5.0 KiB
traefik
This is a Docker container for a Traefik edge router.
The official container and documentation was made by
traefik.
This docker-rebuild is made up by a docker-compose.yml file.
Set-up
Create the files rebuild.sh and docker-compose.yml at the same place.
In that folder create the directories data/config.
Place the files data/traefik.yml and data/config/dynamic.yml in the
according directories.
Change the settings according to your needs and run ./rebuild.sh afterwards.
Additional guides on the usage of Traefik for Docker services can be found in
the Traefik wiki entry.
Volumes
Set the following volumes in the volumes: section of the docker-compose file.
| Outside mount/volume name | Container mount | Description |
|---|---|---|
/etc/localtime |
/etc/localtime:ro |
get the system time |
/var/run/docker.sock |
/var/run/docker.sock:ro |
get access to view docker container |
./data/traefik.yml |
/traefik.yml:ro |
basic traefik config |
./data/acme.json |
/acme.json |
place to store certificates for https |
./data/config |
/configurations |
place for dynamically changable configs |
Ports
Set the following ports in the ports: section.
| Container Port | Recommended outside port | Protocol | Description |
|---|---|---|---|
80 |
80 |
TCP | http |
443 |
443 |
TCP | https |
Networks
Set the following networks in the networks: section of the docker-compose file.
| Name | Usage |
|---|---|
proxy |
network to expose http and https ports |
Labels
Set the following labels in the labels: section.
- "traefik.enable=true"
- "traefik.docker.network=proxy"
- "traefik.http.routers.traefik-secure.entrypoints=websecure"
- "traefik.http.routers.traefik-secure.service=api@internal"
- "traefik.http.routers.traefik-secure.rule=Host(`traefik.<domain>`)"
- "traefik.http.routers.traefik-secure.middlewares=user-auth@file"
The first five lines are for publishing traefik under traefik.<domain>.
The last line is to add authentication.
rebuild.sh
#!/bin/sh
docker-compose down
docker pull traefik:v2.4
docker-compose up -d
docker-compose.yml
version: "3"
services:
traefik:
image: traefik:v2.4
container_name: traefik
restart: unless-stopped
security_opt:
- no-new-privileges:true
networks:
- proxy
ports:
- 80:80
- 443:443
volumes:
- /etc/localtime:/etc/localtime:ro
- /var/run/docker.sock:/var/run/docker.sock:ro
- ./data/traefik.yml:/traefik.yml:ro
- ./data/acme.json:/acme.json
- ./data/config:/configurations
labels:
- "traefik.enable=true"
- "traefik.docker.network=proxy"
- "traefik.http.routers.traefik-secure.entrypoints=websecure"
- "traefik.http.routers.traefik-secure.rule=Host(`traefik.<domain>`)"
- "traefik.http.routers.traefik-secure.service=api@internal"
- "traefik.http.routers.traefik-secure.middlewares=user-auth@file"
networks:
proxy:
external: true
data/traefik.yml
api:
dashboard: true
entryPoints:
web:
address: :80
http:
redirections:
entryPoint:
to: websecure
websecure:
address: :443
http:
middlewares:
- secureHeaders@file
tls:
certResolver: letsencrypt
providers:
docker:
endpoint: "unix:///var/run/docker.sock"
exposedByDefault: false
file:
filename: /configurations/dynamic.yml
certificatesResolvers:
letsencrypt:
acme:
email: <email address>
storage: acme.json
keyType: EC384
httpChallenge:
entryPoint: web
data/config/dynamic.yml
In the config replace <username:htpasswd> with the output of
echo $(htpasswd -nb <user> <pasword>) | sed -e s/\\$/\\$\\$/g.
http:
middlewares:
secureHeaders:
headers:
sslRedirect: true
forceSTSHeader: true
stsIncludeSubdomains: true
stsPreload: true
stsSeconds: 31536000
user-auth:
basicAuth:
users:
- "<username:htpasswd>"
tls:
options:
default:
cipherSuites:
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305
minVersion: VersionTLS12