summaryrefslogtreecommitdiff
path: root/internal/suites/example/compose/nginx
diff options
context:
space:
mode:
Diffstat (limited to 'internal/suites/example/compose/nginx')
-rw-r--r--internal/suites/example/compose/nginx/backend/docker-compose.yml24
-rw-r--r--internal/suites/example/compose/nginx/portal/docker-compose.yml2
2 files changed, 16 insertions, 10 deletions
diff --git a/internal/suites/example/compose/nginx/backend/docker-compose.yml b/internal/suites/example/compose/nginx/backend/docker-compose.yml
index 6121db1a5..00c1f5633 100644
--- a/internal/suites/example/compose/nginx/backend/docker-compose.yml
+++ b/internal/suites/example/compose/nginx/backend/docker-compose.yml
@@ -1,19 +1,23 @@
+---
version: '3'
services:
nginx-backend:
image: nginx:alpine
labels:
- - 'traefik.frontend.rule=Host:home.example.com,public.example.com,secure.example.com,admin.example.com,singlefactor.example.com' # Traefik 1.x
- - 'traefik.frontend.auth.forward.address=https://authelia-backend:9091/api/verify?rd=https://login.example.com:8080' # Traefik 1.x
- - 'traefik.frontend.auth.forward.tls.insecureSkipVerify=true' # Traefik 1.x
- - 'traefik.frontend.auth.forward.trustForwardHeader=true' # Traefik 1.x
- - 'traefik.frontend.auth.forward.authResponseHeaders=Remote-User, Remote-Groups, Remote-Name, Remote-Email' # Traefik 1.x
- - 'traefik.http.routers.protectedapps.rule=Host(`home.example.com`, `public.example.com`, `secure.example.com`, `admin.example.com`, `singlefactor.example.com`)' # Traefik 2.x
- - 'traefik.http.routers.protectedapps.entrypoints=https' # Traefik 2.x
- - 'traefik.http.routers.protectedapps.tls=true' # Traefik 2.x
- - 'traefik.http.routers.protectedapps.middlewares=authelia@docker' # Traefik 2.x
+ # Traefik 1.x
+ - 'traefik.frontend.rule=Host:home.example.com,public.example.com,secure.example.com,admin.example.com,singlefactor.example.com' # yamllint disable-line rule:line-length
+ - 'traefik.frontend.auth.forward.address=https://authelia-backend:9091/api/verify?rd=https://login.example.com:8080' # yamllint disable-line rule:line-length
+ - 'traefik.frontend.auth.forward.tls.insecureSkipVerify=true'
+ - 'traefik.frontend.auth.forward.trustForwardHeader=true'
+ - 'traefik.frontend.auth.forward.authResponseHeaders=Remote-User,Remote-Groups,Remote-Name,Remote-Email'
+ # Traefik 2.x
+ - 'traefik.http.routers.protectedapps.rule=Host(`home.example.com`,`public.example.com`,`secure.example.com`,`admin.example.com`,`singlefactor.example.com`)' # yamllint disable-line rule:line-length
+ - 'traefik.http.routers.protectedapps.entrypoints=https'
+ - 'traefik.http.routers.protectedapps.tls=true'
+ - 'traefik.http.routers.protectedapps.middlewares=authelia@docker'
volumes:
- ./example/compose/nginx/backend/html:/usr/share/nginx/html
- ./example/compose/nginx/backend/nginx.conf:/etc/nginx/nginx.conf
networks:
- - authelianet \ No newline at end of file
+ - authelianet
+...
diff --git a/internal/suites/example/compose/nginx/portal/docker-compose.yml b/internal/suites/example/compose/nginx/portal/docker-compose.yml
index b387d7f3e..517e192fb 100644
--- a/internal/suites/example/compose/nginx/portal/docker-compose.yml
+++ b/internal/suites/example/compose/nginx/portal/docker-compose.yml
@@ -1,3 +1,4 @@
+---
version: '3'
services:
nginx-portal:
@@ -14,3 +15,4 @@ services:
- duo.example.com
# Set the IP to be able to query on port 443
ipv4_address: 192.168.240.100
+...