change test-adminipwhitelist par test-adminipallowlist
This commit is contained in:
parent
1dd2858922
commit
4366dde71a
@ -32,7 +32,7 @@ services:
|
|||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.${apikazServName}.rule=Host(`${apikazHost}.${domain}`)"
|
- "traefik.http.routers.${apikazServName}.rule=Host(`${apikazHost}.${domain}`)"
|
||||||
- "traefik.http.routers.${apikazServName}.middlewares=test-adminipwhitelist@file"
|
- "traefik.http.routers.${apikazServName}.middlewares=test-adminipallowlist@file"
|
||||||
- "traefik.docker.network=apikazNet"
|
- "traefik.docker.network=apikazNet"
|
||||||
|
|
||||||
#volumes:
|
#volumes:
|
||||||
|
@ -31,7 +31,7 @@ services:
|
|||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.${officeServName}-admin.rule=Host(`${site}-${officeHost}.${domain}`) && PathPrefix(`/(c|l)ool/adminws`)"
|
- "traefik.http.routers.${officeServName}-admin.rule=Host(`${site}-${officeHost}.${domain}`) && PathPrefix(`/(c|l)ool/adminws`)"
|
||||||
- "traefik.http.routers.${officeServName}-admin.middlewares=test-adminipwhitelist@file"
|
- "traefik.http.routers.${officeServName}-admin.middlewares=test-adminipallowlist@file"
|
||||||
- "traefik.http.routers.${officeServName}.rule=Host(`${site}-${officeHost}.${domain}`) && ! PathPrefix(`/(c|l)ool/adminws`)"
|
- "traefik.http.routers.${officeServName}.rule=Host(`${site}-${officeHost}.${domain}`) && ! PathPrefix(`/(c|l)ool/adminws`)"
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
|
@ -26,7 +26,7 @@ services:
|
|||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.pad-admin.rule=Host(`${padHost}.${domain}`) && PathPrefix(`/admin`)"
|
- "traefik.http.routers.pad-admin.rule=Host(`${padHost}.${domain}`) && PathPrefix(`/admin`)"
|
||||||
- "traefik.http.routers.pad-admin.middlewares=test-adminipwhitelist@file"
|
- "traefik.http.routers.pad-admin.middlewares=test-adminipallowlist@file"
|
||||||
- "traefik.http.routers.pad.rule=Host(`${padHost}.${domain}`)"
|
- "traefik.http.routers.pad.rule=Host(`${padHost}.${domain}`)"
|
||||||
- "traefik.docker.network=etherpadNet"
|
- "traefik.docker.network=etherpadNet"
|
||||||
|
|
||||||
|
@ -25,7 +25,7 @@ services:
|
|||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.${framadateServName}-admin.rule=Host(`${dateHost}.${domain}`) && PathPrefix(`/admin`)"
|
- "traefik.http.routers.${framadateServName}-admin.rule=Host(`${dateHost}.${domain}`) && PathPrefix(`/admin`)"
|
||||||
- "traefik.http.routers.${framadateServName}-admin.middlewares=test-adminipwhitelist@file"
|
- "traefik.http.routers.${framadateServName}-admin.middlewares=test-adminipallowlist@file"
|
||||||
- "traefik.http.routers.${framadateServName}.rule=Host(`${dateHost}.${domain}`)"
|
- "traefik.http.routers.${framadateServName}.rule=Host(`${dateHost}.${domain}`)"
|
||||||
- "traefik.docker.network=framadateNet"
|
- "traefik.docker.network=framadateNet"
|
||||||
|
|
||||||
|
@ -26,7 +26,7 @@ services:
|
|||||||
- "traefik.http.middlewares.prometheus-stripprefix.stripprefix.prefixes=/prometheus"
|
- "traefik.http.middlewares.prometheus-stripprefix.stripprefix.prefixes=/prometheus"
|
||||||
- "traefik.http.routers.prometheus-secure.rule=Host(`${site}.${domain}`) && PathPrefix(`/prometheus`)"
|
- "traefik.http.routers.prometheus-secure.rule=Host(`${site}.${domain}`) && PathPrefix(`/prometheus`)"
|
||||||
# - "traefik.http.routers.prometheus-secure.tls=true"
|
# - "traefik.http.routers.prometheus-secure.tls=true"
|
||||||
- "traefik.http.routers.prometheus-secure.middlewares=prometheus-stripprefix,test-adminipwhitelist@file,traefik-auth"
|
- "traefik.http.routers.prometheus-secure.middlewares=prometheus-stripprefix,test-adminiallowlist@file,traefik-auth"
|
||||||
- "traefik.http.routers.prometheus-secure.service=prometheus"
|
- "traefik.http.routers.prometheus-secure.service=prometheus"
|
||||||
- "traefik.http.services.prometheus.loadbalancer.server.port=9090"
|
- "traefik.http.services.prometheus.loadbalancer.server.port=9090"
|
||||||
- "traefik.docker.network=traefikNet"
|
- "traefik.docker.network=traefikNet"
|
||||||
@ -53,7 +53,7 @@ services:
|
|||||||
- "traefik.http.routers.grafana-secure.rule=Host(`${site}.${domain}`) && PathPrefix(`/grafana`)"
|
- "traefik.http.routers.grafana-secure.rule=Host(`${site}.${domain}`) && PathPrefix(`/grafana`)"
|
||||||
# - "traefik.http.routers.grafana-secure.tls=true"
|
# - "traefik.http.routers.grafana-secure.tls=true"
|
||||||
- "traefik.http.routers.grafana-secure.service=grafana"
|
- "traefik.http.routers.grafana-secure.service=grafana"
|
||||||
- "traefik.http.routers.grafana-secure.middlewares=grafana-stripprefix,test-adminipwhitelist@file,traefik-auth"
|
- "traefik.http.routers.grafana-secure.middlewares=grafana-stripprefix,test-adminipallowlist@file,traefik-auth"
|
||||||
- "traefik.http.services.grafana.loadbalancer.server.port=3000"
|
- "traefik.http.services.grafana.loadbalancer.server.port=3000"
|
||||||
- "traefik.docker.network=traefikNet"
|
- "traefik.docker.network=traefikNet"
|
||||||
|
|
||||||
|
@ -27,7 +27,7 @@ services:
|
|||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.${jirafeauServName}-admin.rule=Host(`${fileHost}.${domain}`) && PathPrefix(`/admin.php`)"
|
- "traefik.http.routers.${jirafeauServName}-admin.rule=Host(`${fileHost}.${domain}`) && PathPrefix(`/admin.php`)"
|
||||||
- "traefik.http.routers.${jirafeauServName}-admin.middlewares=test-adminipwhitelist@file"
|
- "traefik.http.routers.${jirafeauServName}-admin.middlewares=test-adminipallowlist@file"
|
||||||
- "traefik.http.routers.${jirafeauServName}.rule=Host(`${fileHost}.${domain}`) && ! PathPrefix(`/admin.php`)"
|
- "traefik.http.routers.${jirafeauServName}.rule=Host(`${fileHost}.${domain}`) && ! PathPrefix(`/admin.php`)"
|
||||||
- "traefik.docker.network=jirafeauNet"
|
- "traefik.docker.network=jirafeauNet"
|
||||||
|
|
||||||
|
@ -1,5 +1,3 @@
|
|||||||
#garnir le fichier (enlever le 0.0.0.0/0 pour admin par exemple) et le placer
|
|
||||||
#dans /conf
|
|
||||||
http:
|
http:
|
||||||
middlewares:
|
middlewares:
|
||||||
ipwhitelist:
|
ipwhitelist:
|
Loading…
Reference in New Issue
Block a user