheduled restart to begin if the cache\n; is not being accessed.\n;opcache.force_restart_timeout=180\n\n; OPcache error_log file name. Empty string assumes \"stderr\".\n;opcache.error_log=\n\n; All OPcache errors go to the Web server log.\n; By default, only fatal errors (level 0) or errors (level 1) are logged.\n; You can also enable warnings (level 2), info messages (level 3) or\n; debug messages (level 4).\n;opcache.log_verbosity_level=1\n\n; Preferred Shared Memory back-end. Leave empty and let the system decide.\n;opcache.preferred_memory_model=\n\n; Protect the shared memory from unexpected writing during script execution.\n; Useful for internal debugging only.\n;opcache.protect_memory=0\n\n; Allows calling OPcache API functions only from PHP scripts which path is\n; started from specified string. The default \"\" means no restriction\n;opcache.restrict_api=\n\n; Mapping base of shared memory segments (for Windows only). All the PHP\n; processes have to map shared memory into the same address space. This\n; directive allows to manually fix the \"Unable to reattach to base address\"\n; errors.\n;opcache.mmap_base=\n\n; Facilitates multiple OPcache instances per user (for Windows only). All PHP\n; processes with the same cache ID and user share an OPcache instance.\n;opcache.cache_id=\n\n; Enables and sets the second level cache directory.\n; It should improve performance when SHM memory is full, at server restart or\n; SHM reset. The default \"\" disables file based caching.\n;opcache.file_cache=\n\n; Enables or disables opcode caching in shared memory.\n;opcache.file_cache_only=0\n\n; Enables or disables checksum validation when script loaded from file cache.\n;opcache.file_cache_consistency_checks=1\n\n; Implies opcache.file_cache_only=1 for a certain process that failed to\n; reattach to the shared memory (for Windows only). Explicitly enabled file\n; cache is required.\n;opcache.file_cache_fallback=1\n\n; Enables or disables copying of PHP code (text segment) into HUGE PAGES.\n; This should improve performance, but requires appropriate OS configuration.\n;opcache.huge_code_pages=1\n\n; Validate cached file permissions.\n;opcache.validate_permission=0\n\n; Prevent name collisions in chroot'ed environment.\n;opcache.validate_root=0\n\n; If specified, it produces opcode dumps for debugging different stages of\n; optimizations.\n;opcache.opt_debug_level=0\n\n; Specifies a PHP script that is going to be compiled and executed at server\n; start-up.\n; http://php.net/opcache.preload\n;opcache.preload=\n\n; Preloading code as root is not allowed for security reasons. This directive\n; facilitates to let the preloading to be run as another user.\n; http://php.net/opcache.preload_user\n;opcache.preload_user=\n\n; Prevents caching files that are less than this number of seconds old. It\n; protects from caching of incompletely updated files. In case all file updates\n; on your site are atomic, you may increase performance by setting it to \"0\".\n;opcache.file_update_protection=2\n\n; Absolute path used to store shared lockfiles (for *nix only).\n;opcache.lockfile_path=/tmp\n\n[curl]\n; A default value for the CURLOPT_CAINFO option. This is required to be an\n; absolute path.\n;curl.cainfo =\n\n[openssl]\n; The location of a Certificate Authority (CA) file on the local filesystem\n; to use when verifying the identity of SSL/TLS peers. Most users should\n; not specify a value for this directive as PHP will attempt to use the\n; OS-managed cert stores in its absence. If specified, this value may still\n; be overridden on a per-stream basis via the \"cafile\" SSL stream context\n; option.\n;openssl.cafile=\n\n; If openssl.cafile is not specified or if the CA file is not found, the\n; directory pointed to by openssl.capath is searched for a suitable\n; certificate. This value must be a correctly hashed certificate directory.\n; Most users should not specify a value for this directive as PHP will\n; attempt to use the OS-managed cert stores in its absence. If specified,\n; this value may still be overridden on a per-stream basis via the \"capath\"\n; SSL stream context option.\n;openssl.capath=\n\n[ffi]\n; FFI API restriction. Possible values:\n; \"preload\" - enabled in CLI scripts and preloaded files (default)\n; \"false\"   - always disabled\n; \"true\"    - always enabled\n;ffi.enable=preload\n\n; List of headers files to preload, wildcard patterns allowed.\n;ffi.preload=\n"
  },
  {
    "path": "appdata/php/php8/pear.conf",
    "content": "#PEAR_Config 0.9\na:33:{s:9:\"cache_dir\";s:15:\"/tmp/pear/cache\";s:15:\"default_channel\";s:12:\"pear.php.net\";s:16:\"preferred_mirror\";s:12:\"pear.php.net\";s:13:\"remote_config\";s:0:\"\";s:13:\"auto_discover\";i:0;s:13:\"master_server\";s:12:\"pear.php.net\";s:10:\"http_proxy\";s:0:\"\";s:7:\"php_dir\";s:18:\"/usr/local/lib/php\";s:7:\"ext_dir\";s:55:\"/usr/local/lib/php/extensions/no-debug-non-zts-20240924\";s:7:\"doc_dir\";s:22:\"/usr/local/lib/php/doc\";s:7:\"bin_dir\";s:14:\"/usr/local/bin\";s:8:\"data_dir\";s:23:\"/usr/local/lib/php/data\";s:7:\"cfg_dir\";s:22:\"/usr/local/lib/php/cfg\";s:7:\"www_dir\";s:25:\"/usr/local/lib/php/htdocs\";s:7:\"man_dir\";s:28:\"/usr/local/lib/php/local/man\";s:8:\"test_dir\";s:23:\"/usr/local/lib/php/test\";s:8:\"temp_dir\";s:14:\"/tmp/pear/temp\";s:12:\"download_dir\";s:18:\"/tmp/pear/download\";s:7:\"php_bin\";s:18:\"/usr/local/bin/php\";s:10:\"php_prefix\";s:0:\"\";s:10:\"php_suffix\";s:0:\"\";s:7:\"php_ini\";s:0:\"\";s:12:\"metadata_dir\";s:0:\"\";s:8:\"username\";s:0:\"\";s:8:\"password\";s:0:\"\";s:7:\"verbose\";i:1;s:15:\"preferred_state\";s:6:\"stable\";s:5:\"umask\";i:18;s:9:\"cache_ttl\";i:3600;s:8:\"sig_type\";s:3:\"gpg\";s:7:\"sig_bin\";s:18:\"/usr/local/bin/gpg\";s:9:\"sig_keyid\";s:0:\"\";s:10:\"sig_keydir\";s:23:\"/usr/local/etc/pearkeys\";}"
  },
  {
    "path": "appdata/php/php8/php/conf.d/extensions.ini",
    "content": "zend_extension=opcache\nextension=amqp\nextension=bcmath\nextension=bz2\nextension=calendar\nextension=exif\nextension=gd\nextension=gettext\nextension=imagick\nextension=intl\nextension=ldap\nextension=mysqli\nextension=pdo_mysql\nextension=pdo_pgsql\nextension=pgsql\nextension=redis\nextension=soap\nextension=sockets\nextension=xsl\nextension=zip"
  },
  {
    "path": "appdata/php/php8/php/conf.d/extensions.ini.example",
    "content": "extension=gd\nextension=mysqli\nextension=sodium\nextension=pdo_mysql\nextension=exif\nextension=zip\nextension=imagick\nextension=mcrypt\nextension=pspell\nextension=redis\nextension=sockets\nextension=ssh2\n\nzend_extension=opcache"
  },
  {
    "path": "appdata/php/php8/php/conf.d/opcache.ini",
    "content": "; Claude Sonnet 3.5 - February 4, 2025\nopcache.enable=1\nopcache.memory_consumption=512\nopcache.interned_strings_buffer=16\nopcache.max_accelerated_files=20000\nopcache.revalidate_freq=3600\nopcache.validate_timestamps=0\nopcache.max_wasted_percentage=10\nopcache.enable_cli=0\nopcache.save_comments=1\n\n; WordPress specific\nopcache.fast_shutdown=1\nopcache.consistency_checks=0"
  },
  {
    "path": "appdata/php/php8/php/conf.d/opcache.ini.example",
    "content": "opcache.enable=1\n\n; 0 means it will check on every request\n;Development = 0. Production = 1 or comment out (default 1)\nopcache.revalidate_freq=0\n; 0 is irrelevant if opcache.validate_timestamps=0 which is desirable in production\n;Development = 1. Production = 0 or comment out (default 0)\nopcache.validate_timestamps=1\n;Development = 1. Production0 or comment out (default 0)\nopcache.consistency_checks=1\n\nopcache.max_accelerated_files=20000\nopcache.memory_consumption=192\nopcache.max_wasted_percentage=10\nopcache.interned_strings_buffer=16\nopcache.fast_shutdown=1"
  },
  {
    "path": "appdata/php/php8/php/conf.d/opcache.ini.new",
    "content": "; Claude Sonnet 3.5\nopcache.enable=0\nopcache.memory_consumption=256\nopcache.interned_strings_buffer=16\nopcache.max_accelerated_files=20000\nopcache.revalidate_freq=3600\nopcache.validate_timestamps=0\nopcache.max_wasted_percentage=10\nopcache.enable_cli=0\nopcache.save_comments=1\n\n; WordPress specific\nopcache.fast_shutdown=1\nopcache.consistency_checks=0"
  },
  {
    "path": "appdata/php/php8/php/conf.d/opcache.ini.old",
    "content": "opcache.enable=1\n; 0 means it will check on every request\n;Development = 0. Production = 1 or comment out (default 1)\nopcache.revalidate_freq=1\n; 0 is irrelevant if opcache.validate_timestamps=0 which is desirable in production\n;Development = 1. Production = 0 or comment out (default 0)\nopcache.validate_timestamps=0\n;Development = 1. Production =0 or comment out (default 0)\nopcache.consistency_checks=0\n\nopcache.max_accelerated_files=20000\nopcache.memory_consumption=128\nopcache.max_wasted_percentage=10\nopcache.interned_strings_buffer=16\nopcache.fast_shutdown=1\n"
  },
  {
    "path": "appdata/php/php8/php/php.ini",
    "content": "; Memory\nmemory_limit = 256M\nmax_execution_time = 300\nmax_input_time = 60\nmax_input_vars = 3000\n\n; File Upload\nupload_max_filesize = 8M\npost_max_size = 18M\nmax_file_uploads = 20\n\n; Error Handling\nerror_reporting = E_ALL & ~E_DEPRECATED & ~E_STRICT\ndisplay_errors = Off\ndisplay_startup_errors = Off\nlog_errors = On\nerror_log = /var/log/php/php-error.log\n\n; Performance\nrealpath_cache_size = 4096k\nrealpath_cache_ttl = 120\n\n; Session\nsession.save_handler = files\nsession.gc_probability = 1\nsession.gc_divisor = 1000"
  },
  {
    "path": "appdata/php/php8/php-fpm.conf",
    "content": ";;;;;;;;;;;;;;;;;;;;;\n; FPM Configuration ;\n;;;;;;;;;;;;;;;;;;;;;\n\n; All relative paths in this configuration file are relative to PHP's install\n; prefix (/usr/local). This prefix can be dynamically changed by using the\n; '-p' argument from the command line.\n\n;;;;;;;;;;;;;;;;;;\n; Global Options ;\n;;;;;;;;;;;;;;;;;;\n\n[global]\n; Pid file\n; Note: the default prefix is /usr/local/var\n; Default Value: none\n;pid = run/php-fpm.pid\n\n; Error log file\n; If it's set to \"syslog\", log is sent to syslogd instead of being written\n; into a local file.\n; Note: the default prefix is /usr/local/var\n; Default Value: log/php-fpm.log\n;error_log = log/php-fpm.log\n\n; syslog_facility is used to specify what type of program is logging the\n; message. This lets syslogd specify that messages from different facilities\n; will be handled differently.\n; See syslog(3) for possible values (ex daemon equiv LOG_DAEMON)\n; Default Value: daemon\n;syslog.facility = daemon\n\n; syslog_ident is prepended to every message. If you have multiple FPM\n; instances running on the same server, you can change the default value\n; which must suit common needs.\n; Default Value: php-fpm\n;syslog.ident = php-fpm\n\n; Log level\n; Possible Values: alert, error, warning, notice, debug\n; Default Value: notice\n;log_level = notice\n\n; Log limit on number of characters in the single line (log entry). If the\n; line is over the limit, it is wrapped on multiple lines. The limit is for\n; all logged characters including message prefix and suffix if present. However\n; the new line character does not count into it as it is present only when\n; logging to a file descriptor. It means the new line character is not present\n; when logging to syslog.\n; Default Value: 1024\n;log_limit = 4096\n\n; Log buffering specifies if the log line is buffered which means that the\n; line is written in a single write operation. If the value is false, then the\n; data is written directly into the file descriptor. It is an experimental\n; option that can potentially improve logging performance and memory usage\n; for some heavy logging scenarios. This option is ignored if logging to syslog\n; as it has to be always buffered.\n; Default value: yes\n;log_buffering = no\n\n; If this number of child processes exit with SIGSEGV or SIGBUS within the time\n; interval set by emergency_restart_interval then FPM will restart. A value\n; of '0' means 'Off'.\n; Default Value: 0\n;emergency_restart_threshold = 0\n\n; Interval of time used by emergency_restart_interval to determine when\n; a graceful restart will be initiated.  This can be useful to work around\n; accidental corruptions in an accelerator's shared memory.\n; Available Units: s(econds), m(inutes), h(ours), or d(ays)\n; Default Unit: seconds\n; Default Value: 0\n;emergency_restart_interval = 0\n\n; Time limit for child processes to wait for a reaction on signals from master.\n; Available units: s(econds), m(inutes), h(ours), or d(ays)\n; Default Unit: seconds\n; Default Value: 0\n;process_control_timeout = 0\n\n; The maximum number of processes FPM will fork. This has been designed to control\n; the global number of processes when using dynamic PM within a lot of pools.\n; Use it with caution.\n; Note: A value of 0 indicates no limit\n; Default Value: 0\n; process.max = 128\n\n; Specify the nice(2) priority to apply to the master process (only if set)\n; The value can vary from -19 (highest priority) to 20 (lowest priority)\n; Note: - It will only work if the FPM master process is launched as root\n;       - The pool process will inherit the master process priority\n;         unless specified otherwise\n; Default Value: no set\n; process.priority = -19\n\n; Send FPM to background. Set to 'no' to keep FPM in foreground for debugging.\n; Default Value: yes\n;daemonize = yes\n\n; Set open file descriptor rlimit for the master process.\n; Default Value: system defined value\n;rlimit_files = 1024\n\n; Set max core size rlimit for the master process.\n; Possible Values: 'unlimited' or an integer greater or equal to 0\n; Default Value: system defined value\n;rlimit_core = 0\n\n; Specify the event mechanism FPM will use. The following is available:\n; - select     (any POSIX os)\n; - poll       (any POSIX os)\n; - epoll      (linux >= 2.5.44)\n; - kqueue     (FreeBSD >= 4.1, OpenBSD >= 2.9, NetBSD >= 2.0)\n; - port       (Solaris >= 10)\n; Default Value: not set (auto detection)\n;events.mechanism = epoll\n\n; When FPM is built with systemd integration, specify the interval,\n; in seconds, between health report notification to systemd.\n; Set to 0 to disable.\n; Available Units: s(econds), m(inutes), h(ours)\n; Default Unit: seconds\n; Default value: 10\n;systemd_interval = 10\n\n;;;;;;;;;;;;;;;;;;;;\n; Pool Definitions ;\n;;;;;;;;;;;;;;;;;;;;\n\n; Multiple pools of child processes may be started with different listening\n; ports and different management options.  The name of the pool will be\n; used in logs and stats. There is no limitation on the number of pools which\n; FPM can handle. Your system will tell you anyway :)\n\n; Include one or more files. If glob(3) exists, it is used to include a bunch of\n; files from a glob(3) pattern. This directive can be used everywhere in the\n; file.\n; Relative path can also be used. They will be prefixed by:\n;  - the global prefix if it's been set (-p argument)\n;  - /usr/local otherwise\ninclude=etc/php-fpm.d/*.conf\n"
  },
  {
    "path": "appdata/php/php8/php-fpm.d/docker.conf",
    "content": "[global]\n; error_log = /proc/self/fd/2\nerror_log = /var/log/php/error.log\n; access_log = /var/log/php/access.log\n\n; https://github.com/docker-library/php/pull/725#issuecomment-443540114\nlog_limit = 8192\n\n[www]\n; php-fpm closes STDOUT on startup, so sending logs to /proc/self/fd/1 does not work.\n; https://bugs.php.net/bug.php?id=73886\naccess.log = /proc/self/fd/2\n; access.log = /var/log/php/www-access.log\nclear_env = no\n\n; Ensure worker stdout and stderr are sent to the main error log.\ncatch_workers_output = yes\ndecorate_workers_output = no\n\n[wordpress]\n; php-fpm closes STDOUT on startup, so sending logs to /proc/self/fd/1 does not work.\n; https://bugs.php.net/bug.php?id=73886\naccess.log = /proc/self/fd/2\n; access.log = /var/log/php/wordpress-access.log\n\nclear_env = no\n\n; Ensure worker stdout and stderr are sent to the main error log.\ncatch_workers_output = yes\ndecorate_workers_output = no"
  },
  {
    "path": "appdata/php/php8/php-fpm.d/wordpress.conf",
    "content": "; USE THE ONE BELOW IF IN FUTURE YOU DECIDE TO USE A SEPARATE PHP PROCESS FOR NON-WP SITES. REMEMBER TO CHANGE THE PORT 9000 TO AVOID CONFLICT. Also the name [WWW]\n; Claude Sonnet 3.5 - February 4, 2025\n\n[wordpress]\nuser = www-data\ngroup = www-data\nlisten = 127.0.0.1:9001\n\npm = dynamic\npm.max_children = 50\npm.start_servers = 8\npm.min_spare_servers = 4\npm.max_spare_servers = 12\n; pm.max_requests = 500 ; possibly causing slow down plugin activation/deactivation\n\npm.process_idle_timeout = 10s ; possibly causing slow down plugin activation/deactivation\nrequest_terminate_timeout = 300s ; possibly causing slow down plugin activation/deactivation\n\nphp_admin_value[error_log] = /var/log/php/wordpress-error.log\nphp_admin_flag[log_errors] = on\n"
  },
  {
    "path": "appdata/php/php8/php-fpm.d/www.conf",
    "content": "; USE THE ONE BELOW IF IN FUTURE YOU DECIDE TO USE A SEPARATE PHP PROCESS FOR NON-WP SITES. REMEMBER TO CHANGE THE PORT 9000 TO AVOID CONFLICT. Also the name [WWW]\n; Claude Sonnet 3.5 - February 4, 2025\n\n[www]\nuser = www-data\ngroup = www-data\nlisten = 127.0.0.1:9000\n\npm = dynamic\npm.max_children = 20\npm.start_servers = 4\npm.min_spare_servers = 2\npm.max_spare_servers = 6\n; pm.max_requests = 500 ; possibly causing slow down plugin activation/deactivation\n\npm.process_idle_timeout = 10s ; possibly causing slow down plugin activation/deactivation\nrequest_terminate_timeout = 300s ; possibly causing slow down plugin activation/deactivation\n\nphp_admin_value[error_log] = /var/log/php/www-error.log\nphp_admin_flag[log_errors] = on\n\n\n"
  },
  {
    "path": "appdata/php/php8/php-fpm.d/zz-docker.conf",
    "content": "[global]\ndaemonize = no\n\n[www]\nlisten = 9000\n\n[wordpress]\nlisten = 9001"
  },
  {
    "path": "appdata/picard/filenaming_script.example",
    "content": "$noop( *** BASED ON https://community.metabrainz.org/t/repository-for-neat-file-name-string-patterns-and-tagger-script-snippets/2786/25 *** )\n$noop( *** DO NOT EDIT THE AREA BELOW | EDITABLE AREA WILL BE AT THE VERY BOTTOM *** )\n\t\t\t$set(MainFolder1,-= $upper($left(%albumartist%,1)) =-/)\n\t\t\t$set(MainFolder2,-= $upper($left(%albumartistsort%,1)) =-/)\n\t\t\t$set(MainFolder3,)\n\t\t\t$set(Artist1,$replace($rreplace(%albumartist%,[_:*?\"<>|],-),?,)/)\n\t\t\t$set(Artist2,$replace($rreplace(%albumartistsort%,[_:*?\"<>|],-),?,)/)\n\t\t\t$set(Album1,$replace($rreplace([$left(%date%,4)] %album%,[_:*?\"<>|], -),?,)$if(%date%,$if(%album%, ))/)\n\t\t\t$set(Album1,$if(%date%,$if(%album%, )[$left(%date%,4)]) $replace($rreplace(%album%,[_:*?\"<>|], -),?,) - $upper(%_extension%)/)\n\t\t\t$set(Album2,$replace($rreplace(%album%,[_:*?\"<>|], -),?,)/)\n\t\t\t$set(MultiDisc1,$if($gt(%totaldiscs%,1),Disc $num(%discnumber%,1)/)\n\t\t\t$set(MultiDisc2,)\n\t\t\t$set(PreTitle1,$replace($rreplace(%albumartist% - %album% -,[_:*?\"<>|], -),?,))\n\t\t\t$set(PreTitle2,)\n\t\t\t$set(Track1, $num(%tracknumber%,2) - )\n\t\t\t$set(Track2, $num(%discnumber%,1)-$num(%tracknumber%,2) - ))\n\t\t\t$set(Title,$replace($rreplace(%title%,[_:*?\"<>|],),?,))\n$noop( *** DO NOT EDIT THE AREA ABOVE| EDITABLE AREA IS JUST BELOW *** )\n\n$noop( *** The Following will use the example of artist: Amy Winehouse and album: Back to Black *** )\n$noop( *** Default output: -=A =-/Amy Winehouse/Back to Black [2007]/Disc 1/Amy Winehouse - Back to Black - 01 - Rehab *** )\n$noop( *** Change the NUMERICAL value ONLY! Example: %MainFolder1% would be changed to %MainFolder2% *** )\n$noop( *** Only change the numerical value to either 1 or 2, anything else will mess things up. *** )\n%MainFolder3%\t$noop( OPTION 1 -= A=- | OPTION 2 -= W =- | OPTION 3 = No single character folder will be created. )\n%Artist1%\t\t\t$noop( OPTION 1 = Amy WineHouse| OPTION 2 = Winehouse, Amy )\n%Album1%\t\t\t$noop( OPTION 1 = [2007] Back to Black | OPTION 2 = Back to Black )\n%MultiDisc2%\t\t$noop( OPTION 1 = If album has more than 1 Disc, then add Disc folders | OPTION 2 = Do not sort by Disc, put all files into a single folder. )\n%PreTitle2%\t\t$noop( OPTION 1 = Show Artist and Album in the track title | OPTION 2 = Do not display Artist or Album)\n%Track2%\t\t\t$noop( OPTION 1 = Track Number: 01 | OPTION 2: Track Number: 1-01-> This is best if MultiDisc is set to 2, because you will have 2 track numbers as 01 - *track names*, etc. )\n%Title%\t\t\t\t$noop( NO OPTION - Just display the name of the track. )\n"
  },
  {
    "path": "appdata/rclone/rclone-logrotate.conf.example",
    "content": "/home/USER/docker/appdata/rclone/logs/*.log {\n    daily\n    rotate 7\n    notifempty\n    missingok\n    compress\n    delaycompress\n    su USER USER\n    create 0664 USER USER\n    size 20M\n}"
  },
  {
    "path": "appdata/rclone/rclone.conf.example",
    "content": "[shb-drive]\ntype = drive\nscope = drive\ntoken = {\"access_token\":\"blah_blah_blah\",\"expiry\":\"2021-02-12T22:37:02.490073796-05:00\"}\nroot_folder_id = blah_blah_blah\nclient_id = blah_blah_blah\nclient_secret = blah_blah_blah\n\n[shb-crypt]\ntype = crypt\nremote = shb-drive:crypt\npassword = blah_blah_blah\npassword2 = blah_blah_blah\n\n"
  },
  {
    "path": "appdata/traefik2/rules/ds918/app-ds918-dsm-oauth.yml.example",
    "content": "http:\n  routers:\n    synology-rtr:\n      rule: \"Host(`dsm.{{env \"DOMAINNAME_DS918\"}}`)\"\n      entryPoints:\n        - https\n      middlewares:\n        - chain-oauth\n      service: synology-svc\n      tls:\n        certResolver: dns-cloudflare\n        options: tls-opts@file\n  services:\n    synology-svc:\n      loadBalancer:\n        servers:\n          - url: \"http://192.168.1.254:5000\"\n"
  },
  {
    "path": "appdata/traefik2/rules/ds918/app-ds918-video-oauth.yml.example",
    "content": "http:\n  routers:\n    synology-video-rtr:\n      rule: \"Host(`video.{{env \"DOMAINNAME_DS918\"}}`)\"\n      entryPoints:\n        - https\n      middlewares:\n        - chain-oauth\n      service: synology-video-svc\n      tls:\n        certResolver: dns-cloudflare\n        options: tls-opts@file\n  services:\n    synology-video-svc:\n      loadBalancer:\n        servers:\n          - url: \"http://192.168.1.254:5003\"\n"
  },
  {
    "path": "appdata/traefik2/rules/ds918/chain-basic-auth.yml",
    "content": "http:\n  middlewares:\n    chain-basic-auth:\n      chain:\n        middlewares:\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-basic-auth\n          - middlewares-compress"
  },
  {
    "path": "appdata/traefik2/rules/ds918/chain-no-auth.yml",
    "content": "http:\n  middlewares:\n    chain-no-auth:\n      chain:\n        middlewares:\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-compress"
  },
  {
    "path": "appdata/traefik2/rules/ds918/chain-oauth-external.yml",
    "content": "http:\n  middlewares:\n    chain-oauth-external:\n      chain:\n        middlewares:\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-oauth-external\n          - middlewares-compress\n\n"
  },
  {
    "path": "appdata/traefik2/rules/ds918/chain-oauth.yml",
    "content": "http:\n  middlewares:\n    chain-oauth:\n      chain:\n        middlewares:\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-oauth\n          - middlewares-compress"
  },
  {
    "path": "appdata/traefik2/rules/ds918/middlewares-basic-auth.yml",
    "content": "http:\n  middlewares:\n    middlewares-basic-auth:\n      basicAuth:\n        # users:\n        #   - \"user:$apsdfswWvC/6.$E3FtsfTntPC0wVJ7IUVtX1\"\n        usersFile: \"/run/secrets/basic_auth_credentials\" \n        realm: \"Traefik 2 Basic Auth\""
  },
  {
    "path": "appdata/traefik2/rules/ds918/middlewares-buffering.yml",
    "content": "http:\n  middlewares:\n    middlewares-buffering:\n      buffering:\n        maxResponseBodyBytes: 2000000\n        maxRequestBodyBytes: 10485760  \n        memRequestBodyBytes: 2097152  \n        memResponseBodyBytes: 2097152\n        retryExpression: \"IsNetworkError() && Attempts() <= 2\"\n"
  },
  {
    "path": "appdata/traefik2/rules/ds918/middlewares-compress.yml",
    "content": "http:\n  middlewares:\n    middlewares-compress:\n      compress: {}"
  },
  {
    "path": "appdata/traefik2/rules/ds918/middlewares-oauth-external.yml",
    "content": "http:\n  middlewares:\n    middlewares-oauth-external:\n      forwardAuth:\n        address: \"https://oauth.{{env \"DOMAINNAME_DS918\"}}\" \n        trustForwardHeader: true\n        authResponseHeaders:\n          - \"X-Forwarded-User\""
  },
  {
    "path": "appdata/traefik2/rules/ds918/middlewares-oauth.yml",
    "content": "http:\n  middlewares:\n    middlewares-oauth:\n      forwardAuth:\n        address: \"http://oauth:4181\" # Make sure you have the OAuth service in docker-compose.yml\n        trustForwardHeader: true\n        authResponseHeaders:\n          - \"X-Forwarded-User\""
  },
  {
    "path": "appdata/traefik2/rules/ds918/middlewares-rate-limit.yml",
    "content": "http:\n  middlewares:\n    middlewares-rate-limit:\n      rateLimit:\n        average: 100\n        burst: 50"
  },
  {
    "path": "appdata/traefik2/rules/ds918/middlewares-secure-headers.yml",
    "content": "http:\n  middlewares:\n    middlewares-secure-headers:\n      headers:\n        accessControlAllowMethods:\n          - GET\n          - OPTIONS\n          - PUT\n        accessControlMaxAge: 100\n        hostsProxyHeaders:\n          - \"X-Forwarded-Host\"\n        # sslRedirect: true #replaced with middlewares-https-redirectscheme for v2.5.x\n        stsSeconds: 63072000\n        stsIncludeSubdomains: true\n        stsPreload: true\n        forceSTSHeader: true\n        # frameDeny: true #overwritten by customFrameOptionsValue\n        customFrameOptionsValue: \"allow-from https:{{env \"DOMAINNAME_DS918\"}}\" #CSP takes care of this but may be needed for organizr.\n        contentTypeNosniff: true\n        browserXssFilter: true\n        # sslForceHost: true # add sslHost to all of the services\n        # sslHost: \"{{env \"DOMAINNAME_DS918\"}}\"\n        referrerPolicy: \"same-origin\"\n        # Setting contentSecurityPolicy is more secure but it can break things. Proper auth will reduce the risk.\n        # the below line also breaks some apps due to 'none' - sonarr, radarr, etc.\n        # contentSecurityPolicy: \"frame-ancestors '*.{{env \"DOMAINNAME_DS918\"}}:*';object-src 'none';script-src 'none';\"\n        # Line below, featurePolicy, was deprecated in v2.5.x in favor permissionPolicy\n        # featurePolicy: \"camera 'none'; geolocation 'none'; microphone 'none'; payment 'none'; usb 'none'; vr 'none';\"\n        permissionsPolicy: \"camera=(), microphone=(), geolocation=(), payment=(), usb=(), vr=()\"\n        customResponseHeaders:\n          X-Robots-Tag: \"none,noarchive,nosnippet,notranslate,noimageindex,\"\n          server: \"\"\n          # https://community.traefik.io/t/how-to-make-websockets-work-with-traefik-2-0-setting-up-rancher/1732\n          # X-Forwarded-Proto: \"https\""
  },
  {
    "path": "appdata/traefik2/rules/ds918/tls-opts.yml",
    "content": "tls:\n  options:\n    tls-opts:\n      minVersion: VersionTLS12\n      cipherSuites:\n        - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\n        - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\n        - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\n        - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\n        - TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305\n        - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305\n        - TLS_AES_128_GCM_SHA256\n        - TLS_AES_256_GCM_SHA384\n        - TLS_CHACHA20_POLY1305_SHA256\n        - TLS_FALLBACK_SCSV # Client is doing version fallback. See RFC 7507\n      curvePreferences:\n        - CurveP521\n        - CurveP384\n      sniStrict: true\n"
  },
  {
    "path": "appdata/traefik2/rules/hs/app-adguard-home-authelia.yml.example",
    "content": "http:\n  routers:\n    adguard-rtr:\n      rule: \"Host(`ag.{{env \"DOMAINNAME_HS\"}}`)\"\n      entryPoints:\n        - websecure\n      middlewares:\n        - chain-authelia\n      service: adguard-svc\n      tls:\n        certResolver: dns-cloudflare\n        options: tls-opts@file\n  services:\n    adguard-svc:\n      loadBalancer:\n        servers:\n          - url: \"http://ADGUARD-CLOUD-SERVER-IP:80\"\n\n"
  },
  {
    "path": "appdata/traefik2/rules/hs/app-adguard-home-oauth.yml.example",
    "content": "http:\n  routers:\n    adguard-rtr:\n      rule: \"Host(`ag.{{env \"DOMAINNAME_HS\"}}`)\"\n      entryPoints:\n        - websecure\n      middlewares:\n        - chain-oauth\n      service: adguard-svc\n      tls:\n        certResolver: dns-cloudflare\n        options: tls-opts@file\n  services:\n    adguard-svc:\n      loadBalancer:\n        servers:\n          - url: \"http://ADGUARD-CLOUD-SERVER-IP:80\"\n\n"
  },
  {
    "path": "appdata/traefik2/rules/hs/app-haos-no-auth.yml.example",
    "content": "http:\n  routers:\n    haos-rtr:\n      rule: \"Host(`haos.{{env \"DOMAINNAME_HS\"}}`)\" \n      entryPoints:\n        - websecure\n      middlewares:\n        - chain-no-auth\n      service: haos-svc\n      tls:\n        certResolver: dns-cloudflare\n  services:\n    haos-svc:\n      loadBalancer:\n        servers:\n          - url: \"http://192.168.1.123:8123\"  # or whatever your external host's IP:port is \n"
  },
  {
    "path": "appdata/traefik2/rules/hs/app-pihole-oauth.yml.example",
    "content": "http:\n  routers:\n    pihole-rtr:\n      rule: \"Host(`pihole.{{env \"DOMAINNAME_HS\"}}`)\" \n      entryPoints:\n        - websecure\n      middlewares:\n        - chain-oauth\n        - pihole-add-admin\n      service: pihole-svc\n      tls:\n        certResolver: dns-cloudflare\n  middlewares:\n    pihole-add-admin:\n      addPrefix: \n        prefix: \"/admin\"\n  services:\n    pihole-svc:\n      loadBalancer:\n        servers:\n          - url: \"http://192.168.1.26:80\"  # or whatever your external host's IP:port is \n"
  },
  {
    "path": "appdata/traefik2/rules/hs/app-plex-no-auth.yml.example",
    "content": "http:\n  routers:\n    splex-rtr:\n      rule: \"Host(`splex.{{env \"DOMAINNAME_HS\"}}`)\"\n      entryPoints:\n        - websecure\n      middlewares:\n        - chain-oauth\n      service: splex-svc\n      tls:\n        certResolver: dns-cloudflare\n        options: tls-opts@file\n  services:\n    splex-svc:\n      loadBalancer:\n        servers:\n          - url: \"http://192.168.1.238:32400\"\n"
  },
  {
    "path": "appdata/traefik2/rules/hs/app-proxmox-ve-oauth.yml.example",
    "content": "http:\n  routers:\n    proxmox-rtr:\n      rule: \"Host(`pve.{{env \"DOMAINNAME_HS\"}}`)\"\n      entryPoints:\n        - websecure\n      middlewares:\n        - chain-oauth\n      service: proxmox-svc\n      tls:\n        certResolver: dns-cloudflare\n        options: tls-opts@file\n  services:\n    proxmox-svc:\n      loadBalancer:\n        passHostHeader: true\n        serversTransport: \"pve\"\n        servers:\n          - url: \"https://192.168.1.100:8006/\"\n  serversTransports:\n    pve:\n      insecureSkipVerify: true\n"
  },
  {
    "path": "appdata/traefik2/rules/hs/app-tautulli-with-auth-bypass.yml.example",
    "content": "http:\n  routers:\n    tautulli-rtr:\n      rule: \"Host(`tautulli.{{env \"DOMAINNAME_HS\"}}`)\"\n      priority: 99\n      entryPoints:\n        - websecure\n      middlewares:\n        - chain-oauth\n      service: tautulli-svc\n    tautulli-rtr-bypass:\n      # rule: \"Host(`tautulli.$DOMAINNAME_HS`) && Header(`traefik-auth-bypass-key`, `$TRAEFIK_AUTH_BYPASS_KEY`)\" # Bypass Auth for LunaSea on iOS\n      rule: \"Host(`tautulli.$DOMAINNAME_HS`) && (Header(`X-Api-Key`, `$TAUTULLI_API_KEY`) || Query(`apikey`, `$TAUTULLI_API_KEY`))\" \n      priority: 100\n      entryPoints:\n        - websecure\n      middlewares:\n        - chain-no-auth\n      service: tautulli-svc\n  services:\n    tautulli-svc:\n      loadBalancer:\n        servers:\n          - url: \"http://192.168.1.111:8181\"\n"
  },
  {
    "path": "appdata/traefik2/rules/hs/app-unifi-controller-authelia.example",
    "content": "http:\n  routers:\n    unifi-rtr:\n      rule: \"Host(`unifi.{{env \"DOMAINNAME_HS\"}}`)\"\n      entryPoints:\n        - websecure\n      middlewares:\n        - chain-authelia\n      service: unifi-svc\n      tls:\n        certResolver: dns-cloudflare\n        options: tls-opts@file\n  services:\n    unifi-svc:\n      loadBalancer:\n        passHostHeader: true\n        serversTransport: \"pve\"\n        servers:\n          - url: \"https://192.168.1.100:8443/\"\n  serversTransports:\n    pve:\n      insecureSkipVerify: true\n"
  },
  {
    "path": "appdata/traefik2/rules/hs/chain-authelia.yml",
    "content": "http:\n  middlewares:\n    chain-authelia:\n      chain:\n        middlewares:\n          # - middlewares-traefik-bouncer # leave this out if you are not using CrowdSec\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-authelia"
  },
  {
    "path": "appdata/traefik2/rules/hs/chain-basic-auth.yml",
    "content": "http:\n  middlewares:\n    chain-basic-auth:\n      chain:\n        middlewares:\n          - middlewares-traefik-bouncer # leave this out if you are not using CrowdSec        \n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-basic-auth\n          #- middlewares-compress"
  },
  {
    "path": "appdata/traefik2/rules/hs/chain-no-auth-no-crowdsec.yml",
    "content": "http:\n  middlewares:\n    chain-no-auth-no-crowdsec:\n      chain:\n        middlewares:\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          #- middlewares-compress "
  },
  {
    "path": "appdata/traefik2/rules/hs/chain-no-auth.yml",
    "content": "http:\n  middlewares:\n    chain-no-auth:\n      chain:\n        middlewares:\n          #- middlewares-traefik-bouncer # leave this out if you are not using CrowdSec\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          #- middlewares-compress\n"
  },
  {
    "path": "appdata/traefik2/rules/hs/chain-oauth-external.yml",
    "content": "http:\n  middlewares:\n    chain-oauth-external:\n      chain:\n        middlewares:\n          - middlewares-traefik-bouncer # leave this out if you are not using CrowdSec\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-oauth-external\n          #- middlewares-compress"
  },
  {
    "path": "appdata/traefik2/rules/hs/chain-oauth-no-crowdsec.yml",
    "content": "http:\n  middlewares:\n    chain-oauth-no-crowdsec:\n      chain:\n        middlewares:\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-oauth\n          #- middlewares-compress"
  },
  {
    "path": "appdata/traefik2/rules/hs/chain-oauth.yml",
    "content": "http:\n  middlewares:\n    chain-oauth:\n      chain:\n        middlewares:\n          #- middlewares-traefik-bouncer # leave this out if you are not using CrowdSec        \n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-oauth\n          - middlewares-compress"
  },
  {
    "path": "appdata/traefik2/rules/hs/domain-passthrough.yml.example",
    "content": "tcp:\n  routers:\n    synology-traefik-rtr:\n      entryPoints:\n        - websecure\n      rule: \"HostSNIRegexp(`{{env \"DOMAINNAME_DS918\"}}`, `{subdomain:[a-z]+}.{{env \"DOMAINNAME_DS918\"}}`)\"\n      service: synology-traefik-svc\n      tls:\n        passthrough: true\n  services:\n    synology-traefik-svc:\n      loadBalancer:\n        servers:\n          - address: \"192.168.1.254:443\""
  },
  {
    "path": "appdata/traefik2/rules/hs/middlewares-authelia.yml",
    "content": "http:\n  middlewares:\n    middlewares-authelia:\n      forwardAuth:\n        address: \"http://authelia:9091/api/verify?rd=https://authelia.{{env \"DOMAINNAME_HS\"}}\"\n        trustForwardHeader: true\n        authResponseHeaders:\n          - \"Remote-User\"\n          - \"Remote-Groups\""
  },
  {
    "path": "appdata/traefik2/rules/hs/middlewares-basic-auth.yml",
    "content": "http:\n  middlewares:\n    middlewares-basic-auth:\n      basicAuth:\n        # users:\n        #   - \"user:$apsdfswWvC/6.$E3FtsfTntPC0wVJ7IUVtX1\"\n        usersFile: \"/run/secrets/basic_auth_credentials\" \n        realm: \"Traefik 2 Basic Auth\""
  },
  {
    "path": "appdata/traefik2/rules/hs/middlewares-buffering.yml",
    "content": "http:\n  middlewares:\n    middlewares-buffering:\n      buffering:\n        maxResponseBodyBytes: 2000000\n        maxRequestBodyBytes: 10485760  \n        memRequestBodyBytes: 2097152  \n        memResponseBodyBytes: 2097152\n        retryExpression: \"IsNetworkError() && Attempts() <= 2\"\n"
  },
  {
    "path": "appdata/traefik2/rules/hs/middlewares-compress.yml",
    "content": "http:\n  middlewares:\n    middlewares-compress:\n      compress: {}\n"
  },
  {
    "path": "appdata/traefik2/rules/hs/middlewares-oauth-external.yml",
    "content": "http:\n  middlewares:\n    middlewares-oauth-external:\n      forwardAuth:\n        address: \"https://oauth.{{env \"DOMAINNAME_HS\"}}\" # Make sure you have the OAuth service in a remote server\n        trustForwardHeader: true\n        authResponseHeaders:\n          - \"X-Forwarded-User\""
  },
  {
    "path": "appdata/traefik2/rules/hs/middlewares-oauth.yml",
    "content": "http:\n  middlewares:\n    middlewares-oauth:\n      forwardAuth:\n        address: \"http://oauth:4181\" # Make sure you have the OAuth service in docker-compose.yml\n        trustForwardHeader: true\n        authResponseHeaders:\n          - \"X-Forwarded-User\""
  },
  {
    "path": "appdata/traefik2/rules/hs/middlewares-rate-limit.yml",
    "content": "http:\n  middlewares:\n    middlewares-rate-limit:\n      rateLimit:\n        average: 100\n        burst: 50\n"
  },
  {
    "path": "appdata/traefik2/rules/hs/middlewares-secure-headers.yml",
    "content": "http:\n  middlewares:\n    middlewares-secure-headers:\n      headers:\n        accessControlAllowMethods:\n          - GET\n          - OPTIONS\n          - PUT\n        accessControlMaxAge: 100\n        hostsProxyHeaders:\n          - \"X-Forwarded-Host\"\n        stsSeconds: 63072000\n        stsIncludeSubdomains: true\n        stsPreload: true\n        # forceSTSHeader: true # This is a good thing but it can be tricky. Enable after everything works.\n        customFrameOptionsValue: SAMEORIGIN # https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options\n        contentTypeNosniff: true\n        browserXssFilter: true\n        referrerPolicy: \"same-origin\"\n        permissionsPolicy: \"camera=(), microphone=(), geolocation=(), payment=(), usb=(), vr=()\"\n        customResponseHeaders:\n          X-Robots-Tag: \"none,noarchive,nosnippet,notranslate,noimageindex,\" # disable search engines from indexing home server\n          server: \"\" # hide server info from visitors\n"
  },
  {
    "path": "appdata/traefik2/rules/hs/middlewares-traefik-bouncer.yml",
    "content": "http:\n  middlewares:\n    middlewares-traefik-bouncer:\n      forwardAuth:\n        address: \"http://traefik-bouncer:8080/api/v1/forwardAuth\" # Make sure you have the traefik-bouncer service in docker-compose.yml\n        trustForwardHeader: true"
  },
  {
    "path": "appdata/traefik2/rules/hs/tls-opts.yml",
    "content": "tls:\n  options:\n    tls-opts:\n      minVersion: VersionTLS12\n      cipherSuites:\n        - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\n        - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\n        - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\n        - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\n        - TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305\n        - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305\n        - TLS_AES_128_GCM_SHA256\n        - TLS_AES_256_GCM_SHA384\n        - TLS_CHACHA20_POLY1305_SHA256\n        - TLS_FALLBACK_SCSV # Client is doing version fallback. See RFC 7507\n      curvePreferences:\n        - CurveP521\n        - CurveP384\n      sniStrict: true\n"
  },
  {
    "path": "appdata/traefik2/rules/toml/app-hassio.toml.example",
    "content": "[http.routers]\n  [http.routers.hassio-rtr]\n      entryPoints = [\"https\"]\n      rule = \"HostHeader(`hassio.example.com`)\"\n      service = \"hassio-svc\"\n      middlewares = [\"chain-no-auth\"]\n      [http.routers.hassio-rtr.tls]\n        certresolver = \"dns-cloudflare\"\n\n[http.services]\n  [http.services.hassio-svc]\n    [http.services.hassio-svc.loadBalancer]\n      passHostHeader = true\n      [[http.services.hassio-svc.loadBalancer.servers]]\n        url = \"http://HASSIO-IP:8123\"  # or whatever your external host's IP:port is \n"
  },
  {
    "path": "appdata/traefik2/rules/toml/app-pihole.toml.example",
    "content": "[http.routers]\n  [http.routers.pihole-rtr]\n      entryPoints = [\"https\"]\n      rule = \"HostHeader(`pihole.example.com`)\"\n      service = \"pihole-svc\"\n      middlewares = [\"chain-authelia\", \"pihole-add-admin\"]\n      [http.routers.pihole-rtr.tls]\n        certresolver = \"dns-cloudflare\"\n\n[http.middlewares]\n  [http.middlewares.pihole-add-admin.addPrefix]\n    prefix = \"/admin\"\n\n[http.services]\n  [http.services.pihole-svc]\n    [http.services.pihole-svc.loadBalancer]\n      passHostHeader = true\n      [[http.services.pihole-svc.loadBalancer.servers]]\n        url = \"http://PIHOLE-IP:80\" # or whatever your external host's IP:port is\n"
  },
  {
    "path": "appdata/traefik2/rules/toml/app-unifi.toml.example",
    "content": "[http.routers]\n  [http.routers.unifi-rtr]\n      entryPoints = [\"https\"]\n      rule = \"Host(`unifi.example.com`)\" # will only work with cloudflare Full SSL (not Strict)\n      service = \"unifi-svc\"\n      middlewares = [\"chain-authelia\"]\n      [http.routers.unifi-rtr.tls]\n        certresolver = \"dns-cloudflare\"\n[http.services]\n  [http.services.unifi-svc]\n    [http.services.unifi-svc.loadBalancer]\n      passHostHeader = true\n      [[http.services.unifi-svc.loadBalancer.servers]]\n        \"https://192.168.5.254:8443\" # or whatever your external host's IP:port is \n"
  },
  {
    "path": "appdata/traefik2/rules/toml/middlewares-chains.toml.example",
    "content": "[http.middlewares]\n  [http.middlewares.chain-no-auth]\n    [http.middlewares.chain-no-auth.chain]\n      middlewares = [ \"middlewares-rate-limit\", \"middlewares-https-redirectscheme\", \"middlewares-secure-headers\"]\n\n  [http.middlewares.chain-basic-auth]\n    [http.middlewares.chain-basic-auth.chain]\n      middlewares = [ \"middlewares-rate-limit\", \"middlewares-https-redirectscheme\", \"middlewares-secure-headers\", \"middlewares-basic-auth\"]\n\n  [http.middlewares.chain-oauth]\n    [http.middlewares.chain-oauth.chain]\n      middlewares = [ \"middlewares-rate-limit\", \"middlewares-https-redirectscheme\", \"middlewares-secure-headers\", \"middlewares-oauth\"]\n\n  [http.middlewares.chain-authelia]\n    [http.middlewares.chain-authelia.chain]\n      middlewares = [ \"middlewares-rate-limit\", \"middlewares-https-redirectscheme\", \"middlewares-secure-headers\", \"middlewares-authelia\"]\n\n  [http.middlewares.chain-nextcloud]\n    [http.middlewares.chain-nextcloud.chain]\n      middlewares = [ \"middlewares-rate-limit\", \"middlewares-https-redirectscheme\", \"nextcloud-middlewares-secure-headers\", \"nextcloud-redirect\"]\n"
  },
  {
    "path": "appdata/traefik2/rules/toml/middlewares-nextcloud.toml.example",
    "content": "[code]\n[http.middlewares]\n  ### Let's give them a new name so it won't conflict with others\n  [http.middlewares.nextcloud-middlewares-secure-headers]\n    ### Change the name here as well\n    [http.middlewares.nextcloud-middlewares-secure-headers.headers]\n  ### Comment out this line as Nextcloud uses quite a few methods for different apps\n#      accessControlAllowMethods= [\"GET\", \"OPTIONS\", \"PUT\"]\n      accessControlMaxAge = 100\n      hostsProxyHeaders = [\"X-Forwarded-Host\"]\n      # sslRedirect = true #replaced with middlewares-https-redirectscheme for v2.5.x\n      stsSeconds = 63072000\n      stsIncludeSubdomains = true\n      stsPreload = true\n      forceSTSHeader = true\n#      frameDeny = true #overwritten by customFrameOptionsValue\n  ### We will modify this value for Nextcloud to remove the X-Frame-Options error:\n      customFrameOptionsValue = \"SAMEORIGIN\" #CSP takes care of this but may be needed for organizr.\n      contentTypeNosniff = true \n      browserXssFilter = true\n#      sslForceHost = true # add sslHost to all of the services\n#      sslHost = \"example.com\"\n      referrerPolicy = \"same-origin\"\n#      Setting contentSecurityPolicy is more secure but it can break things. Proper auth will reduce the risk.\n#      the below line also breaks some apps due to 'none' - sonarr, radarr, etc.\n#      contentSecurityPolicy = \"frame-ancestors '*.example.com:*';object-src 'none';script-src 'none';\"\n      # Line below, featurePolicy, was deprecated in v2.5.x in favor permissionPolicy\n      # featurePolicy = \"camera 'none'; geolocation 'none'; microphone 'none'; payment 'none'; usb 'none'; vr 'none';\"\n      permissionsPolicy = \"camera=(), microphone=(), geolocation=(), payment=(), usb=(), vr=()\"\n  ### Change the middleware name here as well  \n      [http.middlewares.nextcloud-middlewares-secure-headers.headers.customResponseHeaders]\n    ### We just need to set this to none\n        X-Robots-Tag = \"none\"\n        server = \"\"\n\n### This section redirects requests for Nextcloud calendar and contacts service discovery\n### source: https://docs.nextcloud.com/server/21/admin_manual/issues/general_troubleshooting.html#service-discovery\n  [http.middlewares.nextcloud-redirect]\n    [http.middlewares.nextcloud-redirect.redirectRegex]\n      permanent = true\n      regex = \"https://(.*)/.well-known/(card|cal)dav\"\n      replacement = \"https://${1}/remote.php/dav/\""
  },
  {
    "path": "appdata/traefik2/rules/toml/middlewares.toml.example",
    "content": "[http.middlewares]\n  [http.middlewares.middlewares-basic-auth]\n    [http.middlewares.middlewares-basic-auth.basicAuth]\n#      users = [\n#        \"user:$apsdfswWvC/6.$E3FtsfTntPC0wVJ7IUVtX1\",\n#      ]\n      realm = \"Traefik2 Basic Auth\"\n      usersFile = \"/shared/.htpasswd\" #be sure to mount the volume through docker-compose.yml\n\n  [http.middlewares.middlewares-rate-limit]\n    [http.middlewares.middlewares-rate-limit.rateLimit]\n      average = 100\n      burst = 50\n\n# Available Header Options: \n#####https://github.com/unrolled/secure#available-options\n#####https://docs.traefik.io/middlewares/headers/\n# A great resource for these headers is your preferred browser's docs. Firefox: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers\n# https://developers.google.com/search/reference/robots_meta_tag\n# https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Clickjacking_Defense_Cheat_Sheet.md\n# CSP for VNC: https://github.com/cockpit-project/cockpit/pull/5932\n# Check headers here, don't include OAuth when checking headers, otherwise you are checking google's headers: https://securityheaders.com\n# or check them here: https://observatory.mozilla.org/\n\n# CAUTION: Any headers defined in docker-compose (yml) will OVERWRITE ALL of the headers defined below.\n\n  [http.middlewares.middlewares-secure-headers]\n    [http.middlewares.middlewares-secure-headers.headers]\n      accessControlAllowMethods= [\"GET\", \"OPTIONS\", \"PUT\"]\n      accessControlMaxAge = 100\n      hostsProxyHeaders = [\"X-Forwarded-Host\"]\n      # sslRedirect = true #replaced with middlewares-https-redirectscheme for v2.5.x\n      stsSeconds = 63072000\n      stsIncludeSubdomains = true\n      stsPreload = true\n      forceSTSHeader = true\n#      frameDeny = true #overwritten by customFrameOptionsValue\n      customFrameOptionsValue = \"allow-from https:example.com\" #CSP takes care of this but may be needed for organizr. \n      contentTypeNosniff = true \n      browserXssFilter = true \n#      sslForceHost = true # add sslHost and all of the \n#      sslHost = \"example.com\"\n      referrerPolicy = \"same-origin\" \n#      Setting contentSecurityPolicy is more secure but it can break things. Proper auth will reduce the risk.\n#      the below line also breaks some apps due to 'none' - sonarr, radarr, etc.\n#      contentSecurityPolicy = \"frame-ancestors '*.example.com:*';object-src 'none';script-src 'none';\"\n      # Line below, featurePolicy, was deprecated in v2.5.x in favor permissionPolicy\n      # featurePolicy = \"camera 'none'; geolocation 'none'; microphone 'none'; payment 'none'; usb 'none'; vr 'none';\"\n      permissionsPolicy = \"camera=(), microphone=(), geolocation=(), payment=(), usb=(), vr=()\"\n      [http.middlewares.middlewares-secure-headers.headers.customResponseHeaders]\n        X-Robots-Tag = \"none,noarchive,nosnippet,notranslate,noimageindex,\"\n        server = \"\"\n\n  [http.middlewares.middlewares-oauth]\n    [http.middlewares.middlewares-oauth.forwardAuth]\n      address = \"http://oauth:4181\" # Make sure you have the OAuth service in docker-compose.yml\n      trustForwardHeader = true\n      authResponseHeaders = [\"X-Forwarded-User\"]\n\n  [http.middlewares.middlewares-authelia]\n    [http.middlewares.middlewares-authelia.forwardAuth]\n      address = \"http://authelia:9091/api/verify?rd=https://authelia.example.com\"\n      trustForwardHeader = true\n      authResponseHeaders = [\"Remote-User\", \"Remote-Groups\"]\n"
  },
  {
    "path": "appdata/traefik2/rules/ws/chain-authelia-wp.yml",
    "content": "http:\n  middlewares:\n    chain-authelia-wp:\n      chain:\n        middlewares:\n          - middlewares-traefik-bouncer # leave this out if you are not using CrowdSec\n          - middlewares-rate-limit\n          - middlewares-secure-headers-wp\n          - middlewares-authelia\n"
  },
  {
    "path": "appdata/traefik2/rules/ws/chain-authelia.yml",
    "content": "http:\n  middlewares:\n    chain-authelia:\n      chain:\n        middlewares:\n          - middlewares-traefik-bouncer # leave this out if you are not using CrowdSec\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-authelia"
  },
  {
    "path": "appdata/traefik2/rules/ws/chain-basic-auth.yml",
    "content": "http:\n  middlewares:\n    chain-basic-auth:\n      chain:\n        middlewares:\n          - middlewares-traefik-bouncer # leave this out if you are not using CrowdSec\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-basic-auth"
  },
  {
    "path": "appdata/traefik2/rules/ws/chain-no-auth-crowdsec-wp.yml",
    "content": "http:\n  middlewares:\n    chain-no-auth-crowdsec-wp:\n      chain:\n        middlewares:\n          # - middlewares-traefik-bouncer # leave this out if you are not using CrowdSec\n          - middlewares-rate-limit\n          - middlewares-secure-headers-wp"
  },
  {
    "path": "appdata/traefik2/rules/ws/chain-no-auth-wp.yml",
    "content": "http:\n  middlewares:\n    chain-no-auth-wp:\n      chain:\n        middlewares:\n          # - middlewares-traefik-bouncer # leave this out if you are not using CrowdSec\n          - middlewares-rate-limit\n          - middlewares-secure-headers-wp\n"
  },
  {
    "path": "appdata/traefik2/rules/ws/chain-no-auth.yml",
    "content": "http:\n  middlewares:\n    chain-no-auth:\n      chain:\n        middlewares:\n          # - middlewares-traefik-bouncer # leave this out if you are not using CrowdSec\n          - middlewares-rate-limit\n          - middlewares-secure-headers"
  },
  {
    "path": "appdata/traefik2/rules/ws/chain-oauth-no-crowdsec.yml",
    "content": "http:\n  middlewares:\n    chain-oauth-no-crowdsec:\n      chain:\n        middlewares:\n          - middlewares-rate-limit\n          - middlewares-secure-headers-wp\n          - middlewares-oauth"
  },
  {
    "path": "appdata/traefik2/rules/ws/chain-oauth.yml",
    "content": "http:\n  middlewares:\n    chain-oauth:\n      chain:\n        middlewares:\n#          - middlewares-traefik-bouncer # leave this out if you are not using CrowdSec\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-oauth\n"
  },
  {
    "path": "appdata/traefik2/rules/ws/middlewares-authelia.yml",
    "content": "http:\n  middlewares:\n    middlewares-authelia:\n      forwardAuth:\n        address: \"http://authelia:9091/api/verify?rd=https://authelia.{{env \"DOMAINNAME_WS\"}}\"\n        trustForwardHeader: true\n        authResponseHeaders:\n          - \"Remote-User\"\n          - \"Remote-Groups\""
  },
  {
    "path": "appdata/traefik2/rules/ws/middlewares-basic-auth.yml",
    "content": "http:\n  middlewares:\n    middlewares-basic-auth:\n      basicAuth:\n        # users:\n        #   - \"user:$apsdfswWvC/6.$E3FtsfTntPC0wVJ7IUVtX1\"\n        usersFile: \"/run/secrets/basic_auth_credentials\" \n        realm: \"Traefik 2 Basic Auth\""
  },
  {
    "path": "appdata/traefik2/rules/ws/middlewares-compress.yml",
    "content": "http:\n  middlewares:\n    middlewares-compress:\n      compress: {}"
  },
  {
    "path": "appdata/traefik2/rules/ws/middlewares-oauth.yml",
    "content": "http:\n  middlewares:\n    middlewares-oauth:\n      forwardAuth:\n        address: \"http://oauth:4181\" # Make sure you have the OAuth service in docker-compose.yml\n        trustForwardHeader: true\n        authResponseHeaders:\n          - \"X-Forwarded-User\""
  },
  {
    "path": "appdata/traefik2/rules/ws/middlewares-rate-limit.yml",
    "content": "http:\n  middlewares:\n    middlewares-rate-limit:\n      rateLimit:\n        average: 100\n        burst: 50"
  },
  {
    "path": "appdata/traefik2/rules/ws/middlewares-secure-headers-wp.yml",
    "content": "http:\n  middlewares:\n    middlewares-secure-headers-wp:\n      headers:\n        hostsProxyHeaders:\n          - \"X-Forwarded-Host\"\n        stsSeconds: 31536000\n        stsIncludeSubdomains: true\n        stsPreload: true\n        #frameDeny: true # Popups like plugin details etc. wont't open with this. \n        customFrameOptionsValue: \"allow-from https:{{env \"DOMAINNAME_WS\"}}\" \n        contentTypeNosniff: true\n        browserXssFilter: true"
  },
  {
    "path": "appdata/traefik2/rules/ws/middlewares-secure-headers.yml",
    "content": "http:\n  middlewares:\n    middlewares-secure-headers:\n      headers:\n        accessControlAllowMethods:\n          - GET\n          - OPTIONS\n          - PUT\n        accessControlMaxAge: 100\n        hostsProxyHeaders:\n          - \"X-Forwarded-Host\"\n        # sslRedirect: true #replaced with middlewares-https-redirectscheme for v2.5.x\n        stsSeconds: 63072000\n        stsIncludeSubdomains: true\n        stsPreload: true\n        forceSTSHeader: true\n        # frameDeny: true #overwritten by customFrameOptionsValue\n        customFrameOptionsValue: \"allow-from https:{{env \"DOMAINNAME_WS\"}}\" #CSP takes care of this but may be needed for organizr.\n        contentTypeNosniff: true\n        browserXssFilter: true\n        # sslForceHost: true # add sslHost to all of the services\n        # sslHost: \"{{env \"DOMAINNAME_WS\"}}\"\n        referrerPolicy: \"same-origin\"\n        # Setting contentSecurityPolicy is more secure but it can break things. Proper auth will reduce the risk.\n        # the below line also breaks some apps due to 'none' - sonarr, radarr, etc.\n        # contentSecurityPolicy: \"frame-ancestors '*.{{env \"DOMAINNAME_WS\"}}:*';object-src 'none';script-src 'none';\"\n        # Line below, featurePolicy, was deprecated in v2.5.x in favor permissionPolicy\n        # featurePolicy: \"camera 'none'; geolocation 'none'; microphone 'none'; payment 'none'; usb 'none'; vr 'none';\"\n        permissionsPolicy: \"camera=(), microphone=(), geolocation=(), payment=(), usb=(), vr=()\"\n        customResponseHeaders:\n          X-Robots-Tag: \"none,noarchive,nosnippet,notranslate,noimageindex,\"\n          server: \"\"\n          # https://community.traefik.io/t/how-to-make-websockets-work-with-traefik-2-0-setting-up-rancher/1732\n          # X-Forwarded-Proto: \"https\""
  },
  {
    "path": "appdata/traefik2/rules/ws/middlewares-traefik-bouncer.yml",
    "content": "http:\n  middlewares:\n    middlewares-traefik-bouncer:\n      forwardAuth:\n        address: \"http://traefik-bouncer:8080/api/v1/forwardAuth\" # Make sure you have the traefik-bouncer service in docker-compose.yml\n        trustForwardHeader: true"
  },
  {
    "path": "appdata/traefik2/rules/ws/tls-opts.yml",
    "content": "tls:\n  options:\n    tls-opts:\n      minVersion: VersionTLS12\n      cipherSuites:\n        - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\n        - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\n        - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\n        - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\n        - TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305\n        - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305\n        - TLS_AES_128_GCM_SHA256\n        - TLS_AES_256_GCM_SHA384\n        - TLS_CHACHA20_POLY1305_SHA256\n        - TLS_FALLBACK_SCSV # Client is doing version fallback. See RFC 7507\n      curvePreferences:\n        - CurveP521\n        - CurveP384\n      sniStrict: true\n"
  },
  {
    "path": "appdata/traefik3/rules/hs/chain-basic-auth.yml",
    "content": "http:\n  middlewares:\n    chain-basic-auth:\n      chain:\n        middlewares:\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-basic-auth\n          # - middlewares-compress\n"
  },
  {
    "path": "appdata/traefik3/rules/hs/chain-no-auth.yml",
    "content": "http:\n  middlewares:\n    chain-no-auth:\n      chain:\n        middlewares:\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          # - middlewares-compress\n"
  },
  {
    "path": "appdata/traefik3/rules/hs/chain-oauth.yml",
    "content": "http:\n  middlewares:\n    chain-oauth:\n      chain:\n        middlewares:\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-oauth"
  },
  {
    "path": "appdata/traefik3/rules/hs/middlewares-basic-auth.yml",
    "content": "http:\n  middlewares:\n    middlewares-basic-auth:\n      basicAuth:\n        # users:\n        #   - \"user:$apsdfswWvC/6.$E3FtsfTntPC0wVJ7IUVtX1\"\n        usersFile: \"/run/secrets/basic_auth_credentials\" \n        realm: \"Traefik Basic Auth\""
  },
  {
    "path": "appdata/traefik3/rules/hs/middlewares-buffering.yml",
    "content": "http:\n  middlewares:\n    middlewares-buffering:\n      buffering:\n        maxResponseBodyBytes: 2000000\n        maxRequestBodyBytes: 10485760  \n        memRequestBodyBytes: 2097152  \n        memResponseBodyBytes: 2097152\n        retryExpression: \"IsNetworkError() && Attempts() <= 2\"\n"
  },
  {
    "path": "appdata/traefik3/rules/hs/middlewares-oauth.yml",
    "content": "http:\n  middlewares:\n    middlewares-oauth:\n      forwardAuth:\n        address: \"http://oauth:4181/portals/main\" \n        trustForwardHeader: true\n        authResponseHeaders:\n          - \"X-Forwarded-User\"\n          - \"X-Forwarded-Displayname\"\n          - \"X-Authenticated-User\""
  },
  {
    "path": "appdata/traefik3/rules/hs/middlewares-rate-limit.yml",
    "content": "http:\n  middlewares:\n    middlewares-rate-limit:\n      rateLimit:\n        average: 100\n        burst: 50\n"
  },
  {
    "path": "appdata/traefik3/rules/hs/middlewares-secure-headers.yml",
    "content": "http:\n  middlewares:\n    middlewares-secure-headers:\n      headers:\n        accessControlAllowMethods:\n          - GET\n          - OPTIONS\n          - PUT\n        accessControlMaxAge: 100\n        hostsProxyHeaders:\n          - \"X-Forwarded-Host\"\n        stsSeconds: 63072000\n        stsIncludeSubdomains: true\n        stsPreload: true\n        forceSTSHeader: true # This is a good thing but it can be tricky. Enable after everything works.\n        # Comment out customFrameOptionsValue if you're using Jellyfin on LG WebOS\n        customFrameOptionsValue: SAMEORIGIN # https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options\n        contentTypeNosniff: true\n        browserXssFilter: true\n        referrerPolicy: \"same-origin\"\n        permissionsPolicy: \"camera=(), microphone=(), geolocation=(), payment=(), usb=()\"\n        customResponseHeaders:\n          X-Robots-Tag: \"none,noindex,nofollow,noarchive,nosnippet,notranslate,noimageindex\" # disable search engines from indexing home server\n          server: \"\" # hide server info from visitors\n        customRequestHeaders:\n          X-Forwarded-Proto: https"
