Refactor swarm configuration: Update Traefik network labels from 'traefik.docker.network' to 'traefik.swarm.network' across multiple service files
This commit is contained in:
@@ -165,6 +165,7 @@ cython_debug/
|
||||
# production.yml
|
||||
|
||||
cache/
|
||||
config/
|
||||
data-node/
|
||||
meili_data*/
|
||||
privatebin-data/
|
||||
|
||||
@@ -26,7 +26,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.tcp.routers.adguardhome_tcp.entrypoints=dns
|
||||
- traefik.tcp.routers.adguardhome_tcp.rule=HostSNI(`*`)
|
||||
|
||||
@@ -7,7 +7,7 @@ metadata:
|
||||
labels:
|
||||
io.kompose.service: api-server
|
||||
traefik.constraint-label: traefik-public
|
||||
traefik.docker.network: traefik-public
|
||||
traefik.swarm.network: traefik-public
|
||||
traefik.enable: "true"
|
||||
traefik.http.routers.api_server.entrypoints: https
|
||||
traefik.http.routers.api_server.rule: Host(`api.`)
|
||||
|
||||
+9
-9
@@ -40,7 +40,7 @@ services:
|
||||
# - node.labels.adminer.pgadmin == true
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.adminer.entrypoints=https
|
||||
- traefik.http.routers.adminer.rule=Host(`adminer.${DOMAIN}`) || Host(`dbadmin.${DOMAIN}`)
|
||||
@@ -60,7 +60,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.cheatsheets.entrypoints=https
|
||||
- traefik.http.routers.cheatsheets.rule=Host(`cheat.${DOMAIN}`)
|
||||
@@ -83,7 +83,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.heynote.entrypoints=https
|
||||
- traefik.http.routers.heynote.rule=Host(`note.${DOMAIN}`) || Host(`note0.${DOMAIN}`) || Host(`note1.${DOMAIN}`) || Host(`note2.${DOMAIN}`) || Host(`note3.${DOMAIN}`) || Host(`pad.${DOMAIN}`)
|
||||
@@ -121,7 +121,7 @@ services:
|
||||
# - node.labels.jellyfin.jellyfin_cache == true
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.jellyfin.entrypoints=https
|
||||
- traefik.http.routers.jellyfin.rule=Host(`media.${DOMAIN}`)
|
||||
@@ -140,7 +140,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.meshtastic.entrypoints=https
|
||||
- traefik.http.routers.meshtastic.rule=Host(`mesh.${DOMAIN}`)
|
||||
@@ -164,7 +164,7 @@ services:
|
||||
# - node.labels.privatebin.privatebin_data == true
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.privatebin.entrypoints=https
|
||||
- traefik.http.routers.privatebin.rule=Host(`bin.${DOMAIN}`) || Host(`paste.${DOMAIN}`)
|
||||
@@ -185,7 +185,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.streamlit-bai.entrypoints=https
|
||||
- traefik.http.routers.streamlit-bai.rule=Host(`bai.${DOMAIN}`)
|
||||
@@ -203,7 +203,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.streamlit-fin.entrypoints=https
|
||||
- traefik.http.routers.streamlit-fin.rule=Host(`fin.${DOMAIN}`)
|
||||
@@ -224,7 +224,7 @@ services:
|
||||
# - node.labels.site.site_server == true
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.site_server.entrypoints=https
|
||||
- traefik.http.routers.site_server.rule=Host(`${DOMAIN}`) || Host(`www.${DOMAIN}`) || Host(`info.${DOMAIN}`) || Host(`124c41.${DOMAIN}`)
|
||||
|
||||
+1
-1
@@ -79,7 +79,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.authentik-rtr.entrypoints=https
|
||||
- traefik.http.routers.authentik-rtr.rule=Host(`authentik.${DOMAIN}`)
|
||||
|
||||
+1
-1
@@ -41,7 +41,7 @@ services:
|
||||
# Enable Traefik for this service, to make it available in the public network
|
||||
- traefik.enable=true
|
||||
# Use the traefik-public network (declared below)
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
# Use the custom label "traefik.constraint-label=traefik-public"
|
||||
# This public Traefik will only use services with this label
|
||||
# That way you can add other internal Traefik instances per stack if needed
|
||||
|
||||
+1
-1
@@ -30,7 +30,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.docmost.entrypoints=https
|
||||
- traefik.http.routers.docmost.rule=Host(`doc.${DOMAIN}`)
|
||||
|
||||
@@ -7,7 +7,7 @@ metadata:
|
||||
labels:
|
||||
io.kompose.service: dozzle
|
||||
traefik.constraint-label: traefik-public
|
||||
traefik.docker.network: traefik-public
|
||||
traefik.swarm.network: traefik-public
|
||||
traefik.enable: "true"
|
||||
traefik.http.routers.dozzle.entrypoints: https
|
||||
traefik.http.routers.dozzle.middlewares: admin-auth
|
||||
|
||||
+2
-2
@@ -29,7 +29,7 @@ services:
|
||||
# - node.labels.emqx1.emqx-data1 == true
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.tcp.routers.emqx1-tcp-mqtt.entrypoints=mqtt
