95 lines
1.9 KiB
YAML
95 lines
1.9 KiB
YAML
entryPoints:
|
|
web:
|
|
address: :80
|
|
http:
|
|
redirections:
|
|
entryPoint:
|
|
to: web-secure
|
|
scheme: https
|
|
proxyProtocol:
|
|
trustedIPs:
|
|
- "{{ wireguard.cidr }}"
|
|
- "{{ pve_hosts.internal_cidr }}"
|
|
- "{{ nebula.cidr }}"
|
|
web-secure:
|
|
address: :443
|
|
http:
|
|
middlewares:
|
|
- floc-block@file
|
|
- compress@file
|
|
tls:
|
|
certresolver: le
|
|
domains:
|
|
- main: theorangeone.net
|
|
sans: "*.theorangeone.net"
|
|
- main: jakehoward.tech
|
|
sans: "*.jakehoward.tech"
|
|
- main: 0rng.one
|
|
sans: "*.0rng.one"
|
|
{% if traefik_provider_gitlab %}
|
|
- main: gitlab-pages.theorangeone.net
|
|
sans: "*.gitlab-pages.theorangeone.net"
|
|
{% endif %}
|
|
proxyProtocol:
|
|
trustedIPs:
|
|
- "{{ wireguard.cidr }}"
|
|
- "{{ pve_hosts.internal_cidr }}"
|
|
- "{{ nebula.cidr }}"
|
|
traefik:
|
|
address: :8080
|
|
|
|
ping: {}
|
|
|
|
providers:
|
|
docker:
|
|
endpoint: tcp://docker_proxy:2375
|
|
watch: true
|
|
exposedByDefault: false
|
|
network: traefik
|
|
file:
|
|
directory: /etc/traefik/conf
|
|
{% if with_traefik_pages %}
|
|
http:
|
|
endpoint:
|
|
- "http://{{ traefik_pages_password }}@traefik-pages:5000/.traefik-pages/provider"
|
|
{% endif %}
|
|
|
|
api:
|
|
dashboard: true
|
|
insecure: true
|
|
|
|
certificatesResolvers:
|
|
le:
|
|
acme:
|
|
email: "{{ letsencrypt_email }}"
|
|
storage: /etc/traefik/acme.json
|
|
dnsChallenge:
|
|
provider: cloudflare
|
|
delayBeforeCheck: 0
|
|
resolvers:
|
|
- 1.1.1.1:53
|
|
- 1.0.0.1:53
|
|
|
|
serversTransport:
|
|
insecureSkipVerify: true
|
|
|
|
metrics:
|
|
prometheus:
|
|
entryPoint: traefik
|
|
|
|
tls:
|
|
options:
|
|
default:
|
|
minVersion: VersionTLS12
|
|
|
|
pilot:
|
|
dashboard: false
|
|
|
|
experimental:
|
|
hub: false
|
|
|
|
accessLog:
|
|
filePath: "/var/log/traefik/access.log"
|
|
filters:
|
|
statusCodes:
|
|
- "400-600"
|