  },
  {
    "path": "appdata/traefik3/rules/hs/tls-opts.yml",
    "content": "tls:\n  options:\n    tls-opts:\n      minVersion: VersionTLS12\n      cipherSuites:\n        - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\n        - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\n        - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\n        - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\n        - TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305\n        - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305\n        - TLS_AES_128_GCM_SHA256\n        - TLS_AES_256_GCM_SHA384\n        - TLS_CHACHA20_POLY1305_SHA256\n        - TLS_FALLBACK_SCSV # Client is doing version fallback. See RFC 7507\n      curvePreferences:\n        - CurveP521\n        - CurveP384\n      sniStrict: true\n"
  },
  {
    "path": "appdata/traefik3/rules/ws-arm/chain-basic-auth.yml",
    "content": "http:\n  middlewares:\n    chain-basic-auth:\n      chain:\n        middlewares:\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-basic-auth\n          # - middlewares-compress\n"
  },
  {
    "path": "appdata/traefik3/rules/ws-arm/chain-no-auth-crowdsec-wp.yml",
    "content": "http:\n  middlewares:\n    chain-no-auth-crowdsec-wp:\n      chain:\n        middlewares:\n          # - middlewares-traefik-bouncer # leave this out if you are not using CrowdSec\n          - middlewares-rate-limit\n          - middlewares-secure-headers-wp"
  },
  {
    "path": "appdata/traefik3/rules/ws-arm/chain-no-auth-simple.yml",
    "content": "http:\n  middlewares:\n    chain-no-auth-simple:\n      chain:\n        middlewares:\n          - middlewares-rate-limit\n          # - middlewares-secure-headers\n          # - middlewares-compress\n"
  },
  {
    "path": "appdata/traefik3/rules/ws-arm/chain-no-auth-wp.yml",
    "content": "http:\n  middlewares:\n    chain-no-auth-wp:\n      chain:\n        middlewares:\n          # - middlewares-traefik-bouncer # leave this out if you are not using CrowdSec\n          - middlewares-rate-limit\n          - middlewares-secure-headers-wp\n"
  },
  {
    "path": "appdata/traefik3/rules/ws-arm/chain-no-auth.yml",
    "content": "http:\n  middlewares:\n    chain-no-auth:\n      chain:\n        middlewares:\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          # - middlewares-compress\n"
  },
  {
    "path": "appdata/traefik3/rules/ws-arm/chain-oauth.yml",
    "content": "http:\n  middlewares:\n    chain-oauth:\n      chain:\n        middlewares:\n          # - plugins-crowdsec-traefik-bouncer\n          - middlewares-rate-limit\n          - middlewares-secure-headers\n          - middlewares-oauth"
  },
  {
    "path": "appdata/traefik3/rules/ws-arm/middlewares-basic-auth.yml",
    "content": "http:\n  middlewares:\n    middlewares-basic-auth:\n      basicAuth:\n        # users:\n        #   - \"user:$apsdfswWvC/6.$E3FtsfTntPC0wVJ7IUVtX1\"\n        usersFile: \"/run/secrets/basic_auth_credentials\" \n        realm: \"Traefik Basic Auth\""
  },
  {
    "path": "appdata/traefik3/rules/ws-arm/middlewares-buffering.yml",
    "content": "http:\n  middlewares:\n    middlewares-buffering:\n      buffering:\n        maxResponseBodyBytes: 2000000\n        maxRequestBodyBytes: 10485760  \n        memRequestBodyBytes: 2097152  \n        memResponseBodyBytes: 2097152\n        retryExpression: \"IsNetworkError() && Attempts() <= 2\"\n"
  },
  {
    "path": "appdata/traefik3/rules/ws-arm/middlewares-oauth.yml",
    "content": "http:\n  middlewares:\n    middlewares-oauth:\n      forwardAuth:\n        address: \"http://oauth:4181\" # Make sure you have the OAuth service in docker-compose.yml\n        trustForwardHeader: true\n        authResponseHeaders:\n          - \"X-Forwarded-User\""
  },
  {
    "path": "appdata/traefik3/rules/ws-arm/middlewares-rate-limit.yml",
    "content": "http:\n  middlewares:\n    middlewares-rate-limit:\n      rateLimit:\n        average: 100\n        burst: 50\n"
  },
  {
    "path": "appdata/traefik3/rules/ws-arm/middlewares-secure-headers-wp.yml",
    "content": "http:\n  middlewares:\n    middlewares-secure-headers-wp:\n      headers:\n        hostsProxyHeaders:\n          - \"X-Forwarded-Host\"\n        stsSeconds: 31536000\n        stsIncludeSubdomains: true\n        stsPreload: true\n        #frameDeny: true # Popups like plugin details etc. wont't open with this. \n        customFrameOptionsValue: \"allow-from https:{{env \"DOMAINNAME_1\"}}\" \n        contentTypeNosniff: true\n        browserXssFilter: true"
  },
  {
    "path": "appdata/traefik3/rules/ws-arm/middlewares-secure-headers.yml",
    "content": "http:\n  middlewares:\n    middlewares-secure-headers:\n      headers:\n        accessControlAllowMethods:\n          - GET\n          - OPTIONS\n          - PUT\n        accessControlMaxAge: 100\n        hostsProxyHeaders:\n          - \"X-Forwarded-Host\"\n        stsSeconds: 63072000\n        stsIncludeSubdomains: true\n        stsPreload: true\n        forceSTSHeader: true # This is a good thing but it can be tricky. Enable after everything works.\n        customFrameOptionsValue: SAMEORIGIN # https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options\n        contentTypeNosniff: true\n        browserXssFilter: true\n        referrerPolicy: \"same-origin\"\n        permissionsPolicy: \"camera=(), microphone=(), geolocation=(), payment=(), usb=()\"\n        customResponseHeaders:\n          X-Robots-Tag: \"none,noindex,nofollow,noarchive,nosnippet,notranslate,noimageindex\" # disable search engines from indexing home server\n          server: \"\" # hide server info from visitors\n        customRequestHeaders:\n          X-Forwarded-Proto: https"
  },
  {
    "path": "appdata/traefik3/rules/ws-arm/tls-opts.yml",
    "content": "tls:\n  options:\n    tls-opts:\n      minVersion: VersionTLS12\n      cipherSuites:\n        - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\n        - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\n        - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\n        - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\n        - TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305\n        - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305\n        - TLS_AES_128_GCM_SHA256\n        - TLS_AES_256_GCM_SHA384\n        - TLS_CHACHA20_POLY1305_SHA256\n        - TLS_FALLBACK_SCSV # Client is doing version fallback. See RFC 7507\n      curvePreferences:\n        - CurveP521\n        - CurveP384\n      sniStrict: true\n"
  },
  {
    "path": "archives/traefik_v1/docker-compose-npm.yml",
    "content": "version: \"3.9\"\n\n########################### NETWORKS\n# You may customize the network subnet (192.168.89.0/24) below as you please.\n# Docker Compose version 3.5 or higher required to define networks this way.\n\nnetworks:\n  default:\n    driver: bridge\n  npm_proxy:\n    name: npm_proxy\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.89.0/24\n  # If you decide to use Socket Proxy, you need socket_proxy network as we. See https://www.smarthomebeginner.com/traefik-docker-security-best-practices/#9_Use_a_Docker_Socket_Proxy\n\n########################### EXTENSION FIELDS\n# Helps eliminate repetition of sections\n# More Info on how to use this: https://github.com/htpcBeginner/docker-traefik/pull/228\n\n# Common environment values\nx-environment: &default-tz-puid-pgid\n  TZ: $TZ\n  PUID: $PUID\n  PGID: $PGID\n\n# Keys common to some of the core services that we always to automatically restart on failure\nx-common-keys-core: &common-keys-core\n  networks:\n    - npm_proxy\n  security_opt:\n    - no-new-privileges:true\n  restart: always\n\n# Keys common to some of the dependent services/apps\nx-common-keys-apps: &common-keys-apps\n  networks:\n    - npm_proxy\n  security_opt:\n    - no-new-privileges:true\n  restart: unless-stopped\n\n# Keys common to some of the services in media-services.txt\nx-common-keys-media: &common-keys-media\n  networks:\n    - npm_proxy\n  security_opt:\n    - no-new-privileges:true\n  restart: \"no\"\n\n########################### SERVICES\nservices:\n\n  ############################# FRONTENDS\n\n  # Nginx Proxy Manager - Reverse Proxy with LetsEncrypt\n  npm:\n    <<: *common-keys-core # See EXTENSION FIELDS at the top\n    container_name: nginx-proxy-manager\n    image: 'jc21/nginx-proxy-manager:latest'\n    # For Static IP\n    networks:\n    # For Static IP\n      npm_proxy:\n        ipv4_address: 192.168.89.254 # You can specify a static IP\n    # For Dynamic IP\n    # networks:\n    #  - npm_proxy\n    ports:\n      - '80:80' # Public HTTP Port. Port Forwarding on Router is ON.\n      - '443:443' # Public HTTPS Port. Port Forwarding on Router is ON.\n      - '81:81' # Admin Web Port. Port Forwarding on Router is OFF. Internal Home Network Access only - 192.168.89.254:81.\n    volumes:\n      - $DOCKERDIR/appdata/npm/config:/config \n      - $DOCKERDIR/appdata/npm/letsencrypt:/etc/letsencrypt\n      - $DOCKERDIR/appdata/npm/data:/data\n    environment:\n      DB_SQLITE_FILE: \"/config/database.sqlite\"\n      DISABLE_IPV6: 'true'\n\n  # Portainer - WebUI for Containers\n  portainer:\n    <<: *common-keys-core # See EXTENSION FIELDS at the top\n    container_name: portainer\n    image: portainer/portainer-ce:latest\n    command: -H unix:///var/run/docker.sock # Use Docker Socket Proxy and comment this line out, for improved security.\n    # command: -H tcp://socket-proxy:2375 # Use this instead, if you have Socket Proxy enabled.\n    networks:\n      - npm_proxy\n    ports: \n      - \"9000:9000\"\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock:ro # Use Docker Socket Proxy and comment this line out, for improved security.\n      - $DOCKERDIR/appdata/portainer/data:/data # Change to local directory if you want to save/transfer config locally.\n    environment:\n      - TZ=$TZ\n\n  # Heimdall - Application Dashboard\n  heimdall:\n    <<: *common-keys-core # See EXTENSION FIELDS at the top\n    image: lscr.io/linuxserver/heimdall\n    container_name: heimdall\n    ports:\n      - \"83:80\" # 80 to 82 already taken by other services\n      # - \"444:443\" # 443 used by Nginx Proxy Manager. Disabled because we will put Heimdall behind proxy.\n    volumes:\n      - $DOCKERDIR/appdata/heimdall:/config\n    environment:\n      <<: *default-tz-puid-pgid\n\n  ############################# DOWNLOADERS\n  \n  # nzbget - Binary newsgrabber (NZB downloader)\n  nzbget:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: lscr.io/linuxserver/nzbget\n    container_name: nzbget\n    networks:\n      npm_proxy:\n        ipv4_address: 192.168.89.216\n    ports:\n      - \"6789:6789\"\n    volumes:\n      - $DOCKERDIR/appdata/nzbget:/config\n      - $DATADIR/downloads:/data/downloads\n    environment:\n      <<: *default-tz-puid-pgid\n\n  # TransmissionBT - Torrent Downloader\n  # For Proxmox LXC Containers - https://pve.proxmox.com/wiki/OpenVPN_in_LXC\n  transmission-vpn:\n    image: haugene/transmission-openvpn:latest\n    container_name: transmission-vpn\n    restart: unless-stopped\n    networks:\n      npm_proxy:\n        ipv4_address: 192.168.89.169\n    ports:\n      - \"9091:9091\"\n    cap_add:\n      - NET_ADMIN\n    devices:\n      - /dev/net/tun\n    volumes:\n      - /etc/localtime:/etc/localtime:ro\n      - $DOCKERDIR/appdata/transmission-vpn/data:/data\n      - $DOCKERDIR/appdata/transmission-vpn/config:/config\n      - $DATADIR/downloads:/data/downloads\n    environment:\n      <<: *default-tz-puid-pgid\n      OPENVPN_PROVIDER: FASTESTVPN\n      OPENVPN_USERNAME: $FASTEST_USERNAME\n      OPENVPN_PASSWORD: $FASTEST_PASSWORD\n      LOCAL_NETWORK: \"$LOCAL_NETWORK\"\n      UMASK_SET: 2\n      TRANSMISSION_RPC_AUTHENTICATION_REQUIRED: \"true\"\n      TRANSMISSION_RPC_HOST_WHITELIST: \"127.0.0.1,$SERVER_IP\"\n      TRANSMISSION_RPC_PASSWORD: $TRANSMISSION_RPC_PASSWORD\n      TRANSMISSION_RPC_USERNAME: $TRANSMISSION_RPC_USERNAME\n      TRANSMISSION_UMASK: 002\n      TRANSMISSION_RATIO_LIMIT: 1.00\n      TRANSMISSION_RATIO_LIMIT_ENABLED: \"true\"\n      TRANSMISSION_ALT_SPEED_DOWN: 40000\n      TRANSMISSION_ALT_SPEED_ENABLED: \"false\"\n      TRANSMISSION_ALT_SPEED_UP: 250\n      TRANSMISSION_SPEED_LIMIT_DOWN: 80000\n      TRANSMISSION_SPEED_LIMIT_DOWN_ENABLED: \"true\"\n      TRANSMISSION_SPEED_LIMIT_UP: 500\n      TRANSMISSION_SPEED_LIMIT_UP_ENABLED: \"true\"\n      TRANSMISSION_INCOMPLETE_DIR: /data/downloads/torrents/incomplete\n      TRANSMISSION_INCOMPLETE_DIR_ENABLED: \"true\"\n      TRANSMISSION_WATCH_DIR: /data/downloads/torrents\n      TRANSMISSION_WATCH_DIR_ENABLED: \"true\"\n      TRANSMISSION_DOWNLOAD_DIR: /data/downloads/torrents\n      LOG_TO_STDOUT: \"true\"\n\n  # qBittorrent - Torrent downloader without VPN\n  qbittorrent:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: lscr.io/linuxserver/qbittorrent:latest\n    container_name: qbittorrent\n    #network_mode: container:transmission-vpn # Passing network through Transmission Container if VPN is needed.\n    ports:\n      - \"8080:8080\"\n    volumes:\n      - $DOCKERDIR/appdata/qbittorrent:/config\n      - $DATADIR/downloads:/data/downloads # Ensure that downloads folder is set to /data/downloads in qBittorrent\n    environment:\n      <<: *default-tz-puid-pgid\n      UMASK_SET: 002\n\n  ############################# PVRS\n\n  # Prowlarr - Indexer Proxy\n  prowlarr:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: ghcr.io/linuxserver/prowlarr:develop\n    container_name: prowlarr\n    networks:\n      npm_proxy:\n        ipv4_address: 192.168.89.162\n    ports:\n      - \"9696:9696\"\n    volumes:\n      - $DOCKERDIR/appdata/prowlarr:/config\n      - \"/etc/localtime:/etc/localtime:ro\"\n    environment:\n      <<: *default-tz-puid-pgid\n\n  # Lidarr - Music Management\n  lidarr:\n    <<: *common-keys-media # See EXTENSION FIELDS at the top\n    image: lscr.io/linuxserver/lidarr:latest\n    container_name: lidarr\n    networks:\n      npm_proxy:\n        ipv4_address: 192.168.89.163\n    ports:\n      - \"8686:8686\"\n    volumes:\n      - $DOCKERDIR/appdata/lidarr:/config\n      - $DATADIR/downloads:/data/downloads\n      - $DATADIR/local/music:/data/media/music\n      - \"/etc/localtime:/etc/localtime:ro\"\n    environment:\n      <<: *default-tz-puid-pgid\n\n  # Radarr - Movie management\n  radarr:\n    <<: *common-keys-media # See EXTENSION FIELDS at the top\n    image: lscr.io/linuxserver/radarr:nightly # latest was causing \"Error parsing column 45\"\n    container_name: radarr\n    networks:\n      npm_proxy:\n        ipv4_address: 192.168.89.164\n    ports:\n      - \"7878:7878\"\n    volumes:\n      - $DOCKERDIR/appdata/radarr:/config\n      - $DATADIR:/data\n      - \"/etc/localtime:/etc/localtime:ro\"\n    environment:\n      <<: *default-tz-puid-pgid\n\n  # Sonarr - TV Shows management\n  sonarr:\n    <<: *common-keys-media # See EXTENSION FIELDS at the top\n    image: lscr.io/linuxserver/sonarr\n    container_name: sonarr\n    networks:\n      npm_proxy:\n        ipv4_address: 192.168.89.167\n    ports:\n      - \"8989:8989\"\n    volumes:\n      - $DOCKERDIR/appdata/sonarr:/config\n      - $DATADIR:/data\n      - \"/etc/localtime:/etc/localtime:ro\"\n    environment:\n      <<: *default-tz-puid-pgid\n\n  # Readarr - Books management\n  readarr:\n    <<: *common-keys-media # See EXTENSION FIELDS at the top\n    image: hotio/readarr:nightly\n    container_name: readarr\n    ports:\n      - \"8987:8987\"\n    volumes:\n      - $DOCKERDIR/appdata/readarr:/config\n      - $DATADIR:/data\n      - \"/etc/localtime:/etc/localtime:ro\"\n    environment:\n      <<: *default-tz-puid-pgid\n      UMASK: 002\n      #ARGS: \"\"\n\n  ############################# MEDIA\n\n  # Airsonic Advanced - Music Server\n  airsonic:\n    <<: *common-keys-media # See EXTENSION FIELDS at the top\n    image: lscr.io/linuxserver/airsonic-advanced\n    container_name: airsonic-advanced\n    ports: \n      - \"4040:4040\"\n      - \"4041:4041\" #UPnp\n    volumes:\n      - $DOCKERDIR/appdata/airsonic/podcasts:/data/podcasts\n      - $DOCKERDIR/appdata/airsonic/playlists:/data/playlists\n      - $DOCKERDIR/appdata/airsonic/config:/config\n      - $DATADIR/local/music:/data/music\n    environment:\n      <<: *default-tz-puid-pgid\n      JAVA_OPTS: '-Dserver.forward-headers-strategy=native' # Optional - if you use a reverse-proxy\n\n  # Jellyfin - Media Server\n  jellyfin:\n    <<: *common-keys-media # See EXTENSION FIELDS at the top\n    image: jellyfin/jellyfin:latest\n    container_name: jellyfin\n    #devices:\n    #  - /dev/dri:/dev/dri # for harware transcoding\n    ports:\n      - \"8096:8096\"\n      - \"8920:8920\" # Emby also uses same port if running both\n    environment:\n      <<: *default-tz-puid-pgid\n      UMASK_SET: 022\n    volumes:\n      - $DOCKERDIR/appdata/jellyfin:/config\n      - $DATADIR/downloads:/data/downloads\n      - $DATADIR/media:/data/media\n      - /dev/shm:/data/transcode # Offload transcoding to RAM if you have enough RAM\n\n  # Plex - Media Server\n  plexms:\n    <<: *common-keys-media # See EXTENSION FIELDS at the top\n    image: plexinc/pms-docker:public\n    container_name: plexms\n    ports:\n      - \"32400:32400/tcp\"\n      - \"3005:3005/tcp\"\n      - \"8324:8324/tcp\"\n      - \"32469:32469/tcp\"\n      # - \"1900:1900/udp\" # Conflicts with xTeVe and Synology default ports\n      - \"32410:32410/udp\"\n      - \"32412:32412/udp\"\n      - \"32413:32413/udp\"\n      - \"32414:32414/udp\"\n      # - \"33400:33400\" # If you use Plex Web Tools\n    #devices:\n    #  - /dev/dri:/dev/dri # for harware transcoding\n    volumes:\n      - $DOCKERDIR/appdata/plexms:/config\n      - $DATADIR/media:/media\n      - /dev/shm:/transcode\n    environment:\n      TZ: $TZ\n      HOSTNAME: \"dockerPlex\"\n      PLEX_CLAIM_FILE: $PLEX_CLAIM\n      PLEX_UID: $PUID\n      PLEX_GID: $PGID\n      ADVERTISE_IP: http://$SERVER_IP:32400/\n\n  # Tautulli - Plex Stats and Monitoring\n  tautulli:\n    <<: *common-keys-media # See EXTENSION FIELDS at the top\n    image: linuxserver/tautulli:latest\n    container_name: tautulli\n    ports:\n      - \"8181:8181\"\n    volumes:\n      - $DOCKERDIR/appdata/tautulli/config:/config\n      - $DOCKERDIR/appdata/plexms/Library/Application Support/Plex Media Server/Logs:/logs:ro # For tautulli Plex log viewer\n    environment:\n      <<: *default-tz-puid-pgid\n\n  # Ombi - Media Requests\n  ombi:\n    <<: *common-keys-media # See EXTENSION FIELDS at the top\n    image: linuxserver/ombi:latest\n    container_name: ombi\n    ports:\n      - \"3579:3579\"\n    volumes:\n      - $DOCKERDIR/appdata/ombi:/config\n    environment:\n      <<: *default-tz-puid-pgid\n\n  ############################# MEDIA FILE MANAGEMENT\n\n  # Bazarr - Subtitle Management\n  bazarr:\n    <<: *common-keys-media # See EXTENSION FIELDS at the top\n    image: lscr.io/linuxserver/bazarr\n    container_name: bazarr\n    ports:\n      - \"6767:6767\"\n    volumes:\n      - $DOCKERDIR/appdata/bazarr:/config\n      - $DATADIR/media:/data/media\n    environment:\n      <<: *default-tz-puid-pgid\n\n  # Picard - Music Library Tagging and Management\n  picard:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: mikenye/picard:latest\n    container_name: picard\n    ports:\n      - \"5800:5800\"\n    volumes:\n      - $DATADIR:/data:rw\n      - $DOCKERDIR/appdata/picard:/config:rw\n      - /dev/shm:/dev/shm\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      TZ: $TZ\n      UMASK: 002\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n\n  # Handbrake - Video Conversion (Transcoding and compression)\n  handbrake:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: jlesage/handbrake:latest\n    container_name: handbrake\n    ports:\n      - \"5801:5800\"\n    volumes:\n      - $DATADIR/downloads:/data/downloads\n      - $DOCKERDIR/appdata/handbrake/config:/config\n      - $DOCKERDIR/appdata/handbrake/watch:/watch\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      UMASK: 002\n      TZ: $TZ\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      AUTOMATED_CONVERSION_KEEP_SOURCE: 1\n      VNC_PASSWORD: $HANDBRAKE_VNC_PASSWD\n\n  ############################# UTILITIES\n \n  # Dozzle - Real-time Docker Log Viewer\n  dozzle:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: amir20/dozzle:latest\n    container_name: dozzle\n    networks:\n      - npm_proxy\n    ports:\n      - \"8081:8080\" # qBittorrent is using port 8080\n    environment:\n      DOZZLE_LEVEL: info\n      DOZZLE_TAILSIZE: 300\n      DOZZLE_FILTER: \"status=running\"\n      # DOZZLE_FILTER: \"label=log_me\" # limits logs displayed to containers with this label.\n      # DOCKER_HOST: tcp://socket-proxy:2375 # Use this instead if you have Socket Proxy enabled.\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock # Use Docker Socket Proxy and comment this line for improved security.\n\n  # File Browser - Explorer\n  filebrowser:\n    <<: *common-keys-core # See EXTENSION FIELDS at the top\n    image: filebrowser/filebrowser:s6\n    container_name: filebrowser\n    ports:\n      - \"82:80\" # 80 and 81 are used by Nginx Proxy Manager\n    volumes:\n      - $DOCKERDIR/appdata/filebrowser:/config \n      - $USERDIR:/srv\n    environment:\n      <<: *default-tz-puid-pgid\n\n  ############################# MAINTENANCE\n\n  # Docker-GC - Automatic Docker Garbage Collection\n  # Create docker-gc-exclude file\n  dockergc:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: clockworksoul/docker-gc-cron:latest\n    container_name: docker-gc\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock # Use Docker Socket Proxy and comment this line for improved security.\n      - $DOCKERDIR/appdata/docker-gc/docker-gc-exclude:/etc/docker-gc-exclude # Create empty file\n    environment:\n      CRON: 0 0 0 * * ? # Everyday at midnight. Previously 0 0 * * *\n      FORCE_IMAGE_REMOVAL: 1\n      FORCE_CONTAINER_REMOVAL: 0\n      GRACE_PERIOD_SECONDS: 604800\n      DRY_RUN: 0\n      CLEAN_UP_VOLUMES: 1\n      TZ: $TZ\n      # DOCKER_HOST: tcp://socket-proxy:2375 # Use this if you have Socket Proxy enabled.\n\n  # WatchTower - Automatic Docker Container Updates\n  watchtower:\n    <<: *common-keys-core # See EXTENSION FIELDS at the top\n    image: containrrr/watchtower\n    container_name: watchtower\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock\n    environment:\n      TZ: $TZ\n      WATCHTOWER_CLEANUP: \"true\"\n      WATCHTOWER_REMOVE_VOLUMES: \"true\"\n      WATCHTOWER_INCLUDE_STOPPED: \"true\"\n      WATCHTOWER_NO_STARTUP_MESSAGE: \"false\"\n      WATCHTOWER_SCHEDULE: \"0 30 12 * * *\" # Everyday at 12:30\n      # DOCKER_HOST: tcp://socket-proxy:2375 # Use this if you have Socket Proxy enabled.\n      DOCKER_API_VERSION: \"1.40\"\n"
  },
  {
    "path": "archives/traefik_v1/docker-compose-t1-obsolete.yml",
    "content": "version: \"3.7\"\n\n# DOCKER TRAEFIK 1 IS NO LONGER BEING MAINTAINED. CHECK INSTRUCTIONS FOR DOCKER TRAEFIK V2 SETUP.\n\n################ THESE ARE APPS I USED TO USE BUT NOT ANYMORE ###########\n\n########################### NETWORKS\nnetworks:\n  t1_proxy:\n    external:\n      name: t1_proxy\n  default:\n    driver: bridge\n\n########################### SERVICES\nservices:\n  # Monitorr - Webfront to display the status of any webapp or service\n  monitorr:\n    image: monitorr/monitorr\n    container_name: monitorr\n    hostname: monitorr\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #      - \"${MONITORR_PORT}:80\"\n    volumes:\n      - ${USERDIR}/docker/monitorr:/app\n    environment:\n      - PUID=${PUID}\n      - PGID=${PGID}\n      - TZ=${TZ}\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: monitorr\n      traefik.protocol: http\n      traefik.port: 80\n      traefik.frontend.rule: Host:monitorr.${DOMAINNAME}\n      traefik.frontend.headers.SSLHost: monitorr.${DOMAINNAME}\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      #      traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue overrides this\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:${DOMAINNAME}\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Varken - Monitor Plex, Sonarr, Radarr, and Other Data\n  varken:\n    image: boerderij/varken\n    hostname: varken\n    container_name: varken\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n      - default\n    volumes:\n      - ${USERDIR}/docker/varken:/config\n    environment:\n      PUID: ${PUID}\n      PGID: ${PGID}\n      TZ: ${TZ}\n      VRKN_GLOBAL_SONARR_SERVER_IDS: 1\n      VRKN_GLOBAL_RADARR_SERVER_IDS: 1\n      VRKN_GLOBAL_LIDARR_SERVER_IDS: \"false\"\n      VRKN_GLOBAL_TAUTULLI_SERVER_IDS: 1\n      VRKN_GLOBAL_OMBI_SERVER_IDS: \"false\"\n      VRKN_GLOBAL_SICKCHILL_SERVER_IDS: \"false\"\n      VRKN_GLOBAL_UNIFI_SERVER_IDS: 1\n      VRKN_INFLUXDB_URL: ${SERVER_IP}\n      VRKN_INFLUXDB_PORT: 8086\n      VRKN_INFLUXDB_SSL: \"false\"\n      VRKN_INFLUXDB_VERIFY_SSL: \"false\"\n      VRKN_INFLUXDB_USERNAME: ${VARKEN_USER}\n      VRKN_INFLUXDB_PASSWORD: ${VARKEN_PASS}\n      VRKN_TAUTULLI_1_URL: ${SERVER_IP}:${TAUTULLI_PORT}\n      VRKN_TAUTULLI_1_FALLBACK_IP: 1.1.1.1\n      VRKN_TAUTULLI_1_APIKEY: ${TAUTULLI_API_KEY}\n      VRKN_TAUTULLI_1_SSL: \"false\"\n      VRKN_TAUTULLI_1_VERIFY_SSL: \"false\"\n      VRKN_TAUTULLI_1_GET_ACTIVITY: \"true\"\n      VRKN_TAUTULLI_1_GET_ACTIVITY_RUN_SECONDS: 30\n      VRKN_TAUTULLI_1_GET_STATS: \"true\"\n      VRKN_TAUTULLI_1_GET_STATS_RUN_SECONDS: 3600\n      VRKN_SONARR_1_URL: ${SERVER_IP}:${SONARR_PORT}\n      VRKN_SONARR_1_APIKEY: ${SONARR_API_KEY}\n      VRKN_SONARR_1_SSL: \"false\"\n      VRKN_SONARR_1_VERIFY_SSL: \"false\"\n      VRKN_SONARR_1_MISSING_DAYS: 7\n      VRKN_SONARR_1_MISSING_DAYS_RUN_SECONDS: 300\n      VRKN_SONARR_1_FUTURE_DAYS: 1\n      VRKN_SONARR_1_FUTURE_DAYS_RUN_SECONDS: 300\n      VRKN_SONARR_1_QUEUE: \"true\"\n      VRKN_SONARR_1_QUEUE_RUN_SECONDS: 300\n      VRKN_RADARR_1_URL: ${SERVER_IP}:${RADARR_PORT}\n      VRKN_RADARR_1_APIKEY: ${RADARR_API_KEY}\n      VRKN_RADARR_1_SSL: \"false\"\n      VRKN_RADARR_1_VERIFY_SSL: \"false\"\n      VRKN_RADARR_1_QUEUE: \"true\"\n      VRKN_RADARR_1_QUEUE_RUN_SECONDS: 300\n      VRKN_RADARR_1_GET_MISSING: \"true\"\n      VRKN_RADARR_1_GET_MISSING_RUN_SECONDS: 300\n      VRKN_UNIFI_1_URL: ${UNIFI_HOST}\n      VRKN_UNIFI_1_USERNAME: ${UNIFI_USER}\n      VRKN_UNIFI_1_PASSWORD: ${UNIFI_PASS}\n      VRKN_UNIFI_1_SITE: default\n      VRKN_UNIFI_1_USG_NAME: USG\n      VRKN_UNIFI_1_SSL: \"true\"\n      VRKN_UNIFI_1_VERIFY_SSL: \"false\"\n      VRKN_UNIFI_1_GET_USG_STATS_RUN_SECONDS: 300\n\n  # Telly Tv- IPTV proxy for Plex\n  # https://hub.docker.com/r/tellytv/telly\n  # https://github.com/tellytv/telly/wiki/Docker-Walkthrough%3A-Linux-with-config-file\n  # https://github.com/tellytv/telly/wiki/Adding-Telly-to-Plex\n  # Telly uses port 6077\n  # In plex, the DVR IP will be http://HostIP:6077\n  # EPG data will be at http://HostIP:6077/epg.xml\n  # xTeve is better than TellyTV - Replaced on Jan 09, 2020\n  tellytv:\n    image: tellytv/telly:dev-ffmpeg\n    container_name: tellytv\n    hostname: tellytv\n    restart: unless-stopped\n    network_mode: host\n    ports:\n      - \"1900:1900/udp\"\n    environment:\n      - TZ=${TZ}\n    volumes:\n      - ${USERDIR}/docker/telly/telly.config.toml:/etc/telly/telly.config.toml\n\n  # Traefik Home - Dashboard\n  home:\n    image: lobre/traefik-home\n    container_name: traefik-home\n    hostname: traefik-home\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #     - \"${SMOKEPING_PORT}:80\"\n    volumes:\n      - /var/run/docker.sock:/tmp/docker.sock:ro\n    labels:\n      #Additional label - add this to all containers to make them appear on dashboard\n      traefik.home: \"true\"\n      #Regular labels\n      traefik.enable: \"true\"\n      traefik.backend: home\n      traefik.protocol: http\n      traefik.port: 80\n      traefik.frontend.rule: Host:home.${DOMAINNAME}\n      traefik.frontend.headers.SSLHost: home.${DOMAINNAME}\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      #      traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue overrides this\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:${DOMAINNAME}\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # MiFlora MQTT Daemon - BT to MQTT Daemon for MiFlora Sensors\n  miflora:\n    image: raymondmm/miflora-mqtt\n    container_name: miflora-mqtt\n    hostname: miflora\n    environment:\n      - TZ=${TZ}\n    network_mode: host\n    #    user: \"0\"\n    volumes:\n      - ${USERDIR}/docker/miflora-mqtt/config:/config\n    restart: unless-stopped\n\n  # xTeve - IPTV proxy for Plex\n  xteve:\n    image: alturismo/xteve\n    container_name: xteve\n    hostname: xteve\n    restart: unless-stopped\n    #    network_mode: host\n    networks:\n      - t1_proxy\n      - default\n    ports:\n      - \"34400:34400\"\n      - \"1901:1900\"\n    #    user: \"0\"\n    #    logging:\n    #      options:\n    #        max-size: \"10m\"\n    #        max-files: 3\n    environment:\n      TZ: ${TZ}\n    volumes:\n      - ${USERDIR}/docker/xteve:/config:rw\n      - /dev/shm:/tmp/xteve\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: xteve\n      traefik.protocol: http\n      traefik.port: 34400\n      traefik.frontend.rule: Host:xteve.${DOMAINNAME}\n      traefik.frontend.headers.SSLHost: xteve.${DOMAINNAME}\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      #      traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue overrides this\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:${DOMAINNAME}\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # MQTT Admin - Web Based MQTT Client\n  mqttweb:\n    image: dersimn/mqtt-admin\n    container_name: mqttweb\n    hostname: mqttweb\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #      - \"80:80\"\n    environment:\n      MQTT_HOST: \"$SERVER_IP:9001\"\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: mqttweb\n      traefik.protocol: http\n      traefik.port: 80\n      traefik.frontend.rule: Host:mqttweb.${DOMAINNAME}\n      traefik.frontend.headers.SSLHost: mqttweb.${DOMAINNAME}\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      #      traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue overrides this\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:${DOMAINNAME}\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Piwigo - Image Gallery\n  piwigo:\n    image: linuxserver/piwigo\n    container_name: piwigo\n    hostname: piwigo\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"${PIWIGO_PORT}:80\"\n    volumes:\n      - ${USERDIR}/docker/piwigo:/config\n    environment:\n      PUID: ${PUID}\n      PGID: ${PGID}\n      TZ: ${TZ}\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: piwigo\n      traefik.protocol: http\n      traefik.port: 80\n      traefik.frontend.rule: Host:piwigo.${DOMAINNAME}\n      traefik.frontend.headers.SSLHost: piwigo.${DOMAINNAME}\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      #      traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue overrides this\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:${DOMAINNAME}\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Logarr - Log Management\n  logarr:\n    image: monitorr/logarr\n    container_name: logarr\n    hostname: logarr\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #     - \"${LOGARR_PORT}:80\"\n    volumes:\n      - ${USERDIR}/docker/logarr/config:/config\n      - ${USERDIR}/docker/logarr/logs:/var/log/logarrlogs\n    environment:\n      TZ: ${TZ}\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: logarr\n      traefik.protocol: http\n      traefik.port: 80\n      traefik.frontend.rule: Host:logarr.${DOMAINNAME}\n      traefik.frontend.headers.SSLHost: logarr.${DOMAINNAME}\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:${DOMAINNAME}\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n"
  },
  {
    "path": "archives/traefik_v1/docker-compose-t1-swarm.yml",
    "content": "# CAUTION: THIS COMPOSE FILE FOR DOCKER SWARM MODE IS NOT BEING ACTIVELY WORKED. MOST OF THE SERVICES LISTED HERE WORK BUT NOT GUARANTEED.\n\n# DOCKER TRAEFIK 1 IS NO LONGER BEING MAINTAINED. CHECK INSTRUCTIONS FOR DOCKER TRAEFIK V2 SETUP.\n\nversion: \"3.7\"\n\nservices:\n  traefik:\n    hostname: traefik\n    image: traefik:latest\n    command:\n      #- \"storeconfig\" #This is the push to consul, secondary traefik must be created and interfaced to this traefik. Remove this traefik's open ports, it shuts down once consul is messaged.\n      - \"--logLevel=INFO\"\n      - \"--InsecureSkipVerify=true\" #for unifi controller to not throw internal server error message\n      - \"--api\"\n      - \"--api.entrypoint=apiport\"\n      - \"--defaultentrypoints=http,https\"\n      - \"--entrypoints=Name:http Address::80 Redirect.EntryPoint:https\"\n      - \"--entrypoints=Name:https Address::443 TLS TLS.SniStrict:true TLS.MinVersion:VersionTLS12 CipherSuites:TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256\"\n      - \"--entrypoints=Name:apiport Address::8080\"\n      - \"--file\"\n      - \"--file.directory=/etc/traefik/rules/\"\n      - \"--file.watch=true\"\n      - \"--acme\"\n      - \"--acme.storage=/etc/traefik/acme/acme.json\"\n      - \"--acme.entryPoint=https\"\n      # not yet ready?\n      #      - \"--acme.TLS-ALPN-01=true\"\n      - \"--acme.dnsChallenge=true\"\n      - \"--acme.dnsChallenge.provider=cloudflare\"\n      - \"--acme.dnsChallenge.delayBeforeCheck=60\"\n      - \"--acme.dnsChallenge.resolvers=1.1.1.1,1.0.0.1\"\n      - \"--acme.onHostRule=true\"\n      - \"--acme.email=admin@${DOMAINNAME}\"\n      - \"--acme.acmeLogging=true\"\n      - \"--acme.domains=${DOMAINNAME},*.${DOMAINNAME},\"\n      - \"--acme.KeyType=RSA4096\"\n      #Let's Encrypt's staging server,\n      #caServer = \"https://acme-staging-v02.api.letsencrypt.org/directory\"\n      - \"--docker\"\n      - \"--docker.swarmMode\"\n      - \"--docker.domain=${DOMAINNAME}\"\n      - \"--docker.watch\"\n      - \"--docker.exposedbydefault=false\"\n      #- \"--consul\"\n      #- \"--consul.endpoint=consul:8500\"\n      #- \"--consul.prefix=traefik\"\n      - \"--retry\"\n      - \"resolvers=[192,168.1.1:53,1.1.1.1:53,]\"\n    environment:\n      TZ: ${TZ}\n      CF_API_EMAIL: ${CLOUDFLARE_EMAIL}\n      CF_API_KEY: ${CLOUDFLARE_API_KEY}\n    ports:\n      - target: 80\n        published: 80\n      - target: 443\n        published: 443\n      - target: 8080\n        published: 8145\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock:ro\n      - ${USERDIR}/docker/traefik1-swarm:/etc/traefik\n      - ${USERDIR}/docker/shared:/shared\n      #- ${USERDIR}/docker/traefik1-swarm/traefik.log:/traefik.log\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      placement:\n        constraints: [node.role == manager]\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n        max_attempts: 5\n      labels:\n        traefik.enable: \"true\"\n        traefik.docker.network: t1s_proxy\n        traefik.backend: traefik\n        traefik.protocol: http\n        traefik.port: 8080\n        traefik.frontend.rule: Host:traefik.${DOMAINNAME}\n        traefik.frontend.entryPoint: http\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.priority: 1\n        traefik.frontend.passHostHeader: \"true\"\n        traefik.frontend.headers.SSLForceHost: \"true\"\n        traefik.frontend.headers.SSLHost: traefik.${DOMAINNAME}\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        ##        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:${DOMAINNAME}\"\n        traefik.frontend.auth.basic.users: ${HTTP_USERNAME}:${HTTP_PASSWORD}\n        #traefik.frontend.auth.forward.address: http://oauth:4181\n        #traefik.frontend.auth.basic.users: xxx:xxx\n\n  unifi:\n    hostname: unifi\n    image: linuxserver/unifi:latest\n    environment:\n      PUID: ${PUID}\n      PGID: ${PGID}\n      TZ: ${TZ}\n    ports:\n      - target: 3478\n        published: 3478\n        protocol: udp\n        mode: host\n      - target: 10001\n        published: 10001\n        protocol: udp\n        mode: host\n      - target: 8080\n        published: 8080\n        protocol: tcp\n        mode: host\n      - target: 8081\n        published: 8081\n        protocol: tcp\n        mode: host\n      - target: 8443\n        published: 8147\n        protocol: tcp\n        mode: host\n      - target: 8880\n        published: 8880\n        protocol: tcp\n        mode: host\n      - target: 6789\n        published: 6789\n        protocol: tcp\n        mode: host\n    volumes:\n      - ${USERDIR}/docker/unifi:/config\n      - ${USERDIR}/docker/shared:/shared\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.tags: \"frontend\"\n        traefik.frontend.passHostHeader: \"true\"\n        traefik.admin.backend: unifi\n        traefik.admin.frontend.rule: Host:unifi.${DOMAINNAME}\n        traefik.admin.port: 8443\n        traefik.admin.protocol: https\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        #        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.priority: 1\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  #HEIMDALL 8148\n  heimdall:\n    image: \"linuxserver/heimdall\"\n    hostname: heimdall\n    volumes:\n      - ${USERDIR}/docker/heimdall:/config\n    ports:\n      - \"8148:80\"\n    #      - \"443:443\"\n    environment:\n      - PUID=${PUID}\n      - PGID=${PGID}\n      - TZ=${TZ}\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:heim.${DOMAINNAME}\n        traefik.port: 80\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: heimdall\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  #GUACAMOLE 8149\n  guacamole:\n    hostname: guacamole\n    image: guacamole/guacamole\n    ports:\n      - 8149:8080\n    environment:\n      #using single quotation around env variables did not work\n      - GUACD_HOSTNAME=guacd\n      - MYSQL_HOSTNAME=${DB_HOST}\n      - MYSQL_PORT=${DB_PORT}\n      - MYSQL_DATABASE=guacamole\n      - MYSQL_USER=${GUAC_MYSQL_USER}\n      - MYSQL_PASSWORD=${GUAC_MYSQL_PASSWORD}\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:guac.${DOMAINNAME}\n        traefik.port: 8080\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: guacamole\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  ################## DATABASES ##############################################\n\n  #PHPMYADMIN 8155\n  # Create a new user with admin priv as in notes. root user did not work.\n  phpmyadmin:\n    hostname: phpmyadmin\n    image: phpmyadmin/phpmyadmin\n    ports:\n      - 8155:80\n    environment:\n      - PMA_HOST=${DB_HOST}\n      - PMA_PORT=${DB_PORT}\n      #      - PMA_ARBITRARY=1\n      - MYSQL_ROOT_PASSWORD=${MYSQL_ROOT_PASSWORD}\n    #    volumes:\n    #      - ${USERDIR}/docker/phpmyadmin:/etc/phpmyadmin\n    #      - ${USERDIR}/docker/shared:/shared\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:pma.${DOMAINNAME}\n        traefik.port: 80\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: phpmyadmin\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  #INFLUXDB 8154\n  #create influxdb.conf\n  influxdb:\n    hostname: influxdb\n    image: influxdb\n    volumes:\n      #      - ${USERDIR}/docker/influxdb/influxdb.conf:/etc/influxdb/influxdb.conf:ro\n      - ${USERDIR}/docker/influxdb/db:/var/lib/influxdb\n      - ${USERDIR}/docker/shared:/shared\n    #    command: -config /etc/influxdb/influxdb.conf\n    ports:\n      - \"8086:8086\"\n      - \"8083:8083\"\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"false\"\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  #GRAFANA 8157\n  grafana:\n    hostname: grafana\n    image: grafana/grafana\n    volumes:\n      - ${USERDIR}/docker/grafana:/var/lib/grafana\n      - ${USERDIR}/docker/shared:/shared\n    ports:\n      - \"8158:3000\"\n    user: \"0\"\n    #    env_file:\n    #      - ${USERDIR}/docker/env/env.grafana\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:graf.${DOMAINNAME}\n        traefik.port: 3000\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: grafana\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  ################## SMART HOME ##############################################\n\n  #MOSQUITTO MQTT BROKER 8152\n  # Create mosquitto.conf, passwd, mosquitto.log files  and set permissions to 775 user:docker\n  mosquitto:\n    image: \"eclipse-mosquitto\"\n    hostname: mosquitto\n    volumes:\n      - ${USERDIR}/docker/mosquitto/config/mosquitto.conf:/mosquitto/config/mosquitto.conf\n      - ${USERDIR}/docker/mosquitto/config/passwd:/mosquitto/config/passwd\n      #      - ${USERDIR}/docker/mosquitto/log/mosquitto.log:/mosquitto/log/mosquitto.log\n      #      - ${USERDIR}/docker/mosquitto/data:/mosquitto/data\n      - ${USERDIR}/docker/shared:/shared\n    ports:\n      - \"1883:1883\" #http\n      #      - \"8158:9001\" #websockets\n      - \"8152:8883\" #https\n    environment:\n      - PUID=${PUID}\n      - PGID=${PGID}\n      - TZ=${TZ}\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"false\"\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  zoneminder:\n    hostname: zoneminder\n    #    image: adc3c7a0ca0a\n    image: quantumobject/docker-zoneminder\n    #    privileged: true\n    ports:\n      - \"8154:80\"\n      - \"8156:443\"\n      - \"9000:9000\"\n    volumes:\n      - /var/empty\n      - ${USERDIR}/docker/shared:/shared\n      - ${USERDIR}/docker/zoneminder/backups:/var/backups\n      - ${USERDIR}/docker/zoneminder/zoneminder:/var/cache/zoneminder\n      - ${USERDIR}/docker/zoneminder/config:/config\n      - type: tmpfs\n        target: /dev/shm\n    environment:\n      - SHMEM=\"50%\"\n      - PUID=${PUID}\n      - PGID=${PGID}\n      - TZ=${TZ}\n      - PHP_TZ=${TZ}\n      - ZM_DB_HOST=192.168.1.254\n      - ZM_DB_PORT=${DB_PORT}\n      #needed to create the initial tables etc. In addition need database zm, username zmuser, and password zmpass - cannot change zm, zmuser, or zmpass\n      - MYSQL_ROOT_PASSWORD=${MYSQL_ROOT_PASSWORD}\n      - MYSQL_ROOT=${USER}\n    #    shm_size: 4096m\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:zone.${DOMAINNAME}\n        traefik.port: 80\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: zoneminder\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  #################### DOWNLOADERS ############################################\n\n  #SABNZBD 8166\n  # Disable SABNnzbd's built-in HTTPS support for traefik proxy to work\n  # Needs trailing / if using PathPrefix\n  sabnzbd:\n    image: \"linuxserver/sabnzbd\"\n    hostname: sabnzbd\n    volumes:\n      - ${USERDIR}/docker/sabnzbd:/config\n      - ${USERDIR}/Downloads:/downloads\n      - ${USERDIR}/Downloads/incomplete:/incomplete-downloads\n      - ${USERDIR}/docker/shared:/shared\n    ports:\n      - \"8166:8080\"\n    environment:\n      - PUID=${PUID}\n      - PGID=${PGID}\n      - TZ=${TZ}\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:sab.${DOMAINNAME}\n        traefik.port: 8080\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: sabnzbd\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  #qBittorrent 8168\n  # Needs trailing / if using PathPrefixStrip\n  qbittorrent:\n    hostname: qbittorrent\n    image: \"linuxserver/qbittorrent\"\n    volumes:\n      - ${USERDIR}/docker/qbittorrent:/config\n      - ${USERDIR}/Downloads:/downloads\n      - ${USERDIR}/docker/shared:/shared\n    ports:\n      - \"8168:8168\"\n      - \"6881:6881\"\n      - \"6881:6881/udp\"\n    environment:\n      - PUID=${PUID}\n      - PGID=${PGID}\n      - TZ=${TZ}\n      - UMASK_SET=002\n      - WEBUI_PORT=8168\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:qbit.${DOMAINNAME}\n        traefik.port: 8168\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: qbittorrent\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  #################### PVRS ############################################\n  #RADARR 8164\n  # Set url_base in radarr settings if using PathPrefix\n  radarr:\n    #    image: \"aront/radarr\"\n    image: \"linuxserver/radarr\"\n    hostname: radarr\n    volumes:\n      - ${USERDIR}/docker/radarr:/config\n      - ${USERDIR}/Downloads:/downloads\n      - /media/media:/media\n      - /media/ds918:/ds918\n      #      - ${USERDIR}/docker/shared/mp4_automator:/config_mp4_automator\n      - /media/media/movies:/movies\n      - \"/etc/localtime:/etc/localtime:ro\"\n    ports:\n      - \"8164:7878\"\n    environment:\n      - PUID=${PUID}\n      - PGID=${PGID}\n      - TZ=${TZ}\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:radarr.${DOMAINNAME}\n        traefik.port: 7878\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: radarr\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  #SONARR 8167\n  # Set url_base in sonarr settings if using PathPrefix\n  sonarr:\n    #    image: \"aront/sonarr\"\n    image: \"linuxserver/sonarr\"\n    hostname: sonarr\n    volumes:\n      - ${USERDIR}/docker/sonarr:/config\n      - ${USERDIR}/Downloads:/downloads\n      - /media/media/tvshows:/tv\n      - /media/media:/media\n      - /media/ds918:/ds918\n      - \"/etc/localtime:/etc/localtime:ro\"\n    #      - \"${USERDIR}/docker/shared/mp4_automator:/config_mp4_automator:rw\"\n    ports:\n      - \"8167:8989\"\n    environment:\n      - PUID=${PUID}\n      - PGID=${PGID}\n      - TZ=${TZ}\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:sonarr.${DOMAINNAME}\n        traefik.port: 8989\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: sonarr\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  #LIDARR 8163\n  # Set url_base in lidarr settings if using PathPrefix\n  lidarr:\n    image: \"linuxserver/lidarr\"\n    hostname: lidarr\n    volumes:\n      - ${USERDIR}/docker/lidarr:/config\n      - ${USERDIR}/Downloads:/downloads\n      - /media/ds918/media/music:/music\n      - \"/etc/localtime:/etc/localtime:ro\"\n      - ${USERDIR}/docker/shared:/shared\n    ports:\n      - \"8163:8686\"\n    environment:\n      - PUID=${PUID}\n      - PGID=${PGID}\n      - TZ=${TZ}\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:lidarr.${DOMAINNAME}\n        traefik.port: 8686\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: lidarr\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  ####################### INDEXERS #########################################\n  #JACKETT 8161\n  # Set url_base in Jackett settings if using PathPrefix\n  jackett:\n    image: \"linuxserver/jackett\"\n    hostname: jackett\n    volumes:\n      - ${USERDIR}/docker/jackett:/config\n      - ${USERDIR}/Downloads:/downloads\n      - \"/etc/localtime:/etc/localtime:ro\"\n      - ${USERDIR}/docker/shared:/shared\n    ports:\n      - \"8161:9117\"\n    environment:\n      - PUID=${PUID}\n      - PGID=${PGID}\n      - TZ=${TZ}\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:jackett.${DOMAINNAME}\n        traefik.port: 9117\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: jackett\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  #HYDRA 8165\n  # Set base_url in Hydra settings if using PathPrefix\n  hydra:\n    image: \"linuxserver/hydra\"\n    hostname: hydra\n    volumes:\n      - ${USERDIR}/docker/hydra:/config\n      - ${USERDIR}/Downloads:/downloads\n      - ${USERDIR}/docker/shared:/shared\n    ports:\n      - \"8165:5075\"\n    environment:\n      - PUID=${PUID}\n      - PGID=${PGID}\n      - TZ=${TZ}\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:hydra.${DOMAINNAME}\n        traefik.port: 5075\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: hydra\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  ##################### MEDIA SERVER ###########################################\n\n  #EMBY\n  embyms:\n    hostname: embyms\n    image: emby/embyserver:latest\n    volumes:\n      - /etc/localtime:/etc/localtime:ro\n      - ${USERDIR}/docker/embyms:/config\n      - ${USERDIR}/docker/embyms/transcode:/transcode\n      - /media/media:/media\n      - /media/ds918:/ds918\n      - ${USERDIR}/docker/shared:/shared\n      - ${USERDIR}/Downloads:/downloads\n    ports:\n      - \"8096:8096/tcp\"\n      - \"8920:8920/tcp\"\n    environment:\n      - TZ=${TZ}\n      - HOSTNAME=\"zEmby\"\n      - UID=${PUID}\n      - GID=${PGID}\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:emby.${DOMAINNAME}\n        traefik.port: 8096\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: embyms\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  #TAUTULLI / PLEXPY 8170\n  # Set HTTP Root in Tautulli settings if using PathPrefix\n  tautulli:\n    hostname: tautulli\n    image: linuxserver/tautulli\n    volumes:\n      - ${USERDIR}/docker/tautulli/config:/config\n      - ${USERDIR}/docker/tautulli/logs:/logs:ro\n      - ${USERDIR}/docker/shared:/shared\n    ports:\n      - \"8170:8181\"\n    environment:\n      - PUID=${PUID}\n      - PGID=${PGID}\n      - TZ=${TZ}\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:tautulli.${DOMAINNAME}\n        traefik.port: 8181\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: tautulli\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  #BAZARR 8162\n  bazarr:\n    hostname: bazarr\n    image: linuxserver/bazarr\n    volumes:\n      - ${USERDIR}/docker/bazarr:/config\n      - /media/media:/media\n      - /media/ds918:/ds918\n      - ${USERDIR}/docker/shared:/shared\n    ports:\n      - \"8162:6767\"\n    environment:\n      - PUID=${PUID}\n      - PGID=${PGID}\n      - TZ=${TZ}\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"true\"\n        traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n        traefik.frontend.redirect.entryPoint: https\n        traefik.frontend.rule: Host:bazarr.${DOMAINNAME}\n        traefik.port: 6767\n        traefik.protocol: http\n        traefik.frontend.priority: 1\n        traefik.backend: bazarr\n        traefik.docker.network: t1s_proxy\n        traefik.frontend.headers.SSLRedirect: \"true\"\n        traefik.frontend.headers.STSSeconds: 315360000\n        traefik.frontend.headers.browserXSSFilter: \"true\"\n        traefik.frontend.headers.contentTypeNosniff: \"true\"\n        traefik.frontend.headers.forceSTSHeader: \"true\"\n        traefik.frontend.headers.SSLHost: ${DOMAINNAME}\n        traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n        traefik.frontend.headers.STSPreload: \"true\"\n        #        traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue will override this\n        traefik.frontend.headers.customFrameOptionsValue: \"allow-from https://${DOMAINNAME}\"\n        traefik.frontend.passHostHeader: \"true\"\n      #        traefik.frontend.auth.basic.usersFile: /.htpasswd\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n  ##################### MAINTENANCE ###########################################\n\n  # auto update swarm services\n  shepherd:\n    image: mazzolino/shepherd\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock\n    environment:\n      - SLEEP_TIME=\"60m\"\n    deploy:\n      placement:\n        constraints:\n          - node.role == manager\n\n  #GUACAMOLE DAEMON\n  guacd:\n    hostname: guacd\n    image: guacamole/guacd\n    networks:\n      - t1s_proxy\n    deploy:\n      mode: replicated\n      replicas: 1\n      labels:\n        traefik.enable: \"false\"\n      update_config:\n        delay: 30s\n      restart_policy:\n        condition: on-failure\n      placement:\n        #        constraints: [node.platform.os == linux]\n        constraints: [node.role == manager]\n\n########################### NETWORKS ############################\nnetworks:\n  t1s_proxy:\n    name: t1s_proxy\n    external: true\n"
  },
  {
    "path": "archives/traefik_v1/docker-compose-t1-synology.yml",
    "content": "version: \"3.7\"\n\n########################### NETWORKS\nnetworks:\n  traefik_proxy:\n    external:\n      name: traefik_proxy\n  default:\n    driver: bridge\n\n########################### SERVICES\nservices:\n  #UNIFI\n  unifi:\n    image: jacobalberty/unifi:stable\n    container_name: unifi\n    hostname: unifi\n    restart: unless-stopped\n    networks:\n      - default\n    ports:\n      - \"8080:8080\"\n      - \"8443:8443\"\n      - \"3478:3478/udp\"\n      - \"10001:10001/udp\"\n      - \"6789:6789\"\n    environment:\n      UNIFI_UID: 1026\n      UNIFI_GID: 100\n      TZ: America/New_York\n      RUNAS_UID0: \"false\"\n      BIND_PRIV: \"false\"\n    volumes:\n      - ${DOCKERDIR}/unifi:/unifi\n\n  plexms:\n    image: plexinc/pms-docker:public\n    container_name: plexms\n    hostname: plexms\n    restart: unless-stopped\n    volumes:\n      - ${DOCKERDIR}/plex:/config\n      - ${MEDIADIR}:/media:ro\n      - /dev/shm:/transcode\n    network_mode: \"host\"\n    environment:\n      TZ: ${TZ}\n      HOSTNAME: \"synPlex\"\n      PLEX_CLAIM: ${PLEX_CLAIM}\n      PLEX_UID: ${PUID}\n      PLEX_GID: ${PGID}\n      ADVERTISE_IP: http://${SERVER_IP}:32400/\n    devices:\n      - /dev/dri:/dev/dri\n    privileged: true\n\n  ############################# MAINTENANCE\n\n  # Ouroboros - Automatic Docker Container Updates\n  ouroboros:\n    image: pyouroboros/ouroboros\n    container_name: ouroboros\n    hostname: ouroboros\n    restart: unless-stopped\n    networks:\n      - default\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock\n    environment:\n      TZ: ${TZ}\n      INTERVAL: 86400\n      LOG_LEVEL: debug\n      SELF_UPDATE: \"true\"\n      CLEANUP: \"true\"\n      #      IGNORE: traefik influxdb hassio_dns homeassistant hassio_supervisor addon_core_check_config addon_62c7908d_autobackup plexms\n      NOTIFIERS: \"tgram://${TGRAM_BOT_TOKEN}/${TGRAM_CHAT_ID}/\"\n\n  # Docker-GC - Automatic Docker Garbage Collection\n  # Create docker-gc-exclude file\n  dockergc:\n    image: clockworksoul/docker-gc-cron:latest\n    container_name: docker-gc\n    hostname: docker-gc\n    restart: unless-stopped\n    network_mode: none\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock\n      - ${DOCKERDIR}/docker-gc/docker-gc-exclude:/etc/docker-gc-exclude\n    environment:\n      CRON: 0 0 * * *\n      FORCE_IMAGE_REMOVAL: 1\n      FORCE_CONTAINER_REMOVAL: 0\n      GRACE_PERIOD_SECONDS: 604800\n      DRY_RUN: 0\n      CLEAN_UP_VOLUMES: 1\n      TZ: ${TZ}\n"
  },
  {
    "path": "archives/traefik_v1/docker-compose-t1-vpn.yml",
    "content": "version: \"3.7\"\n\n# DOCKER TRAEFIK 1 IS NO LONGER BEING MAINTAINED. CHECK INSTRUCTIONS FOR DOCKER TRAEFIK V2 SETUP.\n\n# GLOBAL NOTES\n# customFrameOptionsValue overrides traefik.frontend.headers.frameDeny=\"true\"\n\n########################### SERVICES\nservices:\n  ############################# FRONTENDS\n\n  # qBittorrent - Torrent downloader\n  # Needs trailing / if using PathPrefixStrip\n  qbittorrent:\n    image: linuxserver/qbittorrent\n    container_name: qbittorrent\n    restart: always\n    network_mode: container:transmission-vpn\n    volumes:\n      - ${USERDIR}/docker/qbittorrent:/config\n      - ${USERDIR}/Downloads:/downloads\n    environment:\n      PUID: ${PUID}\n      PGID: ${PGID}\n      TZ: ${TZ}\n      UMASK_SET: 002\n      WEBUI_PORT: 8168\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: qbittorrent\n      traefik.protocol: http\n      traefik.port: 8168\n      traefik.frontend.rule: Host:qbit.${DOMAINNAME}\n      #     traefik.frontend.rule: Host:${DOMAINNAME}; PathPrefix: /qbittorrent\n      traefik.frontend.headers.SSLHost: qbit.${DOMAINNAME}\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      #      traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue overrides this\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:${DOMAINNAME}\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n"
  },
  {
    "path": "archives/traefik_v1/docker-compose-t1.yml",