|
||||
- traefik.tcp.routers.emqx1-tcp-mqtt.rule=HostSNI(`*`)
|
||||
@@ -68,7 +68,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.mqttx-web.entrypoints=https
|
||||
- traefik.http.routers.mqttx-web.rule=Host(`mqttx.${DOMAIN}`)
|
||||
|
||||
+1
-1
@@ -48,7 +48,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.ghost.entrypoints=https
|
||||
- traefik.http.routers.ghost.rule=Host(`ghost.${DOMAIN}`)
|
||||
|
||||
+1
-1
@@ -51,7 +51,7 @@ services:
|
||||
- node.labels.librechat.libre-logs == true
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.librechat.entrypoints=https
|
||||
- traefik.http.routers.librechat.rule=Host(`chat.${DOMAIN}`)
|
||||
|
||||
@@ -50,7 +50,7 @@ services:
|
||||
# Enable Traefik for this service, to make it available in the public network
|
||||
- traefik.enable=true
|
||||
# Use the traefik-public network (declared below)
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
# Use the custom label "traefik.constraint-label=traefik-public"
|
||||
# This public Traefik will only use services with this label
|
||||
# That way you can add other internal Traefik instances per stack if needed
|
||||
|
||||
@@ -35,7 +35,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.mailwhoami.entrypoints=https
|
||||
- traefik.http.routers.mailwhoami.rule=Host(`mail.${DOMAIN}`)
|
||||
@@ -52,7 +52,7 @@ services:
|
||||
# deploy:
|
||||
# labels:
|
||||
# - traefik.enable=true
|
||||
# - traefik.docker.network=traefik-public
|
||||
# - traefik.swarm.network=traefik-public
|
||||
# - traefik.constraint-label=traefik-public
|
||||
# - traefik.http.routers.rainloop.entrypoints=https
|
||||
# - traefik.http.routers.rainloop.rule=Host(`webmail.${DOMAIN}`)
|
||||
|
||||
@@ -7,7 +7,7 @@ metadata:
|
||||
labels:
|
||||
io.kompose.service: minio-common
|
||||
traefik.constraint-label: traefik-public
|
||||
traefik.docker.network: traefik-public
|
||||
traefik.swarm.network: traefik-public
|
||||
traefik.enable: "true"
|
||||
traefik.http.routers.minio-api-router.entrypoints: https
|
||||
traefik.http.routers.minio-api-router.rule: Host(`minio.`) || Host(`s3.`)
|
||||
|
||||
+1
-1
@@ -25,7 +25,7 @@ services:
|
||||
- node.labels.open_webui.open_webui == true
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.open_webui.entrypoints=https
|
||||
- traefik.http.routers.open_webui.rule=Host(`bot.${DOMAIN}`)
|
||||
|
||||
@@ -7,7 +7,7 @@ metadata:
|
||||
labels:
|
||||
io.kompose.service: osrm-backend
|
||||
traefik.constraint-label: traefik-public
|
||||
traefik.docker.network: traefik-public
|
||||
traefik.swarm.network: traefik-public
|
||||
traefik.enable: "true"
|
||||
traefik.http.routers.osrm-backend.entrypoints: https
|
||||
traefik.http.routers.osrm-backend.middlewares: rate-limit
|
||||
|
||||
+1
-1
@@ -55,7 +55,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.outline-rtr.entrypoints=https
|
||||
- traefik.http.routers.outline-rtr.rule=Host(`outline.${DOMAIN}`)
|
||||
|
||||
+1
-1
@@ -29,7 +29,7 @@ services:
|
||||
- node.labels.portainer.portainer-data == true
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.portainer-https.entrypoints=https
|
||||
- traefik.http.routers.portainer-https.rule=Host(`port.${DOMAIN?Variable not set}`) || Host(`portainer.${DOMAIN?Variable not set}`)
|
||||
|
||||
@@ -7,7 +7,7 @@ metadata:
|
||||
labels:
|
||||
io.kompose.service: postgres-db
|
||||
traefik.constraint-label: traefik-public
|
||||
traefik.docker.network: traefik-public
|
||||
traefik.swarm.network: traefik-public
|
||||
traefik.enable: "true"
|
||||
traefik.tcp.routers.postgres.entrypoints: postgres-socket
|
||||
traefik.tcp.routers.postgres.rule: HostSNI(`*`)
|
||||
|
||||
+1
-1
@@ -7,7 +7,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.frontend.rule=Host:register.${DOMAIN?Variable not set}
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.port=5000
|
||||
ports:
|
||||
- 5000:5000
|
||||
|
||||
@@ -7,7 +7,7 @@ metadata:
|
||||
labels:
|
||||
io.kompose.service: searxng
|
||||
traefik.constraint-label: traefik-public
|
||||
traefik.docker.network: traefik-public
|
||||
traefik.swarm.network: traefik-public
|
||||
traefik.enable: "true"
|
||||
traefik.http.routers.searxng-rtr.entrypoints: https
|
||||
traefik.http.routers.searxng-rtr.middlewares: xbot
|
||||
|
||||
+1
-1
@@ -72,7 +72,7 @@ services:
|
||||
