1
0
mirror of https://github.com/Mailu/Mailu.git synced 2025-09-16 09:06:32 +02:00

Update the traefik doc

This commit is contained in:
Florent Daigniere
2024-01-04 08:47:55 +01:00
parent cc59be41e1
commit cd7651ad7f

View File

@@ -12,13 +12,14 @@ Web contents based on criteria like the requested hostname (virtual hosts).
Traefik as reverse proxy
------------------------
In your docker-compose.yml, add a section like follows:
In your docker-compose.yml, remove the `ports` section of the `front` container
and add a section like follows:
.. code-block:: yaml
reverse-proxy:
# The official v2 Traefik docker image
image: traefik:v2.10
image: traefik:v2.11
# Enables the web UI and tells Traefik to listen to docker
command:
- "--providers.docker=true"
@@ -34,10 +35,9 @@ In your docker-compose.yml, add a section like follows:
- "--entrypoints.pop3.address=:pop3"
- "--entrypoints.pop3s.address=:pop3s"
- "--entrypoints.sieve.address=:sieve"
# - "--api.insecure=true"
- "--log.level=DEBUG"
# - "--api.insecure=true"
# - "--log.level=DEBUG"
ports:
# The HTTP port
- "25:25"
- "80:80"
- "443:443"
@@ -49,7 +49,7 @@ In your docker-compose.yml, add a section like follows:
- "143:143"
- "4190:4190"
# The Web UI (enabled by --api.insecure=true)
#- "8080:8080"
# - "8080:8080"
volumes:
# So that Traefik can listen to the Docker events
- /var/run/docker.sock:/var/run/docker.sock
@@ -61,12 +61,12 @@ and then add the following to the front section:
labels:
- "traefik.enable=true"
# the second part is important to ensure Mailu can get certificates from letsencrypt
- "traefik.http.routers.web.rule=Host(`mail.example.com`) || Path(`/.well-known/acme-challenge/`)"
# the second part is important to ensure Mailu can get certificates from letsencrypt for all hostnames
- "traefik.http.routers.web.rule=Host(`mail.example.com`) || PathPrefix(`/.well-known/acme-challenge/`)"
- "traefik.http.routers.web.entrypoints=web"
- "traefik.http.services.web.loadbalancer.server.port=80"
#other FQDNS can be added here:
# other FQDNS can be added here:
- "traefik.tcp.routers.websecure.rule=HostSNI(`mail.example.com`) || HostSNI(`autoconfig.example.com`) || HostSNI(`mta-sts.example.com`)"
- "traefik.tcp.routers.websecure.entrypoints=websecure"
- "traefik.tcp.routers.websecure.tls.passthrough=true"