    "content": "version: \"3.7\"\n\n# DOCKER TRAEFIK 1 IS NO LONGER BEING MAINTAINED. CHECK INSTRUCTIONS FOR DOCKER TRAEFIK V2 SETUP.\n\n# GLOBAL NOTES\n# customFrameOptionsValue overrides traefik.frontend.headers.frameDeny=\"true\"\n\n########################### NETWORKS\n# Create t1_proxy network\n# docker network create t1_proxy\n\nnetworks:\n  t1_proxy:\n    external:\n      name: t1_proxy\n  default:\n    driver: bridge\n\n########################### SERVICES\nservices:\n  ############################# FRONTENDS\n\n  # Traefik - Reverse Proxy\n  # Touch (create empty files) traefik.toml and acme/acme.json. Set acme.json permissions to 600.\n  traefik:\n    image: traefik:maroilles\n    container_name: traefik\n    restart: unless-stopped\n    networks:\n      - default\n      - t1_proxy\n    ports:\n      - \"80:80\"\n      - \"443:443\"\n    #      - \"$TRAEFIK_DASHBOARD_PORT:8080\"\n    domainname: $DOMAINNAME\n    dns:\n      #      - $PIHOLE_IP\n      - 1.1.1.1\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock:ro\n      - $USERDIR/docker/traefik1:/etc/traefik\n      - $USERDIR/docker/shared:/shared\n    environment:\n      CF_API_EMAIL: $CLOUDFLARE_EMAIL\n      CF_API_KEY: $CLOUDFLARE_API_KEY\n    #      DUCKDNS_TOKEN: $DUCKDNS_TOKEN\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: traefik\n      traefik.protocol: http\n      traefik.port: 8080\n      traefik.frontend.rule: Host:traefik.$DOMAINNAME\n      #      traefik.frontend.rule: Host:$DOMAINNAME; PathPrefixStrip: /traefik\n      traefik.frontend.headers.SSLHost: traefik.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      #      traefik.frontend.headers.frameDeny: \"true\" #customFrameOptionsValue overrides this\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      #      traefik.frontend.auth.basic.users: '$HTTP_USERNAME:$HTTP_PASSWORD'\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Google OAuth - Single Sign On using OAuth 2.0\n  oauth:\n    image: thomseddon/traefik-forward-auth:latest\n    container_name: oauth\n    restart: always\n    networks:\n      - default\n      - t1_proxy\n    environment:\n      PROVIDERS_GOOGLE_CLIENT_ID: $GOOGLE_CLIENT_ID\n      PROVIDERS_GOOGLE_CLIENT_SECRET: $GOOGLE_CLIENT_SECRET\n      SECRET: $OAUTH_SECRET\n      COOKIE_DOMAIN: $DOMAINNAME\n      INSECURE_COOKIE: \"false\"\n      AUTH_HOST: oauth.$DOMAINNAME\n      URL_PATH: /_oauth\n      WHITELIST: $MY_EMAIL\n      LOG_LEVEL: info\n      LIFETIME: 2592000 # 30 days\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: oauth\n      traefik.port: 4181\n      traefik.frontend.rule: Host:oauth.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: oauth.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Portainer - Container Management\n  # Needs trailing / in the URL if using PathPrefixStrip\n  portainer:\n    image: portainer/portainer:latest\n    container_name: portainer\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #      - \"$PORTAINER_PORT:9000\"\n    command: -H unix:///var/run/docker.sock\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock\n      - $USERDIR/docker/portainer/data:/data\n    environment:\n      TZ: $TZ\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: portainer\n      traefik.protocol: http\n      traefik.port: 9000\n      traefik.frontend.rule: Host:portainer.$DOMAINNAME\n      #      traefik.frontend.rule: Host$DOMAINNAME; PathPrefixStrip: /portainer\n      traefik.frontend.headers.SSLHost: portainer.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Organizr - Unified Frontend\n  organizr:\n    image: organizrtools/organizr-v2:latest\n    container_name: organizr\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$ORGANIZR_PORT:80\"\n    volumes:\n      - $USERDIR/docker/organizr:/config\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: organizr\n      traefik.protocol: http\n      traefik.port: 80\n      traefik.frontend.rule: Host:$DOMAINNAME,www.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: $DOMAINNAME\n      #      traefik.frontend.rule: Host:$DOMAINNAME; PathPrefix: organizr\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Heimdall - Unified Frontend Alternative\n  # Putting all services behind Oragnizr slows things down.\n  heimdall:\n    image: linuxserver/heimdall:latest\n    container_name: heimdall\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$HEIMDALL_PORT:80\"\n    volumes:\n      - $USERDIR/docker/heimdall:/config\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: heimdall\n      traefik.protocol: http\n      traefik.port: 80\n      traefik.frontend.rule: Host:heimdall.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: heimdall.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Autoindex - Simple Directory Index\n  autoindex:\n    image: dceoy/nginx-autoindex:latest\n    container_name: autoindex\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #      - \"$AUTOINDEX_PORT:80\"\n    volumes:\n      - /media:/var/lib/nginx/html:ro # Location you want to index\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: autoindex\n      traefik.protocol: http\n      traefik.port: 80\n      traefik.frontend.rule: \"Host:index.$DOMAINNAME\"\n      traefik.frontend.headers.SSLHost: index.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n      traefik.frontend.auth.basic.users: \"$HTTP_USERNAME:$HTTP_PASSWORD\"\n\n  ############################# SMART HOME\n\n  # HA-Dockermon - Manage Docker containers in Home Assistant\n  ha-dockermon:\n    image: philhawthorne/ha-dockermon:latest\n    container_name: ha-dockermon\n    restart: unless-stopped\n    ports:\n      - \"$HA_DOCKERMON_PORT:8126\"\n    volumes:\n      - $USERDIR/docker/ha-dockermon:/config\n      - /var/run/docker.sock:/var/run/docker.sock\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n\n  # Mosquitto - MQTT Broker\n  # Create mosquitto.conf, passwd, mosquitto.log files  and set permissions to 775 user:docker\n  # dexec mosquitto /bin/sh -> mosquitto_passwd -b /mosquitto/config/passwd username passwd\n  mosquitto:\n    image: eclipse-mosquitto:latest\n    container_name: mosquitto\n    restart: unless-stopped\n    ports:\n      - \"$MOSQUITTO_HTTP_PORT:1883\" #http\n      - \"9001:9001\" #websockets\n    #      - \"$MOSQUITTO_HTTPS_PORT:8883\" #https\n    volumes:\n      - $USERDIR/docker/mosquitto/config/mosquitto.conf:/mosquitto/config/mosquitto.conf\n      - $USERDIR/docker/mosquitto/config/passwd:/mosquitto/config/passwd\n      - $USERDIR/docker/shared:/shared\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n\n  # ZoneMinder - Video Surveillance\n  # Create the database and initial tables using the init script. Database zm, username zmuser, and password zmpass - cannot customize zm, zmuser, or zmpass.\n  zoneminder:\n    image: quantumobject/docker-zoneminder:1.32\n    #    image: adc3c7a0ca0a\n    container_name: zoneminder\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$ZONEMINDER_HTTP_PORT:80\"\n      #      - \"$ZONEMINDER_HTTPS_PORT:443\"\n      - \"9000:9000\" # Event Notification Port\n    privileged: true\n    shm_size: 4096m\n    volumes:\n      - /var/empty\n      - $USERDIR/docker/shared:/shared\n      - $USERDIR/docker/zoneminder/backups:/var/backups\n      - $USERDIR/docker/zoneminder/zoneminder:/var/cache/zoneminder\n      - $USERDIR/docker/zoneminder/config:/config\n      - type: tmpfs\n        target: /dev/shm\n    environment:\n      SHMEM: \"50%\"\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n      PHP_TZ: $TZ\n      ZM_DB_HOST: $DB_HOST\n      ZM_DB_PORT: $DB_PORT\n      MYSQL_ROOT_PASSWORD: $MYSQL_ROOT_PASSWORD\n      MYSQL_ROOT: $USER\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: zoneminder\n      traefik.protocol: http\n      traefik.port: 80\n      traefik.frontend.rule: Host:zone.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: zone.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  ############################# DATABASE\n\n  # MariaDB - MySQL Database\n  mariadb:\n    container_name: mariadb\n    image: linuxserver/mariadb:latest\n    restart: always\n    networks:\n      - default\n    ports:\n      - \"3306:3306\"\n    volumes:\n      - $USERDIR/docker/mariadb/data:/config\n      - /etc/timezone:/etc/timezone:ro\n      - /etc/localtime:/etc/localtime:ro\n    environment:\n      - PUID=$PUID\n      - PGID=$PGID\n      - MYSQL_ROOT_PASSWORD=$MYSQL_ROOT_PASSWORD\n\n  # phpMyAdmin - Database management\n  # Create a new user with admin privileges. Cannot login as root.\n  phpmyadmin:\n    image: phpmyadmin/phpmyadmin:latest\n    container_name: phpmyadmin\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n      - default\n    ports:\n      - \"$PHPMYADMIN_PORT:80\"\n    environment:\n      #      PMA_HOST: $DB_HOST\n      #      PMA_HOST: $SERVER_IP\n      PMA_PORT: $DB_PORT\n      PMA_ARBITRARY: 1\n      MYSQL_ROOT_PASSWORD: $MYSQL_ROOT_PASSWORD\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: phpmyadmin\n      traefik.protocol: http\n      traefik.port: 80\n      traefik.frontend.rule: Host:pma.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: pma.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # InfluxDB - Database for sensor data\n  # Create influxdb.conf\n  influxdb:\n    image: influxdb\n    container_name: influxdb\n    restart: always\n    ports:\n      - \"$INFLUXDB_PORT:8086\"\n    volumes:\n      #      - $USERDIR/docker/influxdb/influxdb.conf:/etc/influxdb/influxdb.conf:ro\n      - $USERDIR/docker/influxdb/db:/var/lib/influxdb\n  #    command: -config /etc/influxdb/influxdb.conf\n\n  # Postgres - Database\n  postgres:\n    image: postgres\n    container_name: postgres\n    restart: always\n    volumes:\n      - $USERDIR/docker/postgres:/var/lib/postgresql/data\n    environment:\n      POSTGRES_PASSWORD: $STATPING_DB_PASS\n      POSTGRES_USER: $STATPING_DB_USER\n      POSTGRES_DB: $STATPING_DB\n\n  # Grafana - Graphical data visualization for InfluxDB data\n  grafana:\n    image: grafana/grafana:latest\n    container_name: grafana\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n      - default\n    #    ports:\n    #      - \"$GRAFANA_PORT:3000\"\n    #    depends_on:\n    #      - \"influxdb\"\n    user: \"0\"\n    volumes:\n      - $USERDIR/docker/grafana:/var/lib/grafana\n    environment:\n      GF_INSTALL_PLUGINS: \"grafana-clock-panel,grafana-simple-json-datasource,grafana-worldmap-panel,grafana-piechart-panel\"\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: grafana\n      traefik.protocol: http\n      traefik.port: 3000\n      traefik.frontend.rule: Host:grafana.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: grafana.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  ############################# DOWNLOADERS\n\n  # jDownloader - Download management\n  jdownloader:\n    image: jlesage/jdownloader-2:latest\n    container_name: jdownloader\n    restart: always\n    networks:\n      - t1_proxy\n    ports:\n      - \"$JDOWNLOADER_PORT:8168\"\n    volumes:\n      - $USERDIR/Downloads/completed:/output\n      - $USERDIR/docker/jdownloader:/config\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      TZ: $TZ\n      UMASK: 002\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      VNC_PASSWORD: $JDOWN_VNC_PASSWD\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: jdownloader\n      traefik.protocol: http\n      traefik.port: 5800\n      traefik.frontend.rule: Host:jdown.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: jdown.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # TransmissionBT - Torrent Downloader\n  # ONLY ACCESSIBLE THROUGH https://domain.com/transmission/web/ if using PathPrefix\n  transmission-vpn:\n    image: haugene/transmission-openvpn:latest\n    container_name: transmission-vpn\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n      - default\n    ports:\n      - \"$TRANSMISSION_PORT:9091\"\n    cap_add:\n      - NET_ADMIN\n    devices:\n      - /dev/net/tun\n    dns:\n      - 1.1.1.1\n      - 1.0.0.1\n    volumes:\n      - /etc/localtime:/etc/localtime:ro\n      - $USERDIR/docker/transmission-vpn/data:/data\n      - $USERDIR/docker/transmission-vpn/config:/config\n      - $USERDIR/Downloads:/downloads\n    environment:\n      OPENVPN_PROVIDER: IPVANISH\n      OPENVPN_USERNAME: $IPVANISH_USERNAME\n      OPENVPN_PASSWORD: $IPVANISH_PASSWORD\n      OPENVPN_CONFIG: \"ipvanish-CH-Zurich-zrh-c07\"\n      OPENVPN_OPTS: --inactive 3600 --ping 10 --ping-exit 60\n      LOCAL_NETWORK: \"$LOCAL_NETWORK\"\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n      UMASK_SET: 002\n      TRANSMISSION_RPC_AUTHENTICATION_REQUIRED: \"true\"\n      TRANSMISSION_RPC_HOST_WHITELIST: \"127.0.0.1,$SERVER_IP\"\n      TRANSMISSION_RPC_PASSWORD: $TRANSMISSION_RPC_PASSWORD\n      TRANSMISSION_RPC_USERNAME: $TRANSMISSION_RPC_USERNAME\n      TRANSMISSION_UMASK: 002\n      TRANSMISSION_RATIO_LIMIT: 0.01\n      TRANSMISSION_RATIO_LIMIT_ENABLED: \"true\"\n      TRANSMISSION_ALT_SPEED_DOWN: 2000\n      TRANSMISSION_ALT_SPEED_ENABLED: \"true\"\n      TRANSMISSION_ALT_SPEED_UP: 15\n      TRANSMISSION_SPEED_LIMIT_DOWN: 6000\n      TRANSMISSION_SPEED_LIMIT_DOWN_ENABLED: \"true\"\n      TRANSMISSION_SPEED_LIMIT_UP: 30\n      TRANSMISSION_SPEED_LIMIT_UP_ENABLED: \"true\"\n      TRANSMISSION_INCOMPLETE_DIR: /downloads/incomplete\n      TRANSMISSION_INCOMPLETE_DIR_ENABLED: \"true\"\n      TRANSMISSION_WATCH_DIR: /downloads\n      TRANSMISSION_WATCH_DIR_ENABLED: \"true\"\n      TRANSMISSION_DOWNLOAD_DIR: /downloads/completed\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: transmission-vpn\n      traefik.protocol: http\n      traefik.port: 9091\n      traefik.frontend.rule: Host:trans.$DOMAINNAME\n      #     traefik.frontend.rule: Host:$DOMAINNAME; PathPrefix: /transmission\n      traefik.frontend.headers.SSLHost: trans.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # SABnzbd - Binary newsgrabber (NZB downloader)\n  # Disable SABNnzbd's built-in HTTPS support for traefik proxy to work\n  # Needs trailing / if using PathPrefix\n  sabnzbd:\n    image: linuxserver/sabnzbd:latest\n    container_name: sabnzbd\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$SABNZBD_PORT:8080\"\n    volumes:\n      - $USERDIR/docker/sabnzbd:/config\n      - $USERDIR/Downloads:/downloads\n    #      - $USERDIR/Downloads/incomplete:/incomplete-downloads\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n      UMASK_SET: 002\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: sabnzbd\n      traefik.protocol: http\n      traefik.port: 8080\n      traefik.frontend.rule: Host:sabnzbd.$DOMAINNAME\n      #     traefik.frontend.rule: Host:$DOMAINNAME; PathPrefix: /sabnzbd\n      traefik.frontend.headers.SSLHost: sabnzbd.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  ############################# INDEXERS\n\n  # NZBHydra2 - NZB meta search\n  hydra:\n    image: linuxserver/hydra2:latest\n    container_name: hydra\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$NZBHYDRA_PORT:5076\"\n    volumes:\n      - $USERDIR/docker/hydra2:/config\n      - $USERDIR/Downloads:/downloads\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: hydra\n      traefik.protocol: http\n      traefik.port: 5076\n      traefik.frontend.rule: Host:hydra.$DOMAINNAME\n      #     traefik.frontend.rule: Host:$DOMAINNAME; PathPrefix: /hydra\n      traefik.frontend.headers.SSLHost: hydra.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Jackett - Torrent proxy\n  # Set url_base in Jackett settings if using PathPrefix\n  jackett:\n    image: linuxserver/jackett:latest\n    container_name: jackett\n    restart: always\n    networks:\n      - t1_proxy\n    ports:\n      - \"$JACKETT_PORT:8168\"\n    volumes:\n      - $USERDIR/docker/jackett:/config\n      - $USERDIR/Downloads:/downloads\n      - \"/etc/localtime:/etc/localtime:ro\"\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: jackett\n      traefik.protocol: http\n      traefik.port: 9117\n      traefik.frontend.rule: Host:jackett.$DOMAINNAME\n      #     traefik.frontend.rule: Host:$DOMAINNAME; PathPrefix: /jackett\n      traefik.frontend.headers.SSLHost: jackett.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  ############################# PVRS\n\n  # Lidarr - Music Management\n  # Set url_base in lidarr settings if using PathPrefix\n  lidarr:\n    image: linuxserver/lidarr:latest\n    container_name: lidarr\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$LIDARR_PORT:8686\"\n    volumes:\n      - $USERDIR/docker/lidarr:/config\n      - $USERDIR/Downloads:/downloads\n      - /media/ds918/media/music:/music\n      - \"/etc/localtime:/etc/localtime:ro\"\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: lidarr\n      traefik.protocol: http\n      traefik.port: 8686\n      traefik.frontend.rule: Host:lidarr.$DOMAINNAME\n      #     traefik.frontend.rule: Host:$DOMAINNAME; PathPrefix: /lidarr\n      traefik.frontend.headers.SSLHost: lidarr.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Radarr - Movie management\n  # Set url_base in radarr settings if using PathPrefix\n  radarr:\n    #    image: aront/radarr #for mp4_automator support\n    image: linuxserver/radarr:preview\n    container_name: radarr\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$RADARR_PORT:7878\"\n    volumes:\n      - $USERDIR/docker/radarr:/config\n      - $USERDIR/Downloads:/downloads\n      - /media:/nas\n      #      - $USERDIR/docker/shared/mp4_automator:/config_mp4_automator\n      - \"/etc/localtime:/etc/localtime:ro\"\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: radarr\n      traefik.protocol: http\n      traefik.port: 7878\n      traefik.frontend.rule: Host:radarr.$DOMAINNAME\n      #     traefik.frontend.rule: Host:$DOMAINNAME; PathPrefix: /radarr\n      traefik.frontend.headers.SSLHost: radarr.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Sonarr - TV Shows management\n  # Set url_base in sonarr settings if using PathPrefix\n  sonarr:\n    #    image: aront/sonarr  #for mp4_automator support\n    image: linuxserver/sonarr:preview\n    container_name: sonarr\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$SONARR_PORT:8989\"\n    volumes:\n      - $USERDIR/docker/sonarr:/config\n      - $USERDIR/Downloads:/downloads\n      - /media:/nas\n      - \"/etc/localtime:/etc/localtime:ro\"\n    #      - \"$USERDIR/docker/shared/mp4_automator:/config_mp4_automator:rw\"\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: sonarr\n      traefik.protocol: http\n      traefik.port: 8989\n      traefik.frontend.rule: Host:sonarr.$DOMAINNAME\n      #     traefik.frontend.rule: Host:$DOMAINNAME; PathPrefix: /sonarr\n      traefik.frontend.headers.SSLHost: sonarr.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  ############################# MEDIA\n\n  # AirSonic - Music Server\n  airsonic:\n    container_name: airsonic\n    image: linuxserver/airsonic:latest\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$AIRSONIC_PORT:4040\"\n    volumes:\n      - /media:/nas:ro\n      - $USERDIR/docker/airsonic/podcasts:/podcasts\n      - $USERDIR/docker/airsonic/playlists:/playlists\n      - $USERDIR/docker/airsonic/config:/config\n      #      - $USERDIR/docker/airsonic/config:/app/airsonic/config #Used to change log level for debugging\n      - /etc/timezone:/etc/timezone:ro\n      - /etc/localtime:/etc/localtime:ro\n    environment:\n      - PUID=$PUID\n      - PGID=$PGID\n      - JAVA_OPTS=-Dserver.use-forward-headers=true\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: airsonic\n      traefik.protocol: http\n      traefik.port: 4040\n      traefik.frontend.rule: Host:airsonic.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: airsonic.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n  #      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n  #      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n  #      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Plex - Media Server\n  plexms:\n    image: plexinc/pms-docker:public\n    container_name: plexms\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$PLEX_PORT:32400/tcp\"\n      - \"3005:3005/tcp\"\n      - \"8324:8324/tcp\"\n      - \"32469:32469/tcp\"\n      - \"1900:1900/udp\" #conflict with xTeVe\n      - \"32410:32410/udp\"\n      - \"32412:32412/udp\"\n      - \"32413:32413/udp\"\n      - \"32414:32414/udp\"\n      - \"$PLEX_WEB_TOOLS_PORT:33400\"\n    volumes:\n      - $USERDIR/docker/plexms:/config\n      - $USERDIR/Downloads:/Downloads\n      - /media:/nas\n      - /dev/shm:/transcode # Offload transcoding to RAM if you have enough RAM\n    #      - $USERDIR/Downloads/plex_tmp:/transcode\n    environment:\n      TZ: $TZ\n      HOSTNAME: \"nucPlex\"\n      PLEX_CLAIM: $PLEX_CLAIM\n      PLEX_UID: $PUID\n      PLEX_GID: $PGID\n      ADVERTISE_IP: http://$SERVER_IP:$PLEX_PORT/\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: plexms\n      traefik.protocol: http\n      traefik.port: 32400\n      traefik.frontend.rule: Host:nucplex.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: nucplex.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n  #      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n  #      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n  #      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Emby - Media Server\n  embyms:\n    image: emby/embyserver:latest\n    container_name: embyms\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$EMBY_PORT:8096/tcp\"\n      - \"8920:8920/tcp\"\n    volumes:\n      - /etc/localtime:/etc/localtime:ro\n      - $USERDIR/docker/embyms:/config\n      - /dev/shm:/transcode\n      - /media:/nas\n      - $USERDIR/Downloads:/downloads\n    environment:\n      TZ: $TZ\n      HOSTNAME: \"nucEmby\"\n      UID: $PUID\n      GID: $PGID\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: embyms\n      traefik.protocol: http\n      traefik.port: 8096\n      traefik.frontend.rule: Host:nucemby.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: nucemby.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n  #      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n  #      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n  #      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Jellyfin - Media Server\n  jellyfin:\n    image: jellyfin/jellyfin:latest\n    container_name: jellyfin\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$JELLYFIN_PORT:8096\"\n      - \"8921:8920\" # Changed to 8921 - conflict with Emby\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n      UMASK_SET: 022\n    volumes:\n      - $USERDIR/docker/jellyfin:/config\n      - /dev/shm:/ram_transcode\n      - /media:/nas\n    #      - /media:/nas:ro # Run in ro mode while upgrading JF\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: jellyfin\n      traefik.protocol: http\n      traefik.port: 8096\n      traefik.frontend.rule: Host:jelly.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: jelly.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n  #      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n  #      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n  #      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Ombi - Media Requests\n  ombi:\n    image: linuxserver/ombi:latest\n    container_name: ombi\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$OMBI_PORT:3579\"\n    volumes:\n      - $USERDIR/docker/ombi:/config\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n      BASE_URL: /ombi #optional\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: ombi\n      traefik.protocol: http\n      traefik.port: 3579\n      traefik.frontend.rule: Host:ombi.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: ombi.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Tautulli - Previously PlexPy. Plex statistics and monitoring\n  # Set HTTP Root in Tautulli settings if using PathPrefix\n  tautulli:\n    image: linuxserver/tautulli:latest\n    container_name: tautulli\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$TAUTULLI_PORT:8181\"\n    volumes:\n      - $USERDIR/docker/tautulli/config:/config\n      - $USERDIR/docker/tautulli/logs:/logs:ro\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: tautulli\n      traefik.protocol: http\n      traefik.port: 8181\n      traefik.frontend.rule: Host:tautulli.$DOMAINNAME\n      #     traefik.frontend.rule: Host:$DOMAINNAME; PathPrefix: /tautulli\n      traefik.frontend.headers.SSLHost: tautulli.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Plex-Sync - For Syncing watched status between plex servers\n  plex-sync:\n    image: patsissons/plex-sync:develop\n    container_name: plex-sync\n    environment:\n      INITIAL_RUN: \"true\"\n      #      DRY_RUN: 0\n      CRON_SCHEDULE: \"*/5 * * * *\"\n      SECTION_MAPS: $SYN_PLEX/$SYN_PLEX_HOLLYWOOD $NUC_PLEX/$NUC_PLEX_HOLLYWOOD | $SYN_PLEX/$SYN_PLEX_TVSHOWS $NUC_PLEX/$NUC_PLEX_TVSHOWS | $SYN_PLEX/$SYN_PLEX_INDIAN $NUC_PLEX/$NUC_PLEX_INDIAN | $SYN_PLEX/$SYN_PLEX_KOLLYWOOD $NUC_PLEX/$NUC_PLEX_KOLLYWOOD | $SYN_PLEX/$SYN_PLEX_DOCMOVIES $NUC_PLEX/$NUC_PLEX_DOCMOVIES | $SYN_PLEX/$SYN_PLEX_DOCSHOWS $NUC_PLEX/$NUC_PLEX_DOCSHOWS | $SYN_PLEX/$SYN_PLEX_KIDSMOVIES $NUC_PLEX/$NUC_PLEX_KIDSMOVIES | $SYN_PLEX/$SYN_PLEX_INTERNATIONAL $NUC_PLEX/$NUC_PLEX_INTERNATIONAL\n    restart: unless-stopped\n\n  # PhotoShow - Image Gallery\n  photoshow:\n    image: linuxserver/photoshow:latest\n    container_name: photoshow\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$PHOTOSHOW_PORT:80\"\n    volumes:\n      - $USERDIR/docker/photoshow/config:/config\n      - $USERDIR/docker/photoshow/thumbs:/Thumbs\n      - /media/ds918/media/photos:/Pictures:ro\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: photoshow\n      traefik.protocol: http\n      traefik.port: 80\n      traefik.frontend.rule: Host:photoshow.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: photoshow.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  ############################# MEDIA FILE MANAGEMENT\n\n  # Bazarr - Subtitle Management\n  bazarr:\n    image: linuxserver/bazarr:latest\n    container_name: bazarr\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$BAZARR_PORT:6767\"\n    volumes:\n      - $USERDIR/docker/bazarr:/config\n      - /media:/nas\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: bazarr\n      traefik.protocol: http\n      traefik.port: 6767\n      traefik.frontend.rule: Host:bazarr.$DOMAINNAME\n      #     traefik.frontend.rule: Host:$DOMAINNAME; PathPrefix: /bazarr\n      traefik.frontend.headers.SSLHost: bazarr.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Picard - Music Library Tagging and Management\n  picard:\n    image: mikenye/picard:latest\n    container_name: picard\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #      - \"$PICARD_PORT:5800\"\n    volumes:\n      - $USERDIR/Downloads/wip_media:/wip_media:rw\n      - $USERDIR/docker/picard:/config:rw\n      - /media/ds918/media/music:/music:rw\n      - /dev/shm:/dev/shm\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      TZ: $TZ\n      UMASK: 002\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: picard\n      traefik.protocol: http\n      traefik.port: 5800\n      traefik.frontend.rule: Host:picard.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: picard.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Handbrake - Video Conversion (Transcoding and compression)\n  handbrake:\n    image: jlesage/handbrake:latest\n    container_name: handbrake\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #      - \"$HANDBRAKE_PORT:5800\"\n    volumes:\n      - $USERDIR/Downloads:/downloads:ro\n      - $USERDIR/docker/handbrake/config:/config:rw\n      - $USERDIR/docker/handbrake/watch:/watch:rw\n      - $USERDIR/Downloads/wip_media:/output:rw\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      UMASK: 002\n      TZ: $TZ\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      AUTOMATED_CONVERSION_KEEP_SOURCE: 1\n      VNC_PASSWORD: $HANDBRAKE_VNC_PASSWD\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: handbrake\n      traefik.protocol: http\n      traefik.port: 5800\n      traefik.frontend.rule: Host:handbrake.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: handbrake.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # MKVToolNix - Video Editing (Remuxing - changing media container while keeping original source quality)\n  mkvtoolnix:\n    image: jlesage/mkvtoolnix:latest\n    container_name: mkvtoolnix\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #      - \"$MKVTOOLNIX_PORT:5800\"\n    volumes:\n      - $USERDIR/Downloads:/downloads:rw\n      - $USERDIR/docker/mkvtoolnix/config:/config:rw\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      UMASK: 002\n      TZ: $TZ\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      VNC_PASSWORD: $MKVTOOLNIX_VNC_PASSWD\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: mkvtoolnix\n      traefik.protocol: http\n      traefik.port: 5800\n      traefik.frontend.rule: Host:mkvtoolnix.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: mkvtoolnix.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # MakeMKV - Video Editing (Ripping from Disks)\n  makemkv:\n    image: jlesage/makemkv:latest\n    container_name: makemkv\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #      - \"$MAKEMKV_PORT:5800\"\n    volumes:\n      - $USERDIR/Downloads:/Downloads:rw\n      - $USERDIR/docker/makemkv/config:/config:rw\n      - $USERDIR/Downloads/wip_media:/output:rw\n      - /dev/shm:/dev/shm\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      UMASK: 002\n      TZ: $TZ\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      VNC_PASSWORD: $MAKEMKV_VNC_PASSWD\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: makemkv\n      traefik.protocol: http\n      traefik.port: 5800\n      traefik.frontend.rule: Host:makemkv.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: makemkv.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # FileBot - File renamer\n  filebot:\n    image: jlesage/filebot:latest\n    container_name: filebot\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #      - \"$FILEBOT_PORT:5800\"\n    volumes:\n      # A *.psm license file is required in /config\n      # https://github.com/jlesage/docker-filebot#installing-a-license\n      - $USERDIR/docker/filebot:/config\n      - /media:/nas\n      - $USERDIR/Downloads:/downloads\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      TZ: $TZ\n      UMASK: 002\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      VNC_PASSWD: $FILEBOT_VNC_PASSWD\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: filebot\n      traefik.protocol: http\n      traefik.port: 5800\n      traefik.frontend.rule: Host:filebot.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: filebot.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  ############################# UTILITIES\n\n  # Firefox - Web Broswer\n  firefox:\n    image: jlesage/firefox:latest\n    container_name: firefox\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #      - \"$FIREFOX_PORT:5800\"\n    volumes:\n      - $USERDIR/docker/firefox:/config\n      - $USERDIR/Downloads/completed:/config/downloads\n      - /dev/shm:/dev/shm\n      - $USERDIR/docker/shared:/shared\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      TZ: $TZ\n      UMASK: 002\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      VNC_PASSWD: $FIREFOX_VNC_PASSWD\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: firefox\n      traefik.protocol: http\n      traefik.port: 5800\n      traefik.frontend.rule: Host:firefox.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: firefox.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Glances - System Information\n  glances:\n    image: nicolargo/glances:latest\n    container_name: glances\n    restart: unless-stopped\n    privileged: true\n    #    network_mode: host\n    networks:\n      - t1_proxy\n    #    ports:\n    #      - \"$GLANCES_PORT:61208\"\n    pid: host\n    volumes:\n      - $USERDIR/docker/glances/glances.conf:/glances/conf/glances.conf # Use this if you want to add a glances.conf file\n      - /var/run/docker.sock:/var/run/docker.sock:ro\n    environment:\n      #      GLANCES_OPT: \"-C /glances/conf/glances.conf --quiet --export influxdb\"\n      GLANCES_OPT: \"-w\"\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: glances\n      traefik.protocol: http\n      traefik.port: 61208\n      traefik.frontend.rule: Host:glances.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: glances.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # APCUPSD - APC UPS Management\n  # create the apcupsd.conf file\n  apcupsd:\n    image: gersilex/apcupsd:lastest\n    container_name: apcupsd\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$APCUPSD_PORT:3551\"\n    privileged: true\n    tty: true\n    volumes:\n      - /tmp/apcupsd-docker:/tmp/apcupsd-docker\n      - $USERDIR/docker/apcupsd/apcupsd.conf:/etc/apcupsd/apcupsd.conf\n      - $USERDIR/docker/apcupsd/doshutdown:/etc/apcupsd/doshutdown\n      - $USERDIR/docker/apcupsd/apcupsd.events:/var/log/apcupsd.events\n\n  # qDirStat - Directory Statistics\n  qdirstat:\n    image: jlesage/qdirstat:latest\n    container_name: qdirstat\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #      - \"$QDIRSTAT_PORT:5800\"\n    volumes:\n      - $USERDIR:/storage:ro\n      - $USERDIR/docker/qdirstat/config:/config:rw\n      - /media:/nas\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      UMASK: 002\n      TZ: $TZ\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      VNC_PASSWORD: $QDIRSTAT_VNC_PASSWD\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: qdirstat\n      traefik.protocol: http\n      traefik.port: 5800\n      traefik.frontend.rule: Host:qdirstat.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: qdirstat.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Guacamole - Remote desktop, SSH, on Telnet on any HTML5 Browser\n  # Create all databases and tables first\n  guacamole:\n    image: guacamole/guacamole:latest\n    container_name: guacamole\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$GUACAMOLE_PORT:8080\"\n    links:\n      - guacd:guacd\n    #      - mariadb:mysql\n    #    depends_on:\n    #      - mariadb\n    environment:\n      GUACD_HOSTNAME: guacd\n      MYSQL_HOSTNAME: $DB_HOST\n      MYSQL_PORT: $DB_PORT\n      MYSQL_DATABASE: guacamole\n      MYSQL_USER: $GUAC_MYSQL_USER\n      MYSQL_PASSWORD: $GUAC_MYSQL_PASSWORD\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: guacamole\n      traefik.protocol: http\n      traefik.port: 8080\n      traefik.frontend.rule: \"Host:guac.$DOMAINNAME; AddPrefix: /guacamole\"\n      traefik.frontend.headers.SSLHost: guac.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # Guacamole Daemon - Needed for Guacamole\n  guacd:\n    image: guacamole/guacd:latest\n    container_name: guacd\n    restart: unless-stopped\n\n  # Dozzle - Real-time Docker Log Viewer\n  dozzle:\n    image: amir20/dozzle:latest\n    container_name: dozzle\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #      - \"$DOZZLE_PORT:8080\"\n    environment:\n      DOZZLE_LEVEL: info\n      DOZZLE_TAILSIZE: 300\n      DOZZLE_FILTER: \"status=running\"\n    #      DOZZLE_FILTER: \"label=log_me\" # limits logs displayed to containers with this label\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: dozzle\n      traefik.protocol: http\n      traefik.port: 8080\n      traefik.frontend.rule: \"Host:dozzle.$DOMAINNAME\"\n      traefik.frontend.headers.SSLHost: dozzle.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # VSCode - VSCode Editing\n  vscode:\n    image: codercom/code-server:latest\n    container_name: vscode\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #      - \"$VSCODE_PORT:8080\"\n    volumes:\n      - $USERDIR/docker/vscode/project:/home/coder/project\n      - $USERDIR/docker/vscode/local:/home/coder/.local/share/code-server\n    environment:\n      PASSWORD: $VSCODE_PASSWORD\n    # Run as root first, create the directories, then change permissions to user:docker and 775. Disable run as root below.\n    #    user: \"0\"\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: vscode\n      traefik.protocol: http\n      traefik.port: 8080\n      traefik.frontend.rule: \"Host:vscode.$DOMAINNAME\"\n      traefik.frontend.headers.SSLHost: vscode.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # StatPing - Status Page & Monitoring Server\n  statping:\n    image: hunterlong/statping:latest\n    container_name: statping\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    ports:\n      - \"$STATPING_PORT:8080\"\n    volumes:\n      - $USERDIR/docker/statping:/app\n    environment:\n      VIRTUAL_HOST: localhost\n      VIRTUAL_PORT: 8080\n      DB_CONN: postgres\n      DB_HOST: postgres\n      DB_USER: $STATPING_DB_USER\n      DB_PASS: $STATPING_DB_PASS\n      DB_DATABASE: $STATPING_DB\n      IS_DOCKER: \"true\"\n      DISABLE_LOGS: \"false\"\n      NAME: StatPing\n      DESCRIPTION: Monitor web services\n    labels:\n      traefik.enable: \"true\"\n      traefik.backend: statping\n      traefik.protocol: http\n      traefik.port: 8080\n      traefik.frontend.rule: \"Host:statping.$DOMAINNAME\"\n      traefik.frontend.headers.SSLHost: statping.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n  #      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n  #      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n  #      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  # SmokePing - Network latency Monitoring\n  smokeping:\n    image: linuxserver/smokeping:latest\n    container_name: smokeping\n    restart: unless-stopped\n    networks:\n      - t1_proxy\n    #    ports:\n    #     - \"$SMOKEPING_PORT:80\"\n    volumes:\n      - $USERDIR/docker/smokeping/config:/config\n      - $USERDIR/docker/smokeping/data:/data\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      traefik.enable: \"true\"\n      traefik.home: \"true\"\n      traefik.backend: smokeping\n      traefik.protocol: http\n      traefik.port: 80\n      traefik.frontend.rule: Host:smokeping.$DOMAINNAME\n      traefik.frontend.headers.SSLHost: smokeping.$DOMAINNAME\n      traefik.docker.network: t1_proxy\n      traefik.frontend.passHostHeader: \"true\"\n      traefik.frontend.headers.SSLForceHost: \"true\"\n      traefik.frontend.headers.SSLRedirect: \"true\"\n      traefik.frontend.headers.browserXSSFilter: \"true\"\n      traefik.frontend.headers.contentTypeNosniff: \"true\"\n      traefik.frontend.headers.forceSTSHeader: \"true\"\n      traefik.frontend.headers.STSSeconds: 315360000\n      traefik.frontend.headers.STSIncludeSubdomains: \"true\"\n      traefik.frontend.headers.STSPreload: \"true\"\n      traefik.frontend.headers.customResponseHeaders: X-Robots-Tag:noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex\n      traefik.frontend.headers.customFrameOptionsValue: \"allow-from https:$DOMAINNAME\"\n      traefik.frontend.auth.forward.address: \"http://oauth:4181\"\n      traefik.frontend.auth.forward.authResponseHeaders: X-Forwarded-User\n      traefik.frontend.auth.forward.trustForwardHeader: \"true\"\n\n  ############################# MAINTENANCE\n\n  # Ouroboros - Automatic Docker Container Updates\n  ouroboros:\n    image: pyouroboros/ouroboros:latest\n    container_name: ouroboros\n    restart: unless-stopped\n    networks:\n      - default\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock\n    environment:\n      TZ: $TZ\n      INTERVAL: 86400\n      LOG_LEVEL: debug\n      SELF_UPDATE: \"true\"\n      CLEANUP: \"true\"\n      IGNORE: traefik influxdb hassio_dns homeassistant hassio_supervisor addon_core_check_config addon_62c7908d_autobackup plexms\n      NOTIFIERS: \"tgram://$TGRAM_BOT_TOKEN/$TGRAM_CHAT_ID/\"\n\n  # Docker-GC - Automatic Docker Garbage Collection\n  # Create docker-gc-exclude file\n  dockergc:\n    image: clockworksoul/docker-gc-cron:latest\n    container_name: docker-gc\n    restart: unless-stopped\n    network_mode: none\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock\n      - $USERDIR/docker/docker-gc/docker-gc-exclude:/etc/docker-gc-exclude\n    environment:\n      CRON: 0 0 * * *\n      FORCE_IMAGE_REMOVAL: 1\n      FORCE_CONTAINER_REMOVAL: 0\n      GRACE_PERIOD_SECONDS: 604800\n      DRY_RUN: 0\n      CLEAN_UP_VOLUMES: 1\n      TZ: $TZ\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/rules/app.toml.example",
    "content": "# Replace APPNAME, LAN-IP, PORT, example.com\n[backends]\n  [backends.backend-APPNAME]\n    [backends.backend-APPNAME.servers]\n      [backends.backend-APPNAME.servers.server-APPNAME-ext]\n        url = \"http://LAN-IP:PORT\"\n        weight = 0\n[frontends]\n  [frontends.frontend-APPNAME]\n    backend = \"backend-APPNAME\"\n    passHostHeader = true\n    [frontends.frontend-APPNAME.routes]\n          [frontends.frontend-APPNAME.routes.route-APPNAME-ext]\n        rule = \"Host:APPNAME.example.com\"\n    [frontends.frontend-APPNAME.headers]\n      SSLRedirect = true\n      SSLHost = \"APPNAME.example.com\"\n      SSLForceHost = true\n      STSSeconds = 315360000\n      STSIncludeSubdomains = true\n      STSPreload = true\n      forceSTSHeader = true\n      frameDeny = true\n      contentTypeNosniff = true\n      browserXSSFilter = true\n      customFrameOptionsValue=\"allow-from https:example.com\"\n    [frontends.frontend-APPNAME.auth]\n      headerField = \"X-WebAuth-User\"\n      [frontends.frontend-APPNAME.auth.forward]\n        address = \"http://oauth:4181\"\n        trustForwardHeader = true\n        authResponseHeaders = [\"X-Forwarded-User\"]"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/rules/dafang1.toml",
    "content": "[backends]\n  [backends.backend-dafang1]\n    [backends.backend-dafang1.servers]\n      [backends.backend-dafang1.servers.server-dafang1-ext]\n        url = \"https://192.168.5.246\"\n        weight = 0\n[frontends]\n  [frontends.frontend-dafang1]\n    backend = \"backend-dafang1\"\n    passHostHeader = true\n    [frontends.frontend-dafang1.routes]\n          [frontends.frontend-dafang1.routes.route-dafang1-ext]\n        rule = \"Host:dafang1.example.com\"\n    [frontends.frontend-dafang1.headers]\n      SSLRedirect = true\n      SSLHost = \"dafang1.example.com\"\n      SSLForceHost = true\n      STSSeconds = 315360000\n      STSIncludeSubdomains = true\n      STSPreload = true\n      forceSTSHeader = true\n      frameDeny = true\n      contentTypeNosniff = true\n      browserXSSFilter = true\n      customFrameOptionsValue=\"allow-from https:example.com\"\n    [frontends.frontend-dafang1.auth]\n      headerField = \"X-WebAuth-User\"\n      [frontends.frontend-dafang1.auth.forward]\n        address = \"http://oauth:4181\"\n        trustForwardHeader = true\n        authResponseHeaders = [\"X-Forwarded-User\"]"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/rules/hassio.toml",
    "content": "[backends]\n  [backends.backend-hassio]\n    [backends.backend-hassio.servers]\n      [backends.backend-hassio.servers.server-hassio-ext]\n        url = \"http://192.168.5.908888\"\n        weight = 0\n[frontends]\n  [frontends.frontend-hassio]\n    backend = \"backend-hassio\"\n    passHostHeader = true\n    [frontends.frontend-hassio.routes]\n          [frontends.frontend-hassio.routes.route-hassio-ext]\n        rule = \"Host:hassio.example.com\"\n    [frontends.frontend-hassio.headers]\n      SSLRedirect = true\n      SSLHost = \"hassio.example.com\"\n      SSLForceHost = true\n      STSSeconds = 315360000\n      STSIncludeSubdomains = true\n      STSPreload = true\n      forceSTSHeader = true\n      frameDeny = true\n      contentTypeNosniff = true\n      browserXSSFilter = true\n      customFrameOptionsValue=\"allow-from https:example.com\"\n# ENABLING AUTH CAUSES ISSUES WITH SERVICES THAT RELY ON REACHING HASSIO.example.COM (EG. TELEGRAM, GOOGLE ASSISTANT, ETC.)\n#    [frontends.frontend-hassio.auth]\n#      headerField = \"X-WebAuth-User\"\n#      [frontends.frontend-hassio.auth.forward]\n#        address = \"http://oauth:4181\"\n#        trustForwardHeader = true\n#        authResponseHeaders = [\"X-Forwarded-User\"]"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/rules/pihole.toml",
    "content": "[backends]\n  [backends.backend-pihole]\n    [backends.backend-pihole.servers]\n      [backends.backend-pihole.servers.server-pihole-ext]\n        url = \"http://192.168.1.26\"\n        weight = 0\n[frontends]\n  [frontends.frontend-pihole]\n    backend = \"backend-pihole\"\n    passHostHeader = true\n    [frontends.frontend-pihole.routes]\n          [frontends.frontend-pihole.routes.route-pihole-ext]\n        rule = \"Host:pi.example.com;AddPrefix:/admin\"\n    [frontends.frontend-pihole.headers]\n      SSLRedirect = true\n      SSLHost = \"pi.example.com\"\n      SSLForceHost = true\n      STSSeconds = 315360000\n      STSIncludeSubdomains = true\n      STSPreload = true\n      forceSTSHeader = true\n      frameDeny = true\n      contentTypeNosniff = true\n      browserXSSFilter = true\n      customFrameOptionsValue=\"allow-from https:example.com\"\n    [frontends.frontend-pihole.auth]\n      headerField = \"X-WebAuth-User\"\n      [frontends.frontend-pihole.auth.forward]\n        address = \"http://oauth:4181\"\n        trustForwardHeader = true\n        authResponseHeaders = [\"X-Forwarded-User\"]"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/rules/plexwebtools.toml",
    "content": "[backends]\n  [backends.backend-plexwebtools]\n    [backends.backend-plexwebtools.servers]\n      [backends.backend-plexwebtools.servers.server-plexwebtools-ext]\n        url = \"http://192.168.5.90:33400/\"\n        weight = 0\n[frontends]\n  [frontends.frontend-plexwebtools]\n    backend = \"backend-plexwebtools\"\n    passHostHeader = true\n    [frontends.frontend-plexwebtools.routes]\n          [frontends.frontend-plexwebtools.routes.route-plexwebtools-ext]\n        rule = \"Host:pwt.example.com\"\n    [frontends.frontend-plexwebtools.headers]\n      SSLRedirect = true\n      SSLHost = \"pwt.example.com\"\n      SSLForceHost = true\n      STSSeconds = 315360000\n      STSIncludeSubdomains = true\n      STSPreload = true\n      forceSTSHeader = true\n      frameDeny = true\n      contentTypeNosniff = true\n      browserXSSFilter = true\n      customFrameOptionsValue=\"allow-from https:example.com\"\n    [frontends.frontend-plexwebtools.auth]\n      headerField = \"X-WebAuth-User\"\n      [frontends.frontend-plexwebtools.auth.forward]\n        address = \"http://oauth:4181\"\n        trustForwardHeader = true\n        authResponseHeaders = [\"X-Forwarded-User\"]"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/rules/shellinabox.toml",
    "content": "[backends]\n  [backends.backend-shellinabox]\n    [backends.backend-shellinabox.servers]\n      [backends.backend-shellinabox.servers.server-shellinabox-ext]\n        url = \"http://192.168.5.904200\"\n        weight = 0\n[frontends]\n  [frontends.frontend-shellinabox]\n    backend = \"backend-shellinabox\"\n    passHostHeader = true\n    [frontends.frontend-shellinabox.routes]\n          [frontends.frontend-shellinabox.routes.route-shellinabox-ext]\n        rule = \"Host:shell.example.com\"\n    [frontends.frontend-shellinabox.headers]\n      SSLRedirect = true\n      SSLHost = \"shell.example.com\"\n      SSLForceHost = true\n      STSSeconds = 315360000\n      STSIncludeSubdomains = true\n      STSPreload = true\n      forceSTSHeader = true\n      frameDeny = true\n      contentTypeNosniff = true\n      browserXSSFilter = true\n      customFrameOptionsValue=\"allow-from https:example.com\"\n    [frontends.frontend-shellinabox.auth]\n      headerField = \"X-WebAuth-User\"\n      [frontends.frontend-shellinabox.auth.forward]\n        address = \"http://oauth:4181\"\n        trustForwardHeader = true\n        authResponseHeaders = [\"X-Forwarded-User\"]\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/rules/synology.toml",
    "content": "[backends]\n  [backends.backend-synology]\n    [backends.backend-synology.servers]\n      [backends.backend-synology.servers.server-synology-ext]\n        url = \"http://192.168.5.254:5000\"\n        weight = 0\n[frontends]\n  [frontends.frontend-synology]\n    backend = \"backend-synology\"\n    passHostHeader = true\n    [frontends.frontend-synology.routes]\n          [frontends.frontend-synology.routes.route-synology-ext]\n        rule = \"Host:syno.example.com\"\n    [frontends.frontend-synology.headers]\n      SSLRedirect = true\n      SSLHost = \"syno.example.com\"\n      SSLForceHost = true\n      STSSeconds = 315360000\n      STSIncludeSubdomains = true\n      STSPreload = true\n      forceSTSHeader = true\n      frameDeny = true\n      contentTypeNosniff = true\n      browserXSSFilter = true\n      customFrameOptionsValue=\"allow-from https:example.com\"\n    [frontends.frontend-synology.auth]\n      headerField = \"X-WebAuth-User\"\n      [frontends.frontend-synology.auth.forward]\n        address = \"http://oauth:4181\"\n        trustForwardHeader = true\n        authResponseHeaders = [\"X-Forwarded-User\"]\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/rules/synplex.toml",
    "content": "[backends]\n  [backends.backend-plex]\n    [backends.backend-plex.servers]\n      [backends.backend-plex.servers.server-plex-ext]\n        url = \"http://192.168.5.238:32400\"\n        weight = 0\n[frontends]\n  [frontends.frontend-plex]\n    backend = \"backend-plex\"\n    passHostHeader = true\n    [frontends.frontend-plex.routes]\n          [frontends.frontend-plex.routes.route-plex-ext]\n        rule = \"Host:synplex.example.com\"\n\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/rules/unifi.toml",
    "content": "[backends]\n  [backends.backend-ufi]\n    [backends.backend-ufi.servers]\n      [backends.backend-ufi.servers.server-ufi-ext]\n        url = \"https://192.168.5.254:8443\"\n        weight = 0\n[frontends]\n  [frontends.frontend-ufi]\n    backend = \"backend-ufi\"\n    passHostHeader = true\n    [frontends.frontend-ufi.routes]\n          [frontends.frontend-ufi.routes.route-ufi-ext]\n        rule = \"Host:ufi.example.com\"\n    [frontends.frontend-ufi.headers]\n      SSLRedirect = true\n      SSLHost = \"ufi.example.com\"\n      SSLForceHost = true\n      STSSeconds = 315360000\n      STSIncludeSubdomains = true\n      STSPreload = true\n      forceSTSHeader = true\n      frameDeny = true\n      contentTypeNosniff = true\n      browserXSSFilter = true\n      customFrameOptionsValue=\"allow-from https:example.com\"\n    [frontends.frontend-ufi.auth]\n      headerField = \"X-WebAuth-User\"\n      [frontends.frontend-ufi.auth.forward]\n        address = \"http://oauth:4181\"\n        trustForwardHeader = true\n        authResponseHeaders = [\"X-Forwarded-User\"]\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/rules/webmin.toml",
    "content": "[backends]\n  [backends.backend-webmin]\n    [backends.backend-webmin.servers]\n      [backends.backend-webmin.servers.server-webmin-ext]\n        url = \"http://192.168.5.90:8110\"\n        weight = 0\n[frontends]\n  [frontends.frontend-webmin]\n    backend = \"backend-webmin\"\n    passHostHeader = true\n    [frontends.frontend-webmin.routes]\n          [frontends.frontend-webmin.routes.route-webmin-ext]\n        rule = \"Host:webmin.example.com\"\n    [frontends.frontend-webmin.headers]\n      SSLRedirect = true\n      SSLHost = \"webmin.example.com\"\n      SSLForceHost = true\n      STSSeconds = 315360000\n      STSIncludeSubdomains = true\n      STSPreload = true\n      forceSTSHeader = true\n      frameDeny = true\n      contentTypeNosniff = true\n      browserXSSFilter = true\n      customFrameOptionsValue=\"allow-from https:example.com\"\n    [frontends.frontend-webmin.auth]\n      headerField = \"X-WebAuth-User\"\n      [frontends.frontend-webmin.auth.forward]\n        address = \"http://oauth:4181\"\n        trustForwardHeader = true\n        authResponseHeaders = [\"X-Forwarded-User\"]"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/rules/xiaofang1.toml",
    "content": "[backends]\n  [backends.backend-xiaofang1]\n    [backends.backend-xiaofang1.servers]\n      [backends.backend-xiaofang1.servers.server-xiaofang1-ext]\n        url = \"https://192.168.15.4\"\n        weight = 0\n[frontends]\n  [frontends.frontend-xiaofang1]\n    backend = \"backend-xiaofang1\"\n    passHostHeader = true\n    [frontends.frontend-xiaofang1.routes]\n          [frontends.frontend-xiaofang1.routes.route-xiaofang1-ext]\n        rule = \"Host:xiaofang1.example.com\"\n    [frontends.frontend-xiaofang1.headers]\n      SSLRedirect = true\n      SSLHost = \"xiaofang1.example.com\"\n      SSLForceHost = true\n      STSSeconds = 315360000\n      STSIncludeSubdomains = true\n      STSPreload = true\n      forceSTSHeader = true\n      frameDeny = true\n      contentTypeNosniff = true\n      browserXSSFilter = true\n      customFrameOptionsValue=\"allow-from https:example.com\"\n    [frontends.frontend-xiaofang1.auth]\n      headerField = \"X-WebAuth-User\"\n      [frontends.frontend-xiaofang1.auth.forward]\n        address = \"http://oauth:4181\"\n        trustForwardHeader = true\n        authResponseHeaders = [\"X-Forwarded-User\"]\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/rules.toml",
    "content": ""
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/traefik.toml",
    "content": "#debug = true\n\nlogLevel = \"INFO\" #DEBUG, INFO, WARN, ERROR, FATAL, PANIC\nInsecureSkipVerify = true\ndefaultEntryPoints = [\"https\", \"http\"]\n\n# WEB interface of Traefik - it will show web page with overview of frontend and backend configurations \n\n[api]\n  entryPoint = \"traefik\"\n  dashboard = true\n  debug = false\n  address = \":8080\"\n#  usersFile = \"/shared/.htpasswd\"\n\n# Force HTTPS\n[entryPoints]\n  [entryPoints.http]\n  address = \":80\"\n    [entryPoints.http.redirect]\n    entryPoint = \"https\"\n#  [entryPoints.traefik]\n#  address = \":8080\"\n#    [entryPoints.https.auth.basic.users]\n#    usersFile = \"/shared/.htpasswd\" \n  [entryPoints.https]\n  address = \":443\"\n#    [entryPoints.https.auth.basic.users]\n#    usersFile = \"/shared/.htpasswd\"  \n    [entryPoints.https.tls]\n#      [[entryPoints.https.tls.certificates]]\n#      certFile = \"/home/example/docker/shared/example_com-unified.crt\"\n#      keyFile = \"/home/example/docker/shared/pi20151206.key\"\n\n[file]\n  directory = \"/etc/traefik/rules/\"\n  watch = true\n\n# Let's encrypt configuration\n[acme]\nemail = \"admin@example.com\"\nstorage=\"/etc/traefik/acme/acme.json\"\nentryPoint = \"https\"\nacmeLogging=true \nonDemand = false #create certificate when container is created\n#onHostRule = true #disable for wildcard domains\n# Use a HTTP-01 acme challenge rather than TLS-SNI-01 challenge\n#[acme.httpChallenge] #does not work with wildcard domains, use dns challenge\n#  entryPoint = \"http\" #does not work with wildcard domains\n[acme.dnsChallenge]\n  provider = \"cloudflare\"\n  delayBeforeCheck = 180\n[[acme.domains]]\n   main = \"example.com\"\n[[acme.domains]]\n   main = \"*.example.com\"\n   \n# Connection to docker host system (docker.sock)\n[docker]\nendpoint = \"unix:///var/run/docker.sock\"\ndomain = \"example.com\"\nwatch = true\n# This will hide all docker containers that don't have explicitly  \n# set label to \"enable\"\nexposedbydefault = false\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/traefik.toml.crab",
    "content": "logLevel = \"WARN\" #DEBUG, INFO, WARN, ERROR, FATAL, PANIC\ndefaultEntryPoints = [\"http\", \"https\"]\n\n# WEB interface of Traefik - it will show web page with overview of frontend and backend configurations \n[web]\naddress = \":8080\"\n  [web.auth.basic]\n  usersFile = \"/shared/.htpasswd\"\n\n# Force HTTPS\n[entryPoints]\n  [entryPoints.http]\n  address = \":80\"\n    [entryPoints.http.redirect]\n    entryPoint = \"https\"\n  [entryPoints.https]\n  address = \":443\"\n#    [entryPoints.https.auth.basic]\n#    usersFile = \"/certs/.htpasswd\"  \n    [entryPoints.https.tls]\n#      [[entryPoints.https.tls.certificates]]\n#      certFile = \"/home/example/docker/certs/example_com-unified.crt\"\n#      keyFile = \"/home/example/docker/certs/pi20151206.key\"\n\n\n[file]\n  watch = true\n  filename = \"/etc/traefik/rules.toml\"\n\n# Let's encrypt configuration\n[acme]\nemail = \"admin@example.com\"\nstorage=\"/etc/traefik/acme/acme.json\"\nentryPoint = \"https\"\nacmeLogging=true \nonDemand = false #create certificate when container is created\nonHostRule = true\n  # Use a HTTP-01 acme challenge rather than TLS-SNI-01 challenge\n  [acme.httpChallenge]\n  entryPoint = \"http\"\n\n# Connection to docker host system (docker.sock)\n[docker]\nendpoint = \"unix:///var/run/docker.sock\"\ndomain = \"traefik.duckdns.org\"\nwatch = true\n# This will hide all docker containers that don't have explicitly  \n# set label to \"enable\"\nexposedbydefault = false\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/traefik.toml.example",
    "content": "#debug = true\n\nlogLevel = \"INFO\" #DEBUG, INFO, WARN, ERROR, FATAL, PANIC\nInsecureSkipVerify = true\ndefaultEntryPoints = [\"https\", \"http\"]\n\n# WEB interface of Traefik - it will show web page with overview of frontend and backend configurations \n\n[api]\n  entryPoint = \"traefik\"\n  dashboard = true\n  debug = false\n  address = \":8080\"\n\n# Force HTTPS\n[entryPoints]\n  [entryPoints.http]\n  address = \":80\"\n    [entryPoints.http.redirect]\n    entryPoint = \"https\"\n  [entryPoints.https]\n  address = \":443\"\n#    [entryPoints.https.auth.basic.users]\n#    usersFile = \"/shared/.htpasswd\"  \n    [entryPoints.https.tls]\n\n[file]\n  directory = \"/etc/traefik/rules/\"\n  watch = true\n\n# Let's encrypt configuration\n[acme]\nemail = \"admin@example.com\"\nstorage=\"/etc/traefik/acme/acme.json\"\nentryPoint = \"https\"\nacmeLogging=true \nonDemand = false #create certificate when container is created\n#onHostRule = true #disable for wildcard domains\n# Use a HTTP-01 acme challenge rather than TLS-SNI-01 challenge\n#[acme.httpChallenge] #does not work with wildcard domains, use dns challenge\n#  entryPoint = \"http\" #does not work with wildcard domains\n[acme.dnsChallenge]\n  provider = \"cloudflare\"\n  delayBeforeCheck = 180\n[[acme.domains]]\n   main = \"example.com\"\n[[acme.domains]]\n   main = \"*.example.com\"\n   \n# Connection to docker host system (docker.sock)\n[docker]\nendpoint = \"unix:///var/run/docker.sock\"\ndomain = \"example.com\"\nwatch = true\n# This will hide all docker containers that don't have explicitly  \n# set label to \"enable\"\nexposedbydefault = false\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/traefik.toml.singledomain",
    "content": "logLevel = \"WARN\" #DEBUG, INFO, WARN, ERROR, FATAL, PANIC\ndefaultEntryPoints = [\"http\", \"https\"]\n\n# WEB interface of Traefik - it will show web page with overview of frontend and backend configurations \n[web]\naddress = \":8080\"\n  [web.auth.basic]\n  usersFile = \"/certs/.htpasswd\"\n\n# Force HTTPS\n[entryPoints]\n  [entryPoints.http]\n  address = \":80\"\n    [entryPoints.http.redirect]\n    entryPoint = \"https\"\n  [entryPoints.https]\n  address = \":443\"\n#    [entryPoints.https.auth.basic]\n#    usersFile = \"/certs/.htpasswd\"  \n    [entryPoints.https.tls]\n#      [[entryPoints.https.tls.certificates]]\n#      certFile = \"/home/example/docker/certs/example_com-unified.crt\"\n#      keyFile = \"/home/example/docker/certs/pi20151206.key\"\n      \n# Let's encrypt configuration\n[acme]\nemail = \"admin@example.com\"\nstorage=\"/etc/traefik/acme/acme.json\"\nentryPoint = \"https\"\nacmeLogging=true \nonDemand = false #create certificate when container is created\nonHostRule = true\n  # Use a HTTP-01 acme challenge rather than TLS-SNI-01 challenge\n  [acme.httpChallenge]\n  entryPoint = \"http\"\n\n# Connection to docker host system (docker.sock)\n[docker]\nendpoint = \"unix:///var/run/docker.sock\"\ndomain = \"example.com\"\nwatch = true\n# This will hide all docker containers that don't have explicitly  \n# set label to \"enable\"\nexposedbydefault = false\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-standalone/traefik.toml.wcddns",
    "content": "#debug = true\n\nlogLevel = \"ERROR\" #DEBUG, INFO, WARN, ERROR, FATAL, PANIC\nInsecureSkipVerify = true\ndefaultEntryPoints = [\"https\", \"http\"]\n\n# WEB interface of Traefik - it will show web page with overview of frontend and backend configurations \n[web]\naddress = \":8080\"\n  [web.auth.basic]\n  usersFile = \"/shared/.htpasswd\"\n\n# Force HTTPS\n[entryPoints]\n  [entryPoints.http]\n  address = \":80\"\n    [entryPoints.http.redirect]\n    entryPoint = \"https\"\n  [entryPoints.https]\n  address = \":443\"\n#    [entryPoints.https.auth.basic]\n#    usersFile = \"/shared/.htpasswd\"  \n    [entryPoints.https.tls]\n#      [[entryPoints.https.tls.certificates]]\n#      certFile = \"/home/example/docker/shared/example_com-unified.crt\"\n#      keyFile = \"/home/example/docker/shared/pi20151206.key\"\n\n[file]\n  watch = true\n  filename = \"/etc/traefik/rules.toml\"\n\n# Let's encrypt configuration\n[acme]\nemail = \"email@example.com\"\nstorage=\"/etc/traefik/acme/acme.json\"\nentryPoint = \"https\"\nacmeLogging=true \nonDemand = false #create certificate when container is created\n#onHostRule = true #disable for wildcard domains\n# Use a HTTP-01 acme challenge rather than TLS-SNI-01 challenge\n#[acme.httpChallenge] #does not work with wildcard domains, use dns challenge\n#  entryPoint = \"http\" #does not work with wildcard domains\n[acme.dnsChallenge]\n  provider = \"duckdns\"\n  delayBeforeCheck = 0\n[[acme.domains]]\n   main = \"smarthomebeginner.duckdns.org\"\n#[[acme.domains]]\n#   main = \"*.smarthomebeginner.duckdns.org\"\n   \n# Connection to docker host system (docker.sock)\n[docker]\nendpoint = \"unix:///var/run/docker.sock\"\ndomain = \"smarthomebeginne.duckdns.org\"\nwatch = true\n# This will hide all docker containers that don't have explicitly  \n# set label to \"enable\"\nexposedbydefault = false\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/backcam.toml",
    "content": "[backends]\n  [backends.backend-backcam.servers]\n    [backends.backend-backcam.servers.server-backcam-ext]\n      url = \"http://192.168.1.93\"\n      weight = 0\n\n[frontends]\n  [frontends.frontend-backcam]\n    backend = \"backend-backcam\"\n    passHostHeader = true\n    basicAuth = [\n      \"user:HASHED_PASSWORD\",\n    ]\n    [frontends.frontend-backcam.routes]\n      [frontends.frontend-backcam.routes.route-backcam-ext]\n        rule = \"Host:backcam.example.com\" \n"
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/dsmfiles.toml",
    "content": "[backends]\n  [backends.backend-dsmfiles]\n    [backends.backend-dsmfiles.servers]\n      [backends.backend-dsmfiles.servers.server-dsmfiles-ext]\n        url = \"http://192.168.1.254:7000\"\n        weight = 0\n\n[frontends]\n  [frontends.frontend-dsmfiles]\n    backend = \"backend-dsmfiles\"\n    passHostHeader = true\n    basicAuth = [\n      \"user:HASHED_PASSWORD\",\n    ]\n    [frontends.frontend-dsmfiles.routes]\n          [frontends.frontend-dsmfiles.routes.route-dsmfiles-ext]\n        rule = \"Host:dsmfiles.example.com\""
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/frontcam.toml",
    "content": "[backends]\n  [backends.backend-frontcam.servers]\n    [backends.backend-frontcam.servers.server-frontcam-ext]\n      url = \"http://192.168.1.92\"\n      weight = 0\n\n[frontends]\n  [frontends.frontend-frontcam]\n    backend = \"backend-frontcam\"\n    passHostHeader = true\n    basicAuth = [\n      \"user:HASHED_PASSWORD\",\n    ]\n    [frontends.frontend-frontcam.routes]\n      [frontends.frontend-frontcam.routes.route-frontcam-ext]\n        rule = \"Host:frontcam.example.com\" \n"
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/hassio.toml",
    "content": "[backends]\n  [backends.backend-hassio]\n    [backends.backend-hassio.servers]\n      [backends.backend-hassio.servers.server-hassio-ext]\n        url = \"http://192.168.1.908888\"\n        weight = 0\n\n[frontends]\n  [frontends.frontend-hassio]\n    backend = \"backend-hassio\"\n    passHostHeader = true\n#    basicAuth = [\n#      \"user:HASHED_PASSWORD\",\n#    ]\n    [frontends.frontend-hassio.routes]\n          [frontends.frontend-hassio.routes.route-hassio-ext]\n        rule = \"Host:hassio.example.com\"\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/hassio_nodered.toml",