# - node.labels.searxng.searxng_data == true
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.searxng-rtr.entrypoints=https
|
||||
- traefik.http.routers.searxng-rtr.rule=Host(`search.${DOMAIN}`)
|
||||
|
||||
+5
-5
@@ -7,7 +7,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.cyberchef.entrypoints=https
|
||||
- traefik.http.routers.cyberchef.rule=Host(`cook.${DOMAIN}`)
|
||||
@@ -36,7 +36,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.librespeed.entrypoints=https
|
||||
- traefik.http.routers.librespeed.rule=Host(`speed.${DOMAIN}`) || Host(`speedtest.${DOMAIN}`)
|
||||
@@ -57,7 +57,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.linx.entrypoints=https
|
||||
- traefik.http.routers.linx.rule=Host(`linx.${DOMAIN}`)
|
||||
@@ -79,7 +79,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.wetty.entrypoints=https
|
||||
- traefik.http.routers.wetty.rule=Host(`terminal.${DOMAIN}`)
|
||||
@@ -95,7 +95,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.whisper_web.entrypoints=https
|
||||
- traefik.http.routers.whisper_web.rule=Host(`whisper.${DOMAIN}`)
|
||||
|
||||
+6
-6
@@ -21,7 +21,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.api_server.entrypoints=https
|
||||
- traefik.http.routers.api_server.rule=Host(`api.${DOMAIN}`)
|
||||
@@ -49,7 +49,7 @@ services:
|
||||
- node.role == manager
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.dozzle.entrypoints=https
|
||||
- traefik.http.routers.dozzle.rule=Host(`log.${DOMAIN}`)
|
||||
@@ -96,7 +96,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.minio-router.entrypoints=https
|
||||
- traefik.http.routers.minio-router.rule=Host(`drive.${DOMAIN}`) || Host(`storage.${DOMAIN}`)
|
||||
@@ -136,7 +136,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.osrm-backend.entrypoints=https
|
||||
- traefik.http.routers.osrm-backend.rule=Host(`osrm.${DOMAIN}`)
|
||||
@@ -177,7 +177,7 @@ services:
|
||||
- node.labels.postgres.postgres_data == true
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.tcp.routers.postgres.entrypoints=postgres-socket
|
||||
- traefik.tcp.routers.postgres.rule=HostSNI(`*`)
|
||||
@@ -195,7 +195,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.whoami-rtr.entrypoints=https
|
||||
- traefik.http.routers.whoami-rtr.rule=Host(`whoami.$DOMAIN`)
|
||||
|
||||
+1
-1
@@ -22,7 +22,7 @@ services:
|
||||
- node.role == manager
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.swarmpit-https.entrypoints=https
|
||||
- traefik.http.routers.swarmpit-https.rule=Host(`swarmpit.${DOMAIN?Variable not set}`)
|
||||
|
||||
+4
-4
@@ -87,7 +87,7 @@ services:
|
||||
memory: 64M
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.swarmprom-grafana-https.rule=Host(`grafana.${DOMAIN?Variable not set}`)
|
||||
- traefik.http.routers.swarmprom-grafana-https.entrypoints=https
|
||||
@@ -123,7 +123,7 @@ services:
|
||||
memory: 64M
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.swarmprom-alertmanager-https.rule=Host(`alertmanager.${DOMAIN?Variable not set}`)
|
||||
- traefik.http.routers.swarmprom-alertmanager-https.entrypoints=https
|
||||
@@ -146,7 +146,7 @@ services:
|
||||
replicas: 1
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.swarmprom-unsee-https.rule=Host(`unsee.${DOMAIN?Variable not set}`)
|
||||
- traefik.http.routers.swarmprom-unsee-https.entrypoints=https
|
||||
@@ -211,7 +211,7 @@ services:
|
||||
memory: 128M
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.swarmprom-prometheus-https.rule=Host(`prometheus.${DOMAIN?Variable not set}`)
|
||||
- traefik.http.routers.swarmprom-prometheus-https.entrypoints=https
|
||||
|
||||
+1
-1
@@ -8,7 +8,7 @@ services:
|
||||
deploy:
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-public
|
||||
- traefik.swarm.network=traefik-public
|
||||
- traefik.constraint-label=traefik-public
|
||||
- traefik.http.routers.thelounge-https.entrypoints=https
|
||||
- traefik.http.routers.thelounge-https.rule=Host(`irc.${DOMAIN?Variable not set}`)
|
||||
|
||||
@@ -7,7 +7,7 @@ metadata:
|
||||
labels:
|
||||
io.kompose.service: whoami
|
||||
traefik.constraint-label: traefik-public
|
||||
traefik.docker.network: traefik-public
|
||||
traefik.swarm.network: traefik-public
|
||||
traefik.enable: "true"
|
||||
traefik.http.routers.whoami-rtr.entrypoints: https
|
||||
traefik.http.routers.whoami-rtr.rule: Host(`whoami.`)
|
||||
|
||||
Reference in New Issue
Block a user