Testing separation of SSL and non-SSL
This is to attempt at not having the path prefix added twice on the initial connection to the site
This commit is contained in:
@@ -18,16 +18,19 @@ services:
|
|||||||
io.rancher.scheduler.affinity:host_label: ${HOST_LABEL}
|
io.rancher.scheduler.affinity:host_label: ${HOST_LABEL}
|
||||||
{{- end}}
|
{{- end}}
|
||||||
traefik.enable: true
|
traefik.enable: true
|
||||||
### Start Web Segment
|
### Start HTTP Segment
|
||||||
traefik.web.frontend.entryPoints: http,https
|
traefik.http.frontend.entryPoints: http
|
||||||
traefik.web.frontend.headers.forceSTSHeader: true
|
traefik.http.frontend.headers.SSLRedirect: true
|
||||||
traefik.web.frontend.headers.referrerPolicy: no-referrer # Security enhancement (Prevents leaking of referer information)
|
### End HTTP Segment
|
||||||
traefik.web.frontend.headers.SSLRedirect: true
|
### Start HTTPS Segment
|
||||||
traefik.web.frontend.headers.STSPreload: true
|
traefik.https.frontend.entryPoints: https
|
||||||
traefik.web.frontend.headers.STSSeconds: 15552000
|
traefik.https.frontend.headers.forceSTSHeader: true
|
||||||
traefik.web.frontend.rule: "Host:${TRAEFIK_HOSTNAME}; AddPrefix:/guacamole"
|
traefik.https.frontend.headers.referrerPolicy: no-referrer # Security enhancement (Prevents leaking of referer information)
|
||||||
traefik.web.port: "8080"
|
traefik.https.frontend.headers.STSPreload: true
|
||||||
### End Web Segment
|
traefik.https.frontend.headers.STSSeconds: 15552000
|
||||||
|
traefik.https.frontend.rule: "Host:${TRAEFIK_HOSTNAME}; AddPrefix:/guacamole"
|
||||||
|
traefik.https.port: "8080"
|
||||||
|
### End HTTPS Segment
|
||||||
links:
|
links:
|
||||||
- guacd
|
- guacd
|
||||||
- mysql
|
- mysql
|
||||||
|
|||||||
Reference in New Issue
Block a user