    "content": "[backends]\n  [backends.backend-node.servers]\n    [backends.backend-node.servers.server-node-ext]\n      url = \"http://192.168.1.90:1880\"\n      weight = 0\n\n[frontends]\n  [frontends.frontend-node]\n    backend = \"backend-node\"\n    passHostHeader = true\n\n    [frontends.frontend-node.routes]\n      [frontends.frontend-node.routes.route-node-ext]\n        rule = \"Host:node.example.com\" \n"
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/hassio_ssh_terminal.toml",
    "content": "[backends]\n  [backends.backend-hassterm]\n    [backends.backend-hassterm.servers]\n      [backends.backend-hassterm.servers.server-hassterm-ext]\n        url = \"http://192.168.1.90:7681\"\n        weight = 0\n\n[frontends]\n  [frontends.frontend-hassterm]\n    backend = \"backend-hassterm\"\n    passHostHeader = true\n#    basicAuth = [\n#      \"user:HASHED_PASSWORD\",\n#    ]\n    [frontends.frontend-hassterm.routes]\n          [frontends.frontend-hassterm.routes.route-hassterm-ext]\n        rule = \"Host:hassterm.example.com\"\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/hassio_vscode.toml",
    "content": "[backends]\n  [backends.backend-vscode]\n    [backends.backend-vscode.servers]\n      [backends.backend-vscode.servers.server-vscode-ext]\n        url = \"http://192.168.1.90:1337\"\n        weight = 0\n\n[frontends]\n  [frontends.frontend-vscode]\n    backend = \"backend-vscode\"\n    passHostHeader = true\n#    basicAuth = [\n#      \"user:HASHED_PASSWORD\",\n#    ]\n    [frontends.frontend-vscode.routes]\n          [frontends.frontend-vscode.routes.route-vscode-ext]\n        rule = \"Host:vscode.example.com\"\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/pihole.toml",
    "content": "[backends]\n  [backends.backend-pihole]\n    [backends.backend-pihole.servers]\n      [backends.backend-pihole.servers.server-pihole-ext]\n        url = \"http://192.168.1.26\"\n        weight = 0\n\n[frontends]\n  [frontends.frontend-pihole]\n    backend = \"backend-pihole\"\n    passHostHeader = true\n#    basicAuth = [\n#      \"user:HASHED_PASSWORD\",\n#    ]\n    [frontends.frontend-pihole.routes]\n          [frontends.frontend-pihole.routes.route-pihole-ext]\n        rule = \"Host:pi.example.com\""
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/plex.toml",
    "content": "[backends]\n  [backends.backend-plex]\n    [backends.backend-plex.servers]\n      [backends.backend-plex.servers.server-plex-ext]\n        url = \"http://192.168.1.254:32400\"\n        weight = 0\n\n[frontends]\n  [frontends.frontend-plex]\n    backend = \"backend-plex\"\n    passHostHeader = true\n    [frontends.frontend-plex.routes]\n          [frontends.frontend-plex.routes.route-plex-ext]\n        rule = \"Host:plex.example.com\"\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/plexwebtools.toml",
    "content": "[backends]\n  [backends.backend-plexwebtools]\n    [backends.backend-plexwebtools.servers]\n      [backends.backend-plexwebtools.servers.server-plexwebtools-ext]\n        url = \"http://192.168.1.254:33400/\"\n        weight = 0\n\n[frontends]\n  [frontends.frontend-plexwebtools]\n    backend = \"backend-plexwebtools\"\n    passHostHeader = true\n#    basicAuth = [\n#      \"user:HASHED_PASSWORD\",\n#    ]\n    [frontends.frontend-plexwebtools.routes]\n          [frontends.frontend-plexwebtools.routes.route-plexwebtools-ext]\n        rule = \"Host:pwt.example.com\""
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/portainer.toml",
    "content": "[backends]\n  [backends.backend-portainer]\n    [backends.backend-portainer.servers]\n      [backends.backend-portainer.servers.server-portainer-ext]\n        url = \"http://192.168.1.90:8146\"\n        weight = 0\n\n[frontends]\n  [frontends.frontend-portainer]\n    backend = \"backend-portainer\"\n    passHostHeader = true\n#    basicAuth = [\n#      \"user:HASHED_PASSWORD\",\n#    ]\n    [frontends.frontend-portainer.routes]\n          [frontends.frontend-portainer.routes.route-portainer-ext]\n        rule = \"Host:portainer.example.com\"\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/printer.toml",
    "content": "[backends]\n  [backends.backend-printer]\n    [backends.backend-printer.servers]\n      [backends.backend-printer.servers.server-printer-ext]\n        url = \"http://192.168.1.23\"\n        weight = 0\n\n[frontends]\n  [frontends.frontend-printer]\n    backend = \"backend-printer\"\n    passHostHeader = true\n    basicAuth = [\n      \"user:HASHED_PASSWORD\",\n    ]\n    [frontends.frontend-printer.routes]\n          [frontends.frontend-printer.routes.route-printer-ext]\n        rule = \"Host:printer.example.com\""
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/shellinabox.toml",
    "content": "[backends]\n  [backends.backend-shellinabox]\n    [backends.backend-shellinabox.servers]\n      [backends.backend-shellinabox.servers.server-shellinabox-ext]\n        url = \"https://192.168.1.904200\"\n        weight = 0\n\n[frontends]\n  [frontends.frontend-shellinabox]\n    backend = \"backend-shellinabox\"\n    passHostHeader = true\n    basicAuth = [\n      \"user:HASHED_PASSWORD\",\n    ]\n    [frontends.frontend-shellinabox.routes]\n          [frontends.frontend-shellinabox.routes.route-shellinabox-ext]\n        rule = \"Host:shell.example.com\"\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/synology.toml",
    "content": "[backends]\n  [backends.backend-synology.servers]\n    [backends.backend-synology.servers.server-synology-ext]\n      url = \"http://192.168.1.254:5000\"\n      weight = 0\n\n[frontends]\n  [frontends.frontend-synology]\n    backend = \"backend-synology\"\n    passHostHeader = true\n\n    [frontends.frontend-synology.routes]\n      [frontends.frontend-synology.routes.route-synology-ext]\n        rule = \"Host:syno.example.com\" \n"
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/transmission.toml",
    "content": "[backends]\n  [backends.backend-trans]\n    [backends.backend-trans.servers]\n      [backends.backend-trans.servers.server-trans-ext]\n        url = \"http://192.168.1.90:8169\"\n        weight = 0\n\n[frontends]\n  [frontends.frontend-trans]\n    backend = \"backend-trans\"\n    passHostHeader = true\n#    basicAuth = [\n#      \"user:HASHED_PASSWORD\",\n#    ]\n    [frontends.frontend-trans.routes]\n          [frontends.frontend-trans.routes.route-trans-ext]\n        rule = \"Host:trans.example.com\"\n"
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/webmin.toml",
    "content": "[backends]\n  [backends.backend-webmin.servers]\n    [backends.backend-webmin.servers.server-webmin-ext]\n      url = \"http://192.168.1.90:8110\"\n      weight = 0\n\n[frontends]\n  [frontends.frontend-webmin]\n    backend = \"backend-webmin\"\n    passHostHeader = true\n    basicAuth = [\n      \"user:HASHED_PASSWORD\",\n    ]\n    [frontends.frontend-webmin.routes]\n      [frontends.frontend-webmin.routes.route-webmin-ext]\n        rule = \"Host:webmin.example.com\" \n"
  },
  {
    "path": "archives/traefik_v1/traefik1-swarm/rules/xiaofang1.toml",
    "content": "[backends]\n  [backends.backend-xiaofang1.servers]\n    [backends.backend-xiaofang1.servers.server-xiaofang1-ext]\n      url = \"https://192.168.1.83\"\n      weight = 0\n\n[frontends]\n  [frontends.frontend-xiaofang1]\n    backend = \"backend-xiaofang1\"\n    passHostHeader = true\n\n    [frontends.frontend-xiaofang1.routes]\n      [frontends.frontend-xiaofang1.routes.route-xiaofang1-ext]\n        rule = \"Host:xiaofang1.example.com\" "
  },
  {
    "path": "archives/traefik_v3-pre-deployrr/CHANGELOG.md",
    "content": "###################### THIS CHANGELOG IS NO LONGER MAINTAINED. SEE DETAILED COMMIT LOGS. ##########################\n\n# Changelog\n\n- Only showing high-level changes. Smaller changes are too many to list. See commits.\n\n## Planned (notes for future):\n- Scrutiny, Rdiffweb, plex image cleaner, Dockge\n- apprise, Apprise api, remmina, Webtop, openvscode-server, \n- Add projectsend, embystat, nextcloud, nut-upsd, HealthChecks, FileRun, fail2ban, ofelia, scrutiny to NUC, Wireguard, traktarr, listrr, Subliminal, netdata, Exportarr, Unpackarr\n- Check Cloudbox/cloudbox - plex autoscan, cloudplow, plexdupefinder, plextraktsync\n- implement secrets and remove variables from .env\n- add prometheus, glances to influxdb, speedtest to influxdb\n- Web GUI for rclone\n- Switch to Hotio.dev's cloudflareddns,\n- Check traefik buffering - to avoid http error 431 - header request size too large\n- Implement thelounge, privatebin\n\n## January 23, 2022\n\n- To many changes to list. See detailed commit log.\n\n## October 10, 2021\n\n- Discontinuing this overall changelog due to commits now having a detailed log.\n- Updated to Traefik 2.5.x\n\n## January 6, 2021\n\n- Moved server to Proxmox on a dedicated cloud/seedbox.\n- Extensive tidying up of the setup.\n- Moved all container data to the new \"appdata\" folder.\n- Added Google Drive using rclone and mergerfs.\n- Removed Emby. Added Readarr and Tiny Media Manager\n\n## October 15, 2020\n\n- Added Duplicati\n- Fixed Cloudflare Companion - secrets not working in 6.3.0\n\n## October 03, 2020\n\n- Upgraded to Traefik 2.3.1.\n- Obsoleted Traefik Error Pages\n- Fixed TLS Options\n\n## August 20, 2020\n\n- Replaced Ouroboros with Watchtower\n- Changed Docker-Socket-Proxy from tecnativa to fluencelabs image - More granularity on permissions\n\n## August 17, 2020\n\n- Moved some of the apps to Synology docker stack (dockerc-compose-t2-synology.yml) - Portainer, MariaDB, InfluxDB, Mosquitto MQTT Broker, Cloudflare DDNS, Redis. Add my NUC stack as a separate endpoint NAS Portainer.\n- Implemented Tecnativa Socket Proxy - Traefik, Portainer, Glances, Dozzle, Ouroboros, Docker-GC, Cloudflare Companion\n- Moved from Home Assistant Supervised to Home Assistant Core\n- Fixed multihost CNAME creation in Cloudflare Companion\n- Fully rolled out Docker secrets - Traefik, Authelia, Plex, Guacamole, OAuth, MariaDB, etc.. There are still some images that do not support secrets.\n- Renamed docker-compose-synology-t2.yml to docker-compose-t2-synology.yml\n- Obsoleted SmokePing\n- Obsoleted HA-DockerMon\n- Obsoleted UniFi Controller\n- Obsoleted Postgres\n- Updated Authelia configuration.yml.example\n- Obsoleted ZoneMinder. Moved to MotionEye\n- Added Traefik Custom Error Pages\n- Added SMTP to Telegram\n\n## July 22, 2020\n\n- Implemented socket proxy - Traefik, Portainer, Dozzle, Glances, cf-Companion, Docker-GC, WatchTower. Exception: ha-dockermon.\n\n## July 16, 2020\n\n- Removed USER from docker group to enforce use of sudo for docker commands (improve security)\n- Updated bash_aliases\n- Partially implemented Docker secrets\n- passHostHeader is true by default. Removed from rules.\n- Moved from toml to yml. Included examples for both in repo.\n- Added \\$SECRETSDIR env variable\n- Expanded bash_aliases\n\n## July 14, 2020\n\n- Added Synology Docker Compose for Traefik 2\n- Introduced new environmental variable \\$DOCKERDIR for simplicity\n\n## June 25, 2020\n\n- Updated Authelia volumes to reflect the current structure\n- Cleaned up LazyLibrarian, Calibre, and Caliber-web\n- Bug fixes and typos\n- Added /dev/dri volumes to support hardware transcoding in Plex, Emby, and Jellyfin\n\n## June 12, 2020\n\n- Added Home Assistant Core\n- Added Redis and Redis Commander\n- Enabled Authelia to use Redis\n- Added LazyLibrarian, Calibre, and Caliber-web\n\n## May 31, 2020\n\n- Removed tls=true from service since tls.certresolver=dns-cloudflare auto enables TLS\n- Enabled Cloudflare proxy\n- Added Cloudflare Companion to auto create CNAMEs for services\n- Replaces Cloudflare DDNS with Oznu's image\n\n## May 19, 2020\n\n- Removed Jackett from VPN\n- Removed qBittorrent\n- Added Home Assistant Core to Obsolete as a backup (due to recent developments with Home Assistant)\n\n## May 18, 2020\n\n- Switched default auth from OAuth to Authelia\n- Added default certresolver and TLS options and removed these from all services\n- Added VSCode, Motion Eye\n- Obsoleted Cloud Commander, CloudlIDE, Linuxserver VSCode\n- Set exposedByDefault to True so Traefik is enabled by default for all services\n\n## May 11, 2020\n\n- Added Authelia Lite multifactor authentication\n\n## April 25, 2020\n\n- Added Traefik Certificate Dumper, Cloudflare DDNS\n\n## April 19, 2020\n\n- Switched to Traefik 2.2 as default\n\n## March 31, 2020\n\n- Added Ombi, PhotoShow\n- Moved Traefik-Home, MQTT Admin, xTeVe, Piwigo, MiFlora Daemon, xTeVe, Logarr to Obsolete list\n\n## January 14, 2020\n\n- Added dozzle, smokeping, Traefik-Home, and VSCode Server - Thanks github.com/thefrenchmatt\n\n## January 9, 2020\n\n- Replace TellyTV with xTeve\n- Re-added Emby for Testing\n\n## January 7, 2020\n\n- Added MiFlora MQTT Daemon to monitor plant status, AirSonic, and MariaDB\n- Obsoleted Varken\n\n## January 6, 2020\n\n- Switched radarr and sonarr to \"preview\" tag to use the new low resource UI.\n- Renamed Traefik 1 folder from \"traefik\" to \"traefik1\"\n\n## December 16, 2019\n\n- Significant changes - too many to list\n- Included first draft of Traefik 2.1 setup\n- Included a draft of Traefik 1 in Docker Swarm mode\n- Removed monitorr (use statping instead)\n\n## November 22, 2019\n\n- Replaced Emby with Jellyfin\n- Added Postgres database for StatPing\n\n## November 21, 2019\n\n- Added Autoindex\n- Addded TellyTV for IPTV proxy for plex\n- Added StatPing with Grafana Dashboard - not working yet\n- Separated VPN apps into different compose file\n- Removed IPVanish container and put vpn apps behind Transmission-VPN's network\n\n## November 8, 2019\n\n- Harmonized paths and removed unused volumes\n- Moved Plex and Emby transcoding to /dev/shm (RAM)\n\n## November 7, 2019\n\n- Added IPVanish VPN container.\n- Added VPN support for Jackett, qBittorrent, and jDownloader.\n- Initial push to GitHub\n\n## November 6, 2019\n\n- Moved environmental variables to .env file\n\n## November 4, 2019\n\n- Added plex-sync to sync two plex servers.\n- Added MakeMKV.\n\n## October 28, 2019\n\n- Added Plex, MKVToolNix, QDirStat\n\n## October 24, 2019\n\n- Added Picard, Handbrake, and Filebot\n\n## Oct 14, 2019\n\n- Implemented Google OAuth\n\n## Oct 11, 2019\n\n- Added Firefox, Glances, jDownloader, Logarr, Monitorr, and apcupsd\n- Replaced watchtower with Ouroboros\n\n## Oct 4, 2019\n\n- Added Heimdall\n\n## Sep 17, 2019\n\n- Fixed traefik v1.7.16\n- Added organizr\n- Fixed traefik labels\n- Switched to hydra2.\n- Removed Heimdall.\n- Cleaned up docker compose.\n\n## Aug 20, 2019\n\n- Removed Unifi (moved to VPS).\n- Switched back to linuxserver for sonarr and radarr.\n\n## Feb 25, 2019\n\n- Moved to NUC.\n\n## Feb 8, 2019\n\n- Added jlesage/handbrake\n- Switched from linuxserver/sonarr to aront/sonarr, linuxserver/radarr to aront/radarr for mp4_automator support\n\n## Feb 5, 2019\n\n- Removed Plexms, Nodered, Hole, Syncthing\n"
  },
  {
    "path": "archives/traefik_v3-pre-deployrr/custom/Dockerfile-csdash",
    "content": "FROM metabase/metabase\n\nRUN mkdir /data/ && wget https://crowdsec-statics-assets.s3-eu-west-1.amazonaws.com/metabase_sqlite.zip && unzip metabase_sqlite.zip -d /data/"
  },
  {
    "path": "archives/traefik_v3-pre-deployrr/custom/Dockerfile-php7",
    "content": "# https://github.com/mlocati/docker-php-extension-installer\n\n# https://www.php.net/ChangeLog-7.php\nFROM php:7.4-fpm\n\n# ADD https://raw.githubusercontent.com/mlocati/docker-php-extension-installer/master/install-php-extensions /usr/local/bin/\nADD https://github.com/mlocati/docker-php-extension-installer/releases/latest/download/install-php-extensions /usr/local/bin/\n\n\nRUN chmod uga+x /usr/local/bin/install-php-extensions && sync && \\\n    install-php-extensions gd mysqli pdo_mysql opcache imagick exif zip mcrypt pspell redis sockets ssh2 bcmath intl calendar\n\n# ADDED AUGUST 18, 2022 BECAUSE ERRORS IN PHP7 DOCKER LOGS TO INCREASE MAX_CHILDREN\n# https://serverfault.com/questions/884256/how-and-where-to-configure-pm-max-children-for-php-fpm-with-docker\n# SETUP PHP-FPM CONFIG SETTINGS (max_children / max_requests)\nRUN echo 'pm.max_children = 15' >> /usr/local/etc/php-fpm.d/zz-docker.conf && \\\n    echo 'pm.max_requests = 500' >> /usr/local/etc/php-fpm.d/zz-docker.conf"
  },
  {
    "path": "archives/traefik_v3-pre-deployrr/docker-compose-dns.yml",
    "content": "########################### ANAND'S ENVIRONMENT\n\n# Here are my 5 Docker Hosts:\n# - Home Server (hs) - Proxmox LXC with Ubuntu Server 22.04\n# - Media / Database Server (mds) - Proxmox LXC with Ubuntu Server 22.04\n# - Web Server (ws) - Digital Ocean VPS with Ubuntu Server 22.04\n# - Synology (ds918) - Synology DS918+ \n# - DNS / AdBlock Server (dns) - Raspberry Pi 4B with Raspberry Pi OS\n\n########################### THIS COMPOSE FILE\n# - DNS / AdBlock Server (dns) - Raspberry Pi 4B with Raspberry Pi OS\n# - Prefix/suffix \"dns\" refers to the above host\n# - Docker version 24.0.7, build afdd53b\n# - Docker Compose version v2.21.0\n\n########################### NETWORKS\n# You may customize the network subnets (192.168.x.0/24) below as you please.\n\nnetworks:\n  default:\n    driver: bridge\n  socket_proxy:\n    name: socket_proxy\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.91.0/24\n  t2_proxy:\n    name: t2_proxy\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.90.0/24\n\n########################### SECRETS\nsecrets:\n  basic_auth_credentials:\n    file: $DOCKERDIR/secrets/basic_auth_credentials\n  cf_dns_api_token:\n    file: $DOCKERDIR/secrets/cf_dns_api_token\n  traefik_forward_auth:\n    file: $DOCKERDIR/secrets/traefik_forward_auth\n\ninclude:\n  ########################### SERVICES\n  # PREFIX dns = DNS / AdBlock Server\n\n  # CORE\n  - compose/$HOSTNAME/socket-proxy.yml\n  - compose/$HOSTNAME/traefik.yml\n  # - compose/$HOSTNAME/oauth.yml \n  # AD-BLOCKING\n  #- compose/$HOSTNAME/adguardhome.yml\n  #- compose/$HOSTNAME/adguardhome-sync.yml\n  # DNS RESOLVER\n  #- compose/$HOSTNAME/unbound.yml\n  # VPN\n  # - compose/$HOSTNAME/wg-easy.yml\n  # MONITORING\n  # - compose/$HOSTNAME/glances.yml\n  # MAINTENANCE\n  # - compose/$HOSTNAME/docker-gc.yml # not available for arm\n  - compose/$HOSTNAME/ddns-updater.yml\n  # - compose/$HOSTNAME/certdumper.yml"
  },
  {
    "path": "archives/traefik_v3-pre-deployrr/docker-compose-hs-old.yml",
    "content": "########################### ANAND'S ENVIRONMENT\n# Here are my 5 Docker Hosts:\n# - Home Server (hs) - Proxmox LXC with Ubuntu Server 22.04\n# - Media / Database Server (mds) - Proxmox LXC with Ubuntu Server 22.04\n# - Web Server (ws) - Digital Ocean VPS with Ubuntu Server 22.04\n# - Synology (ds918) - Synology DS918+ \n# - DNS / AdBlock Server (dns) - Raspberry Pi 4B with Raspberry Pi OS\n\n########################### THIS COMPOSE FILE\n# - Home Server (hs) - Proxmox LXC with Ubuntu Server 22.04\n# - Prefix/suffix \"hs\" refers to the above host\n# - Docker version 24.0.7, build afdd53b\n# - Docker Compose version v2.21.0\n\n########################### NETWORKS\n# You may customize the network subnets (192.168.x.0/24) below as you please.\nnetworks:\n  default:\n    driver: bridge\n  socket_proxy:\n    name: socket_proxy\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.91.0/24\n  # t2_proxy:\n  #   name: t2_proxy\n  #   driver: bridge\n  #   ipam:\n  #     config:\n  #       - subnet: 192.168.90.0/24\n  t3_proxy:\n    name: t3_proxy\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.90.0/24\n\n########################### SECRETS\nsecrets:\n  basic_auth_credentials:\n    file: $DOCKERDIR/secrets/basic_auth_credentials\n  cf_dns_api_token:\n    file: $DOCKERDIR/secrets/cf_dns_api_token\n  traefik_forward_auth:\n    file: $DOCKERDIR/secrets/traefik_forward_auth\n  mysql_root_password:\n    file: $DOCKERDIR/secrets/mysql_root_password\n  authelia_jwt_secret:\n    file: $DOCKERDIR/secrets/authelia_jwt_secret\n  authelia_session_secret:\n    file: $DOCKERDIR/secrets/authelia_session_secret\n  # authelia_storage_mysql_password:\n  #   file: $DOCKERDIR/secrets/authelia_storage_mysql_password\n  # authelia_notifier_smtp_password:\n  #   file: $DOCKERDIR/secrets/authelia_notifier_smtp_password\n  # authelia_duo_api_secret_key:\n  #   file: $DOCKERDIR/secrets/authelia_duo_api_secret_key\n  authelia_storage_encryption_key:\n    file: $DOCKERDIR/secrets/authelia_storage_encryption_key\n  guac_db_name:\n    file: $DOCKERDIR/secrets/guac_db_name\n  guac_mysql_user:\n    file: $DOCKERDIR/secrets/guac_mysql_user\n  guac_mysql_password:\n    file: $DOCKERDIR/secrets/guac_mysql_password\n\ninclude:\n  ########################### SERVICES\n  # PREFIX hs = Home Server\n  # HOSTNAME=hs - defined in .env\n\n  # CORE\n  - compose/$HOSTNAME/traefik.yml\n  - compose/$HOSTNAME/socket-proxy.yml\n  - compose/$HOSTNAME/oauth.yml\n  - compose/$HOSTNAME/authelia.yml\n  - compose/$HOSTNAME/portainer.yml\n  - compose/$HOSTNAME/dockge.yml\n  # SECURITY\n  - compose/$HOSTNAME/crowdsec.yml\n  - compose/$HOSTNAME/traefik-bouncer.yml\n  # FRONTEND\n  - compose/$HOSTNAME/autoindex.yml\n  - compose/$HOSTNAME/homepage.yml\n  - compose/$HOSTNAME/phpmyadmin.yml\n  - compose/$HOSTNAME/pgadmin.yml\n  - compose/$HOSTNAME/sitespeed.yml\n  - compose/$HOSTNAME/whoami.yml\n  # DOWNLOADERS\n  # - compose/$HOSTNAME/jdownloader.yml\n  - compose/$HOSTNAME/qbittorrent.yml\n  - compose/$HOSTNAME/sabnzbd.yml\n  # PVRS\n  - compose/$HOSTNAME/sonarr.yml\n  - compose/$HOSTNAME/radarr.yml\n  - compose/$HOSTNAME/lidarr.yml\n  # COMPLEMENTARY APPS\n  - compose/$HOSTNAME/prowlarr.yml\n  - compose/$HOSTNAME/notifiarr.yml\n  - compose/$HOSTNAME/bazarr.yml\n  - compose/$HOSTNAME/picard.yml\n  # MONITORING\n  - compose/$HOSTNAME/grafana.yml\n  - compose/$HOSTNAME/grafana-tm.yml\n  - compose/$HOSTNAME/uptime-kuma.yml\n  - compose/$HOSTNAME/dozzle.yml\n  - compose/$HOSTNAME/scrutiny.yml\n  - compose/$HOSTNAME/teslamate.yml\n  - compose/$HOSTNAME/speedtest-tracker.yml\n  # - compose/$HOSTNAME/radarr-exporter.yml\n  # - compose/$HOSTNAME/sonarr-exporter.yml\n  # - compose/$HOSTNAME/lidarr-exporter.yml\n  # - compose/$HOSTNAME/prowlarr-exporter.yml\n  # - compose/$HOSTNAME/sabnzbd-exporter.yml\n  - compose/$HOSTNAME/node-exporter.yml\n  # ADMIN\n  - compose/$HOSTNAME/guacamole.yml\n  # - compose/$HOSTNAME/kasm.yml\n  - compose/$HOSTNAME/it-tools.yml\n  # UTILITIES\n  - compose/$HOSTNAME/firefox.yml\n  - compose/$HOSTNAME/firefly.yml\n  # FILE MANAGEMENT\n  - compose/$HOSTNAME/vscode.yml\n  - compose/$HOSTNAME/makemkv.yml\n  - compose/$HOSTNAME/mkvtoolnix.yml\n  # NETWORK\n  - compose/$HOSTNAME/gluetun.yml\n  # MAINTENANCE\n  - compose/$HOSTNAME/docker-gc.yml\n  - compose/$HOSTNAME/deunhealth.yml\n"
  },
  {
    "path": "archives/traefik_v3-pre-deployrr/docker-compose-mds.yml",
    "content": "########################### ANAND'S ENVIRONMENT\n# Here are my 5 Docker Hosts:\n# - Home Server (hs) - Proxmox LXC with Ubuntu Server 22.04\n# - Media / Database Server (mds) - Proxmox LXC with Ubuntu Server 22.04\n# - Web Server (ws) - Digital Ocean VPS with Ubuntu Server 22.04\n# - Synology (ds918) - Synology DS918+ \n# - DNS / AdBlock Server (dns) - Raspberry Pi 4B with Raspberry Pi OS\n\n########################### THIS COMPOSE FILE\n# - Media / Database Server (mds) - Proxmox LXC with Ubuntu Server 22.04\n# - Prefix/suffix \"dns\" refers to the above host\n# - Docker version 24.0.7, build afdd53b\n# - Docker Compose version v2.21.0\n\n########################### NETWORKS\n# You may customize the network subnets (192.168.x.0/24) below as you please.\nnetworks:\n  default:\n    driver: bridge\n  dockervlan:\n    name: dockervlan\n    driver: macvlan\n    driver_opts:\n      parent: eth0 # using ifconfig\n    ipam:\n      config:\n        - subnet: \"192.168.1.0/24\"\n          ip_range: \"192.168.1.226/32\"\n          gateway: \"192.168.1.1\"\n\n########################### SECRETS\nsecrets:\n  plex_claim:\n    file: $DOCKERDIR/secrets/plex_claim\n  mysql_root_password:\n    file: $DOCKERDIR/secrets/mysql_root_password\n  pgsql_teslamate_passwd:\n    file: $DOCKERDIR/secrets/pgsql_teslamate_passwd\n\ninclude:\n  ########################### SERVICES\n  # PREFIX mds = Media / Database Server\n  # HOSTNAME=mds - defined in .env\n\n  # MEDIA\n  - compose/$HOSTNAME/airsonic-advanced.yml\n  - compose/$HOSTNAME/jellyfin.yml\n  - compose/$HOSTNAME/plex.yml\n  # - compose/$HOSTNAME/plex-image-cleanup.yml\n  # - compose/$HOSTNAME/plex-meta-manager.yml\n  - compose/$HOSTNAME/tautulli.yml\n  # DATABASES\n  - compose/$HOSTNAME/prometheus.yml\n  - compose/$HOSTNAME/mariadb.yml\n  - compose/$HOSTNAME/influxdb.yml\n  - compose/$HOSTNAME/pgsql-teslamate.yml\n  # MONITORING\n  - compose/$HOSTNAME/node-exporter.yml\n  - compose/$HOSTNAME/mosquitto.yml\n"
  },
  {
    "path": "archives/traefik_v3-pre-deployrr/docker-compose-ws.yml",
    "content": "########################### ANAND'S ENVIRONMENT\n# Here are my 5 Docker Hosts:\n# - Home Server (hs) - Proxmox LXC with Ubuntu Server 22.04\n# - Media / Database Server (mds) - Proxmox LXC with Ubuntu Server 22.04\n# - Web Server (ws) - Digital Ocean VPS with Ubuntu Server 22.04\n# - Synology (ds918) - Synology DS918+ \n# - DNS / AdBlock Server (dns) - Raspberry Pi 4B with Raspberry Pi OS\n\n########################### THIS COMPOSE FILE\n# - Web Server (ws) - Digital Ocean VPS with Ubuntu Server 22.04\n# - Prefix/suffix \"ws\" refers to the above host\n# - Docker version 24.0.7, build afdd53b\n# - Docker Compose version v2.21.0\n\n########################### NETWORKS\n# You may customize the network subnets (192.168.x.0/24) below as you please.\nnetworks:\n  default:\n    driver: bridge\n  socket_proxy:\n    name: socket_proxy\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.91.0/24\n  t3_proxy:\n    name: t3_proxy\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.90.0/24\n\n########################### SECRETS\nsecrets:\n  basic_auth_credentials:\n    file: $DOCKERDIR/secrets/basic_auth_credentials\n  cf_dns_api_token:\n    file: $DOCKERDIR/secrets/cf_dns_api_token\n  traefik_forward_auth:\n    file: $DOCKERDIR/secrets/traefik_forward_auth\n  mysql_root_password:\n    file: $SECRETSDIR/mysql_root_password\n  authelia_jwt_secret:\n    file: $SECRETSDIR/authelia_jwt_secret\n  authelia_session_secret:\n    file: $SECRETSDIR/authelia_session_secret\n  authelia_storage_mysql_password:\n    file: $SECRETSDIR/authelia_storage_mysql_password\n  authelia_notifier_smtp_password:\n    file: $SECRETSDIR/authelia_notifier_smtp_password\n  authelia_duo_api_secret_key:\n    file: $SECRETSDIR/authelia_duo_api_secret_key\n\ninclude:\n  ########################### SERVICES\n  # PREFIX ws = Web Server\n  # HOSTNAME=ws - defined in .env\n\n  # CORE\n  - compose/$HOSTNAME/traefik.yml\n  - compose/$HOSTNAME/socket-proxy.yml\n  - compose/$HOSTNAME/oauth.yml\n  - compose/$HOSTNAME/portainer.yml\n  # SECURITY\n  - compose/$HOSTNAME/crowdsec.yml\n  - compose/$HOSTNAME/traefik-bouncer.yml\n  - compose/$HOSTNAME/cloudflare-bouncer.yml\n  # DATABASES\n  - compose/$HOSTNAME/mariadb.yml\n  - compose/$HOSTNAME/redis.yml\n  # FRONTEND\n  # - compose/$HOSTNAME/autoindex.yml\n  - compose/$HOSTNAME/phpmyadmin.yml\n  - compose/$HOSTNAME/adminer.yml\n  - compose/$HOSTNAME/whoami.yml\n  # WEB\n  - compose/$HOSTNAME/nginx.yml\n  - compose/$HOSTNAME/php7.yml\n  - compose/$HOSTNAME/php8.yml\n  # MONITORING\n  - compose/$HOSTNAME/node-exporter.yml\n  - compose/$HOSTNAME/glances.yml\n  # FILE MANAGEMENT\n  - compose/$HOSTNAME/vscode.yml\n  # NETWORK\n  - compose/$HOSTNAME/wg-easy.yml\n  # MAINTENANCE\n  - compose/$HOSTNAME/docker-gc.yml"
  },
  {
    "path": "commits/2020/2020_08_17.txt",
    "content": "Oh boy! where do I even begin.\n\nLots of changes in this commit:\n\n1. Moved some of the apps to Synology docker stack (dockerc-compose-t2-synology.yml) - Portainer, MariaDB, InfluxDB, Mosquitto MQTT Broker, Cloudflare DDNS, Redis. Add my NUC stack as a separate endpoint NAS Portainer.\n2. Implemented Tecnativa Socket Proxy - Traefik, Portainer, Glances, Dozzle, Ouroboros, Docker-GC, Cloudflare Companion\n3. Moved from Home Assistant Supervised to Home Assistant Core\n4. Fixed multihost CNAME creation in Cloudflare Companion\n5. Fully rolled out Docker secrets - Traefik, Authelia, Plex, Guacamole, OAuth, MariaDB, etc.. There are still some images that do not support secrets. \n6. Renamed docker-compose-synology-t2.yml to docker-compose-t2-synology.yml\n7. Obsoleted SmokePing - no use for me\n8. Obsoleted HA-DockerMon - could live without it. Tried to simplify my Home Assistant setup.\n9. Obsoleted UniFi Controller - moved it to cloud.\n10. Obsoleted Postgres - Hoping to use MySQL for StatPing\n11. Updated readme with current information\n12. Updated Authelia configuration.yml.example\n13. Obsoleted ZoneMinder. Moved to MotionEye, which is much simpler to setup and use.\n\nAnd last a big one that I have been working on:\n\n13. Added docker-compose-t2-web.yml - This is contains all the apps that I run on my Digitial Ocean Virtual Private server. This server runs wordpress and couple of other dynamic (PHP) sites. \n"
  },
  {
    "path": "commits/2020/2020_08_21.txt",
    "content": "Downgraded synology watchtower docker api to 1.39 (max supported). Added some comments. \n* Upgrade docker-compose to 1.29.2 (1.28.0 or up needed for compose profiles)\n* Change docker-compsose file version to 3.9\n* Upgraded traefik to v2.5.x (brie)\n* Added support for docker-compose profiles - thanks for the tip tomlawson.io.\n* Update bash aliases to support docker-compose profiles.\n* Added compose profiles to all services for testing.\n* Removed depends_on from dozzle and docker_gc\n* Replaced featurePolicy with permissionsPolicy in middlewares.yml - for Traefik v2.5.x\n* Replaced sslRedirect with RedirectScheme in middlewares.yml - for Traefik v2.5.x\n* Updated traefik middlewares example yml and toml files"
  },
  {
    "path": "commits/2020/2020_10_05.txt",
    "content": "Obsoleted Traefik error pages. Did not spend anymore time on it and don't see the value in doing so.\nAdded TLS options. Changed HostHeader to Host rule.\nAdded Host rule to certain services (auth bypass)\nAdded GZIP compression middleware\nUpgrading Traefik from cheverotin (2.2.x) to 2.3.x (picodin)"
  },
  {
    "path": "commits/2020/2020_10_06.txt",
    "content": "Connected to Traefik Pilot\nAdded healthchecks, ping, and autoheal"
  },
  {
    "path": "commits/2020/2020_10_14.txt",
    "content": "* Fixed firefox https://github.com/jlesage/docker-firefox/blob/master/README.md#allowing-the-membarrier-system-call\n* Fixed Oauth - removed secrets and went back to environmental variables \n* Disabled traefik pilot and ping - did not see a need for it yet\n* Added duplicati - updated readme.md and change log\n* Fixed cf-companion. Went back to environmental variables with scoped token instead of secrets (not working)\n"
  },
  {
    "path": "commits/2020/2020_10_20.txt",
    "content": "* Switched from Authelia to Google OAuth. Authelia seemed to have too much overhead for a single user environment.\n* updated README"
  },
  {
    "path": "commits/2020/2020_10_24.txt",
    "content": "* Updated README with more details."
  },
  {
    "path": "commits/2020/2020_11_29.txt",
    "content": "* Modified socket proxy to allow portainer connections to 2375 from local network."
  },
  {
    "path": "commits/2021/2021_01_06.txt",
    "content": "* Started moving partial stack to seed/cloud box.\n* Created an appdata folder and moved all app folders into it (to tidy things up a bit). \n* Moved htpasswd from shared folder to secrets. Edited middlewares-basic-auth. This changes the way htpasswd is called in docker-compose.\n* Created a folder called \"archives\". Moved all Traefik v1 stuff into it. \n* Changed $DOMAINNAME to $DOMAINNAME0 \n* Moved t2_proxy and socket_proxy subnets in docker compose file instead of outside the compose file (https://github.com/htpcBeginner/docker-traefik/discussions/119). Therefore, it is not necessary to create these networks external before starting the stack. Improved portability.\n* Removed some environmental variables in paths to simplify things (eg. $SECRETSDIR is now $DOCKERDIR/secrets).\n* Changed volumes for apps (eg. radarr, sonarr, etc.) to reduce unnecessary rewrites - https://trash-guides.info/Misc/how-to-set-up-hardlinks-and-atomic-moves/.\n* Switched backed to tecnativa's socket proxy (fluencelabs socket proxy not updated for months).\n* Updated thomseddon/traefik-forward-auth (OAuth) environmental variables to use PROVIDERS_GOOGLE_CLIENT and PROVIDERS_GOOGLE_CLIENT_SECRET.\n* Removed exposing ports to docker host. This was not needed on my cloud/seed box all apps could talk to each other using their internal static IPs.\n* Removed exposing socket-proxy port. All apps connected to socket_proxy network can connect to the proxy using internal hostname.\n* Changed Organizr image to organizr/organizr.\n* Added $TZ to linuxserver/mariadb - statping MySQL did not work without it.\n* Put mariadb, influxdb, and redis on \"default\" network and added dependent services to the network (eg. authelia, statping, PMA, Guacamole, etc.)\n* Obsoleted Emby - Between Plex and Jellyfin all my needs are covered.\n* Added readarr (nightly) - still alpha\n* Added descriptions at the top for various docker-compose files.\n* Added secrets_example folder and added some example secrets.\n* Updated README.md and CHANGELOG.md.\n* Added Rclone and MergerFS with Google Drive.\n* Added systemd startup scripts for Rclone (rclone-drive.service and rclone-crypt.service)  and MergerFS (merge-media.service) based on https://github.com/animosity22/homescripts.\n* Added media-services.txt, which list the services to stop using dcup2/dcstop2 $(cat media-services.txt)\n* Changed restart on some containers dependent on MergerFS media folder to \"no\". Moved starting those containers to a bash script upon successful GDrive mount.\n* Added a script to monitor the status of Rclone and MergerFS mount (check-mounts.sh). If one of the mount fails then media folder dependent services are automatically stopped and an email notification is sent.\n* Added script to automatically/periodically move files from \"local\" to \"remote\" (Google Drive) for MergerFS (upload-media.sh).\n* Added a script to move/convert unencrypted media files on Google Drive to encrypted (drive-to-crypt.sh). The script is set to run at a daily average of 2.75 MB/s, which equates to about 474 GB per day (~237 GB download, encrypt, and ~237 GB reupload). Google Drive Business has a maximum of 750 GB per day.\n* Removed watchtower to avoid automatic reboot of containers that use Rclone/MergerFS mount. "
  },
  {
    "path": "commits/2021/2021_02_14.txt",
    "content": "* Typos in README.md\n* Added --max-transfer to Rclone uploads and syncs\n* Fixed linuxserver/mariadb docker secrets https://github.com/htpcBeginner/docker-traefik/issues/127\n* Updated docker-compose-t2-nuc.yml to reflect apps used currently on my NUC home server\n* Updated rclone logrotate config - fixed permissions, added su directive, modified size, and daily rotation\n* Updated check-mounts.sh to check rclone logs for GDrive token expired/revoked errors\n* Updated check-mounts.sh to check for mergerfs and rclone systemd service statuses.\n* Modified bazarr labels to allow NZB360 app to bypass OAuth\n* Added PlexTraktSync https://hub.docker.com/r/twolaw/plextraktsync. Did not use it, so obsoleted. Instead setup plex trakt scrobbler plugin.\n* Obsoleted plex-sync and moved to https://github.com/trakt/Plex-Trakt-Scrobbler\n* Obsoleted Tiny Media Manager - did not use it\n* Rclone frequently failed mounting, added --allow-non-empty \n* Added --no-modtime to rclone-drive.service and rclone-crypt.service to increase performance\n* Added cloudplow and Plex autoscan for testing\n* Switched from SABnzbd to Nzbget - no specific reason for the switch. Sab worked great too. Obsoleted SABnzbd. OAuth bypass for NZB360 app not working yet.\n* Moved metadata folders for sonarr, radarr, lidarr, Plex, and Jellyfin to a new virtual disk. To reduce size of VM image backups on Proxmox.\n* Moved some log folders to a new virtual disk to reduce VM image size - nzbget.\n* Added start-media-after-boot.sh to check and start media containers (Plex, radarr, etc.) after Rclone and MergerFS mounts are successful."
  },
  {
    "path": "commits/2021/2021_03_11.txt",
    "content": "* Several updates. See full commit log.\n* Moved nzblog back to docker folder, reversing previous commit.\n* Changed transmission logs to LOG_TO_STDOUT: \"true\". Log file was huge.\n* Disabled statping logs until i am not ready to use it.\n* Modified rclone logrotate to include .log files.\n* Added comments to clarify why MediaCover and Plex metadata folders were mounted as volumes."
  },
  {
    "path": "commits/2021/2021_04_08.txt",
    "content": "* Several updates 2021_04_08. See full commit log.\n* Updated cloudflare IPs removed 104.16.0.0/12 and added 104.16.0.0/13,104.24.0.0/14\n* Updated traefik from picodon (v2.3.x) to livarot (v2.4.x)"
  },
  {
    "path": "commits/2021/2021_05_14.txt",
    "content": "* Several updates 2021_05_14. See full commit log.\n* Added TOML examples for Nextcloud middlewares - https://www.smarthomebeginner.com/traefik-docker-nextcloud/ \n* Obsoleted cloudplow - not using at this point/haven't set it up yet\n* Switched to radarr nightly. \"latest\" tag broke the UI.\n* Updated README.md"
  },
  {
    "path": "commits/2021/2021_08_09.txt",
    "content": "* Several updates 2021_08_09. See full commit log.\n* Updated auhelia to 4.30.0. Updated configuration.yml file based on https://www.authelia.com/docs/configuration/migration.html and https://github.com/authelia/authelia/blob/master/config.template.yml.\n* Updated redis to 6.2.5\n* Updated Traefik from 2.3.1 to 2.4.13"
  },
  {
    "path": "commits/2021/2021_10_04.txt",
    "content": "* Several updates 2021_10_04. See full commit log.\n* Upgrade docker-compose to 1.29.2 (1.28.0 or up needed for compose profiles)\n* Change docker-compsose file version to 3.9\n* Upgraded traefik to v2.5.x (brie)\n* Added support for docker-compose profiles - thanks for the tip tomlawson.io.\n* Update bash aliases to support docker-compose profiles.\n* Added compose profiles to all services for testing.\n* Removed depends_on from dozzle and docker_gc\n* Replaced featurePolicy with permissionsPolicy in middlewares.yml - for Traefik v2.5.x\n* Replaced sslRedirect with RedirectScheme in middlewares.yml - for Traefik v2.5.x\n* Updated traefik middlewares example yml and toml files"
  },
  {
    "path": "commits/2022/2022_01_23.txt",
    "content": "* Several updates 2022_01_23. See full commit log.\n* Big change 1: my web stack is now part of the same Proxmox host that runs my home/media server. Previously it was on Digital Ocean.\n* Big change 2: moved most of my services from NUC/ASROCK 4x4-4800U to Synology for homelab use. So no more docker-compose-t2-nuc.yml.\n* Updated docker version to 20.10.12.\n* Updated docker-compose version to 1.29.2.\n* Updated compose file version to 3.9.\n* Updated README with additional information. As mentioned in previous commit CHANGELOG is now discontinued due to detailed commit messages such as this one. Only the \"planned\" section of CHANGELOG will be updated.\n* Minor customizations to upload-media.sh.example for uploading media from local drive to google drive (rclone).\n* Updated upload-excludes.log.example to exclude partial~, torrents, .part, and incomplete downloads from being uploaded to google drive.\n* Updated start-media-after-boot.sh - the script waits until all drives are mounted (rclone and MergerFS) before starting media containers (media-services.txt).\n* Updated media-services.txt as the list of services I use have changed - e.g. Plex moved to synology.\n* Updated check-mounts.sh with minor tweaks - this script checks for all required mounts periodically to either keep-alive or stop the media containers.\n* Updated middlewares.yml to add missing middlewares-https-redirectscheme - https://github.com/htpcBeginner/docker-traefik/issues/187.\n* Added middlewares-oauth-external (middlewares.yml) to offload authentication to an external service that was already running OAuth (reduce duplication).\n* Added few additional middlewares (middlewares.yml) for testing - compression and traefik buffering issues.\n* Updated middlewares-chains.yml to add compression middleware and chain-oauth-external for external OAuth as explained above.\n* Removed authelia from home server. Still used on web stack.\n* Obsoleted Organizr and Heimdall - wasn't using much and my Proxmox host is not too powerful. I might add it back later.\n* Removed all database services (MariaDB, Redis, phpMyAdmin, InfluxDB, RedisCommander, etc.) from docker-compose.yml. This reduced duplicated services. Since the web stack is now a guest on the same Proxmox host. Services on docker-compose.yml now use database services from the web stack.\n* Added prowlarr for testing - replacement for Jackett.\n* Obsoleted LazyLibrarian, Caliber, and Caliber-web - wasn't using them.\n* Added Readarr for testing.\n* AirSonic development stopped. Plus, the database corrupted twice. Obsoleted it and added NaviDrome and FunkWhale for testing.\n* Removed Plex from docker-compose.yml. It is now part of my Synology stack at home. Still running Jellyfin in the cloud as a backup and to share with others.\n* Due to the above reason, also moved Tautulli to Synology.\n* Obsoleted FileBot, Photoshow and autoscan - wasn't using them.\n* Added Synthing - I now use this to sync scripts, compose files, etc. between various systems. \n* Obsoleted StatPing temporarily - I will probably add it back.\n* Obsoleted Traefik Error Pages - did not find a way to use for wordpress\n* Removed cert dumper, dozzle, and glaces from web stack to keep things light. May add it later if resources can handle it.\n* Obsoleted Unifi Controller - I do not use Unifi at this point (I wish I could). I do not have the time to set it up (lack of cables, etc.) after the move.\n* Added tdarr and tdarr-node to Synology to transcode videos to H265/HEVC - only small home clips. Synology is too underpowered for transcoding movies. \n* Added Rclone service (both unencrypted and encrypted) to Synology to mount media from google drive. "
  },
  {
    "path": "commits/2022/2022_02_04.txt",
    "content": "* Several updates 2022_02_04. See full commit log.\n* Moved bash_aliases to /shared/config/\n* Implemented bash_aliases.env to hide sensitive information, which will allow me to share my current bash_aliases which keeps evolving\n* Customized bash_aliases so i can share it among different hosts and yet tweak them automatically depending on the host (eg. aliases picking the right docker-compose files on various platforms)\n* Moved platform-specific traefik rules to specific folders so i can share the repo among several of my devices\n* Changed default domain to DOMAINNAME0 and the rest to $DOMAINNAME1 and 2 align the docker-compose files\n* Updated README"
  },
  {
    "path": "commits/2022/2022_02_06.txt",
    "content": "* Several updates 2022_02_06. See full commit log.\n* Moved homeserver rules and scripts (main docker-compose-t2.yml) to its own folders\n* Fixed oauth secrets. It works now. See https://github.com/htpcBeginner/docker-traefik/pull/229. \n* Fixed bugs in bash_aliases"
  },
  {
    "path": "commits/2022/2022_02_21.txt",
    "content": "* Several updates 2022_02_21. See full commit log.\n* Cleaned up shared/config/bash_aliases - consolidated all my bash_aliases into one as I now syncthing this with all my servers.\n* Added a few more example scripts that are called in my bash_aliases file.\n* Moved authelia to web stack.\n* Moved homeserver stack to a unprivileged Proxmox LXC container (previously a Ubuntu VM).\n* Due to above move to LXC container, enabled /dev/net/tun for Transmission-vpn\n* Obsoleted  Funkwhale, too complex to maintain for what I wanted. \n* Obsoleted PhotoShow. Added FileBrowser.\n* Moved some of the logs to a dedicated/central logs folder in docker root folder.\n* Moved Syncthing to a native app on Ubuntu guest container outside of docker.\n* Other minor improvements."
  },
  {
    "path": "commits/2022/2022_02_23.txt",
    "content": "* Several updates 2022_02_23. See full commit log.\n* Updated traefik to 2.6.\n* Updated Docker Compose to v2.1.1. Above this version, Cloudflare Companion was not working and I cannot figure out why.\n* Changed cloudflare secrets (from cloudflare prefix to cf) to make them work with Cloudflare Companion.\n* Obsoleted Navidrom. Added Airsonic Advanced - I was used to the features in Airsonic.\n* Added Mariadb support for Airsonic.\n* Fixed StatPing MariadB connection issue: https://github.com/statping/statping/issues/260#issuecomment-541041752"
  },
  {
    "path": "commits/2022/2022_03_20.txt",
    "content": "* Several updates 2022_03_20. See full commit log.\n* Configured Prowlarr, which is amazing. \n* With prowlarr working, there is no need for Jackett and NZBHydra. Obsoleted both.\n* Added flaresolverr to circumvent cloudflare challenge for some of the torrent trackers.\n* Minor changes to bash_aliases.\n* Added YT-DLP bash_aliases.\n* Updated example systemd scripts for Rclone (rclone-drive.service.example and rclone-crypt.service.example) and MergerFS (merge-media.service.example).\n* Added a check to see if rclone media upload is already running prior to starting a new one (upload-media.sh.example). \n* Updated media-services.txt to add airsonic-advanced. This should have container names and not service names. \n* Updated README.\n* Obsoleted Navidrom and added Airsonic-Advanced with MariaDB backend. Couldn't live without the features of Airsonic.\n* Added dupeguru temporarily - I am organizing my music collection and there a ton of duplicate files. \n* Replaced StatPing with Uptime-Kuma, which is awesome. \n* Tried Youtube-DL-Material and MeTube - Couldn't get these to work - Could not resolve host name error. YT-DLP works great."
  },
  {
    "path": "commits/2022/2022_05_19.txt",
    "content": "* Several updates 2022_05_19. See full commit log.\n* Added bash_aliases for monitoring stack - not fully implemented yet.\n* Changed cloudflare_email secret to cf_email\n* Increased inotify limits for syncthing to work properly on synology.\n* Updated Rclone media upload scripts.\n* Added docker-compose.yml (with Nginx Proxy Manager) - https://www.smarthomebeginner.com/docker-media-server-2022/\n* Updated README.\n* Upgraded Traefik to 2.6, Docker Compose to v2.5.0.\n* Switched from Codercom to LinuxServer.io Visual Studio Code Server image.\n* Minor changes to Synology stack.\n* Moved authelia to obsolete. I will add it back at a later time.\n* Added some apps for log and resources monitoring - in testing. Not fully implemented.\n"
  },
  {
    "path": "commits/2022/2022_06_15.txt",
    "content": "* Several updates 2022_06_15. See full commit log.\n* There was lot of push back on the move to extension fields, which reduced readability. Simplified it a bit but not abandoning it at this point.\n* Moving smarthomebeginner.com to Proxmox VM on a unreliable dedicated server provider was a failure. So moved it back to digital ocean VPS so the website is not affected during my meddling with the homeserver.\n* Got a separate domain name for home server - previously shared domain name with my cloud proxmox server. This means CF-DDNS on Synology now does not use a subdomain any more.\n* Obsoleted Cloudflare Companion - resorted to just using a wildcard CNAME pointing to the root domain instead of creating CNAME DNS records on the fly.\n* Upgraded to the new Docker Compose V2, which is now built into Docker as a plugin. https://docs.docker.com/compose/#compose-v2-and-the-new-docker-compose-command. So from now on it is \"docker compose\" command instead of \"docker-compose\". Also there is no need to manually install and ugprade Docker Compose (except on Synology).\n* Minor changes with bash_aliases to reflect the changes in servers/hosts."
  },
  {
    "path": "commits/2022/2022_06_19.txt",
    "content": "* Several updates 2022_06_19. See full commit log.\n* Renamed \"homeserver\" to \"cloudserver\" wherever applicable (scripts, logs, traefik rules, etc.). \"homeserver\" actually referred to my Proxmox server in the cloud and Synology is my Docker-Traefik server at home.\n* Added domain name variables to Traefik environment, to pass the variable into container. This allows using {{env \"DOMAINNAME_CLOUD_SERVER\"}} in Traefik dynamic rules to refer to domain names."
  },
  {
    "path": "commits/2022/2022_06_26.txt",
    "content": "* Several updates 2022_06_26. See full commit log.\n* Published my real middlewares.yml, middlewares-chains.yml, and tls-opts.yml, thanks to the previous commit that allowed usage of environmental variables in rules.\n* Added LOCAL_IPS and CLOUDFLARE_IPS variables to simplify Traefik compose.\n* Added CrowdSec, CrowdSec Dashboard, and Traefik Bouncer. This appears to be working well but will check for a few more days before publishing a separate guide on it.\n* Updated middlewares and chains to include crowdsec middleware. \n* Updated Traefik logs and its path to support parsing with Crowdsec. Also separated traefik log and access log.\n"
  },
  {
    "path": "commits/2022/2022_07_14.txt",
    "content": "* Several updates 2022_07_14. See full commit log.\n* Updated bash_aliases for Synology DSM 7, which uses SYSTEMD\n* changed traefik_forward_auth secrets example to align with 2022 Traefik forward Auth guide: https://www.smarthomebeginner.com/traefik-forward-auth-google-oauth-2022/\n* After update to DSM 7.1 switch_ports scripts for 80 and 443 did not work (switch_ports.sh.example). Had to add a command to restart nginx. \n* Modified examples of traefik rules YML for non-docker apps.\n* Fixed: Wrong port was specified for qbittorrent behind traefik. Changed it to 8080.\n* Changed lidarr volumes to align with TRaSH guide.\n* Edited README.\n\ndocker-compose-t2.yml\n* Moved my Plex that was running by iteself on a separate docker host on my home network to cloud server. \n* Typos and comments\n\ndocker-compose-t2-synology.yml\n* Installed Adguard Home on Synology to replace my Pi-Hole on Raspberry Pi. This required adding a separate macvlan docker network (dockervlan). \n* Added Dashy for testing - potential replacement for heimdall.\n* Added back Traefik cert dumper to use the certs with AdGuard Home for DoH/DoT.\n* Replaced cf-ddns from oznu by qmcgaw/ddns-updater, which has a few nice features: discord notification (via shoutrrr), webUI for logs, etc.\n\n"
  },
  {
    "path": "commits/2022/2022_09_20.txt",
    "content": "* Several updates 2022_09_20. See full commit log.\n\n* The biggest change is the addition of CrowdSec intrusion prevention system to my environment. It is mitigating well over 600 intrusion attempts per day.\n* Added some new middlewares chains in middlewares-chains.yml to support the addition of CrowdSec. \n* Renamed traefik bouncer middleware in middlewares.yml.\n* Modified Dockerfile-php7 to supress some errors in php logs.\n* Fixed minor mistakes in my rclone scripts.\n* Modified media-services.txt to reflect current setup.\n* Updated bash_aliases - major change is the addition of commands for CrowdSec.\n* Edited README.\n\ndocker-compose-t2.yml\n* Fixed a typo chain-auth-basic to chain-basic-auth\n* Added CrowdSec (agent). Although an agent is installed here, my primary agent (the mothership; the decision maker) is the one in docker-compose-t2-web.yml. This instance just parses the logs but makes no decisions.\n* Obsoleted CrowdSec dashboard - was using too much resources.\n* Modified traefik bouncer to get decisions from the \"mothership\" crowdsec remote agent instead of the local agent.\n* Added Prometheus to harvest some CrowdSec stats. I can now visualize metrics on my Grafana. \n* Obsoleted YoutubeDL-Material - could never get this to work. It has worked for others.\n* Obsoleted Flaresolverr - Saw no real use for my situation. \n* Renamed airsonic service to airsonic-advanced.\n* Added Plex Meta Manager - will push my configs as example at a later point.\n* Re-Added Tautulli.\n\ndocker-compose-t2-synology.yml\n* Added ZeroTier. Now all my key hosts are connected through ZeroTier and Plex, Arr apps, etc. can be accessed using ZeroTier IPs. \n* Re-Added Plex-Sync to sync watched status between two Plex servers.\n* VS Code server has been giving me issues recently and is currently non functional on Synology.\n* Minor changes to DDNS updater\n\ndocker-compose-t2-web.yml\n* Biggest change is the addition of CrowdSec. CrowdSec on my Digital Ocean VPS is the primary agent. \n* Added wg-easy for easy Wireguard deployment. This will run on my Digital Ocean VPS, which will be always on and the most reliable of all my servers.\n* Modified logging for serveral apps (eg. Traefik, Nginx, etc.) to simplify CrowdSec implementation. These logs will be parsed by CrowdSec agent for malicious activities and decisions (ban) will be sent to the bouncers. \n* Added CrowdSec cloudflare bouncer to block malicious IPs using Cloudflare managed rules. Unfortunately CrowdSec limits blocklist to max 10,000 IPs. For the rest, see below.\n* Added CrowdSec Traefik bouncer to block malicious IPs.\n* In addition, installed CrowdSec Firewall bouncer on host machine to make Linux firewall block malicious IPs. \n* Replaced CF trusted IPs list with an environmental variable with same info. Looks cleaner."
  },
  {
    "path": "commits/2023/2023_01_26.txt",
    "content": "* Several updates 2023_01_26. See full commit log.\n\n* bash_aliases updates due to moving my proxmox server from the cloud back into my home - I now have fiber with 10 Gbps :-)\n* Added --drive-stop-on-upload-limit switch to stop rclone upload when google drive errors out due to quota.\n* Added crowdsec and traefik-bouncer to basic-services.txt as without them none of the service would be accessible and traefik won't start.\n* Remove cf-companion. I now just wildcard all CNAMEs to the root domain pointing to my IP. Much simpler this way and its not a big security risk.\n* Updated README with crowdsec related posts.\n* Obsoleted cf-companion (see above) and heimdall (replaced with homepage)\n* Updated traefik to v2.9\n* Updated docker and docker-compose versions.\n* Added crowdsecurity/blocklist-mirror to export all the blocked IPs as a list.\n* Added whoami container for testing purposes\n* Exposed some ports to the host now that my server is inside my home network.\n* Added AdGuard Home sync to sync all my instances of adguard home.\n"
  },
  {
    "path": "commits/2023/2023_03_02.txt",
    "content": "* Several updates 2023_03_02. See full commit log.\n\n* Converted by Synology M2 drives from cache device to a volume for docker. Significantly faster docker performance. Consequently few minor changes to paths (volume1 to volume3)\n* Updated traefik app yml for Home Assistant OS. \n* Replaced Transmission (with built in VPN killswitch) with Gluetun and Surfshark Wireguard VPN (https://bit.ly/shb-surfshark). \n* Replaced Transmission with qBittorrent (which I prefer) via Glueten VPN.\n* Added a whoami container on home server for testing purposes.\n* Replaced Dashy with Homepage.\n* Added deunhealth so qBittorrent heals after VPN disconnects/restarts\n* Updated docker and docker compose versions"
  },
  {
    "path": "commits/2023/2023_05_26.txt",
    "content": "* Several updates 2023_05_26. See full commit log.\n\n* A ton of changes. \n* Renamed docker-compose.yml to docker-compose-npm.yml to align with the naming convention used for traefik.\n* I was getting tired of my experiments affecting media servers and databases, which were needed 24/7. So split media apps and databases into their own compose. I run this on a separate Ubuntu LXC (unprivileged) container on Proxmox.\n* Deleted docker-compose-t2-obsolete.yml. Moved all obsolete apps into their own yml files in the archives folder.\n* Major changes on docker-compose-t2.yml (my home server). Extension fields were killing the readability and made it difficult to write guides without explaining. Therefore, I removed extension fields. This will be replicated to Synology and Web Server compose files in future.\n* Updated hardware and docker version details in compose files.\n* Added docker profiles with the aim of symplifying starting and stopping specific group of services.\n* Updated some paths to reflect the new setup.\n* Replaced Nzbget with SABnzbd. Nzbget development stopped.\n* Archived handbrake, mkvtoolnix, makemkv - rarely used them.\n* Temporarily removed glances, qdirstat, AdGuard-Home Sync\n* Add IT-Tools, Sitespeed.io (to monitor my site performance)\n* Added Lidarr, Radarr, Prowlarr, SABnzbd, and Sonarr exporters to send metrics to Prometheus - I may remove some of this information is also available via Home Assistant InfluxDB. \n* Added Node-Exporter to scrape Docker host metrics into Prometheus for Grafana dashboarding.\n* Updated milddlewares.yml removed old settings and cleaned things up a bit.\n* Update media-services.txt - This might go away in future after I implement docker profiles.\n* Updated README.\n* Whats coming: Move traefik CLI commands to traefik.yml to clean up the compose. Add Traefik plugins."
  },
  {
    "path": "commits/2023/2023_09_24.txt",
    "content": "* Several updates 2023_09_24. See full commit log.\n\n* Changed docker-compose-t2-media-db.yml to docker-compose-media-db.yml as this stack was not using Traefik.\n* Updated docker and docker compose versions in all stacks. \n* Docker extension fields were partially removed in my previous commit. Not its been removed from all my other stacks - due to readability issues. \n* Implemented Docker profiles to start and stop cntainers as a group - e.g. those that depend on mounts will be started using a bash script after the mounts become available. \n* No use for media-services.txt anymore after implementation of docker profiles.\n* Modified start-media-after-boot.sh to reflect the use of docker profiles.\n* Added addition PHP extensions to Docekrfile-php7 for my web stack.\n* Updated bash_aliases to use docker profiles.\n* Added prometheus and influxdb2 metrics for Traefik. \n* Exposes socket proxy port 2375 to local network - manage containers from home assistant\n* Some changes due to Plex now using media stored on Synology instead of Google Drive (Rclone)\n* Added node-exporter and glances to web stack for Grafana monitoring\n* Removed crowdsec-blocklists container. Could not find a use.\n* Testing mergerfs container on Synology \n* Updated traefik to 2.10"
  },
  {
    "path": "commits/2024/2024_01_19.txt",
    "content": "* Several updates 2024_01_19. See full commit log.\n\n* Biggest structural change in a long time to align with what Auto-Traefik does.\n    - Renamed all Docker compose files (remove t2 suffix)\n    - Now all docker compose files have their hostname as suffix (for my 5 Docker hosts)\n* Split the big long docker compose files into individual service YMLs using Docker include: /compose folder.\n* Moved all archived compose files into /compose/archives.\n* Updated bash aliases - docker commands simplified, and more."
  },
  {
    "path": "commits/2024/2024_01_22.txt",
    "content": "* Several updates 2024_01_22. See full commit log.\n\n* Changed domain name variables to align with hostnames (and their prefixes/suffixes) I implemented in the previous commit\n    - DOMAINNAME_CLOUD_SERVER is now DOMAINNAME_HS\n    - DOMAINNAME_HOME_SYNOLOGY is now DOMAINNAME_DS918\n    - DOMAINNAME_SHB is now DOMAINNAME_WS\n* Replace Traefik/Cloudflare ACME validation from using Email and Global API Key to Scoped API Toekn (CF_DNS_API_TOKEN). Deleted unwated secrets.\n* Split middlewares.yml to individual middleware YML files - to align with Auto-Traefik.\n* Split middlewares-chains.yml to individual chain YML files - to align with Auto-Traefik.\n* Moved some of the media apps to Media Server docker stack (docker-compose-mds.yml)\n* Added more example file providers for various scenarios."
