added router

Signed-off-by: karmacoma <karmacoma@karmacoma.dev>
This commit is contained in:
KARMACOMA 2025-11-25 23:17:20 +00:00
parent 9c2fef799e
commit 7bae744da6

View file

@ -27,6 +27,33 @@ services:
timeout: 10s
retries: 3
labels:
- "traefik.enable=true"
# Define a custom service pointing to port 7878 (radarr WebUI)
- "traefik.http.services.radarr-svc.loadbalancer.server.port=7878"
# --- SECURE ROUTER (HTTPS) ---
# 1. Match the domain
- "traefik.http.routers.radarr-secure.rule=Host(`radarr.karmacoma.dev`)"
# 2. Use HTTPS entrypoint
- "traefik.http.routers.radarr-secure.entrypoints=https"
# 3. Enable TLS (SSL) using LetsEncrypt
- "traefik.http.routers.radarr-secure.tls=true"
- "traefik.http.routers.radarr-secure.tls.certresolver=letsencrypt"
# 4. Apply the Authentik Middleware (Check the name matches your dynamic config)
- "traefik.http.routers.radarr-secure.middlewares=authentik-auth@file"
# 5. Point to the service we defined above
- "traefik.http.routers.radarr-secure.service=radarr-svc"
# 6. PRIORITY: This is the fix. Higher number wins over Coolify defaults.
- "traefik.http.routers.radarr-secure.priority=100"
# --- OPTIONAL: HTTP REDIRECT (Standard Coolify behavior) ---
- "traefik.http.routers.gluetun-http.rule=Host(`qbittorrent.karmacoma.dev`)"
- "traefik.http.routers.gluetun-http.entrypoints=http"
- "traefik.http.routers.gluetun-http.middlewares=redirect-to-https"
- "traefik.http.routers.gluetun-http.priority=100"
- "traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https"
# If you stick with Option A (radarr-config), you must declare it here:
volumes:
radarr-config: