diff --git a/stack.production.yml b/stack.production.yml index b89306b..c69aad6 100644 --- a/stack.production.yml +++ b/stack.production.yml @@ -61,32 +61,15 @@ services: - node.hostname == ingress.nixc.us # - node.labels.mac-rack == true labels: - - 'traefik.enable=true' - - 'traefik.http.routers.authelia_authelia.rule=Host(`login.nixc.us`)' - - 'traefik.http.routers.authelia_authelia.entryPoints=websecure' - - 'traefik.http.routers.authelia_authelia.tls=true' - - 'traefik.http.middlewares.authelia_authelia.forwardAuth.address=http://authelia_authelia:9091/api/authz/forward-auth' - ## The following commented line is for configuring the Authelia URL in the proxy. We strongly suggest this is - ## configured in the Session Cookies section of the Authelia configuration. - # - 'traefik.http.middlewares.authelia.forwardAuth.address=http://authelia_authelia:9091/api/authz/forward-auth?authelia_url=https%3A%2F%2Flogin.nixc.us%2F' - # - 'traefik.http.middlewares.authelia_authelia.forwardAuth.trustForwardHeader=true' - # - 'traefik.http.middlewares.authelia_authelia.forwardAuth.authResponseHeaders=Remote-User,Remote-Groups,Remote-Email,Remote-Name' - # - "us.nixc.autodeploy=true" - # - 'traefik.enable=true' - # - 'traefik.http.routers.authelia_authelia.tls=true' - # - "traefik.http.services.authelia_authelia.loadbalancer.server.port=9091" - # - 'traefik.http.routers.authelia_authelia.rule=Host(`login.nixc.us`)' - # - 'traefik.http.routers.authelia_authelia.entrypoints=websecure' - # - "traefik.http.routers.authelia_authelia.tls.certresolver=letsencryptresolver" - # - "traefik.http.routers.authelia_authelia.service=authelia_authelia" - - "traefik.docker.network=traefik" - # # ## Authelia recommendations - # - 'traefik.http.middlewares.authelia_authelia.forwardauth.address=http://authelia_authelia:9091/api/verify?rd=https://login.nixc.us/' - # - 'traefik.http.middlewares.authelia_authelia.forwardauth.trustForwardHeader=true' - # - 'traefik.http.middlewares.authelia_authelia.forwardauth.authResponseHeaders=Remote-User, Remote-Groups, Remote-Name, Remote-Email' - # - 'traefik.http.middlewares.authelia-basic.forwardauth.address=http://authelia_authelia:9091/api/verify?auth=basic' - # - 'traefik.http.middlewares.authelia-basic.forwardauth.trustForwardHeader=true' - # - 'traefik.http.middlewares.authelia-basic.forwardauth.authResponseHeaders=Remote-User, Remote-Groups, Remote-Name, Remote-Email' + traefik.enable: true + traefik.http.routers.authelia_authelia.rule: Host(`login.nixc.us`) + traefik.http.routers.authelia_authelia.entryPoints: websecure + traefik.http.routers.authelia_authelia.service: "authelia_authelia" + traefik.http.routers.authelia_authelia.tls.certresolver: "letsencryptresolver" + traefik.http.services.authelia_authelia.loadbalancer.server.port: "9091" + traefik.http.routers.authelia_authelia.tls: true + traefik.http.middlewares.authelia_authelia.forwardAuth.address: http://authelia_authelia:9091/api/authz/forward-auth + traefik.docker.network: traefik redis: image: git.nixc.us/nixius/authelia:production-redis # command: redis-server --appendonly yes