  },
  {
    "path": "commits/2024/2024_01_30.txt",
    "content": "* Several updates 2024_01_30. See full commit log.\n\n* Remove HTTPS redirect scheme middleware. Not used and redirects handled globally with CLI commands.\n* Changed entrypoint names from http/https to web/websecure to align with several online documentation.\n* Updated readme.\n* Changed basic auth secret from htpassd to basic_auth_credentials (just easier to understand)\n"
  },
  {
    "path": "commits/2024/2024_05_01.txt",
    "content": "* Several updates 2024_05_01. See full commit log.\n\n* Updated Traefik to v3 (on home server - hs). The rest will be migrated over slowly.\n* Syntax updated for Traefik v3 compatibility - Headers to Header, HeadersRegexp to HeaderRegexp, HostSNIRegexp, etc. Check https://www.smarthomebeginner.com/traefik-v3-docker-compose-guide-2024/#Migrating_from_Traefik_v2_to_v3.\n* \"t2_proxy\" network is now \"t3_proxy\" to represent Traefik v3. Subnet 192.168.90.0/24 remains the same.\n* Continuing to maintain both Traefik v2 and Traefik v3 appdata folders (at least for a few more months).\n* Removed compress middleware - was causing unnessary log warnings about mime type. I could not find a solution.\n* Removed Docker Compose version tags. \n* Added Authelia, Scrutiny, Kasm (WIP), and Firefly + Importer.\n* Bash Aliases updates.\n* Nginx verion update to 1.24 in web server (ws).\n* docker-compose-dns.yml is work-in-progress. "
  },
  {
    "path": "commits/2024/2024_05_30.txt",
    "content": "* Several updates 2024_05_30. See full commit log.\n* Added MakeMKV, MKVToolNix, to homeserver\n* Authelia upgraded to 4.38.8 and example configuration.yml and users.yml updated.\n* Jellyfin does not work on WebOS via Traefik Proxy. Created new security headers (without SAMEORIGIN) to allow Jellyfin to work\n* Removed obsolete shell scripts. Will reupload them as I update them.\n* Updated start-media-after-boot.sh.example to start media containers after Rclone mounts load.\n* Updated bash_aliases"
  },
  {
    "path": "commits/2025_10_15.txt",
    "content": "* Several updates 2025_10_15. See full commit log.\n* Big update after several months. I was focussed on updating the UDMS guides and developing Deployrr.  \n* Rebuilt Home Server (hs) and Web Server (ws-arm) from scratch using Deployrr and UDMS Series 2025. Synology will be updated at somepoint.\n* Traefik udpated to v3. \n* Updated .env.example to match Deployrr/UDMS standards.\n* Updated README.md with current information and links to latest UDMS guides and videos.\n* Manually switched Google OAuth (Traefik Forward Auth) from thomseddon/traefik-forward-auth:latest to italypaleale/traefik-forward-auth:4 (maintained regularly at this time + more features). Deployrr will be updated at some point. "
  },
  {
    "path": "compose/archives/adguardhome-sync.yml",
    "content": "  # AdGuard Home Sync - Sync Settings between AdGuard Homes\n  adguardhome-sync:\n    <<: *common-keys-core # See EXTENSION FIELDS at the top\n    image: lscr.io/linuxserver/adguardhome-sync:latest\n    container_name: adguardhome-sync\n    environment:\n      <<: *default-tz-puid-pgid\n      CONFIGFILE: /config/adguardhome-sync.yaml #optional\n    volumes:\n      - $DOCKERDIR/appdata/adguard-home/config:/config\n    "
  },
  {
    "path": "compose/archives/ampache.yml",
    "content": "  # Ampache - Music Server\n  ampache:\n    container_name: ampache\n    image: ampache/ampache:nosql\n    restart: \"no\"\n    # profiles:\n    # - media\n    networks:\n      - t2_proxy\n      - default\n    security_opt:\n      - no-new-privileges:true\n    # ports:\n    #   - \"$AMPACHE_PORT:80\"\n    volumes:\n      - $DOCKERDIR/appdata/ampache/config:/var/www/config\n      - $DOCKERDIR/appdata/ampache/log:/var/log/ampache\n      - $DATADIR/media/music:/media\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.ampache-rtr.entrypoints=https\"\n      - \"traefik.http.routers.ampache-rtr.rule=Host(`amp.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.ampache-rtr.middlewares=chain-no-auth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.ampache-rtr.service=ampache-svc\"\n      - \"traefik.http.services.ampache-svc.loadbalancer.server.port=80\""
  },
  {
    "path": "compose/archives/apcupsd.yml",
    "content": "  # APCUPSD - APC UPS Management\n  # create the apcupsd.conf file\n  apcupsd:\n    image: gersilex/apcupsd:latest\n    container_name: apcupsd\n    restart: unless-stopped\n    networks:\n      - t2_proxy\n    security_opt:\n      - no-new-privileges:true\n    ports:\n      - \"$APCUPSD_PORT:3551\"\n    privileged: true\n    tty: true\n    volumes:\n      - /tmp/apcupsd-docker:/tmp/apcupsd-docker\n      - $DOCKERDIR/apcupsd/apcupsd.conf:/etc/apcupsd/apcupsd.conf\n      - $DOCKERDIR/apcupsd/doshutdown:/etc/apcupsd/doshutdown\n      - $DOCKERDIR/apcupsd/apcupsd.events:/var/log/apcupsd.events"
  },
  {
    "path": "compose/archives/autoindex.yml",
    "content": "services:\n  # Autoindex - Simple Directory Index\n  autoindex:\n    container_name: autoindex\n    image: dceoy/nginx-autoindex:latest\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - t2_proxy\n    # ports:\n    #   - \"$AUTOINDEX_PORT:80\"\n    volumes:\n      - $USERDIR:/var/lib/nginx/html:ro # Location you want to index\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.autoindex-rtr.entrypoints=websecure\"\n      - \"traefik.http.routers.autoindex-rtr.rule=Host(`index.$DOMAINNAME_WS`)\"\n      # Middlewares\n      - \"traefik.http.routers.autoindex-rtr.middlewares=chain-oauth@file\"\n      # HTTP Services\n      - \"traefik.http.routers.autoindex-rtr.service=autoindex-svc\"\n      - \"traefik.http.services.autoindex-svc.loadbalancer.server.port=80\""
  },
  {
    "path": "compose/archives/autoscan.yml",
    "content": "  # Plex AutoScan - On demand/specific folder scanning for Plex\n  autoscan:\n    image: hotio/autoscan\n    container_name: autoscan\n    restart: \"no\"\n    # profiles:\n    # - media\n    # - testing\n    networks:\n      - t2_proxy\n    security_opt:\n      - no-new-privileges:true\n    #ports:\n    #  - \"3030:3030\"\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n      UMASK: 002\n      #PLEX_LOGIN: \"\"\n      #PLEX_PASSWORD: \"\"\n    volumes:\n      - $DOCKERDIR/appdata/autoscan:/config"
  },
  {
    "path": "compose/archives/cadvisor.yml",
    "content": "  # cAdvisor - Container Advisor\n  cadvisor:\n    <<: *common-keys-monitoring # See EXTENSION FIELDS at the top\n    container_name: cadvisor\n    image: gcr.io/cadvisor/cadvisor:latest\n    ports:\n      - \"$CADVISOR_PORT:8080\"\n    #privileged: true # Only needed for CentOS, Fedora, Red Hat, etc.\n    #devices:\n    #  - /dev/kmsg\n    volumes:\n      - /:/rootfs:ro\n      - /var/run:/var/run:rw\n      - /sys:/sys:ro\n      - /var/lib/docker/:/var/lib/docker:ro\n      - /dev/disk/:/dev/disk:ro\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.cadvisor-rtr.entrypoints=https\"\n      - \"traefik.http.routers.cadvisor-rtr.rule=HostHeader(`cad.$DOMAINNAME1`)\"\n      ## Middlewares\n      - \"traefik.http.routers.cadvisor-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.cadvisor-rtr.service=cadvisor-svc\"\n      - \"traefik.http.services.cadvisor-svc.loadbalancer.server.port=8080\"\n"
  },
  {
    "path": "compose/archives/certdumper.yml",
    "content": "services:\n  # Traefik Certs Dumper - Extract LetsEncrypt Certificates - Traefik2 Compatible\n  certdumper:\n    container_name: traefik_certdumper\n    image: humenius/traefik-certs-dumper:latest\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    network_mode: none\n    # command: --restart-containers container1,container2,container3\n    volumes:\n      - $DOCKERDIR/appdata/traefik2/acme:/traefik:ro\n      - $DOCKERDIR/shared/certs/$DOMAINNAME_WS:/output:rw\n      # - /var/run/docker.sock:/var/run/docker.sock:ro # Only needed if restarting containers (use Docker Socket Proxy instead)\n    environment:\n      DOMAIN: $DOMAINNAME_WS"
  },
  {
    "path": "compose/archives/cf-companion.yml",
    "content": "  # Cloudflare-Companion - Automatic CNAME DNS Creation\n  cf-companion:\n    <<: *common-keys-core # See EXTENSION FIELDS at the top\n    container_name: cf-companion\n    image: tiredofit/traefik-cloudflare-companion:latest\n    networks:\n      - socket_proxy\n    environment:\n      - TIMEZONE=$TZ\n      - TRAEFIK_VERSION=2\n      - CF_TOKEN__FILE=/run/secrets/cf_token\n      - TARGET_DOMAIN=cdoc.$DOMAINNAME_CLOUD_SERVER # Edit this. Either a subdomain or just $DOMAINNAME_CLOUD_SERVER pointing to the IP will work. See: https://github.com/htpcBeginner/docker-traefik/issues/244.\n      - DOMAIN1=$DOMAINNAME_CLOUD_SERVER\n      - DOMAIN1_ZONE_ID=$CLOUDFLARE_ZONEID # Copy from Cloudflare Overview page\n      - DOMAIN1_PROXIED=TRUE\n      - DOCKER_HOST=tcp://socket-proxy:2375\n    secrets: \n      - cf_token\n    labels:\n      # Add hosts specified in rules here to force cf-companion to create the CNAMEs\n      # Since cf-companion creates CNAMEs based on host rules, this a workaround for non-docker/external apps\n      - \"traefik.http.routers.cf-companion-rtr.rule=Host(Host(`webmin.$DOMAINNAME_CLOUD_SERVER`) || Host(`shell.$DOMAINNAME_CLOUD_SERVER`) || Host(`stcdoc.$DOMAINNAME_CLOUD_SERVER`) || Host(`ag.$DOMAINNAME_CLOUD_SERVER`)\"\n"
  },
  {
    "path": "compose/archives/cloud-commander.yml",
    "content": "  # Cloud Commander - web file manager\n  cloudcmd:\n    image: coderaiser/cloudcmd\n    container_name: cloudcmd\n    restart: unless-stopped\n    networks:\n      - t2_proxy\n    security_opt:\n      - no-new-privileges:true\n    volumes:\n      - $USERDIR/docker/cloudcmd:/root\n      - $USERDIR:/mnt/fs\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.cloudcmd-rtr.entrypoints=https\"\n      - \"traefik.http.routers.cloudcmd-rtr.rule=Host(`cloudcmd.$DOMAINNAME`)\"\n      - \"traefik.http.routers.cloudcmd-rtr.tls=true\"\n      ## Middlewares\n      - \"traefik.http.routers.cloudcmd-rtr.middlewares=chain-authelia@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.cloudcmd-rtr.service=cloudcmd-svc\"\n      - \"traefik.http.services.cloudcmd-svc.loadbalancer.server.port=8000\""
  },
  {
    "path": "compose/archives/cloud9.yml",
    "content": "  # Cloud IDE - Editing\n  cloud9:\n    image: linuxserver/cloud9\n    container_name: cloud9\n    restart: unless-stopped\n    networks:\n      - t2_proxy\n    security_opt:\n      - no-new-privileges:true\n    ports:\n      - \"$CLOUD9_PORT:8000\"\n    volumes:\n      - $USERDIR/server/scripts:/code\n      - /var/run/docker.sock:/var/run/docker.sock\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n      # PASSWORD: $CLOUD9_PASSWORD\n      # USERNAME: $CLOUD9_USERNAME\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.cloud9-rtr.entrypoints=https\"\n      - \"traefik.http.routers.cloud9-rtr.rule=Host(`cloud9.$DOMAINNAME`)\"\n      - \"traefik.http.routers.cloud9-rtr.tls=true\"\n      ## Middlewares\n      - \"traefik.http.routers.cloud9-rtr.middlewares=chain-authelia@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.cloud9-rtr.service=cloud9-svc\"\n      - \"traefik.http.services.cloud9-svc.loadbalancer.server.port=8000\""
  },
  {
    "path": "compose/archives/cloudflare-ddns.yml",
    "content": "  # Cloudflare DDNS - Dynamic DNS Updater\n  cloudddns:\n    container_name: cloudddns\n    restart: always\n    image: joshava/cloudflare-ddns\n    volumes:\n      - $USERDIR/docker/cloudflare-ddns/config.yaml:/app/config.yaml\n    environment:\n      - PUID=$PUID\n      - PGID=$PGID\n      - TZ=$TZ"
  },
  {
    "path": "compose/archives/cloudplow.yml",
    "content": "  # CloudPlow - Rclone remote uploader/syncer\n  cloudplow:\n    image: sabrsorensen/alpine-cloudplow\n    container_name: cloudplow\n    restart: \"no\"\n    security_opt:\n      - no-new-privileges:true\n    volumes:\n      - $DOCKERDIR/appdata/cloudplow:/config/:rw\n      - $DOCKERDIR/appdata/rclone:/rclone_config/:rw\n      #- /home/<user>/google_drive_service_accounts:/service_accounts/:rw\n      - $DATADIR/media:/data/media:rw\n      - /etc/localtime:/etc/localtime:ro\n    environment:\n      - PUID=$PUID\n      - PGID=$PGID\n      - CLOUDPLOW_CONFIG=/config/config.json\n      - CLOUDPLOW_LOGFILE=/config/cloudplow.log\n      - CLOUDPLOW_LOGLEVEL=DEBUG\n      - CLOUDPLOW_CACHEFILE=/config/cache.db"
  },
  {
    "path": "compose/archives/crowdsec-blocklist.yml",
    "content": "  # CrowdSec Blocklist Mirror - For PiHole/AdGuard Use\n  # sudo docker exec crowdsec cscli bouncer add cloudflare-bouncer\n  crowdsec-blocklist:\n    image: crowdsecurity/blocklist-mirror\n    container_name: crowdsec-blocklist\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - t2_proxy\n    volumes:\n      - $DOCKERDIR/appdata/crowdsec-blocklist/cfg.yaml:/etc/crowdsec/bouncers/crowdsec-blocklist-mirror.yaml\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.crowdsec-blocklist-rtr.entrypoints=https\"\n      - \"traefik.http.routers.crowdsec-blocklist-rtr.rule=Host(`blocklist.$DOMAINNAME_SHB`)\" # https://domain.com/security/blocklist\n      ## Middlewares\n      - \"traefik.http.routers.crowdsec-blocklist-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.crowdsec-blocklist-rtr.service=crowdsec-blocklist-svc\"\n      - \"traefik.http.services.crowdsec-blocklist-svc.loadbalancer.server.port=41412\""
  },
  {
    "path": "compose/archives/crowdsec-metabase.yml",
    "content": "  # CrowdSec Dashboard\n  # Uses a lot of resources. May be crowdsec's cloud dashboard or Prometheus Grafana may be a better option.\n  csdash:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    container_name: crowdsec-dashboard\n    build:\n      context: $DOCKERDIR/custom/\n      dockerfile: Dockerfile-csdash\n    depends_on:\n      - crowdsec\n    environment:\n      - MB_DB_FILE=/data/metabase.db\n      - MGID=1000\n    volumes:\n      - $DOCKERDIR/appdata/crowdsec/data:/metabase-data/\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.csdash-rtr.entrypoints=https\"\n      - \"traefik.http.routers.csdash-rtr.rule=Host(`csdash.$DOMAINNAME_CLOUD_SERVER`)\"\n      ## Middlewares\n      - \"traefik.http.routers.csdash-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.csdash-rtr.service=csdash-svc\"\n      - \"traefik.http.services.csdash-svc.loadbalancer.server.port=3000\""
  },
  {
    "path": "compose/archives/dashy.yml",
    "content": "  # Dashy - Application Dashboard\n  dashy:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    container_name: dashy\n    image: lissy93/dashy\n    healthcheck:\n      test: ['CMD', 'node', '/app/services/healthcheck']\n      interval: 1m30s\n      timeout: 10s\n      retries: 3\n      start_period: 40s\n    ports:\n      - 4000:80\n    volumes:\n      - $DOCKERDIR/appdata/dashy/conf.yml:/app/public/conf.yml\n      - $DOCKERDIR/appdata/dashy:/app/public/item-icons\n    environment:\n      - NODE_ENV=production\n      - UID=$PUID\n      - GID=$PGID\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.dashy-rtr.entrypoints=https\"\n      - \"traefik.http.routers.dashy-rtr.rule=Host(`$DOMAINNAME_HOME_SYNOLOGY`,`www.$DOMAINNAME_HOME_SYNOLOGY`)\"\n      ## Middlewares\n      - \"traefik.http.routers.dashy-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.dashy-rtr.service=dashy-svc\"\n      - \"traefik.http.services.dashy-svc.loadbalancer.server.port=80\"\n"
  },
  {
    "path": "compose/archives/digikam.yml",
    "content": "  # digikam - Photo Management\n  digikam:\n    image: ghcr.io/linuxserver/digikam\n    container_name: digikam\n    restart: unless-stopped\n    networks:\n      - t2_proxy\n    volumes:\n      - $DOCKERDIR/appdata/digikam:/config\n      - $DATADIR/photos:/data/photos\n    #ports:\n    #  - 3000:3000\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.digikam-rtr.entrypoints=https\"\n      - \"traefik.http.routers.digikam-rtr.rule=Host(`digikam.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.digikam-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.digikam-rtr.service=digikam-svc\"\n      - \"traefik.http.services.digikam-svc.loadbalancer.server.port=3000\""
  },
  {
    "path": "compose/archives/dns/adguardhome-sync.yml",
    "content": "services:\n  # AdGuard Home Sync - Sync Settings between AdGuard Homes\n  adguardhome-sync:\n    image: lscr.io/linuxserver/adguardhome-sync:latest\n    container_name: adguardhome-sync\n    restart: unless-stopped\n    profiles: [\"core\", \"all\", \"dns\"]\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n      CONFIGFILE: /config/adguardhome-sync.yaml #optional\n    volumes:\n      - $DOCKERDIR/appdata/adguardhome-sync:/config"
  },
  {
    "path": "compose/archives/dns/adguardhome.yml",
    "content": "services:\n  # AdGuard Home - DNS AdBlocking\n  adguardhome:\n    container_name: adguardhome\n    image: adguard/adguardhome\n    restart: unless-stopped\n    profiles: [\"core\", \"all\", \"dns\"]\n    network_mode: host\n    # networks:\n    #   - default\n    # ports:\n    #   - 53:53/udp\n    #   - 67:67/udp \n    #   - 68:68/tcp \n    #   - 1068:68/udp # port conflict with Raspbery PI OS DHCPD https://github.com/AdguardTeam/AdGuardHome/issues/1049\n    #   - 81:80/tcp \n    #   - 444:443/tcp \n    #   - 853:853/tcp \n    # #   - 3000:3000/tcp \n    volumes:\n      - $DOCKERDIR/appdata/adguardhome/conf:/opt/adguardhome/conf\n      - $DOCKERDIR/appdata/adguardhome/work:/opt/adguardhome/work\n      # - $DOCKERDIR/shared/certs/$DOMAINNAME_SHB:/certs # optional: if you have your own SSL certs"
  },
  {
    "path": "compose/archives/dns/ddns-updater.yml",
    "content": "services:\n  # Cloudflare DDNS - Dynamic DNS Updater\n  ddns-updater:\n    image: qmcgaw/ddns-updater\n    container_name: ddns-updater\n    restart: unless-stopped\n    profiles: [\"core\", \"all\", \"dns\"]\n    networks:\n      - t2_proxy\n    ports:\n      - 8000:8000/tcp\n    volumes:\n      - $DOCKERDIR/appdata/ddns-updater:/updater/data # Owned by UID 1000\n    environment:\n      TZ: $TZ\n      PERIOD: 4h\n      UPDATE_COOLDOWN_PERIOD: 5m\n      PUBLICIP_DNS_TIMEOUT: 3s\n      HTTP_TIMEOUT: 10s\n      DATADIR: /updater/data\n      # Web UI\n      LISTENING_PORT: 8000\n      # Backup\n      BACKUP_PERIOD: 96h # 0 to disable\n      BACKUP_DIRECTORY: /updater/data/backups\n      # Other\n      LOG_LEVEL: warning\n      SHOUTRRR_ADDRESSES: $DISCORD_SHOUTRRR_ADDRESS"
  },
  {
    "path": "compose/archives/dns/socket-proxy.yml",
    "content": "services:\n  # Docker Socket Proxy - Security Enchanced Proxy for Docker Socket\n  socket-proxy:\n    container_name: socket-proxy\n    image: tecnativa/docker-socket-proxy\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      socket_proxy:\n        ipv4_address: 192.168.91.254 # You can specify a static IP    # privileged: true # true for VM. False for unprivileged LXC container.\n    ports:\n    # - \"$ZEROTIER_IP_SYNOLOGY:2375:2375\" # Port 2375 should only ever get exposed to the internal network. When possible use this line.\n    # I use the next line instead, as I want portainer to manage multiple docker endpoints within my home network.\n      - \"2375:2375\"\n    volumes:\n      - \"/var/run/docker.sock:/var/run/docker.sock\"\n    environment:\n      - LOG_LEVEL=info # debug,info,notice,warning,err,crit,alert,emerg\n      ## Variables match the URL prefix (i.e. AUTH blocks access to /auth/* parts of the API, etc.).\n      # 0 to revoke access.\n      # 1 to grant access.\n      ## Granted by Default\n      - EVENTS=1\n      - PING=1\n      - VERSION=1\n      ## Revoked by Default\n      # Security critical\n      - AUTH=0\n      - SECRETS=0\n      - POST=1 # Watchtower\n      # Not always needed\n      - BUILD=0\n      - COMMIT=0\n      - CONFIGS=0\n      - CONTAINERS=1 # Traefik, portainer, etc.\n      - DISTRIBUTION=0\n      - EXEC=0\n      - IMAGES=1 # Portainer\n      - INFO=1 # Portainer\n      - NETWORKS=1 # Portainer\n      - NODES=0\n      - PLUGINS=0\n      - SERVICES=1 # Portainer\n      - SESSION=0\n      - SWARM=0\n      - SYSTEM=0\n      - TASKS=1 # Portainer\n      - VOLUMES=1 # Portainer"
  },
  {
    "path": "compose/archives/dns/traefik.yml",
    "content": "services:\n  # Traefik 2 - Reverse Proxy\n  traefik:\n    container_name: traefik\n    image: traefik:2.10\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    #profiles: [\"core\", \"all\"]\n    networks:\n      t2_proxy:\n        ipv4_address: 192.168.90.254 # You can specify a static IP\n      socket_proxy:\n    command: # CLI arguments\n      - --global.checkNewVersion=true\n      - --global.sendAnonymousUsage=true\n      - --entrypoints.http.address=:80\n      - --entrypoints.https.address=:443\n      - --entrypoints.traefik.address=:8080\n      # - --entrypoints.ping.address=:8081\n      - --entrypoints.http.http.redirections.entrypoint.to=https\n      - --entrypoints.http.http.redirections.entrypoint.scheme=https\n      - --entrypoints.http.http.redirections.entrypoint.permanent=true\n      - --api=true\n      - --api.dashboard=true\n      - --api.insecure=true\n      #- --ping=true\n      # - --serversTransport.insecureSkipVerify=true\n      # Allow these IPs to set the X-Forwarded-* headers - Cloudflare IPs: https://www.cloudflare.com/ips/\n      - --entrypoints.https.forwardedHeaders.trustedIPs=$CLOUDFLARE_IPS,$LOCAL_IPS\n      - --log=true\n      - --log.filePath=/logs/traefik.log\n      - --log.level=INFO # (Default: error) DEBUG, INFO, WARN, ERROR, FATAL, PANIC\n      - --accessLog=true\n      - --accessLog.filePath=/logs/access.log\n      - --accessLog.bufferingSize=100 # Configuring a buffer of 100 lines\n      - --accessLog.filters.statusCodes=204-299,400-499,500-599\n      - --providers.docker=true\n      # - --providers.docker.endpoint=unix:///var/run/docker.sock # Disable for Socket Proxy. Enable otherwise.\n      - --providers.docker.endpoint=tcp://socket-proxy:2375 # Enable for Socket Proxy. Disable otherwise.\n      - --providers.docker.exposedByDefault=false\n      - --providers.docker.network=t2_proxy # Previously t2_proxy\n      - --providers.docker.swarmMode=false\n      - --entrypoints.https.http.tls=true\n      - --entrypoints.https.http.tls.options=tls-opts@file\n      # Add dns-cloudflare as default certresolver for all services. Also enables TLS and no need to specify on individual services\n      - --entrypoints.https.http.tls.certresolver=dns-cloudflare\n      - --entrypoints.https.http.tls.domains[0].main=$DOMAINNAME_DNS\n      - --entrypoints.https.http.tls.domains[0].sans=*.$DOMAINNAME_DNS\n      - --providers.file.directory=/rules # Load dynamic configuration from one or more .toml or .yml files in a directory\n      - --providers.file.watch=true # Only works on top level files in the rules folder\n      - --certificatesResolvers.dns-cloudflare.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory # LetsEncrypt Staging Server - uncomment when testing\n      - --certificatesResolvers.dns-cloudflare.acme.storage=/acme.json\n      - --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.provider=cloudflare\n      - --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.resolvers=1.1.1.1:53,1.0.0.1:53\n      - --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.delayBeforeCheck=90 # To delay DNS check and reduce LE hitrate\n      # - --metrics.prometheus=true\n      # - --metrics.prometheus.buckets=0.1,0.3,1.2,5.0\n    #healthcheck:\n    #  test: [\"CMD\", \"traefik\", \"healthcheck\", \"--ping\"]\n    #  interval: 5s\n    #  retries: 3\n    ports:\n      - target: 80\n        published: 80\n        protocol: tcp\n        mode: host\n      - target: 443\n        published: 443\n        protocol: tcp\n        mode: host\n      # - target: 8080 # need to enable --api.insecure=true\n      #   published: 8080\n      #   protocol: tcp\n      #   mode: host\n    volumes:\n      - $DOCKERDIR/appdata/traefik2/rules/$HOSTNAME:/rules # Dynamic File Provider directory\n      # - /var/run/docker.sock:/var/run/docker.sock:ro # Enable if not using Socket Proxy\n      - $DOCKERDIR/appdata/traefik2/acme/acme.json:/acme.json # Certs File \n      - $DOCKERDIR/logs/$HOSTNAME/traefik:/logs # Traefik logs\n    environment:\n      - TZ=$TZ\n      - CF_DNS_API_TOKEN_FILE=/run/secrets/cf_dns_api_token   \n      - HTPASSWD_FILE=/run/secrets/basic_auth_credentials # HTTP Basic Auth Credentials\n      - DOMAINNAME_DNS\n      - DOMAINNAME_HS\n    secrets:\n      - cf_dns_api_token\n      - basic_auth_credentials\n    labels:\n      #- \"autoheal=true\"\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.traefik-rtr.entrypoints=https\"\n      - \"traefik.http.routers.traefik-rtr.rule=Host(`traefik.$DOMAINNAME_DNS` )\"\n      # Services - API\n      - \"traefik.http.routers.traefik-rtr.service=api@internal\"\n      # Healthcheck/ping\n      #- \"traefik.http.routers.ping.rule=Host(`traefik.$DOMAINNAME_DNS`) && Path(`/ping`)\"\n      #- \"traefik.http.routers.ping.tls=true\"\n      #- \"traefik.http.routers.ping.service=ping@internal\"\n      # Middlewares\n      - \"traefik.http.routers.traefik-rtr.middlewares=chain-basic-auth@file\"\n      #- \"traefik.http.routers.traefik-rtr.middlewares=chain-oauth@file\""
  },
  {
    "path": "compose/archives/dns/unbound.yml",
    "content": "services:\n  unbound:\n    container_name: unbound\n    image: mvance/unbound-rpi:latest\n    network_mode: host\n    volumes:\n    - $DOCKERDIR/appdata/unbound:/opt/unbound/etc/unbound\n    healthcheck:\n      disable: true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\", \"dns\"]"
  },
  {
    "path": "compose/archives/dns/wg-easy.yml",
    "content": "# services:\n  # # WG-EASY - WireGuard Easy\n  # wg-easy:\n  #   image: weejewel/wg-easy\n  #   container_name: wg-easy\n  #   restart: unless-stopped\n      # profiles: [\"core\", \"all\"]\n  #   network_mode: host\n  #   # networks:\n  #   #   - rpi4b\n  #   cap_add:\n  #     - NET_ADMIN\n  #     - SYS_MODULE\n  #   # sysctls:\n  #   #   - net.ipv4.ip_forward=1\n  #   #   - net.ipv4.conf.all.src_valid_mark=1\n  #   # ports:\n  #   #   - \"51822:51822/udp\"\n  #   #   - \"51821:51821/tcp\" # WebUI\n  #   volumes:\n  #     - $DOCKERDIR/appdata/wireguard:/etc/wireguard\n  #   environment:\n  #     - WG_HOST=$DOMAINNAME_CLOUD_SERVER\n  #     - PASSWORD=$WGEASY_PASSWORD\n  #     # Optional:\n  #     # - WG_PORT=18205 # does not work in host mode\n  #     - WG_DEFAULT_ADDRESS=192.168.20.x\n  #     - WG_DEFAULT_DNS=192.168.1.101,192.168.1.102\n  #     # - WG_MTU=1420\n  #     - WG_ALLOWED_IPS=0.0.0.0/0, ::/0\n  #     # - WG_PRE_UP=echo \"Pre Up\" > /etc/wireguard/pre-up.txt\n  #     # - WG_POST_UP=echo \"Post Up\" > /etc/wireguard/post-up.txt\n  #     # - WG_PRE_DOWN=echo \"Pre Down\" > /etc/wireguard/pre-down.txt\n  #     # - WG_POST_DOWN=echo \"Post Down\" > /etc/wireguard/post-down.txt"
  },
  {
    "path": "compose/archives/dupeguru.yml",
    "content": "  # DupeGuru - Duplicate File/Folder Remover\n  dupeguru:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: jlesage/dupeguru:latest\n    container_name: dupeguru\n    # ports:\n    #   - \"$dupeguru_PORT:5800\"\n    volumes:\n      - $USERDIR:/data/home:ro\n      - $DOCKERDIR/appdata/dupeguru/config:/config:rw\n      - /media/data:/data/data:rw\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      UMASK: 002\n      TZ: $TZ\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      VNC_PASSWORD: $DUPEGURU_VNC_PASSWD\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.dupeguru-rtr.entrypoints=https\"\n      - \"traefik.http.routers.dupeguru-rtr.rule=Host(`dupe.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.dupeguru-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.dupeguru-rtr.service=dupeguru-svc\"\n      - \"traefik.http.services.dupeguru-svc.loadbalancer.server.port=5800\"\n"
  },
  {
    "path": "compose/archives/emby.yml",
    "content": "  # Emby - Media Server\n  embyms:\n    image: emby/embyserver:latest\n    container_name: embyms\n    restart: unless-stopped\n    networks:\n      - t2_proxy\n    devices:\n      - /dev/dri:/dev/dri # for harware transcoding\n    security_opt:\n      - no-new-privileges:true\n    ports:\n      - \"$EMBY_PORT:8096/tcp\"\n      - \"8920:8920/tcp\"\n    volumes:\n      - /etc/localtime:/etc/localtime:ro\n      - $DOCKERDIR/appdata/embyms:/config\n      - /dev/shm:/data/transcode\n      - $DATADIR/media:/data/media\n      - $DATADIR/Downloads:/data/downloads\n    environment:\n      TZ: $TZ\n      HOSTNAME: \"nucEmby\"\n      UID: $PUID\n      GID: $PGID\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.embyms-rtr.entrypoints=https\"\n      - \"traefik.http.routers.embyms-rtr.rule=Host(`nucemby.$DOMAINNAME`)\"\n      ## Middlewares\n      - \"traefik.http.routers.embyms-rtr.middlewares=chain-no-auth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.embyms-rtr.service=embyms-svc\"\n      - \"traefik.http.services.embyms-svc.loadbalancer.server.port=8096\""
  },
  {
    "path": "compose/archives/filebrowser.yml",
    "content": "  # File Browser - Explorer\n  filebrowser:\n    image: filebrowser/filebrowser:s6\n    container_name: filebrowser\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - t2_proxy\n    ports:\n      - \"81:80\"\n    volumes:\n      - $DOCKERDIR/appdata/filebrowser:/config\n      - $EXTDRIVE:/data/media\n      - $USERDIR:/data/home\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.filebrowser-rtr.entrypoints=https\"\n      - \"traefik.http.routers.filebrowser-rtr.rule=Host(`fb.$DOMAINNAME_CLOUD_SERVER`)\"\n      ## Middlewares\n      - \"traefik.http.routers.filebrowser-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.filebrowser-rtr.service=filebrowser-svc\"\n      - \"traefik.http.services.filebrowser-svc.loadbalancer.server.port=80\""
  },
  {
    "path": "compose/archives/firefox.yml",
    "content": "  # Firefox - Web Broswer\n  # VNC password not working - check\n  firefox:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: jlesage/firefox:latest\n    container_name: firefox\n    security_opt:\n      - no-new-privileges:true\n      - seccomp:unconfined # October 15, 2020 https://github.com/jlesage/docker-firefox/blob/master/README.md#allowing-the-membarrier-system-call\n    # ports:\n    #   - \"$FIREFOX_PORT:5800\"\n    volumes:\n      - $DOCKERDIR/appdata/firefox:/config\n      - $DOWNLOADSDIR:/config/Downloads\n      - /dev/shm:/dev/shm\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      TZ: $TZ\n      UMASK: 002\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      # VNC_PASSWD: $FIREFOX_VNC_PASSWD # Since OAuth is enabled\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.firefox-rtr.entrypoints=https\"\n      - \"traefik.http.routers.firefox-rtr.rule=Host(`firefoxh.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.firefox-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.firefox-rtr.service=firefox-svc\"\n      - \"traefik.http.services.firefox-svc.loadbalancer.server.port=5800\""
  },
  {
    "path": "compose/archives/flaresolverr.yml",
    "content": "  # FlareSolverr - Proxy server to bypass Cloudflare protection\n  # Not sure if I need this or not. Just testing.\n  flaresolverr:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: ghcr.io/flaresolverr/flaresolverr:latest\n    container_name: flaresolverr\n    networks:\n      t2_proxy:\n        ipv4_address: 192.168.90.160\n    environment:\n      LOG_LEVEL: info\n      LOG_HTML: false\n      CAPTCHA_SOLVER: none\n      TZ: $TZ\n    #ports:\n    #  - \"8191:8191\"\n    restart: unless-stopped"
  },
  {
    "path": "compose/archives/funkwhale.yml",
    "content": "  # FunkWhale - Music Server\n  funkwhale:\n    <<: *common-keys-media # See EXTENSION FIELDS at the top\n    container_name: funkwhale\n    image: thetarkus/funkwhale\n    # ports:\n    #   - \"$FUNKWHALE_PORT:80\"\n    volumes:\n      - $DOCKERDIR/appdata/funkwhale:/data\n      - $DATADIR/media/music:/music:ro\n    environment:\n      - PUID=$PUID\n      - PGID=$PGID\n      - FUNKWHALE_HOSTNAME=proxfw.$DOMAINNAME0\n      - NESTED_PROXY=1\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.funkwhale-rtr.entrypoints=https\"\n      - \"traefik.http.routers.funkwhale-rtr.rule=Host(`proxfw.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.funkwhale-rtr.middlewares=chain-no-auth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.funkwhale-rtr.service=funkwhale-svc\"\n      - \"traefik.http.services.funkwhale-svc.loadbalancer.server.port=80\"\n\n"
  },
  {
    "path": "compose/archives/glances.yml",
    "content": "  # Glances - System Information\n  glances:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: nicolargo/glances:latest\n    container_name: glances\n    # privileged: true # Only for VM\n    # network_mode: host\n    networks:\n      - t2_proxy\n      - socket_proxy\n      - default\n    # ports:\n    #   - \"$GLANCES_PORT:61208\"\n    pid: host\n    volumes:\n      - $DOCKERDIR/appdata/glances/glances.conf:/glances/conf/glances.conf # Use this if you want to add a glances.conf file\n      - $USERDIR:/data/home:ro\n      - /media/data:/data/data:ro\n      # - /var/run/docker.sock:/var/run/docker.sock:ro # Use Docker Socket Proxy instead for improved security\n    environment:\n      # GLANCES_OPT: \"-C /glances/conf/glances.conf --quiet --export influxdb\"\n      # GLANCES_OPT: \"--export influxdb\"\n      GLANCES_OPT: \"-w\"\n      DOCKER_HOST: tcp://socket-proxy:2375\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.glances-rtr.entrypoints=https\"\n      - \"traefik.http.routers.glances-rtr.rule=Host(`glances.$DOMAINNAME_CLOUD_SERVER`)\"\n      ## Middlewares\n      - \"traefik.http.routers.glances-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.glances-rtr.service=glances-svc\"\n      - \"traefik.http.services.glances-svc.loadbalancer.server.port=61208\"\n"
  },
  {
    "path": "compose/archives/gonic.yml",
    "content": "  # Gonic - Music Server\n  gonic:\n    container_name: gonic\n    image: sentriz/gonic:latest\n    restart: \"no\"\n    # profiles:\n    # - media\n    networks:\n      - t2_proxy\n    security_opt:\n      - no-new-privileges:true\n    # ports:\n    #   - \"$GONIC_PORT:80\"\n    volumes:\n      - $DOCKERDIR/appdata/gonic/data:/data\n      - $DOCKERDIR/appdata/gonic/podcasts:/podcasts\n      - $DATADIR/transcode/gonic:/cache\n      - $DATADIR/media/music:/music:ro\n    environment:\n      - PUID=$PUID\n      - PGID=$PGID\n      - TZ=$TZ\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.gonic-rtr.entrypoints=https\"\n      - \"traefik.http.routers.gonic-rtr.rule=Host(`gonic.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.gonic-rtr.middlewares=chain-no-auth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.gonic-rtr.service=gonic-svc\"\n      - \"traefik.http.services.gonic-svc.loadbalancer.server.port=80\""
  },
  {
    "path": "compose/archives/ha-dockermon.yml",
    "content": "  # HA-Dockermon - Manage Docker containers in Home Assistant\n  ha-dockermon:\n    image: philhawthorne/ha-dockermon:latest\n    container_name: ha-dockermon\n    restart: unless-stopped\n    networks:\n      - socket_proxy\n    security_opt:\n      - no-new-privileges:true\n    ports:\n      - \"$HA_DOCKERMON_PORT:8126\"\n    volumes:\n      - $DOCKERDIR/ha-dockermon:/config\n      # - /var/run/docker.sock:/var/run/docker.sock\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n      DOCKER_HOST: tcp://socket-proxy:2375"
  },
  {
    "path": "compose/archives/handbrake.yml",
    "content": "  # Handbrake - Video Conversion (Transcoding and compression)\n  handbrake:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: jlesage/handbrake:latest\n    container_name: handbrake\n    # ports:\n    #   - \"$HANDBRAKE_PORT:5800\"\n    volumes:\n      - $DATADIR/downloads:/data/downloads\n      - $DOCKERDIR/appdata/handbrake/config:/config\n      - $DOCKERDIR/appdata/handbrake/watch:/watch\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      UMASK: 002\n      TZ: $TZ\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      AUTOMATED_CONVERSION_KEEP_SOURCE: 1\n      VNC_PASSWORD: $HANDBRAKE_VNC_PASSWD\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.handbrake-rtr.entrypoints=https\"\n      - \"traefik.http.routers.handbrake-rtr.rule=Host(`handbrake.$DOMAINNAME_CLOUD_SERVER`)\"\n      ## Middlewares\n      - \"traefik.http.routers.handbrake-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.handbrake-rtr.service=handbrake-svc\"\n      - \"traefik.http.services.handbrake-svc.loadbalancer.server.port=5800\""
  },
  {
    "path": "compose/archives/headscale.yml",
    "content": "  # HeadScale - SDN\n  headscale:\n    <<: *common-keys-core # See EXTENSION FIELDS at the top\n    image: headscale/headscale:latest\n    container_name: headscale\n    volumes:\n      - $DOCKERDIR/appdata/headscale/config:/etc/headscale\n      - $DOCKERDIR/appdata/headscale/data:/var/lib/headscale\n    #ports:\n    #  - 27896:8080\n    command: headscale serve\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.headscale-rtr.entrypoints=https\"\n      - \"traefik.http.routers.headscale-rtr.rule=Host(`headscale.$DOMAINNAME_SHB`)\"\n      ## Middlewares\n      #- \"traefik.http.routers.headscale-rtr.middlewares=chain-no-auth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.headscale-rtr.service=headscale-svc\"\n      - \"traefik.http.services.headscale-svc.loadbalancer.server.port=8080\"\n\n"
  },
  {
    "path": "compose/archives/heimdall.yml",
    "content": "  # Heimdall - Application Dashboard\n  heimdall:\n    <<: *common-keys-core # See EXTENSION FIELDS at the top\n    image: lscr.io/linuxserver/heimdall\n    container_name: heimdall\n    # ports:\n    #  - \"$HEIMDALL_PORT:80\" # 80 to 82 already taken by other services\n      # - \"444:443\" # 443 used by Traefik/Nginx Proxy Manager. Disabled because we will put Heimdall behind proxy.\n    volumes:\n      - $DOCKERDIR/appdata/heimdall:/config\n    environment:\n      <<: *default-tz-puid-pgid\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.heimdall-rtr.entrypoints=https\"\n      - \"traefik.http.routers.heimdall-rtr.rule=Host(`$DOMAINNAME_CLOUD_SERVER`,`www.$DOMAINNAME_CLOUD_SERVER`)\"\n      ## Middlewares\n      - \"traefik.http.routers.heimdall-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.heimdall-rtr.service=heimdall-svc\"\n      - \"traefik.http.services.heimdall-svc.loadbalancer.server.port=80\""
  },
  {
    "path": "compose/archives/homeassistant.yml",
    "content": "  # Home Assistant Core - Home Automation\n  # Added temporarily since HASS.io (Home Assistant Supervised) on Docker has been deprecated.\n  homeassistant:\n    container_name: hass-core\n    restart: unless-stopped\n    image: homeassistant/home-assistant:2021.1.5\n    network_mode: host\n    #    networks:\n    #      - t2_proxy\n    devices:\n      - /dev/ttyUSB0:/dev/ttyUSB0\n      - /dev/ttyUSB1:/dev/ttyUSB1\n      - /dev/ttyACM0:/dev/ttyACM0\n    privileged: true\n    volumes:\n      - $USERDIR/docker/homeassistant:/config\n      - /etc/localtime:/etc/localtime:ro\n      #- /media/ssd/motioneye:/media/motioneye\n    environment:\n      - PUID=$PUID\n      - PGID=$PGID\n      - TZ=$TZ\n    labels:\n      ## Exclude From Watchtower\n      - \"com.centurylinklabs.watchtower.enable=false\"\n\n  # Home Assistant Core - Home Automation\n  # If you want Home Assistant, use the one above. This is was old setup. I am still migrating things from this one to Home Assistant Core Above.\n  # Added temporarily since HASS.io (Home Assistant Supervised) on Docker has been deprecated.\n  hassio:\n    container_name: hassio\n    restart: unless-stopped\n    image: homeassistant/home-assistant:0.111.0\n    networks:\n      - t2_proxy\n    devices:\n      - /dev/ttyUSB0:/dev/ttyUSB0\n      - /dev/ttyUSB1:/dev/ttyUSB1\n      - /dev/ttyACM0:/dev/ttyACM0\n    ports:\n      - target: 8123\n        published: $HOMEASSISTANT_PORT\n        protocol: tcp\n        mode: host\n    privileged: true\n    volumes:\n      - $USERDIR/docker/hassio/homeassistant:/config\n      - /etc/localtime:/etc/localtime:ro\n      - $USERDIR/docker/shared:/shared\n      - $USERDIR/docker/open-zwave:/open-zwave\n    environment:\n      - PUID=$PUID\n      - PGID=$PGID\n      - TZ=$TZ\n    labels:\n      ## Exclude From Watchtower\n      - \"com.centurylinklabs.watchtower.enable=false\""
  },
  {
    "path": "compose/archives/homepage.yml",
    "content": "services:\n  # Homepage - Application Dashboard\n  homepage:\n    image: ghcr.io/gethomepage/homepage:latest\n    container_name: homepage\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - t2_proxy\n      - socket_proxy\n    # ports:\n    #  - \"3000:3000\" \n    volumes:\n      - $DOCKERDIR/appdata/homepage:/app/config\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.homepage-rtr.entrypoints=websecure\"\n      - \"traefik.http.routers.homepage-rtr.rule=Host(`$DOMAINNAME_1`,`www.$DOMAINNAME_1`)\" # Both domain.com and www.domain.com\n      ## Middlewares\n      - \"traefik.http.routers.homepage-rtr.middlewares=chain-no-auth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.homepage-rtr.service=homepage-svc\"\n      - \"traefik.http.services.homepage-svc.loadbalancer.server.port=3000\""
  },
  {
    "path": "compose/archives/jackett.yml",
    "content": "  # Jackett - Torrent proxy\n  # Set url_base in Jackett settings if using PathPrefix\n  jackett:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: lscr.io/linuxserver/jackett:latest\n    container_name: jackett\n    # network_mode: container:transmission-vpn\n    networks:\n      t2_proxy:\n        ipv4_address: 192.168.90.161\n    # ports:\n    #  - \"$JACKETT_PORT:9117\"\n    volumes:\n      - $DOCKERDIR/appdata/jackett:/config\n      - $DATADIR/downloads:/data/downloads\n      - \"/etc/localtime:/etc/localtime:ro\"\n    environment:\n      <<: *default-tz-puid-pgid\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.jackett-rtr.entrypoints=https\"\n      - \"traefik.http.routers.jackett-rtr.rule=Host(`jackett.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.jackett-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.jackett-rtr.service=jackett-svc\"\n      - \"traefik.http.services.jackett-svc.loadbalancer.server.port=9117\""
  },
  {
    "path": "compose/archives/loki.yml",
    "content": "  # Loki - Log Aggregation\n  loki:\n    <<: *common-keys-monitoring # See EXTENSION FIELDS at the top\n    container_name: loki\n    image: grafana/loki:latest\n    volumes:\n      - $DOCKERDIR/appdata/loki:/etc/loki\n    ports:\n      - \"$LOKI_PORT:3100\"\n    command: -config.file=/etc/loki/config.yml"
  },
  {
    "path": "compose/archives/makemkv.yml",
    "content": "  # MakeMKV - Video Editing (Ripping from Disks)\n  makemkv:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: jlesage/makemkv:latest\n    container_name: makemkv\n    # ports:\n    #   - \"$MAKEMKV_PORT:5800\"\n    volumes:\n      - $DATADIR/downloads:/data/downloads\n      - $DOCKERDIR/appdata/makemkv/config:/config\n      - /dev/shm:/dev/shm\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      UMASK: 002\n      TZ: $TZ\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      VNC_PASSWORD: $MAKEMKV_VNC_PASSWD\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.makemkv-rtr.entrypoints=https\"\n      - \"traefik.http.routers.makemkv-rtr.rule=Host(`makemkv.$DOMAINNAME_CLOUD_SERVER`)\"\n      ## Middlewares\n      - \"traefik.http.routers.makemkv-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.makemkv-rtr.service=makemkv-svc\"\n      - \"traefik.http.services.makemkv-svc.loadbalancer.server.port=5800\""
  },
  {
    "path": "compose/archives/mergerfs.yml",
    "content": "  # MergerFS - A featureful union filesystem\n  mergerfs:\n    container_name: mergerfs\n    hostname: mergerfs\n    image: hotio/mergerfs:latest\n    restart: always\n    depends_on:\n      - rclone-drive\n      - rclone-crypt\n    user: $PUID:$PGID\n    command: \"/data/media-local:/data/media-crypt:/data/media-drive=RO \\\n      /data/media \\\n      -o rw,\\\n      use_ino,\\\n      allow_other,\\\n      func.getattr=newest,\\\n      category.action=all,\\\n      category.create=ff,\\\n      statfs_ignore=nc,\\\n      cache.files=auto-full,\\\n      func.getattr=newest,\\\n      dropcacheonclose=true,\\\n      nonempty\"\n    cap_add:\n      - SYS_ADMIN\n    security_opt:\n      - apparmor:unconfined\n    devices:\n      - /dev/fuse\n    environment:\n      - TZ=$TZ\n    volumes:\n      - /etc/passwd:/etc/passwd:ro\n      - /etc/group:/etc/group:ro\n      - /etc/fuse.conf:/etc/fuse.conf:shared\n      #- $DATADIR:/data:slave # creates local-media and shb-media on host\n      - $DATADIR/local/media:/data/media-local:rshared\n      - /media/shb-drive/media:/data/media-drive:rshared\n      - /media/shb-crypt/media:/data/media-crypt:rshared\n      - $DATADIR/media:/data/media:rshared"
  },
  {
    "path": "compose/archives/metube.yml",
    "content": "  # MeTube - Youtube downloader\n  # Could not get this to work - \"Could not resolve name\" error\n  metube:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: alexta69/metube\n    container_name: metube\n    user: $PUID:$PGID\n    volumes:\n      - $DATADIR/downloads/youtube:/downloads\n      - $DOCKERDIR/appdata/metube/config:/config\n      - $DOCKERDIR/appdata/metube/cookies:/cookies\n    environment:\n      - STATE_DIR=/config\n      - YTDL_OPTIONS={\"cookiefile\":\"/cookies/cookies.txt\"}\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.metube-rtr.entrypoints=https\"\n      - \"traefik.http.routers.metube-rtr.rule=Host(`metube.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.metube-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.metube-rtr.service=metube-svc\"\n      - \"traefik.http.services.metube-svc.loadbalancer.server.port=8081\""
  },
  {
    "path": "compose/archives/miflora.yml",
    "content": "  # MiFlora MQTT Daemon - BT to MQTT Daemon for MiFlora Sensors\n  miflora:\n    image: raymondmm/miflora-mqtt\n    container_name: miflora-mqtt\n    environment:\n      - TZ=$TZ\n    network_mode: host\n    # user: \"0\"\n    volumes:\n      - $USERDIR/docker/miflora-mqtt/config:/config\n    restart: unless-stopped"
  },
  {
    "path": "compose/archives/mkvtoolnix.yml",
    "content": "  # MKVToolNix - Video Editing (Remuxing - changing media container while keeping original source quality)\n  mkvtoolnix:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: jlesage/mkvtoolnix:latest\n    container_name: mkvtoolnix\n    # ports:\n    #   - \"$MKVTOOLNIX_PORT:5800\"\n    volumes:\n      - $DATADIR/downloads:/data/downloads\n      - $DOCKERDIR/appdata/mkvtoolnix/config:/config:rw\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      UMASK: 002\n      TZ: $TZ\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      VNC_PASSWORD: $MKVTOOLNIX_VNC_PASSWD\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.mkvtoolnix-rtr.entrypoints=https\"\n      - \"traefik.http.routers.mkvtoolnix-rtr.rule=Host(`mkvtoolnix.$DOMAINNAME_CLOUD_SERVER`)\"\n      ## Middlewares\n      - \"traefik.http.routers.mkvtoolnix-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.mkvtoolnix-rtr.service=mkvtoolnix-svc\"\n      - \"traefik.http.services.mkvtoolnix-svc.loadbalancer.server.port=5800\""
  },
  {
    "path": "compose/archives/mosquitto.yml",
    "content": "  # Mosquitto - MQTT Broker\n  # Create mosquitto.conf, passwd, mosquitto.log files  and set permissions to 775 user:docker\n  # dexec mosquitto /bin/sh -> mosquitto_passwd -b /mosquitto/config/passwd username passwd\n  mosquitto:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: eclipse-mosquitto:latest\n    container_name: mosquitto\n    ports:\n      - \"$MOSQUITTO_HTTP_PORT:1883\" #http\n      - \"9001:9001\" #websockets\n      # - \"$MOSQUITTO_HTTPS_PORT:8883\" #https\n    volumes:\n      - $DOCKERDIR/appdata/mosquitto/config/mosquitto.conf:/mosquitto/config/mosquitto.conf\n      - $DOCKERDIR/appdata/mosquitto/config/passwd:/mosquitto/config/passwd\n      - $DOCKERDIR/shared:/shared\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ"
  },
  {
    "path": "compose/archives/motioneye.yml",
    "content": "  # MotionEye - Video Surveillance\n  motioneye:\n    image: ccrisan/motioneye:master-amd64\n    container_name: motioneye\n    restart: unless-stopped\n    networks:\n      - t2_proxy\n    security_opt:\n      - no-new-privileges:true\n    ports:\n      - \"$MOTIONEYE_CAM1:8081\"\n      - \"$MOTIONEYE_CAM2:8082\"\n      - \"$MOTIONEYE_CAM3:8083\"\n      - \"$MOTIONEYE_PORT:8765\"\n    volumes:\n      - /etc/localtime:/etc/localtime:ro\n      - $DOCKERDIR/shared:/shared\n      - $DOCKERDIR/motioneye/etc:/etc/motioneye\n      - $DOCKERDIR/motioneye/merged:/var/lib/motioneye # merged = local + google drive, using rclone and mergerfs\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers Auth Bypass\n      # - \"traefik.http.routers.motioneye-rtr-bypass.entrypoints=https\"\n      # - \"traefik.http.routers.motioneye-rtr-bypass.rule=Headers(`$MOTIONEYE_BYPASS_KEY`, `$MOTIONEYE_BYPASS_VALUE`)\"\n      # - \"traefik.http.routers.motioneye-rtr-bypass.priority=100\"\n      ## HTTP Routers Auth\n      - \"traefik.http.routers.motioneye-rtr.entrypoints=https\"\n      - \"traefik.http.routers.motioneye-rtr.rule=Host(`meye.$DOMAINNAME`)\"\n      - \"traefik.http.routers.motioneye-rtr.priority=99\"\n      ## Middlewares\n      # - \"traefik.http.routers.motioneye-rtr-bypass.middlewares=chain-no-auth@file\"\n      - \"traefik.http.routers.motioneye-rtr.middlewares=chain-no-auth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.motioneye-rtr.service=motioneye-svc\"\n      # - \"traefik.http.routers.motioneye-rtr-bypass.service=motioneye-svc\"\n      - \"traefik.http.services.motioneye-svc.loadbalancer.server.port=8765\"\n"
  },
  {
    "path": "compose/archives/musicbrainz.yml",
    "content": "  # MusicBrainz - Music Library Tagging and Management\n  musicbrainz:\n    image: ghcr.io/linuxserver/musicbrainz\n    container_name: musicbrainz\n    restart: \"no\"\n    # profiles:\n    # - media\n    networks:\n      - t2_proxy\n    security_opt:\n      - no-new-privileges:true\n    # ports:\n    #   - \"$MUSICBRAINZ_PORT:5000\"\n    volumes:\n      - $DOCKERDIR/appdata/musicbrainz/config:/config\n      - $DATADIR/temp/docker/appdata/musicbrainz/data:/data\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n      FILE__BRAINZCODE: /run/secrets/brainzcode\n      WEBADDRESS: $SERVER_IP\n      #NPROC: <parameter> #optional\n    secrets:\n      - brainzcode\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.musicbrainz-rtr.entrypoints=https\"\n      - \"traefik.http.routers.musicbrainz-rtr.rule=Host(`brainz.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.musicbrainz-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.musicbrainz-rtr.service=musicbrainz-svc\"\n      - \"traefik.http.services.musicbrainz-svc.loadbalancer.server.port=5000\""
  },
  {
    "path": "compose/archives/navidrome.yml",
    "content": "  # Navidrome - Music Server\n  navidrome:\n    <<: *common-keys-media # See EXTENSION FIELDS at the top\n    container_name: navidrome\n    image: deluan/navidrome:latest\n    # ports:\n    #   - \"$FUNKWHALE_PORT:4533\"\n    user: $PUID:$PGID\n    volumes:\n      - $DOCKERDIR/appdata/navidrome:/data\n      - $DATADIR/media/music/English:/music/English:ro\n      - $DATADIR/media/music/Kids:/music/Kids:ro\n    environment:\n      - TZ=$TZ\n      - ND_SCANSCHEDULE=1h\n      - ND_LOGLEVEL=info\n      #- ND_BASEURL=\"\"\n      - ND_SESSIONTIMEOUT=24h\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.navidrome-rtr.entrypoints=https\"\n      - \"traefik.http.routers.navidrome-rtr.rule=Host(`proxnd.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.navidrome-rtr.middlewares=chain-no-auth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.navidrome-rtr.service=navidrome-svc\"\n      - \"traefik.http.services.navidrome-svc.loadbalancer.server.port=4533\""
  },
  {
    "path": "compose/archives/node-exporter.yml",
    "content": "  # Node Exporter - Metrics to Prometheus\n  node-exporter:\n    <<: *common-keys-monitoring # See EXTENSION FIELDS at the top\n    container_name: node-exporter\n    image: prom/node-exporter:latest\n    ports:\n      - \"$NODE_EXPORTER_PORT:9100\"\n    volumes:\n      - /proc:/host/proc:ro\n      - /sys:/host/sys:ro\n      - /:/rootfs:ro\n    command: \n      - '--path.procfs=/host/proc' \n      - '--path.sysfs=/host/sys'\n      - --collector.filesystem.ignored-mount-points\n      - \"^/(sys|proc|dev|host|etc|rootfs/var/lib/docker/containers|rootfs/var/lib/docker/overlay2|rootfs/run/docker/netns|rootfs/var/lib/docker/aufs)($$|/)\""
  },
  {
    "path": "compose/archives/nzbget.yml",
    "content": "  # nzbget - Binary newsgrabber (NZB downloader)\n  nzbget:\n    image: lscr.io/linuxserver/nzbget\n    container_name: nzbget\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - t2_proxy\n    ports:\n      - \"6789:6789\"\n    volumes:\n      - $DOCKERDIR/appdata/nzbget:/config\n      - $DATADIR/downloads:/data/downloads\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers Auth Bypass\n      - \"traefik.http.routers.nzbget-rtr-bypass.entrypoints=https\"\n      - \"traefik.http.routers.nzbget-rtr-bypass.rule=Headers(`traefik-bypass-key`, `$TRAEFIK_BYPASS_KEY`)\" # Bypass Auth for LunaSea on iOS\n      - \"traefik.http.routers.nzbget-rtr-bypass.priority=100\"\n      ## HTTP Routers Auth\n      - \"traefik.http.routers.nzbget-rtr.entrypoints=https\"\n      - \"traefik.http.routers.nzbget-rtr.rule=Host(`nzbget.$DOMAINNAME_CLOUD_SERVER`)\"\n      - \"traefik.http.routers.nzbget-rtr.priority=99\"\n      ## Middlewares\n      - \"traefik.http.routers.nzbget-rtr-bypass.middlewares=chain-no-auth@file\"\n      - \"traefik.http.routers.nzbget-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.nzbget-rtr.service=nzbget-svc\"\n      - \"traefik.http.routers.nzbget-rtr-bypass.service=nzbget-svc\"\n      - \"traefik.http.services.nzbget-svc.loadbalancer.server.port=6789\""
  },
  {
    "path": "compose/archives/nzbhydra.yml",
    "content": "  # NZBHydra2 - NZB meta search\n  hydra:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: linuxserver/nzbhydra2:latest\n    container_name: hydra\n    ports:\n      - \"$NZBHYDRA_PORT:5076\"\n    volumes:\n      - $DOCKERDIR/appdata/hydra2:/config\n      - $DATADIR/downloads:/data/downloads\n    environment:\n      <<: *default-tz-puid-pgid\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.hydra-rtr.entrypoints=https\"\n      - \"traefik.http.routers.hydra-rtr.rule=Host(`hydra.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.hydra-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.hydra-rtr.service=hydra-svc\"\n      - \"traefik.http.services.hydra-svc.loadbalancer.server.port=5076\""
  },
  {
    "path": "compose/archives/ombi.yml",
    "content": "  # Ombi - Media Requests\n  ombi:\n    image: linuxserver/ombi:latest\n    container_name: ombi\n    restart: unless-stopped\n    networks:\n      - t2_proxy\n    # ports:\n    #  - \"$OMBI_PORT:3579\"\n    security_opt:\n      - no-new-privileges:true\n    volumes:\n      - $DOCKERDIR/appdata/ombi:/config\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n      BASE_URL: /ombi #optional\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.ombi-rtr.entrypoints=https\"\n      - \"traefik.http.routers.ombi-rtr.rule=Host(`ombi.$DOMAINNAME`)\"\n      ## Middlewares\n      - \"traefik.http.routers.ombi-rtr.middlewares=chain-no-auth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.ombi-rtr.service=ombi-svc\"\n      - \"traefik.http.services.ombi-svc.loadbalancer.server.port=3579\""
  },
  {
    "path": "compose/archives/ouroboros.yml",
    "content": "  # Ouroboros - Automatic Docker Container Updates\n  ouroboros:\n    image: pyouroboros/ouroboros:latest\n    container_name: ouroboros\n    restart: unless-stopped\n    networks:\n      - default\n      - socket_proxy\n    # depends_on:\n    #  - socket-proxy\n    volumes:\n      # - /var/run/docker.sock:/var/run/docker.sock # Use Docker Socket Proxy instead for improved security\n      - $DOCKERDIR/ouroboros/config.json:/root/.docker/config.json:ro\n    environment:\n      TZ: $TZ\n      INTERVAL: 86400\n      LOG_LEVEL: info\n      SELF_UPDATE: \"true\"\n      CLEANUP: \"true\"\n      IGNORE: traefik influxdb hassio_dns homeassistant hassio_supervisor addon_core_check_config addon_62c7908d_autobackup plexms\n      NOTIFIERS: \"tgram://$TGRAM_BOT_TOKEN/$TGRAM_CHAT_ID/\"\n      DOCKER_SOCKETS: tcp://socket-proxy:2375 # POST to be enabled on Socket Proxy"
  },
  {
    "path": "compose/archives/photoprism.yml",
