change test-adminipwhitelist par test-adminipallowlist

This commit is contained in:
HPL 2024-08-16 23:36:05 +02:00
parent 1dd2858922
commit 4366dde71a
7 changed files with 7 additions and 9 deletions

View File

@ -32,7 +32,7 @@ services:
labels: labels:
- "traefik.enable=true" - "traefik.enable=true"
- "traefik.http.routers.${apikazServName}.rule=Host(`${apikazHost}.${domain}`)" - "traefik.http.routers.${apikazServName}.rule=Host(`${apikazHost}.${domain}`)"
- "traefik.http.routers.${apikazServName}.middlewares=test-adminipwhitelist@file" - "traefik.http.routers.${apikazServName}.middlewares=test-adminipallowlist@file"
- "traefik.docker.network=apikazNet" - "traefik.docker.network=apikazNet"
#volumes: #volumes:

View File

@ -31,7 +31,7 @@ services:
labels: labels:
- "traefik.enable=true" - "traefik.enable=true"
- "traefik.http.routers.${officeServName}-admin.rule=Host(`${site}-${officeHost}.${domain}`) && PathPrefix(`/(c|l)ool/adminws`)" - "traefik.http.routers.${officeServName}-admin.rule=Host(`${site}-${officeHost}.${domain}`) && PathPrefix(`/(c|l)ool/adminws`)"
- "traefik.http.routers.${officeServName}-admin.middlewares=test-adminipwhitelist@file" - "traefik.http.routers.${officeServName}-admin.middlewares=test-adminipallowlist@file"
- "traefik.http.routers.${officeServName}.rule=Host(`${site}-${officeHost}.${domain}`) && ! PathPrefix(`/(c|l)ool/adminws`)" - "traefik.http.routers.${officeServName}.rule=Host(`${site}-${officeHost}.${domain}`) && ! PathPrefix(`/(c|l)ool/adminws`)"
networks: networks:

View File

@ -26,7 +26,7 @@ services:
labels: labels:
- "traefik.enable=true" - "traefik.enable=true"
- "traefik.http.routers.pad-admin.rule=Host(`${padHost}.${domain}`) && PathPrefix(`/admin`)" - "traefik.http.routers.pad-admin.rule=Host(`${padHost}.${domain}`) && PathPrefix(`/admin`)"
- "traefik.http.routers.pad-admin.middlewares=test-adminipwhitelist@file" - "traefik.http.routers.pad-admin.middlewares=test-adminipallowlist@file"
- "traefik.http.routers.pad.rule=Host(`${padHost}.${domain}`)" - "traefik.http.routers.pad.rule=Host(`${padHost}.${domain}`)"
- "traefik.docker.network=etherpadNet" - "traefik.docker.network=etherpadNet"

View File

@ -25,7 +25,7 @@ services:
labels: labels:
- "traefik.enable=true" - "traefik.enable=true"
- "traefik.http.routers.${framadateServName}-admin.rule=Host(`${dateHost}.${domain}`) && PathPrefix(`/admin`)" - "traefik.http.routers.${framadateServName}-admin.rule=Host(`${dateHost}.${domain}`) && PathPrefix(`/admin`)"
- "traefik.http.routers.${framadateServName}-admin.middlewares=test-adminipwhitelist@file" - "traefik.http.routers.${framadateServName}-admin.middlewares=test-adminipallowlist@file"
- "traefik.http.routers.${framadateServName}.rule=Host(`${dateHost}.${domain}`)" - "traefik.http.routers.${framadateServName}.rule=Host(`${dateHost}.${domain}`)"
- "traefik.docker.network=framadateNet" - "traefik.docker.network=framadateNet"

View File

@ -26,7 +26,7 @@ services:
- "traefik.http.middlewares.prometheus-stripprefix.stripprefix.prefixes=/prometheus" - "traefik.http.middlewares.prometheus-stripprefix.stripprefix.prefixes=/prometheus"
- "traefik.http.routers.prometheus-secure.rule=Host(`${site}.${domain}`) && PathPrefix(`/prometheus`)" - "traefik.http.routers.prometheus-secure.rule=Host(`${site}.${domain}`) && PathPrefix(`/prometheus`)"
# - "traefik.http.routers.prometheus-secure.tls=true" # - "traefik.http.routers.prometheus-secure.tls=true"
- "traefik.http.routers.prometheus-secure.middlewares=prometheus-stripprefix,test-adminipwhitelist@file,traefik-auth" - "traefik.http.routers.prometheus-secure.middlewares=prometheus-stripprefix,test-adminiallowlist@file,traefik-auth"
- "traefik.http.routers.prometheus-secure.service=prometheus" - "traefik.http.routers.prometheus-secure.service=prometheus"
- "traefik.http.services.prometheus.loadbalancer.server.port=9090" - "traefik.http.services.prometheus.loadbalancer.server.port=9090"
- "traefik.docker.network=traefikNet" - "traefik.docker.network=traefikNet"
@ -53,7 +53,7 @@ services:
- "traefik.http.routers.grafana-secure.rule=Host(`${site}.${domain}`) && PathPrefix(`/grafana`)" - "traefik.http.routers.grafana-secure.rule=Host(`${site}.${domain}`) && PathPrefix(`/grafana`)"
# - "traefik.http.routers.grafana-secure.tls=true" # - "traefik.http.routers.grafana-secure.tls=true"
- "traefik.http.routers.grafana-secure.service=grafana" - "traefik.http.routers.grafana-secure.service=grafana"
- "traefik.http.routers.grafana-secure.middlewares=grafana-stripprefix,test-adminipwhitelist@file,traefik-auth" - "traefik.http.routers.grafana-secure.middlewares=grafana-stripprefix,test-adminipallowlist@file,traefik-auth"
- "traefik.http.services.grafana.loadbalancer.server.port=3000" - "traefik.http.services.grafana.loadbalancer.server.port=3000"
- "traefik.docker.network=traefikNet" - "traefik.docker.network=traefikNet"

View File

@ -27,7 +27,7 @@ services:
labels: labels:
- "traefik.enable=true" - "traefik.enable=true"
- "traefik.http.routers.${jirafeauServName}-admin.rule=Host(`${fileHost}.${domain}`) && PathPrefix(`/admin.php`)" - "traefik.http.routers.${jirafeauServName}-admin.rule=Host(`${fileHost}.${domain}`) && PathPrefix(`/admin.php`)"
- "traefik.http.routers.${jirafeauServName}-admin.middlewares=test-adminipwhitelist@file" - "traefik.http.routers.${jirafeauServName}-admin.middlewares=test-adminipallowlist@file"
- "traefik.http.routers.${jirafeauServName}.rule=Host(`${fileHost}.${domain}`) && ! PathPrefix(`/admin.php`)" - "traefik.http.routers.${jirafeauServName}.rule=Host(`${fileHost}.${domain}`) && ! PathPrefix(`/admin.php`)"
- "traefik.docker.network=jirafeauNet" - "traefik.docker.network=jirafeauNet"

View File

@ -1,5 +1,3 @@
#garnir le fichier (enlever le 0.0.0.0/0 pour admin par exemple) et le placer
#dans /conf
http: http:
middlewares: middlewares:
ipwhitelist: ipwhitelist: