5.2 KiB
traefik
This is a docker container for a traefik edge router.
The official container and documentation was made by
traefik.
This docker-rebuild is made up by a docker-compose.yml
file.
Set-up for config files
First of all create a folder for your rebuild.sh
and docker-compose.yml
.
In that folder create the directories data/config
.
Volumes
Set the following volumes in the volumes:
section of the docker-compose file.
Outside mount/volume name | Container mount | Description |
---|---|---|
/etc/localtime |
/etc/localtime:ro |
get the system time |
/var/run/docker.sock |
/var/run/docker.sock:ro |
get access to view docker container |
./data/traefik.yml |
/traefik.yml:ro |
basic traefik config |
./data/acme.json |
/acme.json |
place to store certificates for https |
./data/config |
/configurations |
place for dynamically changable configs |
Ports
Set the following ports in the ports:
section.
Container Port | Recommended outside port | Protocol | Description |
---|---|---|---|
80 |
80 |
TCP | http |
443 |
443 |
TCP | https |
Networks
Set the following networks in the networks:
section of the docker-compose file.
Name | Usage |
---|---|
proxy |
network to expose http and https ports |
Labels
Set the following labels in the labels:
section.
- "traefik.enable=true"
- "traefik.docker.network=proxy"
- "traefik.http.routers.traefik-secure.entrypoints=websecure"
- "traefik.http.routers.traefik-secure.service=api@internal"
- "traefik.http.routers.traefik-secure.rule=Host(`traefik.<domain>`)"
- "traefik.http.routers.traefik-secure.middlewares=user-auth@file"
The first five lines are for publishing traefik under traefik.<domain>
.
The last line is to add authentication.
rebuild.sh
#!/bin/sh
docker-compose down
docker pull traefik:v2.4
docker-compose up -d
docker-compose.yml
version: "3"
services:
traefik:
image: traefik:v2.4
container_name: traefik
restart: unless-stopped
security_opt:
- no-new-privileges:true
networks:
- proxy
ports:
- 80:80
- 443:443
volumes:
- /etc/localtime:/etc/localtime:ro
- /var/run/docker.sock:/var/run/docker.sock:ro
- ./data/traefik.yml:/traefik.yml:ro
- ./data/acme.json:/acme.json
- ./data/config:/configurations
labels:
- "traefik.enable=true"
- "traefik.docker.network=proxy"
- "traefik.http.routers.traefik-secure.entrypoints=websecure"
- "traefik.http.routers.traefik-secure.rule=Host(`traefik.<domain>`)"
- "traefik.http.routers.traefik-secure.service=api@internal"
- "traefik.http.routers.traefik-secure.middlewares=user-auth@file"
networks:
proxy:
external: true
data/traefik.yml
api:
dashboard: true
entryPoints:
web:
address: :80
http:
redirections:
entryPoint:
to: websecure
websecure:
address: :443
http:
middlewares:
- secureHeaders@file
tls:
certResolver: letsencrypt
providers:
docker:
endpoint: "unix:///var/run/docker.sock"
exposedByDefault: false
file:
filename: /configurations/dynamic.yml
certificatesResolvers:
letsencrypt:
acme:
email: <email address>
storage: acme.json
keyType: EC384
httpChallenge:
entryPoint: web
data/config/dynamic.yml
In the config replace username:htpasswd
with the output of
echo $(htpasswd -nb <user> <pasword>) | sed -e s/\\$/\\$\\$/g
.
http:
middlewares:
secureHeaders:
headers:
sslRedirect: true
forceSTSHeader: true
stsIncludeSubdomains: true
stsPreload: true
stsSeconds: 31536000
user-auth:
basicAuth:
users:
- "username:htpasswd"
tls:
options:
default:
cipherSuites:
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305
minVersion: VersionTLS12
Create reverse proxies
To create a reverse proxy from a docker container add the following lines in the
labels:
section of the docker-compose.yml
of the service to proxy.
- "traefik.enable=true"
- "traefik.http.routers.<service name>-secure.entrypoints=websecure"
- "traefik.http.routers.<service name>-secure.rule=Host(`<subdomain>.<domain>`)"
- "traefik.http.routers.<service name>-secure.service=<service name>"
- "traefik.http.services.<service name>.loadbalancer.server.port=<port>"
This configuration automatically redirects http to https.