    "content": "  # PhotoPrism - Photos Management\n  photoprism:\n    <<: *common-keys-media # See EXTENSION FIELDS at the top\n    image: photoprism/photoprism:latest\n    container_name: photoprism\n    security_opt:\n      - seccomp:unconfined\n      - apparmor:unconfined\n    environment:\n      PHOTOPRISM_ADMIN_PASSWORD: \"$PHOTOPRISM_PASSWORD\"          # !!! PLEASE CHANGE YOUR INITIAL \"admin\" PASSWORD !!!\n      PHOTOPRISM_SITE_URL: \"https://prism.$DOMAINNAME0\"  # public server URL incl http:// or https:// and /path, :port is optional\n      PHOTOPRISM_ORIGINALS_LIMIT: 5000               # file size limit for originals in MB (increase for high-res video)\n      PHOTOPRISM_HTTP_COMPRESSION: \"gzip\"            # improves transfer speed and bandwidth utilization (none or gzip)\n      PHOTOPRISM_DEBUG: \"false\"                      # run in debug mode (shows additional log messages)\n      PHOTOPRISM_PUBLIC: \"false\"                     # no authentication required (disables password protection)\n      PHOTOPRISM_READONLY: \"false\"                   # don't modify originals directory (reduced functionality)\n      PHOTOPRISM_EXPERIMENTAL: \"false\"               # enables experimental features\n      PHOTOPRISM_DISABLE_CHOWN: \"false\"              # disables storage permission updates on startup\n      PHOTOPRISM_DISABLE_WEBDAV: \"false\"             # disables built-in WebDAV server\n      PHOTOPRISM_DISABLE_SETTINGS: \"false\"           # disables Settings in Web UI\n      PHOTOPRISM_DISABLE_TENSORFLOW: \"false\"         # disables all features depending on TensorFlow\n      PHOTOPRISM_DISABLE_FACES: \"false\"              # disables facial recognition\n      PHOTOPRISM_DISABLE_CLASSIFICATION: \"false\"     # disables image classification\n      PHOTOPRISM_DARKTABLE_PRESETS: \"false\"          # enables Darktable presets and disables concurrent RAW conversion\n      PHOTOPRISM_DETECT_NSFW: \"false\"                # flag photos as private that MAY be offensive (requires TensorFlow)\n      PHOTOPRISM_UPLOAD_NSFW: \"true\"                 # allows uploads that MAY be offensive\n      PHOTOPRISM_DATABASE_DRIVER: \"mysql\"            # use MariaDB 10.5+ or MySQL 8+ instead of SQLite for improved performance\n      PHOTOPRISM_DATABASE_SERVER: \"$MARIADB_HOST:$MARIADB_PORT\"     # MariaDB or MySQL database server (hostname:port)\n      PHOTOPRISM_DATABASE_NAME: \"$PHOTOPRISM_DB\"         # MariaDB or MySQL database schema name\n      PHOTOPRISM_DATABASE_USER: \"$PHOTOPRISM_DB_USER\"         # MariaDB or MySQL database user name\n      PHOTOPRISM_DATABASE_PASSWORD: \"$PHOTOPRISM_DB_PASSWORD\"       # MariaDB or MySQL database user password\n      PHOTOPRISM_SITE_TITLE: \"PhotoPrism\"\n      PHOTOPRISM_SITE_CAPTION: \"AI-Powered Photos App\"\n      PHOTOPRISM_SITE_DESCRIPTION: \"\"\n      PHOTOPRISM_SITE_AUTHOR: \"\"\n      ## Run/install on first startup (options: update, gpu, tensorflow, davfs, nano, clean):\n      PHOTOPRISM_INIT: \"tensorflow\"\n      ## Hardware video transcoding config (optional)\n      # PHOTOPRISM_FFMPEG_BUFFERS: \"64\"              # FFmpeg capture buffers (default: 32)\n      # PHOTOPRISM_FFMPEG_BITRATE: \"32\"              # FFmpeg encoding bitrate limit in Mbit/s (default: 50)\n      # PHOTOPRISM_FFMPEG_ENCODER: \"h264_v4l2m2m\"    # use Video4Linux for AVC transcoding (default: libx264)\n      # PHOTOPRISM_FFMPEG_ENCODER: \"h264_qsv\"        # use Intel Quick Sync Video for AVC transcoding (default: libx264)\n      PHOTOPRISM_UMASK: 002\n    user: $PUID:$PGID\n    volumes:\n      - $DATADIR/downloads:/photoprism/originals\n      - $DOCKERDIR/appdata/photoprism:/photoprism/storage\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.photoprism-rtr.entrypoints=https\"\n      - \"traefik.http.routers.photoprism-rtr.rule=Host(`prism.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.photoprism-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.photoprism-rtr.service=photoprism-svc\"\n      - \"traefik.http.services.photoprism-svc.loadbalancer.server.port=2342\""
  },
  {
    "path": "compose/archives/photoshow.yml",
    "content": "  # Photoshow - Simple Photo Viewer\n  photoshow:\n    <<: *common-keys-media # See EXTENSION FIELDS at the top\n    image: lscr.io/linuxserver/photoshow\n    container_name: photoshow\n    volumes:\n      - $DATADIR/media/misc:/Pictures\n      - $DOCKERDIR/appdata/photoshow:/config\n      - $DATADIR/temp/appdata/photoshow:/Thumbs\n    environment:\n      <<: *default-tz-puid-pgid\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.photoshow-rtr.entrypoints=https\"\n      - \"traefik.http.routers.photoshow-rtr.rule=Host(`photoshow.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.photoshow-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.photoshow-rtr.service=photoshow-svc\"\n      - \"traefik.http.services.photoshow-svc.loadbalancer.server.port=80\""
  },
  {
    "path": "compose/archives/plex-sync.yml",
    "content": "  # Plex-Sync - For Syncing watched status between plex servers\n  plex-sync:\n    image: patsissons/plex-sync:develop\n    container_name: plex-sync\n    security_opt:\n      - no-new-privileges:true\n    environment:\n      INITIAL_RUN: \"true\"\n      # DRY_RUN: 0\n      CRON_SCHEDULE: \"*/5 * * * *\"\n      SECTION_MAPS: $SYN_PLEX/$SYN_PLEX_HOLLYWOOD $NUC_PLEX/$NUC_PLEX_HOLLYWOOD | $SYN_PLEX/$SYN_PLEX_TVSHOWS $NUC_PLEX/$NUC_PLEX_TVSHOWS | $SYN_PLEX/$SYN_PLEX_INDIAN $NUC_PLEX/$NUC_PLEX_INDIAN | $SYN_PLEX/$SYN_PLEX_KOLLYWOOD $NUC_PLEX/$NUC_PLEX_KOLLYWOOD | $SYN_PLEX/$SYN_PLEX_DOCMOVIES $NUC_PLEX/$NUC_PLEX_DOCMOVIES | $SYN_PLEX/$SYN_PLEX_DOCSHOWS $NUC_PLEX/$NUC_PLEX_DOCSHOWS | $SYN_PLEX/$SYN_PLEX_KIDSMOVIES $NUC_PLEX/$NUC_PLEX_KIDSMOVIES | $SYN_PLEX/$SYN_PLEX_INTERNATIONAL $NUC_PLEX/$NUC_PLEX_INTERNATIONAL\n    restart: unless-stopped\n"
  },
  {
    "path": "compose/archives/plex-trakt-sync.yml",
    "content": "  # PlexTraktSync\n  # Create Trakt Application https://github.com/Taxel/PlexTraktSync\n  # Had to run this first before starting compose\n  # git clone -b plexmovieagent-fixed https://github.com/Taxel/PlexTraktSync.git /home/USER/docker/apps/\n  # sudo docker run -it --name ptsync -v /home/USER/docker/apps/PlexTraktSync:/usr/src/app -e TZ=\"America/New_York\" --restart on-failure:2 twolaw/plextraktsync:latest\n  # change permissions of .env and .pytrakt.json to 600 and root:root\n  ptsync:\n    image: twolaw/plextraktsync:latest\n    container_name: ptsync\n    restart: unless-stopped\n    networks:\n      - t2_proxy\n    security_opt:\n      - no-new-privileges:true\n    environment:\n      TZ: $TZ\n    volumes:\n      - $DOCKERDIR/apps/pts-mafixed:/usr/src/app # plexmovieagent-fixed branch"
  },
  {
    "path": "compose/archives/postgres.yml",
    "content": "  # Postgres - Database\n  postgres:\n    image: postgres\n    container_name: postgres\n    restart: always\n    security_opt:\n      - no-new-privileges:true\n    volumes:\n      - $DOCKERDIR/postgres:/var/lib/postgresql/data\n    environment:\n      POSTGRES_PASSWORD: $STATPING_DB_PASS\n      POSTGRES_USER: $STATPING_DB_USER\n      POSTGRES_DB: $STATPING_DB"
  },
  {
    "path": "compose/archives/promtail.yml",
    "content": "  # Promtail - Log Scraping/Shipping Agent\n  promtail:\n    <<: *common-keys-monitoring # See EXTENSION FIELDS at the top\n    container_name: promtail\n    image: grafana/promtail:latest\n    volumes:\n      - /var/log:/var/log\n      - /media/cbox/log:/data/logs/cbox\n      - $DOCKERDIR/logs/homeserver:/data/logs/scripts\n      - $DOCKERDIR/appdata/promtail:/etc/promtail\n    # ports:\n    #   - \"1514:1514\" # this is only needed if you are going to send syslogs\n    command: -config.file=/etc/promtail/config.yml\n    "
  },
  {
    "path": "compose/archives/pyrenamer.yml",
    "content": "  #PyRenamer - Easily Rename Your Files\n  pyrenamer:\n    image: mikenye/pyrenamer:latest\n    container_name: pyrenamer\n    restart: \"no\"\n    networks:\n      - t2_proxy\n    security_opt:\n      - no-new-privileges:true\n    # ports:\n    #   - \"$PYRENAMER_PORT:5800\"\n    volumes:\n      - $USERDIR/Downloads:/data/downloads:rw\n      - $DOCKERDIR/appdata/pyrenamer:/config:rw\n      - /media/shb-drive/data/media:/data/shb:rw\n      - /media/ds918/data/media:/data/ds918:rw\n      - /dev/shm:/dev/shm\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      TZ: $TZ\n      UMASK: 002\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.pyrenamer-rtr.entrypoints=https\"\n      - \"traefik.http.routers.pyrenamer-rtr.rule=Host(`pyrenamer.$DOMAINNAME`)\"\n      ## Middlewares\n      - \"traefik.http.routers.pyrenamer-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.pyrenamer-rtr.service=pyrenamer-svc\"\n      - \"traefik.http.services.pyrenamer-svc.loadbalancer.server.port=5800\""
  },
  {
    "path": "compose/archives/readarr.yml",
    "content": "  # Readarr - Books management\n  # Set url_base in readarr settings if using PathPrefix\n  readarr:\n    image: hotio/readarr:nightly\n    container_name: readarr\n    security_opt:\n      - no-new-privileges:true\n    restart: \"no\"\n    profiles: [\"media\",\"arrs\", \"all\"]\n    networks:\n      - t2_proxy\n    ports:\n      - \"8787:8787\"\n    volumes:\n      - $DOCKERDIR/appdata/readarr:/config\n      - $DATADIR:/data\n      - \"/etc/localtime:/etc/localtime:ro\"\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n      UMASK: 002\n      #ARGS: \"\"\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers Auth\n      - \"traefik.http.routers.readarr-rtr.entrypoints=https\"\n      - \"traefik.http.routers.readarr-rtr.rule=Host(`readarr.$DOMAINNAME_CLOUD_SERVER`)\"\n      ## Middlewares\n      - \"traefik.http.routers.readarr-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.readarr-rtr.service=readarr-svc\"\n      - \"traefik.http.services.readarr-svc.loadbalancer.server.port=8787\""
  },
  {
    "path": "compose/archives/redis-commander.yml",
    "content": "  # Redis Commander - Redis Management Tool\n  rediscommander:\n    container_name: rediscommander\n    image: rediscommander/redis-commander:latest\n    restart: unless-stopped\n    networks:\n      - t2_proxy\n    security_opt:\n      - no-new-privileges:true\n    environment:\n      - REDIS_HOST=redis\n      - REDIS_PASSWORD=$REDIS_PASSWORD\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.rediscommander-rtr.entrypoints=https\"\n      - \"traefik.http.routers.rediscommander-rtr.rule=HostHeader(`rediscom.$DOMAINNAME`)\"\n      ## Middlewares\n      - \"traefik.http.routers.rediscommander-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.rediscommander-rtr.service=rediscommander-svc\"\n      - \"traefik.http.services.rediscommander-svc.loadbalancer.server.port=8081\""
  },
  {
    "path": "compose/archives/smokeping.yml",
    "content": "  # SmokePing - Network latency Monitoring\n  smokeping:\n    image: linuxserver/smokeping:latest\n    container_name: smokeping\n    restart: unless-stopped\n    networks:\n      - t2_proxy\n    security_opt:\n      - no-new-privileges:true\n    # ports:\n    #  - \"$SMOKEPING_PORT:80\"\n    volumes:\n      - $DOCKERDIR/smokeping/config:/config\n      - $DOCKERDIR/smokeping/data:/data\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.smokeping-rtr.entrypoints=https\"\n      - \"traefik.http.routers.smokeping-rtr.rule=HostHeader(`smokeping.$DOMAINNAME`)\"\n      ## Middlewares\n      - \"traefik.http.routers.smokeping-rtr.middlewares=chain-authelia@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.smokeping-rtr.service=smokeping-svc\"\n      - \"traefik.http.services.smokeping-svc.loadbalancer.server.port=80\""
  },
  {
    "path": "compose/archives/smtp-to-telegram.yml",
    "content": "  # SMTP to Telegram - Send SMTP Notifications as Telegram Message\n  # Use case: https://github.com/htpcBeginner/docker-traefik/issues/78\n  smtp_to_telegram:\n    image: kostyaesmukov/smtp_to_telegram\n    container_name: smtp_to_telegram\n    restart: always\n    networks:\n      - default\n    environment:\n      TZ: $TZ\n      ST_TELEGRAM_CHAT_IDS: $TGRAM_CHAT_ID\n      ST_TELEGRAM_BOT_TOKEN: $TGRAM_BOT_TOKEN\n      ST_TELEGRAM_MESSAGE_TEMPLATE: \"{subject}\\\\n{body}\""
  },
  {
    "path": "compose/archives/statping.yml",
    "content": "  # StatPing - Status Page & Monitoring Server\n  # Not adding $TZ to linuxserver/mariadb resulted in a blank page\n  # Had to change default username admin in MariaDB\n  # dexec into mariadb and run mysql_tzinfo_to_sql /usr/share/zoneinfo | mysql -u root mysql -p\n  statping:\n    <<: *common-keys-core # See EXTENSION FIELDS at the top\n    image: statping/statping:latest\n    container_name: statping\n    networks:\n      - t2_proxy\n      - default\n    volumes:\n      - $DOCKERDIR/appdata/statping:/app\n    environment:\n      <<: *default-tz-puid-pgid\n      DB_CONN: mysql\n      DB_HOST: $MARIADB_HOST\n      DB_PORT: $MARIADB_PORT\n      DB_USER: $STATPING_DB_USER\n      DB_PASS: $STATPING_DB_PASS\n      DB_DATABASE: $STATPING_DB\n      IS_DOCKER: \"true\"\n      DISABLE_LOGS: \"false\"\n      NAME: StatPing\n      DESCRIPTION: Monitor web services\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.statping-rtr.entrypoints=https\"\n      - \"traefik.http.routers.statping-rtr.rule=Host(`sp.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.statping-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.statping-rtr.service=statping-svc\"\n      - \"traefik.http.services.statping-svc.loadbalancer.server.port=8080\"\n"
  },
  {
    "path": "compose/archives/tdarr-node.yml",
    "content": "  # Tdarr Node - Transcoder Node\n  tdarr-node1:\n    image: haveagitgat/tdarr_node:latest\n    container_name: tdarr-node1\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    # profiles: [\"media\", \"all\"]\n    networks:\n      - t2_proxy\n\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n      UMASK_SET: 002\n      nodeID: Node1\n      nodeIP: tdarr-node1 # or hostname\n      nodePort: 8267\n      serverIP: tdarr # or hostname\n      serverPort: 8266\n    volumes:\n      - $DOCKERDIR/appdata/tdarr/configs:/app/configs\n      - $DOCKERDIR/appdata/tdarr/logs:/app/logs\n      - $DOWNLOADSDIR/transcode/tdarr:/data/temp\n      - $ZDATADIR/Photos/zVideos:/data/media:ro\n      - $DATADIR2/media/zvideos:/data/output"
  },
  {
    "path": "compose/archives/tiny-media-manager.yml",
    "content": "  # Tiny Media Manager - Media and Metadata Management Tool\n  tinymm:\n    image: romancin/tinymediamanager:latest\n    container_name: tinymm\n    restart: \"no\"\n    networks:\n      - t2_proxy\n    security_opt:\n      - no-new-privileges:true\n    # ports:\n    #   - \"$TINYMM_PORT:5800\"\n    volumes:\n      - $DOCKERDIR/appdata/tinymm:/config\n      - $DATADIR/media:/data/media\n      - $DATADIR/downloads:/data/downloads\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      TZ: $TZ\n      UMASK: 002\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      VNC_PASSWD: $TINYMM_VNC_PASSWD\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.tinymm-rtr.entrypoints=https\"\n      - \"traefik.http.routers.tinymm-rtr.rule=Host(`tmm.$DOMAINNAME0`)\"\n      ## Middlewares\n      - \"traefik.http.routers.tinymm-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.tinymm-rtr.service=tinymm-svc\"\n      - \"traefik.http.services.tinymm-svc.loadbalancer.server.port=5800\""
  },
  {
    "path": "compose/archives/traefik-certs-dumper.yml",
    "content": "  # Traefik Certs Dumper - Extract LetsEncrypt Certificates - Traefik2 Compatible\n  certdumper:\n    container_name: traefik_certdumper\n    image: humenius/traefik-certs-dumper:latest\n    network_mode: none\n    # profiles:\n    # - core\n    security_opt:\n      - no-new-privileges:true\n    # command: --restart-containers container1,container2,container3\n    volumes:\n      - $DOCKERDIR/appdata/traefik2/acme:/traefik:ro\n      - $DOCKERDIR/shared/certs/home:/output:rw\n      # - /var/run/docker.sock:/var/run/docker.sock:ro # Only needed if restarting containers (use Docker Socket Proxy instead)\n    environment:\n      DOMAIN: $DOMAINNAME0"
  },
  {
    "path": "compose/archives/traefik-error-pages.yml",
    "content": "  # Traefik - Custom Error Pages\n  # Obsoleted because I did not spend any more time on it to customize and don't see the value\n  traefik-error-pages:\n    container_name: traefik-error-pages\n    image: guillaumebriday/traefik-custom-error-pages\n    restart: unless-stopped\n    networks:\n      - t2_proxy\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.traefik-error-pages-rtr.entrypoints=https\"\n      - \"traefik.http.routers.traefik-error-pages-rtr.rule=HostRegexp(`{host:.+}`)\"\n      - \"traefik.http.routers.traefik-error-pages-rtr.priority=1\"\n      # Middlewares\n      - \"traefik.http.routers.traefik-error-pages-rtr.middlewares=traefik-error-pages\"\n      - \"traefik.http.middlewares.traefik-error-pages.errors.service=traefik-error-pages-svc\"\n      - \"traefik.http.middlewares.traefik-error-pages.errors.status=401,403,404,429,500,502,503\"\n      - \"traefik.http.middlewares.traefik-error-pages.errors.query=/{status}.html\"\n      # HTTP Services\n      - \"traefik.http.routers.traefik-error-pages-rtr.service=traefik-error-pages-svc\"\n      - \"traefik.http.services.traefik-error-pages-svc.loadbalancer.server.port=80\""
  },
  {
    "path": "compose/archives/transmission-vpn.yml",
    "content": "  # TransmissionBT - Torrent Downloader\n  # ONLY ACCESSIBLE THROUGH https://domain.com/transmission/web/ if using PathPrefix\n  # For Proxmox LXC Containers - https://pve.proxmox.com/wiki/OpenVPN_in_LXC\n  transmission-vpn:\n    image: haugene/transmission-openvpn:latest\n    container_name: transmission-vpn\n    restart: unless-stopped\n    networks:\n      t2_proxy:\n        ipv4_address: 192.168.90.169\n    # ports:\n    #  - \"$TRANSMISSION_PORT:9091\" if vpn is enabled you cannot access transmission using host ip\n    cap_add:\n      - NET_ADMIN\n    devices:\n      - /dev/net/tun\n    # dns:\n    #   - 1.1.1.1\n    #   - 1.0.0.1\n    volumes:\n      - /etc/localtime:/etc/localtime:ro\n      - $DOCKERDIR/appdata/transmission-vpn/data:/data\n      - $DOCKERDIR/appdata/transmission-vpn/config:/config\n      - $EXTDRIVE/downloads:/data/downloads\n    environment:\n      <<: *default-tz-puid-pgid\n      OPENVPN_PROVIDER: FASTESTVPN\n      OPENVPN_USERNAME: $FASTESTVPN_USERNAME\n      OPENVPN_PASSWORD: $FASTESTVPN_PASSWORD\n      #OPENVPN_CONFIG: \"Switzerland-UDP\"\n      #OPENVPN_OPTS: --inactive 3600 --ping 10 --ping-exit 60\n      LOCAL_NETWORK: \"$LOCAL_NETWORK\"\n      UMASK_SET: 2\n      # These transmission settings are not needed as /data/transmission-home/settings.json is persistent\n      TRANSMISSION_RPC_AUTHENTICATION_REQUIRED: \"true\"\n      TRANSMISSION_RPC_HOST_WHITELIST: \"127.0.0.1,$SERVER_IP\"\n      TRANSMISSION_RPC_PASSWORD: $TRANSMISSION_RPC_PASSWORD\n      TRANSMISSION_RPC_USERNAME: $TRANSMISSION_RPC_USERNAME\n      TRANSMISSION_UMASK: 002\n      TRANSMISSION_RATIO_LIMIT: 1.0\n      TRANSMISSION_RATIO_LIMIT_ENABLED: \"true\"\n      TRANSMISSION_ALT_SPEED_DOWN: 2000\n      TRANSMISSION_ALT_SPEED_ENABLED: \"false\"\n      TRANSMISSION_ALT_SPEED_UP: 100\n      TRANSMISSION_SPEED_LIMIT_DOWN: 10000\n      TRANSMISSION_SPEED_LIMIT_DOWN_ENABLED: \"true\"\n      TRANSMISSION_SPEED_LIMIT_UP: 500\n      TRANSMISSION_SPEED_LIMIT_UP_ENABLED: \"true\"\n      TRANSMISSION_INCOMPLETE_DIR: /data/downloads/torrents/incomplete\n      TRANSMISSION_INCOMPLETE_DIR_ENABLED: \"true\"\n      TRANSMISSION_WATCH_DIR: /data/downloads/torrents\n      TRANSMISSION_WATCH_DIR_ENABLED: \"true\"\n      TRANSMISSION_DOWNLOAD_DIR: /data/downloads/torrents\n      LOG_TO_STDOUT: \"true\"\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.transmission-vpn-rtr.entrypoints=https\"\n      - \"traefik.http.routers.transmission-vpn-rtr.rule=Host(`trans.$DOMAINNAME_CLOUD_SERVER`)\"\n      ## Middlewares\n      - \"traefik.http.routers.transmission-vpn-rtr.middlewares=middlewares-rate-limit@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.transmission-vpn-rtr.service=transmission-vpn-svc\"\n      - \"traefik.http.services.transmission-vpn-svc.loadbalancer.server.port=9091\" "
  },
  {
    "path": "compose/archives/unifi-controller.yml",
    "content": "  # UniFi Controller - Managing UniFi Network\n  # UDP 3478 Port used for STUN. #REQUIRED\n  # TCP 5514 Port used for remote syslog capture.\n  # TCP 8080 Port used for device and controller communication. #REQUIRED\n  # TCP 8443 Port used for controller GUI/API as seen in a web browser #REQUIRED\n  # TCP 8880 Port used for HTTP portal redirection.\n  # TCP 8843 Port used for HTTPS portal redirection.\n  # TCP 6789 Port used for UniFi mobile speed test. #REQUIRED\n  # TCP 27117 Port used for local-bound database communication.\n  # UDP 5656-5699 Ports used by AP-EDU broadcasting.\n  # UDP 10001 Port used for device discovery #REQUIRED\n  # UDP 1900 Port used for \"Make controller discoverable on L2 network\" in controller settings.\n\n  unifi:\n    container_name: unifi\n    image: jacobalberty/unifi:stable\n    restart: unless-stopped\n    networks:\n      t2_proxy:\n        ipv4_address: 192.168.90.100\n    security_opt:\n      - no-new-privileges:true\n    ports:\n      - \"8080:8080\"\n      - \"8443:8443\"\n      - \"3478:3478/udp\"\n      - \"10001:10001/udp\"\n      - \"6789:6789\"\n      #- \"8081:8081\"\n      #- \"8843:8843\"\n      #- \"8880:8880\"\n    volumes:\n      - ${DOCKERDIR}/unifi:/unifi\n      - /etc/timezone:/etc/timezone:ro\n      - /etc/localtime:/etc/localtime:ro\n    environment:\n      UNIFI_UID: $PUID\n      UNIFI_GID: $PGID\n      TZ: America/New_York\n      RUNAS_UID0: \"false\"\n      BIND_PRIV: \"false\"\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.unifi-rtr.entrypoints=https\"\n      - \"traefik.http.routers.unifi-rtr.rule=HostHeader(`ufi.$DOMAINNAME`)\"\n      ## Middlewares\n      - \"traefik.http.routers.unifi-rtr.middlewares=chain-authelia@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.unifi-rtr.service=unifi-svc\"\n      - \"traefik.http.services.unifi-svc.loadbalancer.server.port=8443\"\n\n\n"
  },
  {
    "path": "compose/archives/unmanic.yml",
    "content": "  # Unmanic - Library Optimizer\n  unmanic:\n    container_name: unmanic\n    image: josh5/unmanic:latest\n    privileged: true\n    ports:\n      - 8888:8888\n    environment:\n      - PUID=$PUID\n      - PGID=$PGID\n      - LIBVA_DRIVER_NAME=i965\n      - LIBVA_DRIVERS_PATH=/usr/lib/x86_64-linux-gnu/dri\n      - TZ=$TZ\n    # devices:\n    #   - /dev/dri:/dev/dri # for hardware transcoding\n    volumes:\n      - $DOCKERDIR/appdata/unmanic:/config\n      - $DATADIR2/media/zvideos:/data/x265\n      - $ZDATADIR/Photos/zVideos/Test:/data/source\n      - $DATADIR2/media/zvideos:/data/transcode\n      - /dev/shm:/dev/shm\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.unmanic-rtr.entrypoints=https\"\n      - \"traefik.http.routers.unmanic-rtr.rule=Host(`unmaic.$DOMAINNAME_HOME_SYNOLOGY`)\"\n      ## Middlewares\n      - \"traefik.http.routers.unmanic-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.unmanic-rtr.service=vscode-svc\"\n      - \"traefik.http.services.unmanic-svc.loadbalancer.server.port=8888\""
  },
  {
    "path": "compose/archives/varken.yml",
    "content": "  # Varken - Monitor Plex, Sonarr, Radarr, and Other Data\n  varken:\n    image: boerderij/varken\n    container_name: varken\n    restart: unless-stopped\n    networks:\n      - t2_proxy\n    volumes:\n      - $USERDIR/docker/varken:/config\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n      VRKN_GLOBAL_SONARR_SERVER_IDS: 1\n      VRKN_GLOBAL_RADARR_SERVER_IDS: 1\n      VRKN_GLOBAL_LIDARR_SERVER_IDS: \"false\"\n      VRKN_GLOBAL_TAUTULLI_SERVER_IDS: 1\n      VRKN_GLOBAL_OMBI_SERVER_IDS: \"false\"\n      VRKN_GLOBAL_SICKCHILL_SERVER_IDS: \"false\"\n      VRKN_GLOBAL_UNIFI_SERVER_IDS: 1\n      VRKN_INFLUXDB_URL: $SERVER_IP\n      VRKN_INFLUXDB_PORT: 8086\n      VRKN_INFLUXDB_SSL: \"false\"\n      VRKN_INFLUXDB_VERIFY_SSL: \"false\"\n      VRKN_INFLUXDB_USERNAME: $VARKEN_USER\n      VRKN_INFLUXDB_PASSWORD: $VARKEN_PASS\n      VRKN_TAUTULLI_1_URL: $SERVER_IP:$TAUTULLI_PORT\n      VRKN_TAUTULLI_1_FALLBACK_IP: 1.1.1.1\n      VRKN_TAUTULLI_1_APIKEY: $TAUTULLI_API_KEY\n      VRKN_TAUTULLI_1_SSL: \"false\"\n      VRKN_TAUTULLI_1_VERIFY_SSL: \"false\"\n      VRKN_TAUTULLI_1_GET_ACTIVITY: \"true\"\n      VRKN_TAUTULLI_1_GET_ACTIVITY_RUN_SECONDS: 30\n      VRKN_TAUTULLI_1_GET_STATS: \"true\"\n      VRKN_TAUTULLI_1_GET_STATS_RUN_SECONDS: 3600\n      VRKN_SONARR_1_URL: $SERVER_IP:$SONARR_PORT\n      VRKN_SONARR_1_APIKEY: $SONARR_API_KEY\n      VRKN_SONARR_1_SSL: \"false\"\n      VRKN_SONARR_1_VERIFY_SSL: \"false\"\n      VRKN_SONARR_1_MISSING_DAYS: 7\n      VRKN_SONARR_1_MISSING_DAYS_RUN_SECONDS: 300\n      VRKN_SONARR_1_FUTURE_DAYS: 1\n      VRKN_SONARR_1_FUTURE_DAYS_RUN_SECONDS: 300\n      VRKN_SONARR_1_QUEUE: \"true\"\n      VRKN_SONARR_1_QUEUE_RUN_SECONDS: 300\n      VRKN_RADARR_1_URL: $SERVER_IP:$RADARR_PORT\n      VRKN_RADARR_1_APIKEY: $RADARR_API_KEY\n      VRKN_RADARR_1_SSL: \"false\"\n      VRKN_RADARR_1_VERIFY_SSL: \"false\"\n      VRKN_RADARR_1_QUEUE: \"true\"\n      VRKN_RADARR_1_QUEUE_RUN_SECONDS: 300\n      VRKN_RADARR_1_GET_MISSING: \"true\"\n      VRKN_RADARR_1_GET_MISSING_RUN_SECONDS: 300\n      VRKN_UNIFI_1_URL: $UNIFI_HOST\n      VRKN_UNIFI_1_USERNAME: $UNIFI_USER\n      VRKN_UNIFI_1_PASSWORD: $UNIFI_PASS\n      VRKN_UNIFI_1_SITE: default\n      VRKN_UNIFI_1_USG_NAME: USG\n      VRKN_UNIFI_1_SSL: \"true\"\n      VRKN_UNIFI_1_VERIFY_SSL: \"false\"\n      VRKN_UNIFI_1_GET_USG_STATS_RUN_SECONDS: 300"
  },
  {
    "path": "compose/archives/watchtower.yml",
    "content": "  # WatchTower - Automatic Docker Container Updates\n  watchtower:\n    image: containrrr/watchtower\n    container_name: watchtower\n    restart: unless-stopped\n    networks:\n      - socket_proxy\n    depends_on:\n      - socket-proxy\n    environment:\n      TZ: $TZ\n      WATCHTOWER_CLEANUP: \"true\"\n      WATCHTOWER_REMOVE_VOLUMES: \"true\"\n      WATCHTOWER_INCLUDE_STOPPED: \"true\"\n      WATCHTOWER_NO_STARTUP_MESSAGE: \"false\"\n      WATCHTOWER_SCHEDULE: \"0 30 12 * * *\" # Everyday at 12:30\n      WATCHTOWER_NOTIFICATIONS: shoutrrr\n      WATCHTOWER_NOTIFICATION_URL: \"telegram://$TGRAM_BOT_TOKEN@telegram?channels=$TGRAM_CHAT_ID\"\n      WATCHTOWER_NOTIFICATIONS_LEVEL: info\n      DOCKER_HOST: tcp://socket-proxy:2375\n      DOCKER_API_VERSION: \"1.40\""
  },
  {
    "path": "compose/archives/xteve.yml",
    "content": "  # xTeve - IPTV proxy for Plex\n  xteve:\n    image: alturismo/xteve\n    container_name: xteve\n    restart: unless-stopped\n    # network_mode: host\n    networks:\n      - t2_proxy\n    ports:\n      - \"34400:34400\"\n      - \"1901:1900\"\n    # user: \"0\"\n    # logging:\n    #   options:\n    #     max-size: \"10m\"\n    #     max-files: 3\n    environment:\n      TZ: $TZ\n    volumes:\n      - $USERDIR/docker/xteve:/config:rw\n      - /dev/shm:/tmp/xteve\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.xteve-rtr.entrypoints=https\"\n      - \"traefik.http.routers.xteve-rtr.rule=Host(`xteve.$DOMAINNAME`)\"\n      - \"traefik.http.routers.xteve-rtr.tls=true\"\n      ## Middlewares\n      - \"traefik.http.routers.xteve-rtr.middlewares=chain-authelia@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.xteve-rtr.service=xteve-svc\"\n      - \"traefik.http.services.xteve-svc.loadbalancer.server.port=34400\""
  },
  {
    "path": "compose/archives/youtubedl-material.yml",
    "content": "  youtubedl-material:\n    <<: *common-keys-apps # See EXTENSION FIELDS at the top\n    image: tzahi12345/youtubedl-material:latest\n    container_name: youtubedl-material\n    # ports:\n    #   - \"$YOUTUBEDLMATERIAL_PORT:17442\"\n    volumes:\n      - $DOCKERDIR/appdata/youtubedl-material/config:/app/appdata\n      - $DATADIR/downloads/youtubedl-material/audio:/app/audio\n      - $DATADIR/downloads/youtubedl-material/video:/app/video\n      - $DATADIR/downloads/youtubedl-material/subscriptions:/app/subscriptions\n      - $DOCKERDIR/appdata/youtubedl-material/users:/app/users\n    environment:\n      UID: $PUID\n      GID: $PGID\n    labels:\n      - \"traefik.enable=true\"\n      ## HTTP Routers\n      - \"traefik.http.routers.youtubedl-material-rtr.entrypoints=https\"\n      - \"traefik.http.routers.youtubedl-material-rtr.rule=Host(`ytdl.$DOMAINNAME_CLOUD_SERVER`)\"\n      ## Middlewares\n      - \"traefik.http.routers.youtubedl-material-rtr.middlewares=chain-oauth@file\"\n      ## HTTP Services\n      - \"traefik.http.routers.youtubedl-material-rtr.service=youtubedl-material-svc\"\n      - \"traefik.http.services.youtubedl-material-svc.loadbalancer.server.port=17442\"\n"
  },
  {
    "path": "compose/ds918/adguardhome.yml",
    "content": "services:\n  # AdGuard Home - DNS AdBlocking\n  adguardhome:\n    container_name: adguardhome\n    image: adguard/adguardhome\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    # profiles: [\"core\", \"all\"]\n    networks:\n      dockervlan:\n        ipv4_address: 192.168.1.25 # IP address inside defined range\n    ports:\n      - 53/udp \n      - 67/udp \n      - 68/tcp \n      - 68/udp \n      - 80/tcp \n      - 443/tcp \n      - 853/tcp \n      - 3000/tcp \n    volumes:\n      - $DOCKERDIR/appdata/adguard/conf:/opt/adguardhome/conf \n      - $DOCKERDIR/appdata/adguard/work:/opt/adguardhome/work \n      - $DOCKERDIR/shared/certs/$DOMAINNAME_DS918:/certs"
  },
  {
    "path": "compose/ds918/certdumper.yml",
    "content": "services:\n  # Traefik Certs Dumper - Extract LetsEncrypt Certificates - Traefik2 Compatible\n  certdumper:\n    container_name: traefik_certdumper\n    image: humenius/traefik-certs-dumper:latest\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    # profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    # command: --restart-containers container1,container2,container3\n    volumes:\n      - $DOCKERDIR/appdata/traefik2/acme:/traefik:ro\n      - $DOCKERDIR/shared/certs/$DOMAINNAME_DS918:/output:rw\n      # - /var/run/docker.sock:/var/run/docker.sock:ro # Only needed if restarting containers (use Docker Socket Proxy instead)\n    environment:\n      DOMAIN: $DOMAINNAME_DS918"
  },
  {
    "path": "compose/ds918/ddns-updater.yml",
    "content": "services:\n  # Cloudflare DDNS - Dynamic DNS Updater\n  ddns-updater:\n    image: qmcgaw/ddns-updater\n    container_name: ddns-updater\n    restart: unless-stopped\n    network_mode: bridge\n    ports:\n      - 8000:8000/tcp\n    volumes:\n      - $DOCKERDIR/appdata/ddns-updater:/updater/data # Owned by UID 1000\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n      PERIOD: 12h\n      UPDATE_COOLDOWN_PERIOD: 5m\n      PUBLICIP_DNS_TIMEOUT: 3s\n      HTTP_TIMEOUT: 10s\n      # Web UI\n      LISTENING_PORT: 8000\n      # Backup\n      BACKUP_PERIOD: 96h # 0 to disable\n      BACKUP_DIRECTORY: /updater/data/backups\n      # Other\n      LOG_LEVEL: info\n      SHOUTRRR_ADDRESSES: $DISCORD_SHOUTRRR_ADDRESS"
  },
  {
    "path": "compose/ds918/docker-gc.yml",
    "content": "services:\n  # Docker-GC - Automatic Docker Garbage Collection\n  # Create docker-gc-exclude file\n  docker-gc:\n    image: clockworksoul/docker-gc-cron:latest\n    container_name: docker-gc\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    # profiles: [\"apps\", \"all\"]\n    networks:\n      - socket_proxy\n    volumes:\n      # - /var/run/docker.sock:/var/run/docker.sock # Use Docker Socket Proxy instead for improved security\n      - $DOCKERDIR/appdata/docker-gc/docker-gc-exclude:/etc/docker-gc-exclude\n    environment:\n      CRON: 0 0 0 * * ? # Everyday at midnight. Previously 0 0 * * *\n      FORCE_IMAGE_REMOVAL: 1\n      FORCE_CONTAINER_REMOVAL: 0\n      GRACE_PERIOD_SECONDS: 604800\n      DRY_RUN: 0\n      CLEAN_UP_VOLUMES: 1\n      TZ: $TZ\n      DOCKER_HOST: tcp://socket-proxy:2375\n"
  },
  {
    "path": "compose/ds918/glances.yml",
    "content": "services:\n  # Glances - System Information\n  glances:\n    image: nicolargo/glances:latest-full\n    container_name: glances\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    # profiles: [\"apps\", \"all\"]\n    # privileged: true # Only for VM\n    # network_mode: host\n    networks:\n      - traefik_proxy\n      - socket_proxy\n      - default\n    ports:\n      - \"61208:61208\"\n    pid: host\n    volumes:\n      - $DOCKERDIR/appdata/glances/glances.conf:/glances/conf/glances.conf # Use this if you want to add a glances.conf file\n      - $DATADIR1:/data/data:ro\n      - $DOCKERDIR:/data/docker:ro\n      # - /var/run/docker.sock:/var/run/docker.sock:ro # Use Docker Socket Proxy instead for improved security\n    environment:\n      # GLANCES_OPT: \"-C /glances/conf/glances.conf --quiet --export influxdb\"\n      # GLANCES_OPT: \"--export influxdb\"\n      GLANCES_OPT: \"-w\"\n      DOCKER_HOST: tcp://socket-proxy:2375\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.glances-rtr.entrypoints=https\"\n      - \"traefik.http.routers.glances-rtr.rule=Host(`glances.$DOMAINNAME_DS918`)\"\n      # Middlewares\n      - \"traefik.http.routers.glances-rtr.middlewares=chain-oauth@file\"\n      # HTTP Services\n      - \"traefik.http.routers.glances-rtr.service=glances-svc\"\n      - \"traefik.http.services.glances-svc.loadbalancer.server.port=61208\""
  },
  {
    "path": "compose/ds918/mergerfs.yml",
    "content": "services:\n  # MergerFS - A featureful union filesystem\n  mergerfs:\n    container_name: mergerfs\n    hostname: mergerfs\n    image: hotio/mergerfs:latest\n    restart: always\n    # depends_on:\n    #  - gdrive # if using rclone\n    #  - gcrypt # if using rclone\n    user: $PUID:$PGID\n    command: \"/data/media1:/data/media2 \\\n      /data/media \\\n      -o rw,\\\n      use_ino,\\\n      allow_other,\\\n      func.getattr=newest,\\\n      category.action=all,\\\n      category.create=ff,\\\n      statfs_ignore=nc,\\\n      cache.files=auto-full,\\\n      func.getattr=newest,\\\n      dropcacheonclose=true,\\\n      nonempty\"\n    cap_add:\n      - SYS_ADMIN\n    security_opt:\n      - apparmor:unconfined\n    devices:\n      - /dev/fuse\n    environment:\n      - TZ=$TZ\n    volumes:\n      - /etc/passwd:/etc/passwd:ro\n      - /etc/group:/etc/group:ro\n      - /etc/fuse.conf:/etc/fuse.conf:shared\n      #- $DATADIR:/data:slave # creates local-media and shb-media on host\n      - $DATADIR1/test:/data/media1:rshared\n      - $DATADIR2/test:/data/media2:rshared\n      - $DATADIR1/mnt/media:/data/media:rshared"
  },
  {
    "path": "compose/ds918/oauth.yml",
    "content": "services:\n  # Google OAuth - Single Sign On using OAuth 2.0\n  # https://www.smarthomebeginner.com/google-oauth-with-traefik-docker/\n  # Also possible to forward all authentication requests to external service. See middlewares-oauth-external and chain-oauth-external.\n  oauth:\n    container_name: oauth\n    image: thomseddon/traefik-forward-auth:latest\n    # image: thomseddon/traefik-forward-auth:2.1-arm # Use this image with Raspberry Pi\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    #profiles: [\"core\", \"all\"]\n    networks:\n      - traefik_proxy\n    # Allow apps to bypass OAuth. Radarr example below will bypass OAuth if API key is present in the request (eg. from NZB360 mobile app).\n    # While this is one way, the recommended way is to bypass authentication using Traefik labels shown in some of the apps later.\n    # command: --rule.radarr.action=allow --rule.radarr.rule=\"Headers(`X-Api-Key`, `$RADARR_API_KEY`)\"\n    # command: --rule.sabnzbd.action=allow --rule.sabnzbd.rule=\"HeadersRegexp(`X-Forwarded-Uri`, `$SABNZBD_API_KEY`)\"\n    environment:\n      - CONFIG=/config\n      - COOKIE_DOMAIN=$DOMAINNAME_DS918\n      - INSECURE_COOKIE=false\n      - AUTH_HOST=oauth.$DOMAINNAME_DS918\n      - URL_PATH=/_oauth\n      - LOG_LEVEL=warn\n      - LOG_FORMAT=text\n      - LIFETIME=86400 # 1 day\n      - DEFAULT_ACTION=auth\n      - DEFAULT_PROVIDER=google\n    secrets:\n      - source: traefik_forward_auth\n        target: /config\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.oauth-rtr.tls=true\"\n      - \"traefik.http.routers.oauth-rtr.entrypoints=https\"\n      - \"traefik.http.routers.oauth-rtr.rule=Host(`oauth.$DOMAINNAME_DS918`)\"\n      # Middlewares\n      - \"traefik.http.routers.oauth-rtr.middlewares=chain-oauth@file\"\n      # HTTP Services\n      - \"traefik.http.routers.oauth-rtr.service=oauth-svc\"\n      - \"traefik.http.services.oauth-svc.loadbalancer.server.port=4181\""
  },
  {
    "path": "compose/ds918/plex-sync.yml",
    "content": "services:\n  # Plex-Sync - For Syncing watched status between plex servers\n  plex-sync:\n    image: patsissons/plex-sync:develop\n    container_name: plex-sync\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    # profiles: [\"media\", \"all\"]\n    networks:\n      - default\n    environment:\n      INITIAL_RUN: \"true\"\n      #DRY_RUN: 0\n      CRON_SCHEDULE: \"*/30 * * * *\"\n      SECTION_MAPS: > \n        $HOME_SERVER_PLEX/$HOME_SERVER_PLEX_MOVHOL $SYNOLOGY_PLEX/$SYNOLOGY_PLEX_MOVHOL | \n        $HOME_SERVER_PLEX/$HOME_SERVER_PLEX_SHOTV $SYNOLOGY_PLEX/$SYNOLOGY_PLEX_SHOTV | \n        $HOME_SERVER_PLEX/$HOME_SERVER_PLEX_SHOKID $SYNOLOGY_PLEX/$SYNOLOGY_PLEX_SHOKID |\n        $HOME_SERVER_PLEX/$HOME_SERVER_PLEX_MOVKID $SYNOLOGY_PLEX/$SYNOLOGY_PLEX_MOVKID | \n        $HOME_SERVER_PLEX/$HOME_SERVER_PLEX_MOVIND $SYNOLOGY_PLEX/$SYNOLOGY_PLEX_MOVIND | \n        $HOME_SERVER_PLEX/$HOME_SERVER_PLEX_MOVKOL $SYNOLOGY_PLEX/$SYNOLOGY_PLEX_MOVKOL | \n        $HOME_SERVER_PLEX/$HOME_SERVER_PLEX_MOVDOC $SYNOLOGY_PLEX/$SYNOLOGY_PLEX_MOVDOC | \n        $HOME_SERVER_PLEX/$HOME_SERVER_PLEX_SHODOC $SYNOLOGY_PLEX/$SYNOLOGY_PLEX_SHODOC | \n        $HOME_SERVER_PLEX/$HOME_SERVER_PLEX_MOVFOR $SYNOLOGY_PLEX/$SYNOLOGY_PLEX_MOVFOR | \n        $HOME_SERVER_PLEX/$HOME_SERVER_PLEX_SHOFOR $SYNOLOGY_PLEX/$SYNOLOGY_PLEX_SHOFOR | \n        $HOME_SERVER_PLEX/$HOME_SERVER_PLEX_SHOIND $SYNOLOGY_PLEX/$SYNOLOGY_PLEX_SHOIND"
  },
  {
    "path": "compose/ds918/plex.yml",
    "content": "services:\n  # Plex - Media Server\n  plex:\n    image: plexinc/pms-docker:plexpass\n    container_name: plex\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    # profiles: [\"media\", \"all\"]\n    networks:\n      - traefik_proxy\n    ports:\n      - \"32400:32400/tcp\"\n      - \"3005:3005/tcp\"\n      - \"8324:8324/tcp\"\n      - \"32469:32469/tcp\"\n      # - \"1900:1900/udp\" # conflicts with xTeVe and Synology default ports\n      - \"32410:32410/udp\"\n      - \"32412:32412/udp\"\n      - \"32413:32413/udp\"\n      - \"32414:32414/udp\"\n      - \"33400:33400\"\n    devices:\n      - /dev/dri:/dev/dri # for hardware transcoding\n    volumes:\n      - $DOCKERDIR/appdata/plex:/config\n      - $DOWNLOADSDIR:/data/downloads\n      - $DATADIR1/media:/data/media\n      - $DATADIR2/media:/data/media2\n      - /dev/shm:/transcode\n    environment:\n      TZ: $TZ\n      HOSTNAME: \"sPlex\"\n      PLEX_CLAIM_FILE: /run/secrets/plex_claim\n      PLEX_UID: $PUID\n      PLEX_GID: $PGID\n      ADVERTISE_IP: \"http://$SERVER_IP1:32400/,http://$SERVER_IP2:32400,https://splex.$DOMAINNAME_HS,https://splex.$DOMAINNAME_DS918,http://$ZEROTIER_IP_SYNOLOGY:32400/\"\n    secrets:\n      - plex_claim\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.plex-rtr.entrypoints=https\"\n      - \"traefik.http.routers.plex-rtr.rule=Host(`splex.$DOMAINNAME_DS918`)\"\n      # Middlewares\n      - \"traefik.http.routers.plex-rtr.middlewares=chain-no-auth@file\"\n      # HTTP Services\n      - \"traefik.http.routers.plex-rtr.service=plex-svc\"\n      - \"traefik.http.services.plex-svc.loadbalancer.server.port=32400\""
  },
  {
    "path": "compose/ds918/portainer.yml",
    "content": "services:\n  # Portainer - WebUI for Containers\n  portainer:\n    container_name: portainer\n    image: portainer/portainer-ee:latest # Use portainer-ce if you do no have a Business Edition license key\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    # profiles: [\"core\", \"all\"]\n    networks:\n      - traefik_proxy\n      - socket_proxy\n    # command: -H unix:///var/run/docker.sock # # Use Docker Socket Proxy instead for improved security\n    command: -H tcp://socket-proxy:2375\n    ports:\n      - \"9000:9000\"\n    volumes:\n      # - /var/run/docker.sock:/var/run/docker.sock:ro # # Use Docker Socket Proxy instead for improved security\n      - $DOCKERDIR/appdata/portainer/data:/data # Change to local directory if you want to save/transfer config locally\n    environment:\n      - TZ=$TZ\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.portainer-rtr.entrypoints=https\"\n      - \"traefik.http.routers.portainer-rtr.rule=Host(`portainer.$DOMAINNAME_DS918`)\"\n      # Middlewares\n      - \"traefik.http.routers.portainer-rtr.middlewares=chain-oauth@file\"\n      # HTTP Services\n      - \"traefik.http.routers.portainer-rtr.service=portainer-svc\"\n      - \"traefik.http.services.portainer-svc.loadbalancer.server.port=9000\""
  },
  {
    "path": "compose/ds918/qdirstat.yml",
    "content": "services:\n  # qDirStat - Directory Statistics\n  qdirstat:\n    image: jlesage/qdirstat:latest\n    container_name: qdirstat\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    # profiles: [\"apps\", \"all\"]\n    networks:\n      - traefik_proxy\n    ports:\n      - \"5800:5800\"\n    volumes:\n      - /volume1:/storage:ro\n      - $DOCKERDIR/appdata/qdirstat/config:/config:rw\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      UMASK: 002\n      TZ: $TZ\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      VNC_PASSWORD: $QDIRSTAT_VNC_PASSWD\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.qdirstat-rtr.entrypoints=https\"\n      - \"traefik.http.routers.qdirstat-rtr.rule=Host(`qdir.$DOMAINNAME_DS918`)\"\n      # Middlewares\n      - \"traefik.http.routers.qdirstat-rtr.middlewares=chain-oauth@file\"\n      # HTTP Services\n      - \"traefik.http.routers.qdirstat-rtr.service=qdirstat-svc\"\n      - \"traefik.http.services.qdirstat-svc.loadbalancer.server.port=5800\""
  },
  {
    "path": "compose/ds918/rclone-gcrypt.yml",
    "content": "services:\n  # Rclone - Google Drive Mount\n  gcrypt:\n    container_name: gcrypt\n    image: rclone/rclone:latest\n    security_opt:\n      - no-new-privileges:true\n      - apparmor:unconfined\n    restart: unless-stopped\n    # profiles: [\"core\", \"all\"]\n    networks:\n      - traefik_proxy\n    cap_add:\n      - SYS_ADMIN\n    command:\n      \"mount gcrypt: /data/gcrypt \\\n      --use-mmap \\\n      --allow-other \\\n      --no-modtime \\\n      --allow-non-empty \\\n      --dir-cache-time=1000h \\\n      --buffer-size=128M \\\n      --uid=1026 \\\n      --gid=100 \\\n      --umask=002 \\\n      --user-agent=ds918 \\\n      --cache-dir=/data/cache/gcrypt \\\n      --vfs-cache-mode=full \\\n      --vfs-cache-max-age=336h \\\n      --vfs-cache-max-size=512G \\\n      --vfs-read-chunk-size-limit=2G \\\n      --log-file /config/rclone/logs/gcrypt.log \\\n      --log-level=NOTICE\"\n      #--bwlimit 3M \\\n      # 3M approxmimately equals 253 GB limit per day\n    devices:\n      - /dev/fuse\n    volumes:\n      - $DOCKERDIR/appdata/rclone:/config/rclone\n      - $DATADIR1/mnt/rclone/gcrypt:/data/gcrypt:shared\n      - $DATADIR1/mnt/rclone/cache/gcrypt:/data/cache/gcrypt\n      - /etc/passwd:/etc/passwd:ro\n      - /etc/group:/etc/group:ro\n      - /etc/fuse.conf:/etc/fuse.conf:ro\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID"
  },
  {
    "path": "compose/ds918/rclone-gdrive.yml",
    "content": "services:\n  # Rclone - Google Drive Mount\n  # https://github.com/openbridge/ob_bulkstash/issues/19\n  # https://github.com/romancin/rclonebrowser-docker\n  # https://hub.docker.com/r/d2dyno/rclone-gui\n  gdrive:\n    container_name: gdrive\n    image: rclone/rclone:latest\n    security_opt:\n      - no-new-privileges:true\n      - apparmor:unconfined\n    restart: unless-stopped\n    # profiles: [\"core\", \"all\"]\n    networks:\n      - traefik_proxy\n    cap_add:\n      - SYS_ADMIN\n    command:\n      \"mount gdrive: /data/gdrive \\\n      --use-mmap \\\n      --allow-other \\\n      --no-modtime \\\n      --allow-non-empty \\\n      --dir-cache-time=1000h \\\n      --buffer-size=128M \\\n      --umask=002 \\\n      --uid=1026 \\\n      --gid=100 \\\n      --user-agent=ds918 \\\n      --cache-dir=/data/cache/gdrive \\\n      --vfs-cache-mode=full \\\n      --vfs-cache-max-age=336h \\\n      --vfs-cache-max-size=512G \\\n      --vfs-read-chunk-size-limit=2G \\\n      --log-file /config/rclone/logs/gdrive.log \\\n      --rc \\\n      --rc-web-gui \\\n      --rc-addr :5572 \\\n      --rc-user=$RCLONE_WEBUI_USER \\\n      --rc-pass=$RCLONE_WEBUI_PASS \\\n      --log-level=NOTICE\"\n      #--bwlimit 150M \\\n      #--bwlimit-file 40M \\\n    devices:\n      - /dev/fuse\n    volumes:\n      - $DOCKERDIR/appdata/rclone:/config/rclone\n      - $DATADIR1/mnt/rclone/gdrive:/data/gdrive:shared\n      - $DATADIR1/mnt/rclone/cache/gdrive:/data/cache/gdrive\n      - /etc/passwd:/etc/passwd:ro\n      - /etc/group:/etc/group:ro\n      - /etc/fuse.conf:/etc/fuse.conf:ro\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.rclone-drive-rtr.entrypoints=https\"\n      - \"traefik.http.routers.rclone-drive-rtr.rule=Host(`rclone.$DOMAINNAME_DS918`)\"\n      # Middlewares\n      - \"traefik.http.routers.rclone-drive-rtr.middlewares=chain-oauth@file\"\n      # HTTP Services\n      - \"traefik.http.routers.rclone-drive-rtr.service=rclone-drive-svc\"\n      - \"traefik.http.services.rclone-drive-svc.loadbalancer.server.port=5572\""
  },
  {
    "path": "compose/ds918/socket-proxy.yml",
    "content": "services:\n  # Docker Socket Proxy - Security Enchanced Proxy for Docker Socket\n  socket-proxy:\n    container_name: socket-proxy\n    image: tecnativa/docker-socket-proxy\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    #profiles: [\"core\", \"all\"]\n    networks:\n      socket_proxy:\n        ipv4_address: 192.168.91.254 # You can specify a static IP    # privileged: true # true for VM. False for unprivileged LXC container.\n    ports:\n    # - \"$ZEROTIER_IP_SYNOLOGY:2375:2375\" # Port 2375 should only ever get exposed to the internal network. When possible use this line.\n    # I use the next line instead, as I want portainer to manage multiple docker endpoints within my home network.\n      - \"2375:2375\"\n    volumes:\n      - \"/var/run/docker.sock:/var/run/docker.sock\"\n    environment:\n      - LOG_LEVEL=info # debug,info,notice,warning,err,crit,alert,emerg\n      ## Variables match the URL prefix (i.e. AUTH blocks access to /auth/* parts of the API, etc.).\n      # 0 to revoke access.\n      # 1 to grant access.\n      ## Granted by Default\n      - EVENTS=1\n      - PING=1\n      - VERSION=1\n      ## Revoked by Default\n      # Security critical\n      - AUTH=0\n      - SECRETS=0\n      - POST=1 # Watchtower\n      # Not always needed\n      - BUILD=0\n      - COMMIT=0\n      - CONFIGS=0\n      - CONTAINERS=1 # Traefik, portainer, etc.\n      - DISTRIBUTION=0\n      - EXEC=0\n      - IMAGES=1 # Portainer\n      - INFO=1 # Portainer\n      - NETWORKS=1 # Portainer\n      - NODES=0\n      - PLUGINS=0\n      - SERVICES=1 # Portainer\n      - SESSION=0\n      - SWARM=0\n      - SYSTEM=0\n      - TASKS=1 # Portainer\n      - VOLUMES=1 # Portainer"
  },
  {
    "path": "compose/ds918/syncthing.yml",
    "content": "services:\n  # SyncThing - Keep folders in Sync\n  syncthing:\n    image: lscr.io/linuxserver/syncthing\n    container_name: syncthing\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    # profiles: [\"core\", \"all\"]\n    networks:\n      - traefik_proxy\n    ports:\n      - \"8384:8384\"\n      - \"22000:22000/tcp\"\n      - \"22000:22000/udp\"\n      - \"21027:21027/udp\"\n    volumes:\n      - /volume1:/data/volume1\n      - $DOCKERDIR/appdata/syncthing:/config\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.syncthing-rtr.entrypoints=https\"\n      - \"traefik.http.routers.syncthing-rtr.rule=Host(`stnas.$DOMAINNAME_DS918`)\"\n      # Middlewares\n      - \"traefik.http.routers.syncthing-rtr.middlewares=chain-oauth@file\"\n      # HTTP Services\n      - \"traefik.http.routers.syncthing-rtr.service=syncthing-svc\"\n      - \"traefik.http.services.syncthing-svc.loadbalancer.server.port=8384\""
  },
  {
    "path": "compose/ds918/tdarr.yml",
    "content": "services:\n  # Tdarr Server - Library Optimizer\n  tdarr:\n    image: ghcr.io/haveagitgat/tdarr:latest\n    logging:\n      options:\n        max-size: \"10m\"\n        max-file: \"3\"\n    container_name: tdarr\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    # profiles: [\"media\", \"all\"]\n    networks:\n      - traefik_proxy\n    devices:\n      - /dev/dri:/dev/dri # for hardware transcoding\n    ports:\n      - 8265:8265 # webUI port\n      - 8266:8266 # server port\n    volumes:\n      - $DOCKERDIR/appdata/tdarr/server:/app/server\n      - $DOCKERDIR/appdata/tdarr/configs:/app/configs\n      - $DOCKERDIR/appdata/tdarr/logs:/app/logs\n      - $DOWNLOADSDIR/transcode/tdarr:/data/temp\n      - $ZDATADIR/Photos/zVideos:/data/zVideos-source:ro\n      - $DATADIR1/media/zvideos:/data/zVideos-destination\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n      UMASK_SET: 002\n      serverIP: 0.0.0.0 # or hostname\n      serverPort: 8266\n      webUIPort: 8265\n      internalNode: true\n      inContainer: true\n      ffmpegVersion: 6\n      nodeName: tdarr-node-ds918\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.tdarr-rtr.entrypoints=https\"\n      - \"traefik.http.routers.tdarr-rtr.rule=Host(`tdarr.$DOMAINNAME_DS918`)\"\n      # Middlewares\n      - \"traefik.http.routers.tdarr-rtr.middlewares=chain-oauth@file\"\n      # HTTP Services\n      - \"traefik.http.routers.tdarr-rtr.service=tdarr-svc\"\n      - \"traefik.http.services.tdarr-svc.loadbalancer.server.port=8265\""
  },
  {
    "path": "compose/ds918/traefik.yml",
    "content": "services:\n  # Traefik 2 - Reverse Proxy\n  traefik:\n    container_name: traefik\n    image: traefik:2.11\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    #profiles: [\"core\", \"all\"]\n    networks:\n      t2_proxy:\n        ipv4_address: 192.168.90.254 # You can specify a static IP\n      socket_proxy:\n    command: # CLI arguments\n      - --global.checkNewVersion=true\n      - --global.sendAnonymousUsage=true\n      - --entrypoints.http.address=:80\n      - --entrypoints.https.address=:443\n      - --entrypoints.traefik.address=:8080\n      # - --entrypoints.ping.address=:8081\n      - --entrypoints.http.http.redirections.entrypoint.to=https\n      - --entrypoints.http.http.redirections.entrypoint.scheme=https\n      - --entrypoints.http.http.redirections.entrypoint.permanent=true\n      - --api=true\n      - --api.dashboard=true\n      - --api.insecure=true\n      #- --ping=true\n      # - --serversTransport.insecureSkipVerify=true\n      # Allow these IPs to set the X-Forwarded-* headers - Cloudflare IPs: https://www.cloudflare.com/ips/\n      - --entrypoints.https.forwardedHeaders.trustedIPs=$CLOUDFLARE_IPS,$LOCAL_IPS\n      - --log=true\n      - --log.filePath=/logs/traefik.log\n      - --log.level=INFO # (Default: error) DEBUG, INFO, WARN, ERROR, FATAL, PANIC\n      - --accessLog=true\n      - --accessLog.filePath=/logs/access.log\n      - --accessLog.bufferingSize=100 # Configuring a buffer of 100 lines\n      - --accessLog.filters.statusCodes=204-299,400-499,500-599\n      - --providers.docker=true\n      # - --providers.docker.endpoint=unix:///var/run/docker.sock # Disable for Socket Proxy. Enable otherwise.\n      - --providers.docker.endpoint=tcp://socket-proxy:2375 # Enable for Socket Proxy. Disable otherwise.\n      - --providers.docker.exposedByDefault=false\n      - --providers.docker.network=t2_proxy \n      # - --providers.docker.swarmMode=false # Traefik v2 Swarm\n      # - --providers.swarm.endpoint=tcp://127.0.0.1:2377 # Traefik v3 Swarm\n      - --entrypoints.https.http.tls=true\n      - --entrypoints.https.http.tls.options=tls-opts@file\n      # Add dns-cloudflare as default certresolver for all services. Also enables TLS and no need to specify on individual services\n      - --entrypoints.https.http.tls.certresolver=dns-cloudflare\n      - --entrypoints.https.http.tls.domains[0].main=$DOMAINNAME_DNS\n      - --entrypoints.https.http.tls.domains[0].sans=*.$DOMAINNAME_DNS\n      - --providers.file.directory=/rules # Load dynamic configuration from one or more .toml or .yml files in a directory\n      - --providers.file.watch=true # Only works on top level files in the rules folder\n      - --certificatesResolvers.dns-cloudflare.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory # LetsEncrypt Staging Server - uncomment when testing\n      - --certificatesResolvers.dns-cloudflare.acme.storage=/acme.json\n      - --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.provider=cloudflare\n      - --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.resolvers=1.1.1.1:53,1.0.0.1:53\n      - --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.delayBeforeCheck=90 # To delay DNS check and reduce LE hitrate\n      # - --metrics.prometheus=true\n      # - --metrics.prometheus.buckets=0.1,0.3,1.2,5.0\n    #healthcheck:\n    #  test: [\"CMD\", \"traefik\", \"healthcheck\", \"--ping\"]\n    #  interval: 5s\n    #  retries: 3\n    ports:\n      - target: 80\n        published: 80\n        protocol: tcp\n        mode: host\n      - target: 443\n        published: 443\n        protocol: tcp\n        mode: host\n      # - target: 8080 # need to enable --api.insecure=true\n      #   published: 8080\n      #   protocol: tcp\n      #   mode: host\n    volumes:\n      - $DOCKERDIR/appdata/traefik2/rules/$HOSTNAME:/rules # Dynamic File Provider directory\n      # - /var/run/docker.sock:/var/run/docker.sock:ro # Enable if not using Socket Proxy\n      - $DOCKERDIR/appdata/traefik2/acme/acme.json:/acme.json # Certs File \n      - $DOCKERDIR/logs/$HOSTNAME/traefik:/logs # Traefik logs\n    environment:\n      - TZ=$TZ\n      - CF_DNS_API_TOKEN_FILE=/run/secrets/cf_dns_api_token   \n      - HTPASSWD_FILE=/run/secrets/basic_auth_credentials # HTTP Basic Auth Credentials\n      - DOMAINNAME_DNS\n      - DOMAINNAME_HS\n    secrets:\n      - cf_dns_api_token\n      - basic_auth_credentials\n    labels:\n      #- \"autoheal=true\"\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.traefik-rtr.entrypoints=https\"\n      - \"traefik.http.routers.traefik-rtr.rule=Host(`traefik.$DOMAINNAME_DNS` )\"\n      # Services - API\n      - \"traefik.http.routers.traefik-rtr.service=api@internal\"\n      # Healthcheck/ping\n      #- \"traefik.http.routers.ping.rule=Host(`traefik.$DOMAINNAME_DNS`) && Path(`/ping`)\"\n      #- \"traefik.http.routers.ping.tls=true\"\n      #- \"traefik.http.routers.ping.service=ping@internal\"\n      # Middlewares\n      - \"traefik.http.routers.traefik-rtr.middlewares=chain-basic-auth@file\"\n      #- \"traefik.http.routers.traefik-rtr.middlewares=chain-oauth@file\""
  },
  {
    "path": "compose/ds918/vscode.yml",
    "content": "services:\n  # VSCode - VSCode Editing\n  vscode: \n    image: lscr.io/linuxserver/code-server:latest \n    container_name: vscode\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    # profiles: [\"core\", \"all\"]\n    networks:\n      - traefik_proxy\n    ports:\n      - \"8443:8443\"\n    volumes:\n      - $DOCKERDIR:/data/docker\n      - $DOCKERDIR/appdata/vscode:/config\n      - $DATADIR1:/data/data\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n      # DOCKER_HOST: tcp://socket-proxy:2375\n      # PASSWORD: $VSCODE_PASSWORD\n      # HASHED_PASSWORD: #optional\n      # SUDO_PASSWORD: password #optional\n      # SUDO_PASSWORD_HASH: #optional\n      # PROXY_DOMAIN: code-server.my.domain #optional\n      # DEFAULT_WORKSPACE: /config/data/User/Workspaces/AZ.code-workspace #optional\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.vscode-rtr.entrypoints=https\"\n      - \"traefik.http.routers.vscode-rtr.rule=Host(`code.$DOMAINNAME_DS918`)\"\n      # Middlewares\n      - \"traefik.http.routers.vscode-rtr.middlewares=chain-oauth@file\"\n      # HTTP Services\n      - \"traefik.http.routers.vscode-rtr.service=vscode-svc\"\n      - \"traefik.http.services.vscode-svc.loadbalancer.server.port=8443\""
  },
  {
    "path": "compose/ds918/zerotier.yml",
    "content": "services:\n  # ZeroTier-One - Private Network over Internet\n  zerotier:\n    image: zerotier/zerotier-synology:latest\n    container_name: zerotier\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    # profiles: [\"core\", \"all\"]\n    network_mode: host\n    cap_add:\n      - NET_ADMIN\n      - SYS_ADMIN\n    devices:\n      - /dev/net/tun\n    volumes:\n      - $DOCKERDIR/appdata/zerotier:/var/lib/zerotier-one"
  },
  {
    "path": "compose/hs/adminer.yml",
    "content": "services:\n  # Adminer - Frontend for Various Databases (MariaDB, PostgreSQL, etc.)\n  adminer:\n    image: adminer:latest\n    container_name: adminer\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$ADMINER_PORT:8080\"\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/bazarr.yml",
    "content": "services:\n  # Bazarr - Subtitle Management\n  bazarr:\n    image: lscr.io/linuxserver/bazarr\n    container_name: bazarr\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"media\", \"starr\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$BAZARR_PORT:6767\"\n    volumes:\n      - $DOCKERDIR/appdata/bazarr:/config\n      - $MEDIADIR1:/data/media1\n      - $MEDIADIR2:/data/media2\n      # - $MEDIADIR3:/data/media3\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/cleanuparr.yml",
    "content": "services:\n  # Cleanuparr - Arr Stack Cleanup Tool\n  cleanuparr:\n    image: ghcr.io/cleanuparr/cleanuparr:latest\n    container_name: cleanuparr\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"all\", \"apps\"]\n    networks:\n      - default\n    ports:\n      - \"$CLEANUPARR_PORT:11011\"\n    volumes:\n      - $DOCKERDIR/appdata/cleanuparr:/config\n    environment:\n      TZ: $TZ\n      PORT: 11011\n      PUID: $PUID\n      PGID: $PGID\n      UMASK: \"022\"\n    stop_signal: SIGTERM\n    stop_grace_period: 30s\n    healthcheck:\n      test: [\"CMD\", \"curl\", \"-f\", \"http://localhost:11011/health\"]\n      interval: 30s\n      timeout: 10s\n      start_period: 30s\n      retries: 3\n    # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/hs/cloud-commander.yml",
    "content": "services:\n  # Cloud Commander - web file manager\n  cloud-commander:\n    image: coderaiser/cloudcmd\n    container_name: cloud-commander\n    restart: unless-stopped\n    security_opt:\n      - no-new-privileges:true\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$CLOUDCOMMANDER_PORT:8000\"\n    volumes:\n      - $DOCKERDIR/appdata/cloud-commander:/root\n      - $USERDIR:/data/$PRIMARY_USERNAME\n      - $MEDIADIR1:/data/media1\n      - $MEDIADIR2:/data/media2\n      # - $MEDIADIR3:/data/media3\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n    # DOCKER-LABELS-PLACEHOLDER\n  "
  },
  {
    "path": "compose/hs/custom.yml",
    "content": "# Add all your custom docker compose snippets here. Auto-Traefik will not modify this.\n# Uncomment services and the compose below it, following yaml syntax.\n\n# services:\n"
  },
  {
    "path": "compose/hs/deployrr-dashboard.yml",
    "content": "services:\n  # Deployrr Dashboard - Homepage based Dashboard for Deployrr\n  deployrr-dashboard:\n    image: ghcr.io/gethomepage/homepage:v1.3.2 \n    container_name: deployrr-dashboard\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n      - socket_proxy\n    ports:\n      - \"$DEPLOYRRDASHBOARD_PORT:3000\" \n    volumes:\n      - $DOCKERDIR/appdata/deployrr-dashboard/config:/app/config\n      - $DOCKERDIR/appdata/deployrr-dashboard/images:/app/public/images\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n      HOMEPAGE_ALLOWED_HOSTS: \"*\"\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/deunhealth.yml",
    "content": "services:\n  # DeUnhealth - Restart your unhealthy containers safely (e.g. containers depending on VPN and VPN reconnects)\n  deunhealth:\n    image: qmcgaw/deunhealth\n    container_name: deunhealth\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]    \n    networks:\n      - socket_proxy\n    environment:\n      - LOG_LEVEL=info\n      - HEALTH_SERVER_ADDRESS=127.0.0.1:9999\n      - TZ=$TZ\n      - DOCKER_HOST\n    # DOCKER-LABELS-PLACEHOLDER  "
  },
  {
    "path": "compose/hs/docker-gc.yml",
    "content": "services:\n  # Docker-GC - Automatic Docker Garbage Collection\n  # Create docker-gc-exclude file\n  docker-gc:\n    image: clockworksoul/docker-gc-cron:latest\n    container_name: docker-gc\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - socket_proxy\n    volumes:\n      # - /var/run/docker.sock:/var/run/docker.sock # Use Docker Socket Proxy instead for improved security\n      - $DOCKERDIR/appdata/docker-gc/docker-gc-exclude:/etc/docker-gc-exclude\n    environment:\n      - CRON=0 0 0 * * ? # Everyday at midnight. Previously 0 0 * * *\n      - FORCE_IMAGE_REMOVAL=1\n      - FORCE_CONTAINER_REMOVAL=0\n      - GRACE_PERIOD_SECONDS=604800\n      - DRY_RUN=0\n      - CLEAN_UP_VOLUMES=1\n      - TZ=$TZ\n      - DOCKER_HOST\n    # DOCKER-LABELS-PLACEHOLDER  "
  },
  {
    "path": "compose/hs/dozzle.yml",
    "content": "services:\n  # Dozzle - Real-time Docker Log Viewer\n  dozzle:\n    image: amir20/dozzle:latest\n    container_name: dozzle\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n      - socket_proxy\n    ports:\n      - \"$DOZZLE_PORT:8080\"\n    environment:\n      - DOZZLE_LEVEL=info\n      - DOZZLE_TAILSIZE=300\n      - DOZZLE_FILTER=\"status=running\"\n      # - DOZZLE_FILTER=\"label=log_me\" # limits logs displayed to containers with this label\n      - DOCKER_HOST\n    # volumes:\n    #  - /var/run/docker.sock:/var/run/docker.sock # Use Docker Socket Proxy instead for improved security\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/firefly-importer.yml",
    "content": "services:\n  # Firefly Importer - Data Importer for Firefly III\n  firefly-importer:\n    image: fireflyiii/data-importer:latest\n    container_name: firefly_importer\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$FIREFLYIMPORTER_PORT:8080\"\n    volumes:\n      - $DOCKERDIR/appdata/firefly:/var/www/html/storage/upload\n    depends_on:\n      - firefly\n    env_file: $DOCKERDIR/appdata/firefly/importer.env\n    # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/hs/firefly.yml",
    "content": "services:\n  # Firefly III - Personal Finance Manager\n  firefly:\n    image: fireflyiii/core:latest\n    container_name: firefly\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$FIREFLY_PORT:8080\"\n    volumes:\n      - $DOCKERDIR/appdata/firefly:/var/www/html/storage/upload\n    env_file: $DOCKERDIR/appdata/firefly/firefly.env\n    # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/hs/glances.yml",
    "content": "services:\n  # Glances - System Information\n  glances:\n    image: nicolargo/glances:latest-full\n    container_name: glances\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"monitoring\", \"all\"]\n    # privileged: true # Only for VM\n    networks:\n      - default\n      - socket_proxy\n    ports:\n      - \"$GLANCES_PORT:61208\"\n    pid: host\n    volumes:\n      - $DOCKERDIR/appdata/glances/glances.conf:/glances/conf/glances.conf # Use this if you want to add a glances.conf file\n      - $DOCKERDIR:/data/docker:ro\n      # - /var/run/docker.sock:/var/run/docker.sock:ro # Use Docker Socket Proxy instead for improved security\n    environment:\n      # - GLANCES_OPT=\"-C /glances/conf/glances.conf --quiet --export influxdb\"\n      # - GLANCES_OPT=\"--export influxdb\"\n      - \"GLANCES_OPT=-w\"\n      - DOCKER_HOST\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/gluetun.yml",
    "content": "services:\n  # Gluetun - VPN Client for Docker Containers and More\n  # Gluetun only for use by torrent clients + on demand lan devices.\n  # Arr apps do not need VPN (not recommended), unless you have ISP/country restrictions.\n  gluetun:\n    image: qmcgaw/gluetun\n    container_name: gluetun\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      - default\n    cap_add:\n      - NET_ADMIN\n    devices:\n      - /dev/net/tun\n    ports:\n      - $QBITTORRENTVPN_PORT:8080 # qBittorrent available at http://DOCKER-HOST-IP:$QBITTORRENTVPN_PORT\n      # - 8888:8888/tcp # HTTP proxy\n      # - 8388:8388/tcp # Shadowsocks\n      # - 8388:8388/udp # Shadowsocks\n    volumes:\n      - $DOCKERDIR/appdata/gluetun:/gluetun\n    environment:\n      TZ: $TZ\n      VPN_SERVICE_PROVIDER: $GLUETUN_VPN_SERVICE_PROVIDER\n      VPN_TYPE: $GLUETUN_VPN_TYPE # wireguard / openvpn\n      WIREGUARD_PRIVATE_KEY: $GLUETUN_WIREGUARD_PRIVATE_KEY\n      WIREGUARD_ADDRESSES: $GLUETUN_WIREGUARD_ADDRESSES\n      # OPENVPN_USER: $GLUETUN_OPENVPN_USERNAME\n      # OPENVPN_PASSWORD: $GLUETUN_OPENVPN_PASSWORD \n    # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/hs/it-tools.yml",
    "content": "services:\n  # IT-Tools - Status Page & Monitoring Server\n  it-tools:\n    image: corentinth/it-tools\n    container_name: it-tools\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$ITTOOLS_PORT:80\"\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/kometa.yml",
    "content": "services:\n  # Kometa - Automatic Metadata Manager for Plex (formerly Plex Meta Mananger)\n  kometa:\n    image: lscr.io/linuxserver/kometa:latest\n    container_name: kometa\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"media\", \"all\"]\n    networks:\n      - default\n    volumes:\n      - $DOCKERDIR/appdata/kometa:/config\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n      KOMETA_CONFIG: /config/config.yml #optional\n      KOMETA_TIME: 03:00 #optional\n      KOMETA_RUN: True #optional\n      KOMETA_TEST: False #optional\n      KOMETA_NO_MISSING: False #optional\n    # DOCKER-LABELS-PLACEHOLDER  \n\n"
  },
  {
    "path": "compose/hs/lidarr.yml",
    "content": "services:\n  # Lidarr - Music Management\n  lidarr:\n    image: lscr.io/linuxserver/lidarr:latest\n    container_name: lidarr\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"media\", \"starr\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$LIDARR_PORT:8686\"\n    volumes:\n      - $DOCKERDIR/appdata/lidarr:/config\n      - $DATADIR1:/data\n      # - $MEDIADIR2:/data/media2\n      # - $MEDIADIR3:/data/media3\n      - $DOWNLOADSDIR:/data/downloads \n      - \"/etc/localtime:/etc/localtime:ro\"\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/maintainerr.yml",
    "content": "services:\n  # Maintainerr - Manage Plex Media\n  maintainerr:\n    image: ghcr.io/jorenn92/maintainerr:latest\n    container_name: maintainerr\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$MAINTAINERR_PORT:6246\"\n    user: $PUID:$PGID\n    volumes:\n      - $DOCKERDIR/appdata/maintainerr:/opt/data\n    environment:\n      TZ: $TZ\n      DEBUG: true\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/makemkv.yml",
    "content": "services:\n  # MakeMKV - Video Editing (Ripping from Disks)\n  makemkv:\n    image: jlesage/makemkv:latest\n    container_name: makemkv\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"media\",\"all\"]\n    networks:\n      - default\n    ports:\n      - \"$MAKEMKV_PORT:5800\"\n    volumes:\n      - $DOWNLOADSDIR:/data/downloads\n      - $DOCKERDIR/appdata/makemkv/config:/config\n      - /dev/shm:/dev/shm\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      UMASK: 002\n      TZ: $TZ\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      # VNC_PASSWORD: $MAKEMKV_VNC_PASSWD\n    # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/hs/mkvtoolnix.yml",
    "content": "services:\n  # MKVToolNix - Video Editing (Remuxing - changing media container while keeping original source quality)\n  mkvtoolnix:\n    image: jlesage/mkvtoolnix:latest\n    container_name: mkvtoolnix\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"media\",\"all\"]\n    networks:\n      - default\n    ports:\n      - \"$MKVTOOLNIX_PORT:5800\"\n    volumes:\n      - $DOWNLOADSDIR:/data/downloads\n      - $DOCKERDIR/appdata/mkvtoolnix/config:/config:rw\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      UMASK: 002\n      TZ: $TZ\n      KEEP_APP_RUNNING: 1\n      CLEAN_TMP_DIR: 1\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n      # VNC_PASSWORD: $MKVTOOLNIX_VNC_PASSWD\n    # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/hs/notifiarr.yml",
    "content": "services:\n  # Notifiarr - Client for Notifiarr.com\n  notifiarr:\n    image: golift/notifiarr\n    container_name: notifiarr\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"media\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$NOTIFIARR_PORT:5454\" \n    volumes:\n      - $DOCKERDIR/appdata/notifiarr:/config\n      - /var/run/utmp:/var/run/utmp\n      - /etc/machine-id:/etc/machine-id\n    environment:\n      DN_API_KEY: $NOTIFIARR_API_KEY\n      #DN_AUTO_UPDATE: off\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n    # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/hs/oauth.yml",
    "content": "services:\n  # Traefik Forward Auth - Single Sign On using OAuth 2.0\n  oauth:\n    container_name: oauth\n    image: ghcr.io/italypaleale/traefik-forward-auth:4\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      - t3_proxy\n    # ports:\n    #   - \"4181:4181\"\n    volumes:\n      - $DOCKERDIR/appdata/oauth/tfa_config.yaml:/etc/traefik-forward-auth/config.yaml:ro\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.oauth-rtr.entrypoints=websecure-internal,websecure-external\"\n      - \"traefik.http.routers.oauth-rtr.rule=Host(`auth.$DOMAINNAME_1`)\"\n      # Middlewares\n      - \"traefik.http.routers.oauth-rtr.middlewares=chain-no-auth@file\"\n      # HTTP Services\n      - \"traefik.http.routers.oauth-rtr.service=oauth-svc\"\n      - \"traefik.http.services.oauth-svc.loadbalancer.server.port=4181\"\n    # DOCKER-LABELS-PLACEHOLDER  \n"
  },
  {
    "path": "compose/hs/picard.yml",
    "content": "services:\n  # Picard - Music Library Tagging and Management\n  picard:\n    image: mikenye/picard:latest\n    container_name: picard\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"media\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$PICARD_PORT:5800\"\n    volumes:\n      - $DOCKERDIR/appdata/picard:/config:rw\n      - $DOWNLOADSDIR:/downloads\n      - /dev/shm:/dev/shm\n    environment:\n      USER_ID: $PUID\n      GROUP_ID: $PGID\n      TZ: $TZ\n      UMASK: 002\n      DISPLAY_WIDTH: 1600\n      DISPLAY_HEIGHT: 960\n    # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/hs/prowlarr.yml",
    "content": "services:\n  # Prowlarr - Index Manager\n  prowlarr:\n    image: ghcr.io/linuxserver/prowlarr:develop\n    container_name: prowlarr\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"starr\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$PROWLARR_PORT:9696\"\n    volumes:\n      - $DOCKERDIR/appdata/prowlarr:/config\n      - $DOWNLOADSDIR:/data/downloads\n      - \"/etc/localtime:/etc/localtime:ro\"\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/qbittorrent-vpn.yml",
    "content": "services:\n  # qBittorrent - Torrent downloader\n  qbittorrent-vpn:\n    image: lscr.io/linuxserver/qbittorrent:latest\n    container_name: qbittorrent-vpn\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"downloads\", \"all\"]\n    network_mode: \"service:gluetun\"\n    volumes:\n      - $DOCKERDIR/appdata/qbittorrent-vpn:/config\n      - $DOWNLOADSDIR:/data/downloads # Ensure that downloads folder is set to /data/downloads in qBittorrent\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n      UMASK_SET: 002\n    healthcheck: # https://github.com/qdm12/gluetun/issues/641#issuecomment-933856220\n      test: \"curl -sf https://example.com  || exit 1\"\n      interval: 1m\n      timeout: 10s\n      retries: 1\n    labels: # Traefik labels added via file provider app-qbittorrent.yml in rules folder\n      - \"deunhealth.restart.on.unhealthy=true\"\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/radarr.yml",
    "content": "services:\n  # Radarr - Movies Management\n  radarr:\n    image: lscr.io/linuxserver/radarr:latest\n    container_name: radarr\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"media\", \"starr\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$RADARR_PORT:7878\"\n    volumes:\n      - $DOCKERDIR/appdata/radarr:/config\n      - $MEDIADIR1/movies:/data/movies1\n      - $MEDIADIR2/movies:/data/movies2\n      # - $MEDIADIR3:/data/media3\n      - $DOWNLOADSDIR:/data/downloads \n      - \"/etc/localtime:/etc/localtime:ro\"\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/sabnzbd.yml",
    "content": "services:\n  # SABnzbd - Binary newsgrabber (NZB downloader)\n  # Disable SABNnzbd's built-in HTTPS support for traefik proxy to work\n  sabnzbd:\n    image: lscr.io/linuxserver/sabnzbd:latest\n    container_name: sabnzbd\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"downloads\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$SABNZBD_PORT:8080\" \n    volumes:\n      - $DOCKERDIR/appdata/sabnzbd:/config\n      - $DOWNLOADSDIR:/data/downloads\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n      UMASK_SET: 002\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/socket-proxy.yml",
    "content": "services:\n  # Docker Socket Proxy - Security Enchanced Proxy for Docker Socket\n  socket-proxy:\n    image: lscr.io/linuxserver/socket-proxy:latest\n    container_name: socket-proxy\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      socket_proxy:\n        ipv4_address: 192.168.91.254 # You can specify a static IP\n    # privileged: true # true for VM. False (default) for unprivileged LXC container.\n    # ports:\n      #- \"2375:2375\"\n    volumes:\n      - \"/var/run/docker.sock:/var/run/docker.sock\"\n    read_only: true\n    tmpfs:\n      - /run\n    environment:\n      - LOG_LEVEL=warning # debug,info,notice,warning,err,crit,alert,emerg\n      - ALLOW_START=1 # Portainer\n      - ALLOW_STOP=1 # Portainer\n      - ALLOW_RESTARTS=1 # Portainer\n      ## Granted by Default\n      - EVENTS=1\n      - PING=1\n      - VERSION=1\n      ## Revoked by Default\n      # Security critical\n      - AUTH=0\n      - SECRETS=0\n      - POST=1 # Watchtower\n      # Not always needed\n      - BUILD=0\n      - COMMIT=0\n      - CONFIGS=0\n      - CONTAINERS=1 # Traefik, portainer, etc.\n      - DISTRIBUTION=0\n      - EXEC=0\n      - IMAGES=1 # Portainer\n      - INFO=1 # Portainer\n      - NETWORKS=1 # Portainer\n      - NODES=0\n      - PLUGINS=0\n      - SERVICES=1 # Portainer\n      - SESSION=0\n      - SWARM=0\n      - SYSTEM=0\n      - TASKS=1 # Portainer\n      - VOLUMES=1 # Portainer\n      - DISABLE_IPV6=0 #optional\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/sonarr.yml",
    "content": "services:\n  # Sonarr - TV Shows Management\n  sonarr:\n    image: lscr.io/linuxserver/sonarr:develop\n    container_name: sonarr\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"media\", \"starr\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$SONARR_PORT:8989\"\n    volumes:\n      - $DOCKERDIR/appdata/sonarr:/config\n      - $MEDIADIR1/shows:/data/shows1\n      - $MEDIADIR2/shows:/data/shows2\n      # - $MEDIADIR3:/data/media3\n      - $DOWNLOADSDIR:/data/downloads \n      - \"/etc/localtime:/etc/localtime:ro\"\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/stirling-pdf.yml",
    "content": "services:\n  # Stirling PDF - Self-hosted PDF Manipulation\n  stirling-pdf:\n    image: stirlingtools/stirling-pdf:latest\n    container_name: stirling-pdf\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default    \n    ports:\n      - \"$STIRLINGPDF_PORT:8080\" \n    volumes:\n      - $DOCKERDIR/appdata/stirling-pdf/trainingData:/usr/share/tessdata # Required for extra OCR languages\n      - $DOCKERDIR/appdata/stirling-pdf/extraConfigs:/configs\n#      - $DOCKERDIR/appdata/stirling-pdf/customFiles:/customFiles/\n#      - $DOCKERDIR/appdata/stirling-pdf/logs:/logs/\n    environment:\n      DOCKER_ENABLE_SECURITY: false\n      INSTALL_BOOK_AND_ADVANCED_HTML_OPS: false\n      LANGS: en_US\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/traefik.yml",
    "content": "services:\n  # Traefik 3 - Reverse Proxy\n  traefik:\n    container_name: traefik\n    image: traefik:3.3\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    depends_on:\n      - socket-proxy\n    networks:\n      t3_proxy:\n        ipv4_address: 192.168.90.254 # You can specify a static IP\n      socket_proxy:\n    command: # CLI arguments\n      - --global.checkNewVersion=true\n      - --global.sendAnonymousUsage=false\n      - --entrypoints.web-external.address=:81\n      - --entrypoints.web-internal.address=:80\n      - --entrypoints.websecure-external.address=:444\n      - --entrypoints.websecure-internal.address=:443\n      - --entrypoints.traefik.address=:8080\n      - --entrypoints.websecure-external.http3=true\n      - --entrypoints.websecure-internal.http3=true\n      - --entrypoints.web-external.http.redirections.entrypoint.to=websecure-external\n      - --entrypoints.web-external.http.redirections.entrypoint.scheme=https\n      - --entrypoints.web-external.http.redirections.entrypoint.permanent=true\n      - --entrypoints.web-internal.http.redirections.entrypoint.to=websecure-internal\n      - --entrypoints.web-internal.http.redirections.entrypoint.scheme=https\n      - --entrypoints.web-internal.http.redirections.entrypoint.permanent=true\n      - --api=true\n      - --api.dashboard=true\n      - --api.insecure=true\n      # - --serversTransport.insecureSkipVerify=true\n      # Allow these IPs to set the X-Forwarded-* headers - Cloudflare IPs: https://www.cloudflare.com/ips/\n      - --entrypoints.websecure-external.forwardedHeaders.trustedIPs=$CLOUDFLARE_IPS,$LOCAL_IPS\n      - --entrypoints.websecure-internal.forwardedHeaders.trustedIPs=$CLOUDFLARE_IPS,$LOCAL_IPS\n      - --log=true\n      - --log.filePath=/logs/traefik.log\n      - --log.level=DEBUG # (Default: error) DEBUG, INFO, WARN, ERROR, FATAL, PANIC\n      - --accessLog=true\n      - --accessLog.filePath=/logs/access.log\n      - --accessLog.bufferingSize=100 # Configuring a buffer of 100 lines\n      - --accessLog.filters.statusCodes=204-299,400-499,500-599\n      - --providers.docker=true\n      # - --providers.docker.endpoint=unix:///var/run/docker.sock # Disable for Socket Proxy. Enable otherwise.\n      - --providers.docker.endpoint=tcp://socket-proxy:2375 # Enable for Socket Proxy. Disable otherwise.\n      - --providers.docker.exposedByDefault=false\n      - --providers.docker.network=t3_proxy \n      # - --providers.docker.swarmMode=false # Traefik v2 Swarm\n      # - --providers.swarm.endpoint=tcp://127.0.0.1:2377 # Traefik v3 Swarm\n      - --entrypoints.websecure-external.http.tls=true\n      - --entrypoints.websecure-external.http.tls.options=tls-opts@file\n      - --entrypoints.websecure-internal.http.tls=true\n      - --entrypoints.websecure-internal.http.tls.options=tls-opts@file\n      # Add dns-cloudflare as default certresolver for all services. Also enables TLS and no need to specify on individual services\n      - --entrypoints.websecure-external.http.tls.certresolver=dns-cloudflare\n      - --entrypoints.websecure-internal.http.tls.certresolver=dns-cloudflare\n      - --entrypoints.websecure-external.http.tls.domains[0].main=$DOMAINNAME_1\n      - --entrypoints.websecure-external.http.tls.domains[0].sans=*.$DOMAINNAME_1\n      - --entrypoints.websecure-internal.http.tls.domains[0].main=$DOMAINNAME_1\n      - --entrypoints.websecure-internal.http.tls.domains[0].sans=*.$DOMAINNAME_1\n      # - DOMAINS-PLACEHOLDER-DO-NOT-DELETE\n      - --providers.file.directory=/rules # Load dynamic configuration from one or more .toml or .yml files in a directory\n      - --providers.file.watch=true # Only works on top level files in the rules folder\n      # - --certificatesResolvers.dns-cloudflare.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory # LetsEncrypt Staging Server - uncomment when testing\n      - --certificatesResolvers.dns-cloudflare.acme.storage=/acme.json\n      - --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.provider=cloudflare\n      - --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.resolvers=1.1.1.1:53,1.0.0.1:53\n      - --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.propagation.delaybeforechecks=120 # To delay DNS check and reduce LE hitrate\n      #- --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.propagation.disablechecks=true # Not recommended\n      # - METRICS-PLACEHOLDER-DO-NOT-DELETE\n    ports:\n      - \"80:80\"\n      - \"81:81\"\n      - \"443:443\"\n      - \"444:444\"\n      - \"$TRAEFIK_PORT:8080\"\n    volumes:\n      - $DOCKERDIR/appdata/traefik3/rules/$HOSTNAME:/rules \n      # - /var/run/docker.sock:/var/run/docker.sock:ro # Use Docker Socket Proxy instead for improved security\n      - $DOCKERDIR/appdata/traefik3/acme/acme.json:/acme.json \n      - $DOCKERDIR/logs/$HOSTNAME/traefik:/logs\n    environment:\n      - TZ=$TZ\n      - CF_DNS_API_TOKEN_FILE=/run/secrets/cf_dns_api_token    \n      - HTPASSWD_FILE=/run/secrets/basic_auth_credentials # HTTP Basic Auth Credentials\n      - DOMAINNAME_1 # Passing the domain name to traefik container to be able to use the variable in rules. \n      # - TRAEFIK_AUTH_BYPASS_KEY\n    secrets:\n      - cf_dns_api_token\n      - basic_auth_credentials\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.traefik-rtr.entrypoints=websecure-internal,websecure-external\"\n      - \"traefik.http.routers.traefik-rtr.rule=Host(`traefik.$DOMAINNAME_1`)\"\n      # Services - API\n      - \"traefik.http.routers.traefik-rtr.service=api@internal\"\n      # Middlewares\n      - \"traefik.http.routers.traefik-rtr.middlewares=chain-oauth@file\" # For Basic HTTP Authentication\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/uptime-kuma.yml",
    "content": "services:\n  # Uptime Kuma - Status Page & Monitoring Server\n  uptime-kuma:\n    image: louislam/uptime-kuma\n    container_name: uptime-kuma\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      - default\n      - socket_proxy\n    ports:\n      - \"$UPTIMEKUMA_PORT:3001\" \n    volumes:\n      - $DOCKERDIR/appdata/uptime-kuma:/app/data\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/hs/wud.yml",
    "content": "services:\n  # WUD (What's Up Docker) - Docker Image Update Notification\n  wud:\n    image: fmartinou/whats-up-docker\n    container_name: wud\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - socket_proxy\n    ports:\n      - \"$WUD_PORT:3000\"\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock\n    environment:\n      # - WUD_TRIGGER_DISCORD_1_URL=https://discord.com/api/webhooks/123/456\n      # - WUD_TRIGGER_DISCORD_1_BOTUSERNAME=WUD\n      - WUD_WATCHER_LOCAL_CRON=0 1 * * *\n      - WUD_WATCHER_LOCAL_WATCHALL=true\n      # - WUD_WATCHER_MYREMOTEHOST_HOST=<remote host>\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/mds/airsonic-advanced.yml",
    "content": "services:\n  # Airsonic Advanced - Music Server\n  airsonic-advanced:\n    image: lscr.io/linuxserver/airsonic-advanced\n    container_name: airsonic-advanced\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"media\", \"all\"]\n    networks:\n      - default\n    volumes:\n      - $DOCKERDIR/appdata/airsonic-advanced/podcasts:/data/podcasts\n      - $DOCKERDIR/appdata/airsonic-advanced/playlists:/data/playlists\n      - $DOCKERDIR/appdata/airsonic-advanced/config:/config\n      - $MEDIADIR1/music:/data/music\n      # - $MEDIADIR3:/data/media3\n    ports:\n      - \"$AIRSONICADVANCED_PORT:4040\"\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n      JAVA_OPTS: '-Dserver.forward-headers-strategy=native' # optional - if you use a reverse-proxy\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/mds/custom.yml",
    "content": "# Add all your custom docker compose snippets here. Auto-Traefik will not modify this.\n# Uncomment services and the compose below it, following yaml syntax.\n\n# services:\n"
  },
  {
    "path": "compose/mds/docker-gc.yml",
    "content": "services:\n  # Docker-GC - Automatic Docker Garbage Collection\n  # Create docker-gc-exclude file\n  docker-gc:\n    image: clockworksoul/docker-gc-cron:latest\n    container_name: docker-gc\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - socket_proxy\n    volumes:\n      # - /var/run/docker.sock:/var/run/docker.sock # Use Docker Socket Proxy instead for improved security\n      - $DOCKERDIR/appdata/docker-gc/docker-gc-exclude:/etc/docker-gc-exclude\n    environment:\n      - CRON=0 0 0 * * ? # Everyday at midnight. Previously 0 0 * * *\n      - FORCE_IMAGE_REMOVAL=1\n      - FORCE_CONTAINER_REMOVAL=0\n      - GRACE_PERIOD_SECONDS=604800\n      - DRY_RUN=0\n      - CLEAN_UP_VOLUMES=1\n      - TZ=$TZ\n      - DOCKER_HOST"
  },
  {
    "path": "compose/mds/influxdb.yml",
    "content": "services:\n  # InfluxDB - Database for sensor data\n  influxdb:\n    image: influxdb:latest\n    container_name: influxdb\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"dbs\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$INFLUXDB_PORT:8086\"\n    volumes:\n      - $DOCKERDIR/appdata/influxdb2/config:/etc/influxdb2\n      - $DOCKERDIR/appdata/influxdb2/db:/var/lib/influxdb2\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/mds/jellyfin.yml",
    "content": "services:\n  # Jellyfin - Media Server\n  jellyfin:\n    image: jellyfin/jellyfin:latest\n    container_name: jellyfin\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"media\", \"all\"]\n    networks:\n      - default\n    user: $PUID:$PGID\n    devices:\n      - /dev/dri:/dev/dri # for harware transcoding\n    ports:\n      - \"$JELLYFIN_PORT:8096\"\n      # - \"8920:8920\" # Emby also uses same port if running both\n    environment:\n      UMASK_SET: 022\n      TZ: $TZ\n    volumes:\n      - $DOCKERDIR/appdata/jellyfin:/config\n      - $DOWNLOADSDIR:/data/downloads\n      - $MEDIADIR1:/data/media1\n      - $MEDIADIR2:/data/media2\n      # - $MEDIADIR3:/data/media3\n      - /dev/shm:/data/transcode # Offload transcoding to RAM if you have enough RAM\n    # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/mds/mariadb.yml",
    "content": "services:\n  # MariaDB - MySQL Database\n  # After starting container for first time dexec and mysqladmin -u root password <password>\n  mariadb:\n    container_name: mariadb\n    image: lscr.io/linuxserver/mariadb\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"dbs\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$MARIADB_PORT:3306\"\n    volumes:\n      - $DOCKERDIR/appdata/mariadb/data:/config\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n      FILE__MYSQL_ROOT_PASSWORD: /run/secrets/mysql_root_password # Note FILE__ (double underscore) - Issue #127\n    secrets:\n      - mysql_root_password"
  },
  {
    "path": "compose/mds/mosquitto.yml",
    "content": "services:\n  # Mosquitto - MQTT Broker\n  # Create mosquitto.conf, passwd, mosquitto.log files  and set permissions to 775 user:docker\n  # dexec mosquitto /bin/sh -> mosquitto_passwd -b /mosquitto/config/passwd username passwd\n  mosquitto:\n    container_name: mosquitto\n    image: eclipse-mosquitto:latest\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"1833:1883\" #http\n      - \"9001:9001\" #websockets\n    volumes:\n      - $DOCKERDIR/appdata/mosquitto/config:/mosquitto/config\n      - $DOCKERDIR/appdata/mosquitto/data:/mosquitto/data\n      - $DOCKERDIR/appdata/mosquitto/log:/mosquitto/log\n      - $DOCKERDIR/appdata/mosquitto/config/mosquitto.conf:/mosquitto/config/mosquitto.conf\n      - $DOCKERDIR/appdata/mosquitto/config/passwd:/mosquitto/config/passwd\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ"
  },
  {
    "path": "compose/mds/node-exporter.yml",
    "content": "services:\n  # Node Exporter - Metrics to Prometheus\n  node-exporter:\n    container_name: node-exporter\n    image: prom/node-exporter:latest\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"monitoring\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"9100:9100\"\n    volumes:\n      - /proc:/host/proc:ro\n      - /sys:/host/sys:ro\n      - /:/rootfs:ro\n    command:\n      - '--path.procfs=/host/proc'\n      - '--path.sysfs=/host/sys'\n      - --collector.filesystem.ignored-mount-points\n      - \"^/(sys|proc|dev|host|etc|rootfs/var/lib/docker/containers|rootfs/var/lib/docker/overlay2|rootfs/run/docker/netns|rootfs/var/lib/docker/aufs)($$|/)\"\n"
  },
  {
    "path": "compose/mds/pgsql-teslamate.yml",
    "content": "services:\n  # PostgreSQL - Database fpr Teslamate\n  pgsql-teslamate:\n    container_name: pgsql-teslamate\n    image: postgres:16-alpine\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    # healthcheck:\n    #   test: [\"CMD-SHELL\", \"pg_isready -d $${POSTGRES_DB} -U $${POSTGRES_USER}\"]\n    #   start_period: 20s\n    #   interval: 30s\n    #   retries: 5\n    #   timeout: 5s\n    networks:\n      - default\n    ports:\n      - \"$PGSQLTESLAMATE_PORT:5432\"\n    volumes:\n      - $DOCKERDIR/appdata/pgsql-teslamate:/var/lib/postgresql/data\n    environment:\n      - POSTGRES_DB=teslamate\n      - POSTGRES_USER=$POSTGRES_USER\n      - POSTGRES_PASSWORD_FILE=/run/secrets/pgsql_teslamate_passwd\n    secrets:\n      - pgsql_teslamate_passwd"
  },
  {
    "path": "compose/mds/plex-image-cleanup.yml",
    "content": "services:\n  pic:\n    image: meisnate12/plex-image-cleanup\n    container_name: pic\n    environment:\n      - TZ=$TZ #optional\n    volumes:\n      - $DOCKERDIR/appdata/plex-image-cleanup:/config\n      - $DOCKERDIR/appdata/plex/Library/Application Support/Plex Media Server:/plex\n    restart: unless-stopped"
  },
  {
    "path": "compose/mds/plex-meta-manager.yml",
    "content": "services:\n  # Plex Meta Manager - Automatic Metadata Manager for Plex\n  plexmm:\n    image: lscr.io/linuxserver/plex-meta-manager:latest\n    container_name: plexmm\n    security_opt:\n      - no-new-privileges:true\n    restart: \"no\"\n    profiles: [\"media\", \"all\"]\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n      PMM_CONFIG: /config/config.yml #optional\n      PMM_TIME: 03:00 #optional\n      PMM_RUN: \"True\" #optional\n      PMM_TEST: \"False\" #optional\n      PMM_NO_MISSING: \"False\" #optional\n    volumes:\n      - $DOCKERDIR/appdata/plex-meta-manager:/config"
  },
  {
    "path": "compose/mds/plex.yml",
    "content": "services:\n  # Plex - Media Server\n  plex:\n    image: plexinc/pms-docker:plexpass\n    container_name: plex\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"media\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$PLEX_PORT:32400/tcp\"\n      - \"3005:3005/tcp\"\n      - \"8324:8324/tcp\"\n      - \"32469:32469/tcp\"\n      - \"1900:1900/udp\" \n      - \"32410:32410/udp\"\n      - \"32412:32412/udp\"\n      - \"32413:32413/udp\"\n      - \"32414:32414/udp\"\n    devices:\n      - /dev/dri:/dev/dri # for harware transcoding\n    volumes:\n      - $DOCKERDIR/appdata/plex:/config\n      - $DOWNLOADSDIR:/data/downloads\n      - $MEDIADIR1:/data/media1\n      - $MEDIADIR2:/data/media2\n      # - $MEDIADIR3:/data/media3\n      - /dev/shm:/data/transcode\n    environment:\n      TZ: $TZ\n      HOSTNAME: $PLEX_SERVER_NAME\n      PLEX_CLAIM_FILE: /run/secrets/plex_claim\n      PLEX_UID: $PUID\n      PLEX_GID: $PGID\n      ADVERTISE_IP: \"http://$SERVER_LAN_IP:32400/,http://$TAILSCALE_IP_MEDIASERVER:32400/,https://plex.$DOMAINNAME_1\"\n    secrets:\n      - plex_claim\n    # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/mds/prometheus.yml",
    "content": "services:\n  # Prometheus - Database for sensor data\n  prometheus:\n    image: prom/prometheus:latest\n    container_name: prometheus\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"dbs\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$PROMETHEUS_PORT:9090\"\n    volumes:\n      - $DOCKERDIR/appdata/prometheus/config:/etc/prometheus\n      - $DOCKERDIR/appdata/prometheus/data:/prometheus\n    user: $PUID:$PGID\n    command:\n      - '--config.file=/etc/prometheus/prometheus.yml'\n      - '--storage.tsdb.path=/prometheus'\n      - '--web.console.libraries=/usr/share/prometheus/console_libraries'\n      - '--web.console.templates=/usr/share/prometheus/consoles'\n      - '--web.enable-lifecycle'\n      - '--web.enable-admin-api'\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/mds/socket-proxy.yml",
    "content": "services:\n  # Docker Socket Proxy - Security Enchanced Proxy for Docker Socket\n  socket-proxy:\n    image: lscr.io/linuxserver/socket-proxy:latest\n    container_name: socket-proxy\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      socket_proxy:\n        ipv4_address: 192.168.91.254 # You can specify a static IP\n    # privileged: true # true for VM. False (default) for unprivileged LXC container.\n    # ports:\n      #- \"2375:2375\"\n    volumes:\n      - \"/var/run/docker.sock:/var/run/docker.sock\"\n    read_only: true\n    tmpfs:\n      - /run\n    environment:\n      - LOG_LEVEL=warning # debug,info,notice,warning,err,crit,alert,emerg\n      - ALLOW_START=1 # Portainer\n      - ALLOW_STOP=1 # Portainer\n      - ALLOW_RESTARTS=1 # Portainer\n      ## Granted by Default\n      - EVENTS=1\n      - PING=1\n      - VERSION=1\n      ## Revoked by Default\n      # Security critical\n      - AUTH=0\n      - SECRETS=0\n      - POST=1 # Watchtower\n      # Not always needed\n      - BUILD=0\n      - COMMIT=0\n      - CONFIGS=0\n      - CONTAINERS=1 # Traefik, portainer, etc.\n      - DISTRIBUTION=0\n      - EXEC=0\n      - IMAGES=1 # Portainer\n      - INFO=1 # Portainer\n      - NETWORKS=1 # Portainer\n      - NODES=0\n      - PLUGINS=0\n      - SERVICES=1 # Portainer\n      - SESSION=0\n      - SWARM=0\n      - SYSTEM=0\n      - TASKS=1 # Portainer\n      - VOLUMES=1 # Portainer\n      - DISABLE_IPV6=0 #optional"
  },
  {
    "path": "compose/mds/tautulli.yml",
    "content": "services:\n  # Tautulli - Plex Statistics and Monitoring\n  tautulli:\n    image: lscr.io/linuxserver/tautulli:latest\n    container_name: tautulli\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"media\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$TAUTULLI_PORT:8181\"\n    volumes:\n      - $DOCKERDIR/appdata/tautulli/config:/config\n      - $DOCKERDIR/appdata/plex/Library/Application Support/Plex Media Server/Logs:/logs:ro # For tautulli Plex log viewer\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n    # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/ws-arm/adminer.yml",
    "content": "services:\n  # Adminer - Frontend for Various Databases (MariaDB, PostgreSQL, etc.)\n  adminer:\n    image: adminer:latest\n    container_name: adminer\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$ADMINER_PORT:8080\"\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/chromium.yml",
    "content": "services:\n  # Chromium - Web Browser\n  chromium:\n    image: lscr.io/linuxserver/chromium:latest\n    container_name: chromium\n    security_opt:\n      - no-new-privileges:true\n      - seccomp:unconfined #optional\n    restart: \"unless-stopped\"\n    profiles: [\"apps\", \"all\"]\n    shm_size: \"1gb\"\n    # DEVICES-GPU-PLACEHOLDER-DO-NOT-DELETE    \n    networks:\n      - default\n    ports:\n      - \"$CHROMIUM_PORT:3000\" # HTTP\n      # - 3001:3001 # HTTPS\n    volumes:\n      - $DOCKERDIR/appdata/chromium:/config\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n      CUSTOM_USER: $CHROMIUM_HTTP_USER\n      PASSWORD: $CHROMIUM_HTTP_PASSWORD\n      # CHROME_CLI: https://www.deployarr.app/ #optional\n    # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/ws-arm/cloudflare-bouncer.yml",
    "content": "services:\n  # CrowdSec Bouncer - Cloudflare\n  # sudo docker exec crowdsec cscli bouncer add cloudflare-bouncer\n  # Set max ip number right the first time (max 10000). Recreating container deletes all ips and readds them causing cloudflare 429 rate limiting.\n  cloudflare-bouncer:\n    image: crowdsecurity/cloudflare-bouncer\n    container_name: cloudflare-bouncer\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      - default\n    volumes:\n      - $DOCKERDIR/appdata/cloudflare-bouncer/cfg.yaml:/etc/crowdsec/bouncers/crowdsec-cloudflare-bouncer.yaml"
  },
  {
    "path": "compose/ws-arm/crawl4ai.yml",
    "content": "services:\n  # Crawl4AI - Web Scraper\n  crawl4ai:\n    image: unclecode/crawl4ai:basic-arm64\n    container_name: crawl4ai\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"11235:11235\"\n      # - \"8025:8000\"\n      # - \"9222:9222\"\n      # - \"8065:8080\"\n    environment:\n      - CRAWL4AI_API_TOKEN=${CRAWL4AI_API_TOKEN:-}\n      # - OPENAI_API_KEY=${OPENAI_API_KEY:-}\n      # - CLAUDE_API_KEY=${CLAUDE_API_KEY:-}\n    volumes:\n      - /dev/shm:/dev/shm\n    deploy:\n      resources:\n        limits:\n          memory: 4G\n        reservations:\n          memory: 1G\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/crowdsec.yml",
    "content": "services:\n  # CrowdSec - Open-source & Collaborative IPS\n  crowdsec:\n    image: crowdsecurity/crowdsec\n    container_name: crowdsec\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    depends_on:\n      mariadb:\n        condition: service_healthy\n    ports:\n      - \"$CROWDSEC_PORT:8080\" # Local API port\n      - \"6060:6060\" # Exposing metrics via Zerotier IP\n    environment:\n      COLLECTIONS: \"crowdsecurity/traefik crowdsecurity/http-cve crowdsecurity/whitelist-good-actors crowdsecurity/iptables crowdsecurity/linux fulljackz/proxmox crowdsecurity/sshd crowdsecurity/wordpress\"\n      GID: $PGID\n      CUSTOM_HOSTNAME: $HOSTNAME\n    volumes:\n      - $DOCKERDIR/logs/$HOSTNAME:/logs/$HOSTNAME:ro\n      - /var/log:/var/log:ro\n      - $DOCKERDIR/appdata/crowdsec/data:/var/lib/crowdsec/data\n      - $DOCKERDIR/appdata/crowdsec/config:/etc/crowdsec"
  },
  {
    "path": "compose/ws-arm/custom.yml",
    "content": "# Add all your custom docker compose snippets here. Auto-Traefik will not modify this.\n# Uncomment services and the compose below it, following yaml syntax.\n\n# services:\n"
  },
  {
    "path": "compose/ws-arm/deployrr-dashboard.yml",
    "content": "services:\n  # Deployarr Dashboard - Homepage based Dashboard for Deployarr\n  deployrr-dashboard:\n    image: ghcr.io/gethomepage/homepage:v0.9.13\n    container_name: deployrr-dashboard\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n      - socket_proxy\n    ports:\n      - \"$DEPLOYARRDASHBOARD_PORT:3000\" \n    volumes:\n      - $DOCKERDIR/appdata/deployrr-dashboard/config:/app/config\n      - $DOCKERDIR/appdata/deployrr-dashboard/images:/app/public/images\n    environment:\n      TZ: $TZ\n      PUID: $PUID\n      PGID: $PGID\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/dockflare.yml",
    "content": "services:\n  # DockFlare - Cloudflare Tunnel & Zero Trust Manager\n  dockflare:\n    image: alplat/dockflare:stable  # alplat/dockflare:unstable docker tag for beta versions\n    container_name: dockflare\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    ports:\n      - \"$DOCKFLARE_PORT:5000\"\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock:ro  # Required to monitor Docker events\n      - $DOCKERDIR/appdata/dockflare:/app/data  # Persistent storage for state\n    networks:\n      - cf_tunnel  # Network for communication with other containers\n      - default\n      - t3_proxy\n    environment:\n      STATE_FILE_PATH: /app/data/state.json\n      TZ: $TZ\n      CF_API_TOKEN: $DOCKFLARE_CF_API_TOKEN\n      CF_ACCOUNT_ID: $DOCKFLARE_CF_ACCOUNT_ID\n      CF_ZONE_ID: $DOCKFLARE_CF_ZONE_ID\n      TUNNEL_NAME: Simple-Tunnel\n      # LABEL_PREFIX: dockflare. # The default is now 'dockflare.'. Uncomment to customize.\n      GRACE_PERIOD_SECONDS: 28800\n      CLEANUP_INTERVAL_SECONDS: 300\n      AGENT_STATUS_UPDATE_INTERVAL_SECONDS: 10\n      SCAN_ALL_NETWORKS: false\n      CLOUDFLARED_NETWORK_NAME: cf_tunnel\n      # TUNNEL_DNS_SCAN_ZONE_NAMES=extradomain.com,another-zone.net\n      MAX_CONCURRENT_DNS_OPS: 3\n    # labels: \n    #   - 'dockflare.enable=true'\n    #   - 'dockflare.hostname=cftunnel.$DOMAINNAME_1'\n    #   - 'dockflare.service=http://dockflare:5000'\n    #   - 'dockflare.access.policy=authenticate'\n    #   - 'dockflare.access.session_duration=8h'\n    #   - 'dockflare.access.custom_rules=[{\"email\":{\"email\":\"avp387@gmail.com\"},\"action\":\"allow\"},{\"action\":\"block\"}]'\n      # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/dozzle.yml",
    "content": "services:\n  # Dozzle - Real-time Docker Log Viewer\n  dozzle:\n    image: amir20/dozzle:latest\n    container_name: dozzle\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n      # - socket_proxy\n    ports:\n      - \"$DOZZLE_PORT:8080\"\n    environment:\n      - DOZZLE_LEVEL=info\n      - DOZZLE_TAILSIZE=300\n      - DOZZLE_FILTER=\"status=running\"\n      # - DOZZLE_FILTER=\"label=log_me\" # limits logs displayed to containers with this label\n      # - DOCKER_HOST\n    volumes:\n     - /var/run/docker.sock:/var/run/docker.sock # Use Docker Socket Proxy instead for improved security\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/flowise.yml",
    "content": "services:\n  flowise:\n    image: flowiseai/flowise:latest\n    container_name: flowise\n    restart: unless-stopped\n    networks:\n      - default\n    ports:\n      - ${FLOWISE_PORT}:${FLOWISE_PORT} # Default port is 5023\n    depends_on:\n      redis:\n        condition: service_healthy\n      postgresql:\n        condition: service_healthy\n    entrypoint: /bin/sh -c \"sleep 3; flowise start\"\n    healthcheck:\n      test: [\"CMD\", \"curl\", \"-f\", \"http://localhost:${FLOWISE_PORT}/health\"]\n      interval: 30s\n      timeout: 10s\n      retries: 3\n    volumes:\n      - $DOCKERDIR/appdata/flowise:/root/.flowise\n    environment:\n      - PORT=${FLOWISE_PORT}\n      - FLOWISE_USERNAME=${FLOWISE_USERNAME}\n      - FLOWISE_PASSWORD=${FLOWISE_PASSWORD}\n      - LOG_LEVEL=info\n      - DATABASE_TYPE=postgres\n      - DATABASE_HOST=postgresql\n      - DATABASE_PORT=${POSTGRESQL_PORT}\n      - DATABASE_NAME=flowise\n      - DATABASE_USER=${FLOWISE_POSTGRESQL_USERNAME}\n      - DATABASE_PASSWORD=${FLOWISE_POSTGRESQL_PASSWORD}\n      - REDIS_HOST=redis\n      - REDIS_PORT=${REDIS_PORT}\n      - APIKEY_PATH=/root/.flowise\n      - SECRETKEY_PATH=/root/.flowise\n      - LOG_PATH=/root/.flowise/logs\n      - STORAGE_TYPE=local\n      - BLOB_STORAGE_PATH=/root/.flowise/storage\n      - DEBUG=false\n      - CORS_ORIGINS=https://www.simplehomelab.com\n      - IFRAME_ORIGINS=*\n      # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/ws-arm/glances.yml",
    "content": "services:\n  # Glances - System Information\n  glances:\n    image: nicolargo/glances:latest-full\n    container_name: glances\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"monitoring\", \"all\"]\n    privileged: true # Only for VM\n    networks:\n      - default\n      - socket_proxy\n    ports:\n      - \"$GLANCES_PORT:61208\"\n    pid: host\n    volumes:\n      - $DOCKERDIR/appdata/glances/glances.conf:/glances/conf/glances.conf # Use this if you want to add a glances.conf file\n      - $DOCKERDIR:/data/docker:ro\n      - /media/block50:/data/block50:ro\n      # - /var/run/docker.sock:/var/run/docker.sock:ro # Use Docker Socket Proxy instead for improved security\n    environment:\n      # - GLANCES_OPT=\"-C /glances/conf/glances.conf --quiet --export influxdb\"\n      # - GLANCES_OPT=\"--export influxdb\"\n      - \"GLANCES_OPT=-w\"\n      - DOCKER_HOST\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/grafana.yml",
    "content": "services:\n  # Grafana - Graphical data visualization for InfluxDB data\n  grafana:\n    image: grafana/grafana:latest\n    container_name: grafana\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$GRAFANA_PORT:3000\"\n    user: $PUID\n    volumes:\n      - $DOCKERDIR/appdata/grafana:/var/lib/grafana\n    environment:\n      GF_INSTALL_PLUGINS: \"grafana-clock-panel,grafana-simple-json-datasource,grafana-worldmap-panel,grafana-piechart-panel,cloudflare-app\"\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/influxdb.yml",
    "content": "services:\n  # InfluxDB - Database for sensor data\n  influxdb:\n    image: influxdb:latest\n    container_name: influxdb\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"dbs\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$INFLUXDB_PORT:8086\"\n    volumes:\n      - $DOCKERDIR/appdata/influxdb2/config:/etc/influxdb2\n      - $DOCKERDIR/appdata/influxdb2/db:/var/lib/influxdb2\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/mariadb.yml",
    "content": "services:\n  mariadb:\n    container_name: mariadb\n    image: mariadb:latest\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$MARIADB_PORT:3306\"\n    volumes:\n      - $DOCKERDIR/appdata/mariadb/data:/var/lib/mysql\n      - $DOCKERDIR/appdata/mariadb/config:/etc/mysql\n    environment:\n      MARIADB_ROOT_PASSWORD_FILE: /run/secrets/mariadb_root_password\n    secrets:\n      - mariadb_root_password\n    healthcheck:\n      test: [ \"CMD\", \"healthcheck.sh\", \"--connect\", \"--innodb_initialized\" ]\n      start_period: 1m\n      start_interval: 10s\n      interval: 1m\n      timeout: 5s\n      retries: 3"
  },
  {
    "path": "compose/ws-arm/n8n.yml",
    "content": "services:\n  # n8n - Workflow Automation Tool\n  n8n:\n    image: docker.n8n.io/n8nio/n8n\n    container_name: n8n\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    depends_on:\n      postgresql:\n        condition: service_healthy\n    ports:\n      - $N8N_PORT:5678\n    volumes:\n      - $DOCKERDIR/appdata/n8n:/home/node/.n8n\n    environment:\n      - DB_TYPE=postgresdb\n      - DB_POSTGRESDB_HOST=postgresql\n      - DB_POSTGRESDB_PORT=5432\n      - DB_POSTGRESDB_DATABASE=n8n\n      - DB_POSTGRESDB_USER=${N8N_POSTGRESQL_USERNAME}\n      - DB_POSTGRESDB_PASSWORD=${N8N_POSTGRESQL_PASSWORD}\n      - N8N_ENFORCE_SETTINGS_FILE_PERMISSIONS=true\n      - N8N_EDITOR_BASE_URL=https://n8n.${DOMAINNAME_1}\n      - WEBHOOK_URL=https://n8n.${DOMAINNAME_1}\n      - N8N_HOST=n8n.${DOMAINNAME_1}\n      - N8N_PROTOCOL=http\n      - NODE_ENV=production\n      - GENERIC_TIMEZONE=${TZ}\n      # - N8N_EDITOR_BASE_URL \n      - N8N_SECURE_COOKIE=false\n      - N8N_EXECUTIONS_PROCESS=main\n      - N8N_RUNNERS_ENABLED=true\n      - N8N_DEFAULT_CORS=TRUE\n      - N8N_CORS_ALLOW_ORIGIN=https://n8n.${DOMAINNAME_1}\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/nginx.yml",
    "content": "services:\n  # Nginx - Web Server\n  nginx:\n    container_name: nginx\n    image: nginx:1.27.3 # 1.27.1 Jan 31, 2025,  1.24 updated 9/25/2024 # 1.20 updated 4/19/2024\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      - t3_proxy\n      # - default\n    depends_on:\n      php8:\n        condition: service_started\n      redis:\n        condition: service_healthy\n    volumes:\n      - /etc/localtime:/etc/localtime:ro\n      - /etc/timezone:/etc/timezone:ro\n      - $DOCKERDIR/logs/ws-arm/nginx:/var/log/nginx\n      - $DOCKERDIR/appdata/nginx:/etc/nginx\n      - $DOCKERDIR/appdata/sites/simplehomelab/html:/var/www/html/simplehomelab\n      - $DOCKERDIR/appdata/sites/khub/html:/var/www/html/khub\n      - $DOCKERDIR/appdata/sites/dash/html:/var/www/html/dash\n      - $DOCKERDIR/appdata/sites/deployrr/html:/var/www/html/deployrr\n      - $DOCKERDIR/appdata/sites/deployarr/html:/var/www/html/deployarr # delete this line after 6/15/2025\n    secrets:\n      - basic_auth_credentials\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers SIMPLEHOMELAB (WordPress) Auth\n      - \"traefik.http.routers.nginx-simplehomelab-auth-rtr.entrypoints=websecure-internal,websecure-external\"\n      - \"traefik.http.routers.nginx-simplehomelab-auth-rtr.rule=Host(`www.$DOMAINNAME_1`) && Path(`/wp-login.php`)\" # crowdsec\n      - \"traefik.http.routers.nginx-simplehomelab-auth-rtr.priority=100\"\n      # HTTP Routers SIMPLEHOMELAB (WordPress) Bypass\n      - \"traefik.http.routers.nginx-simplehomelab-rtr.entrypoints=websecure-internal,websecure-external\"\n      - \"traefik.http.routers.nginx-simplehomelab-rtr.rule=Host(`$DOMAINNAME_1`) || Host(`www.$DOMAINNAME_1`)\" # no crowdsec\n      - \"traefik.http.routers.nginx-simplehomelab-rtr.priority=99\"\n      # HTTP Routers DASH (non-WordPress)\n      - \"traefik.http.routers.nginx-dash-rtr.entrypoints=websecure-internal,websecure-external\"\n      - \"traefik.http.routers.nginx-dash-rtr.rule=Host(`dash.$DOMAINNAME_1`)\" \n      # HTTP Routers deployrr (non-WordPress)\n      - \"traefik.http.routers.nginx-deployrr-rtr.entrypoints=websecure-internal,websecure-external\"\n      - \"traefik.http.routers.nginx-deployrr-rtr.rule=Host(`$DOMAINNAME_2`) || Host(`www.$DOMAINNAME_2`)\" \n      # HTTP Routers deployarr (non-WordPress) delete this line after 6/15/2025\n      - \"traefik.http.routers.nginx-deployarr-rtr.entrypoints=websecure-internal,websecure-external\" # delete this line after 6/15/2025\n      - \"traefik.http.routers.nginx-deployarr-rtr.rule=Host(`$DOMAINNAME_4`) || Host(`www.$DOMAINNAME_4`)\" # delete this line after 6/15/2025\n      # HTTP Routers KHUB (non-WordPress)\n      - \"traefik.http.routers.nginx-khub-rtr.entrypoints=websecure-internal,websecure-external\"\n      - \"traefik.http.routers.nginx-khub-rtr.rule=Host(`$DOMAINNAME_3`) || Host(`www.$DOMAINNAME_3`)\"\n      # Redirect simplehomelab non-www to www middleware\n      - \"traefik.http.middlewares.simplehomelab-redirect.redirectregex.regex=^https?://$DOMAINNAME_1/(.*)\"\n      - \"traefik.http.middlewares.simplehomelab-redirect.redirectregex.replacement=https://www.$DOMAINNAME_1/$${1}\"\n      - \"traefik.http.middlewares.simplehomelab-redirect.redirectregex.permanent=true\"\n      # Redirect khub non-www to www middleware\n      - \"traefik.http.middlewares.khub-redirect.redirectregex.regex=^https?://$DOMAINNAME_3/(.*)\"\n      - \"traefik.http.middlewares.khub-redirect.redirectregex.replacement=https://www.$DOMAINNAME_3/$${1}\"\n      - \"traefik.http.middlewares.khub-redirect.redirectregex.permanent=true\"\n      # Middlewares\n      - \"traefik.http.routers.nginx-khub-rtr.middlewares=khub-redirect,chain-no-auth@file\"\n      - \"traefik.http.routers.nginx-simplehomelab-rtr.middlewares=simplehomelab-redirect,chain-no-auth-wp@file\" # no crowdsec\n      - \"traefik.http.routers.nginx-simplehomelab-auth-rtr.middlewares=simplehomelab-redirect,chain-no-auth-crowdsec-wp@file\" # crowdsec \n      - \"traefik.http.routers.nginx-dash-rtr.middlewares=chain-oauth@file\"\n      - \"traefik.http.routers.nginx-deployrr-rtr.middlewares=chain-no-auth@file\"\n      - \"traefik.http.routers.nginx-deployarr-rtr.middlewares=chain-no-auth@file\" # delete this line after 6/15/2025\n      # HTTP Services\n      - \"traefik.http.routers.nginx-simplehomelab-rtr.service=nginx-svc\"\n      - \"traefik.http.routers.nginx-simplehomelab-auth-rtr.service=nginx-svc\"\n      - \"traefik.http.routers.nginx-khub-rtr.service=nginx-svc\"\n      - \"traefik.http.routers.nginx-dash-rtr.service=nginx-svc\"\n      - \"traefik.http.routers.nginx-deployrr-rtr.service=nginx-svc\"\n      - \"traefik.http.routers.nginx-deployarr-rtr.service=nginx-svc\" # delete this line after 6/15/2025\n      - \"traefik.http.services.nginx-svc.loadbalancer.server.port=80\""
  },
  {
    "path": "compose/ws-arm/oauth.yml",
    "content": "services:\n  # Google OAuth - Single Sign On using OAuth 2.0\n  oauth:\n    container_name: oauth\n    image: thomseddon/traefik-forward-auth:2-arm\n    # image: thomseddon/traefik-forward-auth:2.1-arm # Use this image with Raspberry Pi\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      - t3_proxy\n    # ports:\n    #   - \"4181:4181\"\n    # Allow apps to bypass OAuth. Radarr example below will bypass OAuth if API key is present in the request (eg. from NZB360 mobile app).\n    # While this is one way, the recommended way is to bypass authentication using Traefik labels shown in some of the apps later.\n    # command: --rule.radarr.action=allow --rule.radarr.rule=\"Header(`X-Api-Key`, `$RADARR_API_KEY`)\"\n    # command: --rule.sabnzbd.action=allow --rule.sabnzbd.rule=\"HeaderRegexp(`X-Forwarded-Uri`, `$SABNZBD_API_KEY`)\"\n    environment:\n      - CONFIG=/config\n      - COOKIE_DOMAIN=$DOMAINNAME_1\n      - INSECURE_COOKIE=false\n      - AUTH_HOST=oauth.$DOMAINNAME_1\n      - URL_PATH=/_oauth\n      - LOG_LEVEL=info\n      - LOG_FORMAT=text\n      - LIFETIME=86400 # 1 day\n      - DEFAULT_ACTION=auth\n      - DEFAULT_PROVIDER=google\n    secrets:\n      - source: oauth_secrets\n        target: /config\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.oauth-rtr.entrypoints=websecure-internal,websecure-external\"\n      - \"traefik.http.routers.oauth-rtr.rule=Host(`oauth.$DOMAINNAME_1`)\"\n      # Middlewares\n      - \"traefik.http.routers.oauth-rtr.middlewares=chain-oauth@file\"\n      # HTTP Services\n      - \"traefik.http.routers.oauth-rtr.service=oauth-svc\"\n      - \"traefik.http.services.oauth-svc.loadbalancer.server.port=4181\"\n"
  },
  {
    "path": "compose/ws-arm/ollama.yml",
