2024-05-23 20:06:00 +02:00
x-wordpress-configuration-env : &wordpress-configuration-env
WORDPRESS_PLUGIN_LIST : "maintenance redis-cache"
WORDPRESS_REDIS_HOST : redis
WORDPRESS_CACHE : 1
WORDPRESS_CACHE_KEY_SALT : 'Wp-'
WORDPRESS_TABLE_PREFIX : 'wp_'
WORDPRESS_DEBUG : 0
DEFAULT_EMAIL : "webmaster@example.com"
WORDPRESS_CONFIG_EXTRA : |
define('WP_AUTO_UPDATE_CORE', false);
define('WP_SITEURL', 'https://www.example.com');
define('WP_HOME', 'https://www.example.com');
define('WP_CACHE', true);
define('WP_CACHE_KEY_SALT', 'Wp-');
define('WP_REDIS_HOST', "cache");
define('DISABLE_WP_CRON', true);
$$_SERVER['HTTP_UPGRADE_INSECURE_REQUESTS'] = false;
$$_SERVER['HTTP_X_FORWARDED_PORT'] = 443;
$$_SERVER['HTTP_X_FORWARDED_SSL'] = 'on';
$$_SERVER['HTTPS'] = 'on';
$$_SERVER['SERVER_PORT'] = 443;
$$_SERVER['REQUEST_SCHEME'] = 'https';
# $_SERVER definitions above are set to trick WP that it's accessed over HTTPS. This is typically useful only behind reverse proxy and should be avoided in production
networks :
default :
services :
wordpress :
image : ghcr.io/n0rthernl1ghts/wordpress:6.5.3
deploy :
restart_policy :
condition : any
healthcheck: # See : src/wp-utils/healthcheck
test : [ "CMD" , "/usr/local/bin/healthcheck" ]
interval : 30s
timeout : 5s
retries : 3
2024-05-24 00:38:57 +02:00
env_file :
- ./.secrets/wp-salts.env
- ./.secrets/wp-database.env
2024-05-23 20:06:00 +02:00
environment :
<< : [ *wordpress-configuration-env ]
CRON_ENABLED : "false"
labels : # This configures traefik - if you have it. You also need to make sure that this service is in the same network with Traefik instance
- "traefik.enable=true"
- "traefik.http.routers.${COMPOSE_PROJECT_NAME}-http.rule=Host(`example.com`)"
- "traefik.http.routers.${COMPOSE_PROJECT_NAME}-http.entrypoints=web"
- "traefik.http.routers.${COMPOSE_PROJECT_NAME}-https.tls=true"
- "traefik.http.routers.${COMPOSE_PROJECT_NAME}-https.tls.certresolver=le"
- "traefik.http.routers.${COMPOSE_PROJECT_NAME}-https.rule=Host(`example.com`)"
- "traefik.http.routers.${COMPOSE_PROJECT_NAME}-https.entrypoints=websecure"
- "traefik.http.services.${COMPOSE_PROJECT_NAME}.loadbalancer.server.port=80"
volumes :
- ./data/wordpress/wp-content:/var/www/html/wp-content
networks :
default :
# It's a good idea to have a separate service for the cron job
cron :
extends :
service : wordpress
deploy :
resources :
limits :
memory : 512M # Limit the memory for the cron job to 512 MB. This is a good practice to avoid memory leaks.
environment :
CRON_ENABLED : "true"
# Redis is optional, but it works really well for caching. If removed, please update x-wordpress-configuration-env
cache :
image : redis:alpine
init : true
healthcheck :
test : [ "CMD" , "/usr/local/bin/redis-cli" , "PING" ]
interval : 20s
timeout : 3s
retries : 3
deploy :
restart_policy :
condition : any
resources :
limits :
memory : 64M
networks :
default :
# Please update environment accordingly
database :
image : 'ghcr.io/n0rthernl1ghts/mariadb:10.11'
deploy :
replicas : 1
restart_policy :
condition : any
resources :
limits :
memory : 512M # Should be adjusted accordingly to the website size. 512MB is usually enough for small website
healthcheck :
test : [ "CMD" , "/usr/bin/healthcheck" ]
interval : 30s
timeout : 20s
retries : 3
environment :
PUID : 1000
PGID : 1000
MARIADB_INIT_DATABASES : wordpress
MARIADB_INIT_USERS : wordpress
MARIADB_PASSWORD : wordpress # CHANGE THIS!
MARIADB_ROOT_PASSWORD : 'super-secure-root-password123' # CHANGE THIS!
FORCE_CONFIG_OVERWRITE : 1
volumes :
- ./data/database/config:/config
- ./data/database/data:/var/lib/mysql
networks :
default :