kopia lustrzana https://github.com/Haxxnet/Compose-Examples
Porównaj commity
3 Commity
8a0f235c5c
...
8ddb0b7a4c
Autor | SHA1 | Data |
---|---|---|
LRVT | 8ddb0b7a4c | |
LRVT | ea8fec3c62 | |
LRVT | abd9cd44bf |
|
@ -29,6 +29,8 @@ services:
|
|||
- --entrypoints.https.http.tls.domains[0].main=example.com # define main domain, change to your domain
|
||||
- --entrypoints.https.http.tls.domains[0].sans=*.example.com # define sans domain, change to your domain
|
||||
- --certificatesresolvers.myresolver.acme.email=myemail@domain.tld # define your email address
|
||||
#- --certificatesresolvers.myresolver.acme.httpchallenge=true # use http challenge
|
||||
#- --certificatesresolvers.myresolver.acme.httpchallenge.entrypoint=http # define entrypoint for http challenge
|
||||
- --certificatesresolvers.myresolver.acme.dnschallenge=true # enable dns challenge to obtain wildcard certificates
|
||||
- --certificatesresolvers.myresolver.acme.dnschallenge.provider=cloudflare # define provider for certificates
|
||||
- --certificatesresolvers.myresolver.acme.storage=/etc/traefik/acme.json # define acme path for certificate information
|
||||
|
@ -64,24 +66,6 @@ services:
|
|||
extra_hosts:
|
||||
- host.docker.internal:172.17.0.1 # define internal ip; helps traefik to resolve containers running in host network mode
|
||||
|
||||
whoami:
|
||||
image: traefik/whoami
|
||||
networks:
|
||||
- proxy
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.http.routers.whoami.rule=Host(`whoami.example.com`)
|
||||
- traefik.http.services.whoami.loadbalancer.server.port=80
|
||||
#- traefik.http.services.whoami.loadbalancer.server.scheme=https # optional, but sometines necessary when proxying to https services
|
||||
#- traefik.http.services.whoami.loadbalancer.serverstransport=insecureTransport@file # optional, but sometines necessary when proxying to https services
|
||||
#- traefik.http.middlewares.limit.buffering.maxRequestBodyBytes=50000000 # optional, only necessary for enabled file uploads
|
||||
#- traefik.http.middlewares.limit.buffering.maxResponseBodyBytes=50000000 # optional, only necessary for enabled file uploads
|
||||
#- traefik.http.middlewares.limit.buffering.memRequestBodyBytes=50000000 # optional, only necessary for enabled file uploads
|
||||
#- traefik.http.middlewares.limit.buffering.memResponseBodyBytes=50000000 # optional, only necessary for enabled file uploads
|
||||
- traefik.docker.network=proxy
|
||||
# Part for optional traefik middlewares
|
||||
- traefik.http.routers.whoami.middlewares=local-ipwhitelist@file
|
||||
|
||||
networks:
|
||||
proxy:
|
||||
external: true
|
||||
|
|
|
@ -111,7 +111,9 @@ certificatesResolvers:
|
|||
acme:
|
||||
email: example@example.com # the email address used for ssl certificate registration
|
||||
storage: /etc/traefik/acme.json
|
||||
dnsChallenge:
|
||||
#httpChallenge: # acme http challenge; requires port 80 and proper dns entries
|
||||
# entryPoint: http # specify the entry point for the HTTP challenge (adjust if needed)
|
||||
dnsChallenge: # acme dns challenge; requires api token of dns provider
|
||||
provider: cloudflare
|
||||
# Used to make sure the dns challenge is propagated to the right dns servers
|
||||
resolvers:
|
||||
|
|
Ładowanie…
Reference in New Issue