    "content": "services:\n  # Ollama - A simple and lightweight web-based terminal\n  ollama:\n    image: ollama/ollama:latest\n    container_name: ollama\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$OLLAMA_PORT:11434\"\n    volumes:\n      - $DOCKERDIR/appdata/ollama:/root/.ollama\n    # deploy:\n    #   resources:\n    #     reservations:\n    #       devices:\n    #         - driver: nvidia\n    #           device_ids: ['all']\n    #           capabilities: [gpu]\n    environment:\n      - OLLAMA_KEEP_ALIVE=24h\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/open-webui.yml",
    "content": "services:\n  # Open-WebUI - User-friendly AI Interface\n  open-webui:\n    image: ghcr.io/open-webui/open-webui:main\n    container_name: open-webui\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    depends_on:\n     - ollama\n    ports:\n      - \"$OPENWEBUI_PORT:8080\"\n    environment:\n      - OLLAMA_BASE_URL=http://10.0.0.71:$OLLAMA_PORT\n      - WEBUI_SECRET_KEY=$OPENWEBUI_SECRET_KEY\n      # - CORS_ALLOW_ORIGIN=\n      - USER_AGENT=Open-WebUI\n    volumes:\n      - $DOCKERDIR/appdata/open-webui:/app/backend/data\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/openhands.yml",
    "content": "services:\n  openhands:\n    image: docker.all-hands.dev/all-hands-ai/openhands:0.26\n    container_name: openhands\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      - default\n    environment:\n      - SANDBOX_RUNTIME_CONTAINER_IMAGE=docker.all-hands.dev/all-hands-ai/runtime:0.26-nikolaik\n      - LOG_ALL_EVENTS=true\n    volumes:\n      - /var/run/docker.sock:/var/run/docker.sock\n      - $DOCKERDIR/appdata/openhands:/.openhands-state\n      - /home/anand:/data/anand\n    ports:\n      - \"3010:3000\"\n    extra_hosts:\n      - \"host.docker.internal:host-gateway\"\n    pull_policy: if_not_present"
  },
  {
    "path": "compose/ws-arm/pgadmin.yml",
    "content": "services:\n  # pgAdmin - PostgreSQL Administration\n  pgadmin:\n    image: dpage/pgadmin4\n    container_name: pgadmin\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$PGADMIN_PORT:80\"\n    volumes:\n      - $DOCKERDIR/appdata/pgadmin:/var/lib/pgadmin\n    environment:\n      PGADMIN_DEFAULT_EMAIL: $PGADMIN_ADMIN_EMAIL\n      PGADMIN_DEFAULT_PASSWORD: $PGADMIN_ADMIN_PASSWORD\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/php7.yml",
    "content": "services:\n  # PHP - Hypertext Preprocessor\n  # https://github.com/chialab/docker-php\n  php7:\n    container_name: php7\n    image: chialab/php:7.4-fpm\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      - t3_proxy\n      - default\n    user: $PUID:$PGID # allows upgrading WP and plugins\n    volumes:\n      - $DOCKERDIR/appdata/sites/simplehomelab/html:/var/www/html/simplehomelab\n      - $DOCKERDIR/appdata/php/php7:/usr/local/etc/php\n      - $DOCKERDIR/appdata/sites/khub/html:/var/www/html/khub\n      - $DOCKERDIR/appdata/sites/dash/html:/var/www/html/dash\n      - $DOCKERDIR/appdata/sites/deployrr/html:/var/www/html/deployrr\n      - $DOCKERDIR/appdata/sites/deployarr/html:/var/www/html/deployarr # delete this line after 6/15/2025"
  },
  {
    "path": "compose/ws-arm/php8.yml",
    "content": "services:\n  # PHP - Hypertext Preprocessor\n  # https://github.com/chialab/docker-php\n  php8:\n    container_name: php8\n    image: chialab/php:8.4-fpm\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      default: \n        # ipv4_address: 172.18.0.9 # IP of of WP Crowdsec plugin kept changing\n      t3_proxy: \n    user: $PUID:$PGID # allows upgrading WP and plugins\n    volumes:\n      - $DOCKERDIR/appdata/sites/simplehomelab/html:/var/www/html/simplehomelab\n      - $DOCKERDIR/logs/ws-arm/php/php8:/var/log/php\n      - $DOCKERDIR/appdata/php/php8:/usr/local/etc\n      - $DOCKERDIR/appdata/sites/khub/html:/var/www/html/khub\n      - $DOCKERDIR/appdata/sites/dash/html:/var/www/html/dash\n      - $DOCKERDIR/appdata/sites/deployrr/html:/var/www/html/deployrr\n      - $DOCKERDIR/appdata/sites/deployarr/html:/var/www/html/deployarr # delete this line after 6/15/2025"
  },
  {
    "path": "compose/ws-arm/phpmyadmin.yml",
    "content": "services:\n  # phpMyAdmin - Database management\n  # Create a new user with admin privileges. Cannot login as MySQL root for some reason.\n  phpmyadmin:\n    image: lscr.io/linuxserver/phpmyadmin:latest\n    container_name: phpmyadmin\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$PHPMYADMIN_PORT:80\" \n    environment:\n      - PUID=$PUID\n      - PGID=$PGID\n      - TZ=$TZ\n      - PMA_ARBITRARY=0 #optional\n      - PMA_ABSOLUTE_URI=https://pma.$DOMAINNAME_1 #optional\n      - PMA_HOST=mariadb\n      - PMA_PORT=3306\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/portchecker-api.yml",
    "content": "services:\n  # Port Checker API - Backend API for the Port Checker\n  portchecker-api:\n    image: ghcr.io/dsgnr/portcheckerio-api:latest\n    container_name: api\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - $PORTCHECKERAPI_PORT:8000\n    healthcheck:\n      test: [\"CMD\", \"wget\", \"--spider\", \"-S\", \"http://10.0.0.71:$PORTCHECKERAPI_PORT/healthz\"]\n      interval: 30s\n      timeout: 10s\n      retries: 3\n      start_period: 5s\n    environment:\n      - ALLOW_PRIVATE=false  # Prevent usage of private IP addresses\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/portchecker.yml",
    "content": "services:\n  # Port Checker - Web UI for the Port Checker\n  portchecker:\n    image: ghcr.io/dsgnr/portcheckerio-web:latest\n    container_name: portchecker\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - $PORTCHECKER_PORT:80\n    healthcheck:\n      test: [\"CMD\", \"wget\", \"--spider\", \"-S\", \"http://10.0.0.71:$PORTCHECKER_PORT\"]\n      interval: 30s\n      timeout: 10s\n      retries: 3\n      start_period: 5s\n    depends_on:\n      portchecker-api:\n        condition: service_healthy\n    environment:\n      - DEFAULT_PORT=443  # Optional, Populates a default port value to be populataed in the in the UI input\n      # - GOOGLE_ANALYTICS=  # Optional, set for Google Analytics integration\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/postgresql-vector.yml",
    "content": "services:\n  # pgVector - PostgreSQL with Vector Store\n  postgresql-vector:\n    container_name: postgresql-vector\n    image: pgvector/pgvector:pg17 # PostgreSQL with pgvector support\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    healthcheck:\n      test: [\"CMD-SHELL\", \"pg_isready -d postgres -U $${POSTGRES_USER}\"]\n      start_period: 20s\n      interval: 30s\n      retries: 5\n      timeout: 5s\n    networks:\n      - default\n    ports:\n      - \"$POSTGRESQLVECTOR_PORT:5432\"\n    volumes:\n      - $DOCKERDIR/appdata/postgresql-vector/data:/var/lib/postgresql/data\n      - $DOCKERDIR/appdata/postgresql-vector/schema.sql:/docker-entrypoint-initdb.d/schema.sql # only first time\n    environment:\n      - POSTGRES_DB=postgres # default database\n      - POSTGRES_USER=$POSTGRES_USER # root user\n      - POSTGRES_PASSWORD_FILE=/run/secrets/postgres_default_password\n    secrets:\n      - postgres_default_password\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/postgresql.yml",
    "content": "services:\n  # PostgreSQL - Database\n  postgresql:\n    container_name: postgresql\n    image: postgres:16-alpine\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    healthcheck:\n      test: [\"CMD-SHELL\", \"pg_isready -d postgres -U $${POSTGRES_USER}\"]\n      start_period: 20s\n      interval: 30s\n      retries: 5\n      timeout: 5s\n    networks:\n      - default\n    ports:\n      - \"$POSTGRESQL_PORT:5432\"\n    volumes:\n      - $DOCKERDIR/appdata/postgresql:/var/lib/postgresql/data\n    environment:\n      # - POSTGRES_DB=$POSTGRES_DB\n      - POSTGRES_USER=$POSTGRES_USER\n      - POSTGRES_PASSWORD_FILE=/run/secrets/postgres_default_password\n    secrets:\n      - postgres_default_password"
  },
  {
    "path": "compose/ws-arm/prometheus.yml",
    "content": "services:\n  # Prometheus - Database for sensor data\n  prometheus:\n    image: prom/prometheus:latest\n    container_name: prometheus\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"dbs\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$PROMETHEUS_PORT:9090\"\n    volumes:\n      - $DOCKERDIR/appdata/prometheus/config:/etc/prometheus\n      - $DOCKERDIR/appdata/prometheus/data:/prometheus\n    user: $PUID:$PGID\n    command:\n      - '--config.file=/etc/prometheus/prometheus.yml'\n      - '--storage.tsdb.path=/prometheus'\n      - '--web.console.libraries=/usr/share/prometheus/console_libraries'\n      - '--web.console.templates=/usr/share/prometheus/consoles'\n      - '--web.enable-lifecycle'\n      - '--web.enable-admin-api'\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/qdrant.yml",
    "content": "services:\n  # Qdrant - A vector database and search engine\n  qdrant:\n    image: qdrant/qdrant\n    container_name: qdrant\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks:\n      - default\n    ports:\n      - $QDRANT_PORT:6333 # HTTP API and dashboard\n      - 6334:6334 # gRPC API\n    volumes:\n      - $DOCKERDIR/appdata/qdrant:/qdrant/storage\n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/redis-disk.yml",
    "content": "services:\n  # Redis - Key-value Store\n  redis:\n    image: docker.io/library/redis:alpine\n    container_name: redis\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    command: --save 60 1 --loglevel warning\n    healthcheck:\n      test: [\"CMD-SHELL\", \"redis-cli ping | grep PONG\"]\n      start_period: 20s\n      interval: 30s\n      retries: 5\n      timeout: 3s\n    networks:\n      - default\n    ports:\n      - \"$REDIS_PORT:6379\"\n    volumes:\n      - $DOCKERDIR/appdata/redis:/data"
  },
  {
    "path": "compose/ws-arm/redis.yml",
    "content": "services:\n  # Redis - Key-value Store\n  # Add vm.overcommit_memory = 1 to /etc/sysctl.conf\n  redis:\n    image: docker.io/library/redis:alpine\n    container_name: redis\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    command: redis-server --save \"\" --maxmemory 1gb --maxmemory-policy allkeys-lru\n    healthcheck:\n      test: [\"CMD-SHELL\", \"redis-cli ping | grep PONG\"]\n      start_period: 20s\n      interval: 30s\n      retries: 5\n      timeout: 3s\n    networks:\n      - default\n    ports:\n      - \"$REDIS_PORT:6379\"\n    deploy:\n      resources:\n        limits:\n          memory: 1GB"
  },
  {
    "path": "compose/ws-arm/remmina.yml",
    "content": "services:\n  # Remmina - Remote Desktop Client\n  remmina:\n    image: lscr.io/linuxserver/remmina:latest\n    container_name: remmina\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      - default\n    # DEVICES-GPU-PLACEHOLDER-DO-NOT-DELETE\n    ports:\n      - \"$REMMINA_PORT:3000\" \n      # - \"3001:3001\" # HTTPS\n    volumes:\n      - $DOCKERDIR/appdata/remmina:/config\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      TZ: $TZ\n      CUSTOM_USER: $REMMINA_HTTP_USER\n      PASSWORD: $REMMINA_HTTP_PASSWORD\n      # DRINODE: /dev/dri/renderD128 \n    # DOCKER-LABELS-PLACEHOLDER"
  },
  {
    "path": "compose/ws-arm/socket-proxy.yml",
    "content": "services:\n  # Docker Socket Proxy - Security Enchanced Proxy for Docker Socket\n  socket-proxy:\n    image: lscr.io/linuxserver/socket-proxy:latest\n    container_name: socket-proxy\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      socket_proxy:\n        ipv4_address: 192.168.91.254 # You can specify a static IP\n    privileged: true # true for VM. False (default) for unprivileged LXC container.\n    # ports:\n      #- \"2375:2375\"\n    volumes:\n      - \"/var/run/docker.sock:/var/run/docker.sock\"\n    read_only: true\n    tmpfs:\n      - /run\n    environment:\n      - LOG_LEVEL=warning # debug,info,notice,warning,err,crit,alert,emerg\n      - ALLOW_START=1 # Portainer\n      - ALLOW_STOP=1 # Portainer\n      - ALLOW_RESTARTS=1 # Portainer\n      ## Granted by Default\n      - EVENTS=1\n      - PING=1\n      - VERSION=1\n      ## Revoked by Default\n      # Security critical\n      - AUTH=0\n      - SECRETS=0\n      - POST=1 # Watchtower\n      # Not always needed\n      - BUILD=0\n      - COMMIT=0\n      - CONFIGS=0\n      - CONTAINERS=1 # Traefik, portainer, etc.\n      - DISTRIBUTION=0\n      - EXEC=0\n      - IMAGES=1 # Portainer\n      - INFO=1 # Portainer\n      - NETWORKS=1 # Portainer\n      - NODES=0\n      - PLUGINS=0\n      - SERVICES=1 # Portainer\n      - SESSION=0\n      - SWARM=0\n      - SYSTEM=0\n      - TASKS=1 # Portainer\n      - VOLUMES=1 # Portainer\n      - DISABLE_IPV6=0 #optional"
  },
  {
    "path": "compose/ws-arm/sshwifty.yml",
    "content": "services:\n  # Sshwifty - Web SSH & Telnet Client\n  sshwifty:\n    image: niruix/sshwifty:latest\n    container_name: sshwifty\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    network_mode: \"host\"\n    user: \"$PUID:$PGID\"\n    volumes:\n      - $DOCKERDIR/appdata/sshwifty/conf.json:/sshwifty.conf.json\n    environment:\n      - TZ=$TZ\n      - SSHWIFTY_LISTENPORT=$SSHWIFTY_PORT\n      - SSHWIFTY_SHAREDKEY=$SSHWIFTY_PASSWORD\n      - SSHWIFTY_CONFIG=/sshwifty.conf.json\n    # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/ws-arm/traefik-access-log.yml",
    "content": "services:\n  # Traefik Access Log (access.log) for Dozzle\n  traefik-access-log:\n    container_name: traefik-access-log\n    image: alpine\n    volumes:\n      - $DOCKERDIR/logs/$HOSTNAME/traefik/access.log:/var/log/stream.log\n    command:\n      - tail\n      - -f\n      - /var/log/stream.log     \n    network_mode: none\n    restart: unless-stopped"
  },
  {
    "path": "compose/ws-arm/traefik-error-log.yml",
    "content": "services:\n  # Traefik Error Log (traefik.log) for Dozzle\n  traefik-error-log:\n    container_name: traefik-error-log\n    image: alpine\n    volumes:\n      - $DOCKERDIR/logs/$HOSTNAME/traefik/traefik.log:/var/log/stream.log\n    command:\n      - tail\n      - -f\n      - /var/log/stream.log     \n    network_mode: none\n    restart: unless-stopped"
  },
  {
    "path": "compose/ws-arm/traefik.yml",
    "content": "services:\n  # Traefik 3 - Reverse Proxy\n  traefik:\n    container_name: traefik\n    image: traefik:3.3\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    depends_on:\n      - socket-proxy\n    networks:\n      t3_proxy:\n        ipv4_address: 192.168.90.254 # You can specify a static IP\n      socket_proxy:\n    command: # CLI arguments\n      - --global.checkNewVersion=true\n      - --global.sendAnonymousUsage=false\n      - --entrypoints.web-external.address=:81\n      - --entrypoints.web-internal.address=:80\n      - --entrypoints.websecure-external.address=:444\n      - --entrypoints.websecure-internal.address=:443\n      - --entrypoints.traefik.address=:8080\n      - --entrypoints.web-external.http.redirections.entrypoint.to=websecure-external\n      - --entrypoints.web-external.http.redirections.entrypoint.scheme=https\n      - --entrypoints.web-external.http.redirections.entrypoint.permanent=true\n      - --entrypoints.web-internal.http.redirections.entrypoint.to=websecure-internal\n      - --entrypoints.web-internal.http.redirections.entrypoint.scheme=https\n      - --entrypoints.web-internal.http.redirections.entrypoint.permanent=true\n      - --api=true\n      - --api.dashboard=true\n      - --api.insecure=true\n      # - --serversTransport.insecureSkipVerify=true\n      # Allow these IPs to set the X-Forwarded-* headers - Cloudflare IPs: https://www.cloudflare.com/ips/\n      - --entrypoints.websecure-external.forwardedHeaders.trustedIPs=$CLOUDFLARE_IPS,$LOCAL_IPS\n      - --entrypoints.websecure-internal.forwardedHeaders.trustedIPs=$CLOUDFLARE_IPS,$LOCAL_IPS\n      - --log=true\n      - --log.filePath=/logs/traefik.log\n      - --log.level=INFO # (Default: error) DEBUG, INFO, WARN, ERROR, FATAL, PANIC\n      - --accessLog=true\n      - --accessLog.filePath=/logs/access.log\n      - --accessLog.bufferingSize=100 # Configuring a buffer of 100 lines\n      - --accessLog.filters.statusCodes=204-299,400-499,500-599\n      - --providers.docker=true\n      # - --providers.docker.endpoint=unix:///var/run/docker.sock # Disable for Socket Proxy. Enable otherwise.\n      - --providers.docker.endpoint=tcp://socket-proxy:2375 # Enable for Socket Proxy. Disable otherwise.\n      - --providers.docker.exposedByDefault=false\n      - --providers.docker.network=t3_proxy \n      # - --providers.docker.swarmMode=false # Traefik v2 Swarm\n      # - --providers.swarm.endpoint=tcp://127.0.0.1:2377 # Traefik v3 Swarm\n      - --entrypoints.websecure-external.http.tls=true\n      - --entrypoints.websecure-external.http.tls.options=tls-opts@file\n      - --entrypoints.websecure-internal.http.tls=true\n      - --entrypoints.websecure-internal.http.tls.options=tls-opts@file\n      # Add dns-cloudflare as default certresolver for all services. Also enables TLS and no need to specify on individual services\n      - --entrypoints.websecure-external.http.tls.certresolver=dns-cloudflare\n      - --entrypoints.websecure-internal.http.tls.certresolver=dns-cloudflare\n      - --entrypoints.websecure-external.http.tls.domains[0].main=$DOMAINNAME_1\n      - --entrypoints.websecure-external.http.tls.domains[0].sans=*.$DOMAINNAME_1\n      - --entrypoints.websecure-internal.http.tls.domains[0].main=$DOMAINNAME_1\n      - --entrypoints.websecure-internal.http.tls.domains[0].sans=*.$DOMAINNAME_1\n      - --entrypoints.websecure-external.http.tls.domains[1].main=$DOMAINNAME_2\n      - --entrypoints.websecure-external.http.tls.domains[1].sans=*.$DOMAINNAME_2\n      - --entrypoints.websecure-internal.http.tls.domains[1].main=$DOMAINNAME_2\n      - --entrypoints.websecure-internal.http.tls.domains[1].sans=*.$DOMAINNAME_2\n      - --entrypoints.websecure-external.http.tls.domains[2].main=$DOMAINNAME_3\n      - --entrypoints.websecure-external.http.tls.domains[2].sans=*.$DOMAINNAME_3\n      - --entrypoints.websecure-internal.http.tls.domains[2].main=$DOMAINNAME_3\n      - --entrypoints.websecure-internal.http.tls.domains[2].sans=*.$DOMAINNAME_3\n      - --entrypoints.websecure-external.http.tls.domains[3].main=$DOMAINNAME_4 # delete this line after 6/15/2025\n      - --entrypoints.websecure-external.http.tls.domains[3].sans=*.$DOMAINNAME_4 # delete this line after 6/15/2025\n      - --entrypoints.websecure-internal.http.tls.domains[3].main=$DOMAINNAME_4 # delete this line after 6/15/2025\n      - --entrypoints.websecure-internal.http.tls.domains[3].sans=*.$DOMAINNAME_4 # delete this line after 6/15/2025\n      # - DOMAINS-PLACEHOLDER-DO-NOT-DELETE\n      - --providers.file.directory=/rules # Load dynamic configuration from one or more .toml or .yml files in a directory\n      - --providers.file.watch=true # Only works on top level files in the rules folder\n      # - --certificatesResolvers.dns-cloudflare.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory # LetsEncrypt Staging Server - uncomment when testing\n      - --certificatesResolvers.dns-cloudflare.acme.storage=/acme.json\n      - --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.provider=cloudflare\n      - --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.resolvers=1.1.1.1:53,1.0.0.1:53\n      - --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.propagation.delaybeforechecks=120 # To delay DNS check and reduce LE hitrate\n      #- --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.propagation.disablechecks=true # Not recommended\n      # - --experimental.plugins.crowdsec-bouncer-traefik-plugin.modulename=github.com/maxlerebourg/crowdsec-bouncer-traefik-plugin\n      # - --experimental.plugins.crowdsec-bouncer-traefik-plugin.version=v1.3.5\n      # - METRICS-PLACEHOLDER-DO-NOT-DELETE\n    ports:\n      - \"80:80\"\n      - \"81:81\"\n      - \"443:443\"\n      - \"444:444\"\n      - \"8080:8080\"\n    volumes:\n      - $DOCKERDIR/appdata/traefik3/rules/$HOSTNAME:/rules \n      # - /var/run/docker.sock:/var/run/docker.sock:ro # Use Docker Socket Proxy instead for improved security\n      - $DOCKERDIR/appdata/traefik3/acme/acme.json:/acme.json \n      - $DOCKERDIR/logs/$HOSTNAME/traefik:/logs\n    environment:\n      - TZ=$TZ\n      - CF_DNS_API_TOKEN_FILE=/run/secrets/cf_dns_api_token    \n      - HTPASSWD_FILE=/run/secrets/basic_auth_credentials # HTTP Basic Auth Credentials\n      - DOMAINNAME_1 # Passing the domain name to traefik container to be able to use the variable in rules. \n      - DOMAINNAME_2 \n      - DOMAINNAME_3\n      # - TRAEFIK_AUTH_BYPASS_KEY\n    secrets:\n      - cf_dns_api_token\n      - basic_auth_credentials\n    labels:\n      - \"traefik.enable=true\"\n      # HTTP Routers\n      - \"traefik.http.routers.traefik-rtr.entrypoints=websecure-internal,websecure-external\"\n      - \"traefik.http.routers.traefik-rtr.rule=Host(`traefik.$DOMAINNAME_1`) || Host(`traefik.$DOMAINNAME_2`) || Host(`traefik.$DOMAINNAME_3`)\"\n      # Services - API\n      - \"traefik.http.routers.traefik-rtr.service=api@internal\"\n      # Middlewares\n      - \"traefik.http.routers.traefik-rtr.middlewares=chain-oauth@file\" # For Basic HTTP Authentication"
  },
  {
    "path": "compose/ws-arm/vscode.yml",
    "content": "services:\n  # VSCode - VSCode Editing\n  vscode:\n    image: lscr.io/linuxserver/code-server:latest\n    container_name: vscode\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"core\", \"all\"]\n    networks:\n      - default\n    ports:\n      - \"$VSCODE_PORT:8443\"\n    volumes:\n      - $DOCKERDIR/appdata/vscode:/config\n      - $USERDIR:/data/$PRIMARY_USERNAME\n    environment:\n      - TZ=$TZ\n      - PUID=$PUID\n      - PGID=$PGID\n      # - DOCKER_HOST\n      - PASSWORD=$VSCODE_HTTP_PASSWORD\n      # - HASHED_PASSWORD= #optional\n      # - SUDO_PASSWORD= password #optional\n      # - SUDO_PASSWORD_HASH= #optional\n      # - PROXY_DOMAIN= code-server.my.domain #optional\n      # - DEFAULT_WORKSPACE=/config/data/User/Workspaces/Default.code-workspace #optional\n    # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "compose/ws-arm/wikidocs.yml",
    "content": "services:\n  # Wikidocs - Flat-file Markdown Wiki\n  wikidocs:\n    image: zavy86/wikidocs\n    container_name: wikidocs\n    security_opt:\n      - no-new-privileges:true\n    restart: unless-stopped\n    profiles: [\"apps\", \"all\"]\n    networks: \n      - default\n    ports:\n      - \"$WIKIDOCS_PORT:80\"\n    volumes:\n      - '$DOCKERDIR/appdata/wikidocs:/datasets'\n    environment:\n      PUID: $PUID\n      PGID: $PGID\n      # DOCKER-LABELS-PLACEHOLDER\n"
  },
  {
    "path": "docker-compose-ds918.yml",
    "content": "version: \"3.9\"\n\n# NOTE (OCTOBER 15, 2025): At this time, my Synology setup has not been updated to UDMS 2025/Deployrr standards. It still follows my old way of doing things. \n\n########################### NETWORKS\n# You may customize the network subnets (192.168.x.0/24) below as you please.\nnetworks:\n  default:\n    driver: bridge\n  socket_proxy:\n    name: socket_proxy\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.91.0/24\n  t2_proxy:\n    name: t2_proxy\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.90.0/24\n  dockervlan:\n    name: dockervlan\n    driver: macvlan\n    driver_opts:\n      parent: eth1 # using ifconfig\n    ipam:\n      config:\n        - subnet: \"192.168.1.0/24\"\n          ip_range: \"192.168.1.25/32\"\n          gateway: \"192.168.1.1\"\n\n########################### SECRETS\nsecrets:\n  basic_auth_credentials:\n    file: $DOCKERDIR/secrets/basic_auth_credentials\n  cf_dns_api_token:\n    file: $DOCKERDIR/secrets/cf_dns_api_token\n  traefik_forward_auth:\n    file: $DOCKERDIR/secrets/traefik_forward_auth\n  mysql_root_password:\n    file: $DOCKERDIR/secrets/mysql_root_password\n  plex_claim:\n    file: $DOCKERDIR/secrets/plex_claim\n\n# Docker Compose v2.20 or greater required to use \"include\"\ninclude:\n  ########################### SERVICES\n  # PREFIX ds918 = Synology DS918+ NAS\n  # HOSTNAME=ds918 - defined in .env\n\n  # CORE\n  - compose/$HOSTNAME/traefik.yml\n  - compose/$HOSTNAME/socket-proxy.yml\n  - compose/$HOSTNAME/oauth.yml\n  - compose/$HOSTNAME/portainer.yml\n  # NETWORK\n  - compose/$HOSTNAME/zerotier.yml\n  # - compose/$HOSTNAME/adguardhome.yml\n  # MEDIA\n  - compose/$HOSTNAME/plex.yml\n  - compose/$HOSTNAME/plex-sync.yml\n  - compose/$HOSTNAME/tdarr.yml\n  # FILE MANAGEMENT\n  # - compose/$HOSTNAME/rclone-gdrive.yml\n  # - compose/$HOSTNAME/rclone-gcrypt.yml\n  # - compose/$HOSTNAME/mergerfs.yml\n  - compose/$HOSTNAME/syncthing.yml\n  - compose/$HOSTNAME/vscode.yml\n  # MONITORING\n  - compose/$HOSTNAME/glances.yml\n  # - compose/$HOSTNAME/qdirstat.yml\n  # MAINTENANCE\n  - compose/$HOSTNAME/docker-gc.yml\n  - compose/$HOSTNAME/ddns-updater.yml\n  # - compose/$HOSTNAME/certdumper.yml\n"
  },
  {
    "path": "docker-compose-hs.yml",
    "content": "########################### NETWORKS\n# You may customize the network subnets (192.168.x.0/24) below as you please.\nnetworks:\n  default:\n    driver: bridge\n  socket_proxy:\n    name: socket_proxy\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.91.0/24\n  t3_proxy:\n    name: t3_proxy\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.90.0/24\n  # NETWORKS-PLACEHOLDER-DO-NOT-DELETE\n  \n########################### SECRETS\nsecrets:\n  basic_auth_credentials:\n    file: $DOCKERDIR/secrets/basic_auth_credentials\n  cf_dns_api_token:\n    file: $DOCKERDIR/secrets/cf_dns_api_token\n  oauth_secrets:\n    file: $DOCKERDIR/secrets/oauth_secrets\n  # SECRETS-PLACEHOLDER-DO-NOT-DELETE\n    \ninclude:\n  ########################### SERVICES\n  # HOSTNAME defined in .env file\n\n  # - compose/$HOSTNAME/custom.yml\n  - compose/$HOSTNAME/socket-proxy.yml\n  - compose/$HOSTNAME/deployrr-dashboard.yml\n  - compose/$HOSTNAME/traefik.yml\n  - compose/$HOSTNAME/oauth.yml\n  - compose/$HOSTNAME/adminer.yml\n  - compose/$HOSTNAME/bazarr.yml\n  - compose/$HOSTNAME/cloud-commander.yml\n  - compose/$HOSTNAME/cleanuparr.yml\n  - compose/$HOSTNAME/docker-gc.yml\n  - compose/$HOSTNAME/dozzle.yml\n  - compose/$HOSTNAME/glances.yml\n  - compose/$HOSTNAME/gluetun.yml\n  - compose/$HOSTNAME/it-tools.yml\n  - compose/$HOSTNAME/kometa.yml\n  - compose/$HOSTNAME/lidarr.yml\n  - compose/$HOSTNAME/maintainerr.yml\n  - compose/$HOSTNAME/notifiarr.yml\n  - compose/$HOSTNAME/prowlarr.yml\n  - compose/$HOSTNAME/deunhealth.yml\n  - compose/$HOSTNAME/qbittorrent-vpn.yml\n  - compose/$HOSTNAME/radarr.yml\n  - compose/$HOSTNAME/sabnzbd.yml\n  - compose/$HOSTNAME/sonarr.yml\n  - compose/$HOSTNAME/stirling-pdf.yml\n  - compose/$HOSTNAME/uptime-kuma.yml\n  - compose/$HOSTNAME/wud.yml\n  - compose/$HOSTNAME/picard.yml\n  - compose/$HOSTNAME/makemkv.yml\n  - compose/$HOSTNAME/mkvtoolnix.yml\n  - compose/$HOSTNAME/firefly.yml\n  - compose/$HOSTNAME/firefly-importer.yml\n  # SERVICE-PLACEHOLDER-DO-NOT-DELETE\n"
  },
  {
    "path": "docker-compose-mds.yml",
    "content": "########################### ANAND'S ENVIRONMENT\n# Here are my 4 Docker Hosts:\n# - Home Server (hs) - Proxmox Unprivileged LXC with Ubuntu Server 22.04\n# - Media / Database Server (mds) - Proxmox Unprivileged LXC with Ubuntu Server 22.04\n# - Web Server (ws-arm) - Oracle Cloud Ampere A1 VPS with Ubuntu Server 24.04 (arm)\n# - Synology (ds918) - Synology DS918+ DSM 7.X\n\n########################### THIS COMPOSE FILE\n# - Media / Database Server (mds) - Proxmox LXC with Ubuntu Server 22.04\n# - Built using Deployrr\n# - Docker version 28.3.2, build 578ccf6\n# - Docker Compose version v2.38.2\n\n########################### NETWORKS\n# You may customize the network subnets (192.168.x.0/24) below as you please.\nnetworks:\n  default:\n    driver: bridge\n  socket_proxy:\n    name: socket_proxy\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.91.0/24\n  # NETWORKS-PLACEHOLDER-DO-NOT-DELETE\n\n########################### SECRET\nsecrets:\n  plex_claim:\n    file: $DOCKERDIR/secrets/plex_claim\n  mysql_root_password:\n    file: $DOCKERDIR/secrets/mysql_root_password\n  pgsql_teslamate_passwd:\n    file: $DOCKERDIR/secrets/pgsql_teslamate_passwd\n  # SECRETS-PLACEHOLDER-DO-NOT-DELETE\n\ninclude:\n  ########################### SERVICES\n  # HOSTNAME defined in .env file\n  - compose/$HOSTNAME/plex.yml\n  - compose/$HOSTNAME/airsonic-advanced.yml\n  - compose/$HOSTNAME/socket-proxy.yml\n  - compose/$HOSTNAME/docker-gc.yml\n  - compose/$HOSTNAME/influxdb.yml\n  - compose/$HOSTNAME/mariadb.yml\n  - compose/$HOSTNAME/jellyfin.yml \n  # # - compose/$HOSTNAME/plex-image-cleanup.yml\n  # # - compose/$HOSTNAME/plex-meta-manager.yml\n  - compose/$HOSTNAME/tautulli.yml\n  - compose/$HOSTNAME/prometheus.yml\n  # - compose/$HOSTNAME/pgsql-teslamate.yml\n  # - compose/$HOSTNAME/node-exporter.yml\n  # - compose/$HOSTNAME/mosquitto.yml\n  # SERVICE-PLACEHOLDER-DO-NOT-DELETE\n\n\n\n"
  },
  {
    "path": "docker-compose-ws-arm.yml",
    "content": "########################### NETWORKS\n# You may customize the network subnets (192.168.x.0/24) below as you please.\nnetworks:\n  default:\n    driver: bridge\n  socket_proxy:\n    name: socket_proxy\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.91.0/24\n  t3_proxy:\n    name: t3_proxy\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.90.0/24\n  cf_tunnel:\n    name: cf_tunnel\n    driver: bridge\n    ipam:\n      config:\n        - subnet: 192.168.92.0/24\n  # NETWORKS-PLACEHOLDER-DO-NOT-DELETE\n  \n########################### SECRETS\nsecrets:\n  basic_auth_credentials:\n    file: $DOCKERDIR/secrets/basic_auth_credentials\n  cf_dns_api_token:\n    file: $DOCKERDIR/secrets/cf_dns_api_token\n  oauth_secrets:\n    file: $DOCKERDIR/secrets/oauth_secrets\n  postgres_default_password:\n    file: $DOCKERDIR/secrets/postgres_default_password\n  mariadb_root_password:\n    file: $DOCKERDIR/secrets/mariadb_root_password\n  # SECRETS-PLACEHOLDER-DO-NOT-DELETE\n          \ninclude:\n  ########################### SERVICES\n  # HOSTNAME defined in .env file\n\n  # - compose/$HOSTNAME/custom.yml\n  - compose/$HOSTNAME/socket-proxy.yml\n  - compose/$HOSTNAME/deployrr-dashboard.yml\n  - compose/$HOSTNAME/traefik.yml\n  - compose/$HOSTNAME/oauth.yml\n  - compose/$HOSTNAME/vscode.yml\n  - compose/$HOSTNAME/dozzle.yml\n  - compose/$HOSTNAME/grafana.yml\n  - compose/$HOSTNAME/phpmyadmin.yml\n  - compose/$HOSTNAME/redis.yml\n  - compose/$HOSTNAME/traefik-access-log.yml\n  - compose/$HOSTNAME/traefik-error-log.yml\n  # - compose/$HOSTNAME/sshwifty.yml\n  - compose/$HOSTNAME/remmina.yml\n  # - compose/$HOSTNAME/influxdb.yml\n  # - compose/$HOSTNAME/prometheus.yml\n  - compose/$HOSTNAME/adminer.yml\n  - compose/$HOSTNAME/crowdsec.yml\n  # - compose/$HOSTNAME/php7.yml\n  - compose/$HOSTNAME/php8.yml\n  - compose/$HOSTNAME/cloudflare-bouncer.yml\n  - compose/$HOSTNAME/glances.yml\n  - compose/$HOSTNAME/mariadb.yml\n  - compose/$HOSTNAME/nginx.yml\n  - compose/$HOSTNAME/portchecker-api.yml\n  - compose/$HOSTNAME/portchecker.yml\n  - compose/$HOSTNAME/crawl4ai.yml\n  - compose/$HOSTNAME/postgresql.yml\n  # - compose/$HOSTNAME/pgadmin.yml\n  - compose/$HOSTNAME/postgresql-vector.yml\n  - compose/$HOSTNAME/n8n.yml\n  # - compose/$HOSTNAME/ollama.yml \n  - compose/$HOSTNAME/qdrant.yml\n  # - compose/$HOSTNAME/openhands.yml\n  - compose/$HOSTNAME/wikidocs.yml\n  # - compose/$HOSTNAME/open-webui.yml\n  - compose/$HOSTNAME/chromium.yml\n  - compose/$HOSTNAME/flowise.yml\n  - compose/$HOSTNAME/dockflare.yml\n  # SERVICE-PLACEHOLDER-DO-NOT-DELETE\n"
  },
  {
    "path": "scripts/ds918/change_perms_plex_hw.sh.example",
    "content": "#!/bin/bash\n\n# Change permissions of GPU so Plex on Docker can do Hardware transcoding.\n\nchmod 777 /dev/dri*"
  },
  {
    "path": "scripts/ds918/increase_inotify_limits_syncthing.sh.example",
    "content": "#!/bin/bash\n\n# Synology default is 8192. This is very low and Synthing warns to \"increase inotify limits\". \n# Synology keeps overwriting custom values with default values. \n# Run this script as root at boot and periodically through Task Scheduler on DSM \n\n# echo \"fs.inotify.max_user_watches=204800\" | tee -a /etc/sysctl.conf\n\necho 524288 | tee /proc/sys/fs/inotify/max_user_watches"
  },
  {
    "path": "scripts/ds918/switch_ports.sh.example",
    "content": "#! /bin/bash\n\n# Save this script in one of your shares and schedule it to run as root at boot\n#   through Control Panel -> Task Scheduler\n# DSM upgrades will reset these changes, which is why we schedule them to happen automatically\n\n# NGINX Ports - CUSTOMIZE THIS\n# Several Synology services use port 80 and 443 via Nginx. This conflicts with Traefik, Nginx Proxy Manager, Caddy, etc. \n# This script reconfigures Nginx to use non-default ports, leaving ports 80 and 443 free for reverse proxy.\n\nDEFAULT_HTTP_PORT=80 # typically left as-is, 80.\nDEFAULT_HTTPS_PORT=443 # typically left as-is, 443.\nNEW_HTTP_PORT=81\nNEW_HTTPS_PORT=444\n\n################ DO NOT EDIT BEYOND THIS LINE ###########################\nsed -i \"s/^\\([ \\t]\\+listen[ \\t]\\+[]:[]*\\)$DEFAULT_HTTP_PORT\\([^0-9]\\)/\\1$NEW_HTTP_PORT\\2/\" /usr/syno/share/nginx/*.mustache\nsed -i \"s/^\\([ \\t]\\+listen[ \\t]\\+[]:[]*\\)$DEFAULT_HTTPS_PORT\\([^0-9]\\)/\\1$NEW_HTTPS_PORT\\2/\" /usr/syno/share/nginx/*.mustache\n\nsynosystemctl restart nginx\n"
  },
  {
    "path": "scripts/hs/check-mounts.sh.example",
    "content": "#!/bin/bash\n# This script checks for all required drive mounts, GDrive token validity, and rclone/mergerfs service status. If any issues are found, it shuts down any containers (media-service.txt) dependent on these mounted drives to avoid any data issues and sends an email notification. \n# A mail transfer agent such as nullmailer, ssmtp, or postfix must be configured correctly for emails to work\n\n# CHECKING FOR DRIVE MOUNTS\n\nrclone_drive=\"/media/drive\"\nrclone_crypt=\"/media/crypt\"\nhdd1=\"/media/hdd1\"\nmerge_media=\"/media/hdd1/data/media\"\nnum_drives=4\n\nmounted=0\nnotmounted=\"\"\n\nif mount | grep ${rclone_drive} > /dev/null; then\n\tmounted=$((mounted+1))\n#\techo -e ${rclone_drive}' mounted.'\nelse \n#\techo ${rclone_drive}' not mounted.'\n\tnotmounted=\"${notmounted} ${rclone_drive}\\n\"\nfi\n\nif mount | grep ${rclone_crypt} > /dev/null; then\n\tmounted=$((mounted+1))\n#\techo -e ${rclone_crypt}' mounted.'\nelse \n#\techo -e ${rclone_crypt}' not mounted.'\n\tnotmounted=\"${notmounted} ${rclone_crypt}\\n\"\nfi\n\nif mount | grep ${hdd1} > /dev/null; then\n\tmounted=$((mounted+1))\n#\techo -e ${hdd1}' mounted.'\nelse \n#\techo -e ${hdd1}' not mounted.'\n\tnotmounted=\"${notmounted} ${hdd1}\\n\"\nfi\n\nif mount | grep ${merge_media} > /dev/null; then\n\tmounted=$((mounted+1))\n#\techo -e ${merge_media}' mounted.'\nelse \n#\techo -e ${merge_media}' not mounted.'\n\tnotmounted=\"${notmounted} ${merge_media}\\n\"\nfi\n\n#echo $mounted\n#echo -e ${notmounted}\n\nif [[ \"$mounted\" -ne \"$num_drives\" ]]; then\n\techo -e \"These drives are not mounted properly:\\n\\n${notmounted}\\n\\nShutting down media containers.\" | mail -s \"[DVM ERROR] Some drives not mounted\" info@example.com -aFrom:DockerVM@example.com\n\tsudo docker stop $(cat /home/USER/docker/scripts/media-services.txt)\n#else\n\t#echo \"All drives mounted.\" | mail -s \"All drives mounted.\" info@example.com -aFrom:DockerVM@example.com\nfi\n\n######## CHECKING FOR EXPIRED TOKENS\n\nTOKEN_ERROR=\"expired or revoked\"\nRCLONE_LOGS=\"/home/USER/docker/appdata/rclone/logs/*.log\"\nlogfiles=\"$(egrep -l \"$TOKEN_ERROR\" $RCLONE_LOGS)\"\n\nif [[ ! -z \"$logfiles\" ]]; then\n\techo -e \"These rclone log files have token expired/revoked error:\\n\\n${logfiles}\\n\\nShutting down media containers.\" | mail -s \"[DVM ERROR] Token expired or revoked\" info@example.com -aFrom:DockerVM@example.com\n\tsudo docker stop $(cat /home/USER/docker/scripts/media-services.txt)\n#else\n\t#echo \"Rclone token still appears to be valid.\" | mail -s \"No error in Rclone logs.\" info@example.com -aFrom:DockerVM@example.com\nfi\n\n######## CHECKING RCLONE and MERGERFS SERVICE ERRORS\n\n# MergerFS\nmerge_media_status=\"$(systemctl is-active merge-media.service)\"\nif [[ ! \"$merge_media_status\" == \"active\" ]]; then\n\techo -e \"merge-media.service is reporting an issue:\\n\\n${merge_media_status}\\n\\nShutting down media containers.\" | mail -s \"[DVM ERROR] merge-media.service not running\" info@example.com -aFrom:DockerVM@example.com\n\tsudo docker stop $(cat /home/USER/docker/scripts/media-services.txt)\n#else\n#    echo \"Active\"\nfi\n\n# Rclone Google Drive\nrclone_drive_status=\"$(systemctl is-active rclone-drive.service)\"\nif [[ ! \"$rclone_drive_status\" == \"active\" ]]; then\n\techo -e \"rclone-drive.service is reporting an issue:\\n\\n${rclone_drive_status}\\n\\nShutting down media containers.\" | mail -s \"[DVM ERROR] rclone-drive.service not running\" info@example.com -aFrom:DockerVM@example.com\n\tsudo docker stop $(cat /home/USER/docker/scripts/media-services.txt)\n#else\n#    echo \"Active\"\nfi\n\n# Rclone Google Drive Encrypted\nrclone_crypt_status=\"$(systemctl is-active rclone-crypt.service)\"\nif [[ ! \"$rclone_crypt_status\" == \"active\" ]]; then\n\techo -e \"rclone-crypt.service is reporting an issue:\\n\\n${rclone_crypt_status}\\n\\nShutting down media containers.\" | mail -s \"[DVM ERROR] rclone-crypt.service not running\" info@example.com -aFrom:DockerVM@example.com\n\tsudo docker stop $(cat /home/USER/docker/scripts/media-services.txt)\n#else\n#    echo \"Active\"\nfi\n"
  },
  {
    "path": "scripts/hs/start-media-after-boot.sh.example",
    "content": "#!/bin/bash\n# All containers (profile \"media\") that access rclone/MergerFS mounts set to NOT restart automatically at boot time. \n# This is because, rclone can take a few seconds/minutes to mount remote drives.\n# This script checks the required mounts every 5 seconds and as soon as required drives are mounted, it starts the \"media\" containers.\n\n# CHECKING FOR DRIVE MOUNTS\nnum_drives=1 # number of mounts to check\n# Drive 1\ndrive1=\"/media/rclone/ds918\"\ndrive1_seconds=0\ndrive1_status=0\n# Drive 2 - not used\n# drive2=\"/media/ssd/media-server/media\"\n# drive2_seconds=0\n# drive2_status=0\n\n# Variables set in /etc/environment - PRIMARY_DOMAIN and HOSTNAME\nsource /etc/environment\nemail_to=\"info@$PRIMARY_DOMAIN\"\nemail_from=\"$HOSTNAME@$PRIMARY_DOMAIN\"\n\nmounted=0\nrounds=0\n\nwhile [[ \"$mounted\" -ne \"$num_drives\" ]]; do\n\t# echo -e \"round $rounds\\n\" # for testing\n\tif [[ \"$(systemctl is-active docker)\" == \"active\" ]]; then\n\t\t# Drive 1\n\t\tif mount | grep ${drive1} > /dev/null; then\n\t\t\tif [[ \"$drive1_status\" -eq 0 ]]; then\n\t\t\t\tmounted=$((mounted+1))\n\t\t\t\tdrive1_seconds=$((rounds * 5))\n\t\t\t\tdrive1_status=1\n\t\t\tfi\n\t\tfi\n\t\t# Drive 2\n\t\t# if mount | grep ${drive2} > /dev/null; then\n\t\t# \tif [[ \"$drive2_status\" -eq 0 ]]; then\n\t\t# \t\tmounted=$((mounted+1))\n\t\t# \t\tdrive2_seconds=$((rounds * 5))\n\t\t# \t\tdrive2_status=1\n\t\t# \tfi\n\t\t# fi\n\t\t# Timeout if mounting is not successful after 15 min (180x5)\n\t\tif [[ $rounds -eq 180 ]]; then\n\t\tbreak\n\t\tfi\n\t\tsleep 5\n\t\trounds=$((rounds + 1))\n\tfi\ndone\n\nseconds=$((rounds * 5))\n# echo \"seconds $seconds\" # for testing\n\n# Send an email - SMTP relay required (e.g. ssmtp)\nif [[ \"$mounted\" -eq \"$num_drives\" ]]; then\n\t# echo \"equal\"\n\techo -e \"### `date +'%Y-%m-%d %H:%M'` ### \\n\\n All drives mounted: \\n\\n - $drive1 in $drive1_seconds\\n\\nStarting media containers.\" | mail -s \"[$HOSTNAME] Starting media containers\" ${email_to} -aFrom:${email_from}\n\tsudo docker compose --profile media -f /home/$PRIMARY_USER/docker/docker-compose-$HOSTNAME.yml up -d\nelse\n\t# echo \"not equal\"\n\techo -e \"### `date +'%Y-%m-%d %H:%M'` ### \\n\\n Not all drives mounted after reboot: \\n\\n - $drive1 is $drive1_status\\n\\nTimed out after $seconds seconds.\" | mail -s \"[$HOSTNAME] Mounted not equal to $num_drives.\" ${email_to} -aFrom:${email_from}\n\tsudo docker compose --profile media -f /home/$PRIMARY_USER/docker/docker-compose-$HOSTNAME.yml down\nfi\n"
  },
  {
    "path": "scripts/systemd/rclone-ds918.service.example",
    "content": "[Unit]\nDescription=Rclone NAS SMB\nWants=network-online.target\nAfter=network-online.target\n\n[Service]\n# https://forum.rclone.org/t/some-help-with-rclone-mount-for-plex-buffering-everywhere/18201/23\n# https://forum.rclone.org/t/unable-to-start-rclone-service/32149/7\nType=notify\nExecStart=/usr/bin/rclone mount ds918: /media/rclone/ds918 \\\n#--read-only \\\n--config /home/anand/docker/appdata/rclone/rclone.conf \\\n--log-file=/home/anand/docker/logs/hs/rclone-ds918.log \\\n--log-level NOTICE \\\n--allow-other \\\n--no-modtime \\\n--umask 002 \\\n--user-agent home-server \\\n--dir-cache-time 24h \\\n--buffer-size 128M \\\n--vfs-fast-fingerprint \\\n--vfs-cache-mode full \\\n--vfs-cache-max-age 336h \\\n--cache-dir=/media/ssd/hs/cache/ds918 \\\n--vfs-cache-max-size 896G \\\n--vfs-read-chunk-size-limit 10G \\\n--vfs-refresh \\\n--rc \\\n--rc-web-gui \\\n--rc-addr :5572 \\\n--rc-web-gui-no-open-browser \\\n--rc-no-auth \\\n#--rc-user=$RCLONE_WEBUI_USER \\\n#--rc-pass=$RCLONE_WEBUI_PASS \\\n--use-mmap\nExecStop=/bin/fusermount -uz /media/rclone/ds918\nExecStartPost=/usr/bin/rclone rc vfs/refresh recursive=true --rc-addr :5572 _async=true\nRestart=on-abort\nUser=anand\nGroup=anand\nKillMode=mixed\nRestartSec=5\n\n[Install]\nWantedBy=default.target\n"
  },
  {
    "path": "secrets_example/basic_auth_credentials",
    "content": "users:hashed-password"
  },
  {
    "path": "secrets_example/cf_dns_api_token",
    "content": "h_P8lkjsdADDjf_plsadlksjdfD894SXsdlkjdfikwj52\n"
  },
  {
    "path": "secrets_example/traefik_forward_auth",
    "content": "### EXAMPLE OF REQUIRED FILE TO ALLOW DOCKER SECRETS TO FUNCTION WITH GOOGLE OAUTH\n### FOR FURTHER DETAILS SEE https://github.com/thomseddon/traefik-forward-auth\n# Guide: https://www.smarthomebeginner.com/google-oauth-with-traefik-2-docker/\n\nproviders.google.client-id=yourGOOGLEclientID\nproviders.google.client-secret=yourCLIENTsecret\nsecret=yourOAUTHsecret\nwhitelist=yourEMAILaddress1\nwhitelist=yourEMAILaddress2\n"
  },
  {
    "path": "shared/config/udms_bash_aliases",
    "content": "# Shell Prompt Configuration\nexport PS1=\"[\\[\\e[32m\\]\\u\\[\\e[m\\]@\\[\\e[33m\\]\\h\\[\\e[m\\]: \\\\$\\[\\e[36m\\]\\w\\[\\e[m\\]]\\\\$ \"      # Colorized prompt showing user@host: path$\n\n# Load Configuration\nif [[ -f \"$DEPLOYRR_CONFIG/deployrr_constants\" ]]; then\n    source <(sudo cat $DEPLOYRR_CONFIG/deployrr_constants)      # Load Deployrr configuration if exists\nelse\n    DOCKER_FOLDER=$HOME/docker      # Default Docker folder if no config exists\nfi\n\n#------------------------------------------------------------------------------\n# DOCKER MANAGEMENT\n#------------------------------------------------------------------------------\n\n# Basic Docker Commands\nalias dps='sudo docker ps -a'      # List all containers (running and stopped)\nalias dpss='sudo docker ps -a --format \"table {{.Names}}\\t{{.State}}\\t{{.Status}}\\t{{.Image}}\" | (sed -u 1q; sort)'      # List containers in a nicely formatted table\nalias ddf='sudo docker system df'      # Show Docker disk usage for containers, images, and volumes\nalias dexec='sudo docker exec -ti'      # Execute command in running container (interactive mode)\n\n# Docker Logs and Monitoring\nalias dlogs='sudo docker logs -tf --tail=\"50\" '      # Show last 50 lines of container logs and follow output\nalias dlogsize='sudo du -ch $(sudo docker inspect --format='{{.LogPath}}' $(sudo docker ps -qa)) | sort -h'      # Display size of container log files\nalias dips=\"sudo docker ps -q | xargs -n 1 sudo docker inspect -f '{{.Name}}%tab%{{range .NetworkSettings.Networks}}{{.IPAddress}}%tab%{{end}}' | sed 's#%tab%#\\t#g' | sed 's#/##g' | sort | column -t -N NAME,IP\\(s\\) -o $'\\t'\"      # List IP addresses of all containers\n\n# Docker Container Management\nalias dstop='sudo docker stop'      # Stop a specific container\nalias dstopall='sudo docker stop $(sudo docker ps -aq)'      # Stop all running containers\nalias drm='sudo docker rm $(sudo docker ps -a -q)'      # Remove specified containers\n\n# Docker Cleanup and Maintenance\nalias dprunevol='sudo docker volume prune'      # Remove all unused volumes\nalias dprunesys='sudo docker system prune -a'      # Remove all unused containers, networks, images (both dangling and unreferenced)\nalias ddelimages='sudo docker rmi $(sudo docker images -q)'      # Delete all Docker images\nalias derase='dstopcont ; drmcont ; ddelimages ; dvolprune ; dsysprune'      # Complete cleanup: stop and remove all containers, images, volumes\nalias dprune='ddelimages ; dprunevol ; dprunesys'      # Safe cleanup of unused resources\n\n#------------------------------------------------------------------------------\n# DOCKER COMPOSE & TRAEFIK\n#------------------------------------------------------------------------------\n\n# Docker Compose Basic Commands\nalias dcrun='sudo docker compose --profile all -f $DOCKER_FOLDER/docker-compose-$HOSTNAME.yml'      # Base command for docker-compose operations\nalias dcup='dcrun up -d --build --remove-orphans'      # Start all services, rebuild if needed, remove orphaned containers\nalias dcdown='dcrun down --remove-orphans'      # Stop and remove all containers, including orphaned ones\nalias dcstop='dcrun stop'      # Stop services without removing containers\nalias dcstart='dcrun start'      # Start existing containers\nalias dcrestart='dcrun restart'      # Restart services\nalias dcrec='dcrun up -d --force-recreate --remove-orphans'      # Force recreate containers even if no changes\nalias dcpull='dcrun --parallel 1 pull'      # Pull latest versions of all service images\nalias dclogs='dcrun logs -tf --tail=\"50\"'      # Show and follow last 50 lines of service logs\n\n# Traefik Specific\nalias traefiklogs='tail -f $DOCKER_FOLDER/logs/$HOSTNAME/traefik/traefik.log'      # Monitor Traefik reverse proxy logs\n\n#------------------------------------------------------------------------------\n# CROWDSEC SECURITY\n#------------------------------------------------------------------------------\n\n# CrowdSec CLI Commands\nalias cscli='dcrun exec -t crowdsec cscli'      # Execute CrowdSec CLI commands\nalias csdecisions='cscli decisions list'      # List current IP ban decisions\nalias csalerts='cscli alerts list'      # List security alerts\nalias csinspect='cscli alerts inspect -d'      # Detailed inspection of specific alerts\nalias cshubs='cscli hub list'      # List available CrowdSec hubs\nalias csparsers='cscli parsers list'      # List installed parsers\nalias cscollections='cscli collections list'      # List installed collections\nalias cshubupdate='cscli hub update'      # Update CrowdSec hub index\nalias cshubupgrade='cscli hub upgrade'      # Upgrade all hub items\nalias csmetrics='cscli metrics'      # Show CrowdSec metrics\nalias csmachines='cscli machines list'      # List CrowdSec machines\nalias csbouncers='cscli bouncers list'      # List registered bouncers\n\n# CrowdSec Service Management\nalias csfbstatus='sudo systemctl status crowdsec-firewall-bouncer.service'      # Check firewall bouncer status\nalias csfbstart='sudo systemctl start crowdsec-firewall-bouncer.service'      # Start firewall bouncer\nalias csfbstop='sudo systemctl stop crowdsec-firewall-bouncer.service'      # Stop firewall bouncer\nalias csfbrestart='sudo systemctl restart crowdsec-firewall-bouncer.service'      # Restart firewall bouncer\nalias csbrestart='dcrec2 traefik-bouncer ; csfbrestart'      # Restart both Traefik bouncer and firewall bouncer\n\n# CrowdSec Logs\nalias tailkern='sudo tail -f /var/log/kern.log'      # Monitor kernel logs\nalias tailauth='sudo tail -f /var/log/auth.log'      # Monitor authentication logs\nalias tailcsfb='sudo tail -f /var/log/crowdsec-firewall-bouncer.log'      # Monitor firewall bouncer logs\n\n#------------------------------------------------------------------------------\n# SYSTEM ADMINISTRATION\n#------------------------------------------------------------------------------\n\n# File System Navigation\nalias cd..='cd ..'      # Fix common typo of cd.. instead of cd ..\nalias ..='cd ..'        # Move up one directory level\nalias ...='cd ../..'    # Move up two directory levels\nalias .3='cd ../../..'  # Move up three directory levels\nalias .4='cd ../../../..'  # Move up four directory levels\nalias .5='cd ../../../../..'  # Move up five directory levels\nalias cdd='cd $DOCKER_FOLDER' # Navigate to the Docker folder\nalias up='cd ..'        # Alternative way to move up one directory\nalias back='cd -'       # Return to previous directory (toggles between last two directories)\nalias home='cd ~'       # Navigate to home directory\n\n# File Listing and Management\nalias ls='ls -F --color=auto --group-directories-first'      # Colorized listing with directories first\nalias ll='ls -alh --color=auto --group-directories-first'      # Detailed list, human-readable sizes\nalias lt='ls --human-readable --color=auto --size -1 -S --classify'      # List files by size\nalias lsr='ls --color=auto -t -1'      # List files by modification time\nalias mkdir='mkdir -pv'      # Create parent directories as needed, verbose output\nalias cp='cp -iv'      # Interactive and verbose copy\nalias mv='mv -iv'      # Interactive and verbose move\n\n# Storage and Disk Management\nalias fdisk='sudo fdisk -l'      # List disk partitions\nalias uuid='sudo vol_id -u'      # Show UUID of volumes\nalias mounts='mount | column -t'      # Show mounted filesystems in clean output\nalias dirsize='sudo du -hx --max-depth=1'      # Show directory sizes at depth 1\nalias dirusage='du -ch | grep total'      # Show total disk usage in current directory\nalias diskusage='df -hl --total | grep total'      # Show total disk usage of system\nalias partusage='df -hlT --exclude-type=tmpfs --exclude-type=devtmpfs'      # Show partition usage excluding virtual filesystems\nalias space='du -sh * | sort -hr'      # List directory contents sorted by size\nalias disks='lsblk -o NAME,SIZE,TYPE,MOUNTPOINT'      # List block devices with details\nalias space-usage='df -h -x squashfs -x tmpfs -x devtmpfs'      # Show disk space usage excluding virtual filesystems\nalias inode-usage='df -ih'      # Show inode usage on mounted filesystems\n\n# File Analysis\nalias biggest='find . -type f -printf \"%s %p\\n\" | sort -nr | head -10'      # Show 10 largest files in current directory\nalias recent='find . -type f -printf \"%TY-%Tm-%Td %TT %p\\n\" | sort -r | head -10'      # Show 10 most recently modified files\nalias tree='tree -C'      # Show directory structure in tree format with colors\n\n#------------------------------------------------------------------------------\n# SYSTEM MONITORING & PERFORMANCE\n#------------------------------------------------------------------------------\n\n# Memory and CPU Monitoring\nalias meminfo='free -m -l -t'      # Display memory usage in megabytes\nalias psmem='ps auxf | sort -nr -k 4'      # List processes by memory usage\nalias psmem10='ps auxf | sort -nr -k 4 | head -10'      # Show top 10 memory-consuming processes\nalias pscpu='ps auxf | sort -nr -k 3'      # List processes by CPU usage\nalias pscpu10='ps auxf | sort -nr -k 3 | head -10'      # Show top 10 CPU-consuming processes\nalias cpuinfo='lscpu'      # Show CPU information\nalias gpumeminfo='grep -i --color memory /var/log/Xorg.0.log'      # Show GPU memory information\nalias free='free -h'      # Show memory usage in human-readable format\n\n#------------------------------------------------------------------------------\n# NETWORKING\n#------------------------------------------------------------------------------\n\n# Network Monitoring and Analysis\nalias ports='netstat -tulanp'      # Show all active ports and their processes\nalias showlistening='lsof -i -n | egrep \"COMMAND|LISTEN\"'      # Show listening ports and their processes\nalias ping='ping -c 5'      # Ping with 5 packets only\nalias myip='curl -s ifconfig.me'      # Show external IP address\nalias localip='hostname -I | awk \"{print \\$1}\"'      # Show primary local IP address\nalias header='curl -I'      # Show HTTP headers of a website\nalias dnscheck='dig +short'      # Quick DNS lookup\nalias connections='netstat -nat | awk \"{print \\$6}\" | sort | uniq -c | sort -n'      # Count active network connections by state\nalias bandwidth='nethogs'      # Monitor bandwidth usage by process\n\n#------------------------------------------------------------------------------\n# PACKAGE MANAGEMENT\n#------------------------------------------------------------------------------\n\n# APT Package Management\nalias update='sudo apt-get update'      # Update package index\nalias upgrade='sudo apt-get update && sudo apt-get upgrade'      # Update package index and upgrade all packages\nalias install='sudo apt-get install'      # Install a package\nalias finstall='sudo apt-get -f install'      # Fix broken package installations\nalias rinstall='sudo apt-get -f install --reinstall'      # Reinstall a package\nalias uninstall='sudo apt-get remove'      # Remove a package\nalias search='sudo apt-cache search'      # Search for a package\nalias addkey='sudo apt-key adv --recv-keys --keyserver keyserver.ubuntu.com'      # Add a repository key\n\n#------------------------------------------------------------------------------\n# SYSTEM SERVICES\n#------------------------------------------------------------------------------\n\n# Systemd Service Management\nalias ctlreload='sudo systemctl daemon-reload'      # Reload systemd manager configuration\nalias ctlstart='sudo systemctl start'      # Start a systemd service\nalias ctlstop='sudo systemctl stop'      # Stop a systemd service\nalias ctlrestart='sudo systemctl restart'      # Restart a systemd service\nalias ctlstatus='sudo systemctl status'      # Check status of a systemd service\nalias ctlenable='sudo systemctl enable'      # Enable a service to start at boot\nalias ctldisable='sudo systemctl disable'      # Disable a service from starting at boot\nalias ctlactive='sudo systemctl is-active'      # Check if a service is currently active\n\n# UFW Firewall Management\nalias ufwenable='sudo ufw enable'      # Enable the UFW firewall\nalias ufwdisable='sudo ufw disable'      # Disable the UFW firewall\nalias ufwallow='sudo ufw allow'      # Allow a port through UFW\nalias ufwlimit='sudo ufw limit'      # Limit connections to a port\nalias ufwlist='sudo ufw status numbered'      # List UFW rules with numbers\nalias ufwdelete='sudo ufw delete'      # Delete a UFW rule\nalias ufwreload='sudo ufw reload'      # Reload UFW rules\n\n#------------------------------------------------------------------------------\n# SYNOLOGY DSM\n#------------------------------------------------------------------------------\n\n# Synology Service Management\nalias servicelist='sudo synoservicecfg --list'      # List all Synology services (DSM 6.x)\nalias servicestatus='sudo synosystemctl status'      # Check status of Synology service\nalias servicestop='sudo synosystemctl stop'      # Stop a Synology service\nalias servicehstop='sudo synoservicecfg --hard-stop'      # Hard stop a service (DSM 6.x)\nalias servicestart='sudo synosystemctl start'      # Start a Synology service\nalias servicehstart='sudo synoservicecfg --hard-start'      # Hard start a service (DSM 6.x)\nalias servicerestart='sudo synosystemctl restart'      # Restart a Synology service\nalias restartdocker='sudo synosystemctl restart pkgctl-Docker'      # Restart Docker package\n\n#------------------------------------------------------------------------------\n# FILE COMPRESSION\n#------------------------------------------------------------------------------\n\n# Archive Management\nalias untargz='tar --same-owner -zxvf'      # Extract .tar.gz archive preserving ownership\nalias untarbz='tar --same-owner -xjvf'      # Extract .tar.bz2 archive preserving ownership\nalias lstargz='tar -ztvf'      # List contents of .tar.gz archive\nalias lstarbz='tar -jtvf'      # List contents of .tar.bz2 archive\nalias targz='tar -zcvf'      # Create .tar.gz archive\nalias tarbz='tar -cjvf'      # Create .tar.bz2 archive\n\n#------------------------------------------------------------------------------\n# CONFIGURATION\n#------------------------------------------------------------------------------\n\n# Quick Configuration Edits\nalias reload='. ~/.bashrc'      # Reload bash configuration\nalias aliases='nano ~/.bash_aliases'      # Edit aliases file\nalias hosts='sudo nano /etc/hosts'      # Edit hosts file\nalias bashrc='nano ~/.bashrc'      # Edit bash configuration file"
  }
]