Updated traefik router

Signed-off-by: karmacoma <karmacoma@karmacoma.dev>
This commit is contained in:
KARMACOMA 2025-11-24 00:19:04 +00:00
parent 160ec83dfc
commit fec9b8e130

View file

@ -38,31 +38,31 @@ services:
networks:
- array
labels:
labels:
- "traefik.enable=true"
# 1. Create a STATIC router name (e.g., 'qbittorrent-secure')
# This replaces the dynamic 'https-0-uuid' name.
# --- Router Definition (The "Headless" Config) ---
# 1. Define the Host Rule
- "traefik.http.routers.qbittorrent-secure.rule=Host(`qbittorrent.karmacoma.dev`)"
# 2. Force High Priority
# This ensures Traefik uses THIS router (with Auth) instead of
# any conflicting router Coolify might auto-generate.
- "traefik.http.routers.qbittorrent-secure.priority=100"
# 3. Standard Boilerplate (Required because we are making a manual router)
# 2. SSL/TLS Settings (Standard Coolify Defaults)
- "traefik.http.routers.qbittorrent-secure.entrypoints=websecure"
- "traefik.http.routers.qbittorrent-secure.tls=true"
- "traefik.http.routers.qbittorrent-secure.tls.certresolver=letsencrypt"
# 4. Attach the Middleware
# Now we can reference it because we know our own router's name!
# (Note: We use 'authentik@docker' to ensure we look for the middleware globally)
# 3. High Priority (Just in case)
- "traefik.http.routers.qbittorrent-secure.priority=1000"
# --- The Security Layer ---
# 4. Attach the Middleware (gzip + authentik)
- "traefik.http.routers.qbittorrent-secure.middlewares=gzip,authentik@docker"
# 5. Service Mapping
# Tell the router to send traffic to the service port (8080 for qbit/gluetun)
# --- Service Definition ---
# 5. Point to the Internal Port (Gluetun/qBit port)
- "traefik.http.services.qbittorrent-secure.loadbalancer.server.port=8080"
# --- Network Glue (Crucial!) ---
# 6. Tell Traefik which network to use to reach this container
- "traefik.docker.network=coolify"
networks:
array:
external: true