Files
cameleer-saas/traefik.yml
hsiegeln e0e65bb62c
All checks were successful
CI / build (push) Successful in 47s
CI / docker (push) Successful in 8s
feat: HTTPS admin console via Traefik with NODE_TLS_REJECT_UNAUTHORIZED
ADMIN_ENDPOINT set to HTTPS so OIDC issuer matches browser URL.
NODE_TLS_REJECT_UNAUTHORIZED=0 lets Logto's internal ky-based
OIDC self-discovery accept the self-signed cert through Traefik.
Remove in production with real certs.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-07 00:44:33 +02:00

31 lines
541 B
YAML

api:
dashboard: false
entryPoints:
web:
address: ":80"
http:
redirections:
entryPoint:
to: websecure
scheme: https
websecure:
address: ":443"
admin-console:
address: ":3002"
providers:
docker:
endpoint: "unix:///var/run/docker.sock"
exposedByDefault: false
network: cameleer
file:
filename: /etc/traefik/dynamic.yml
tls:
stores:
default:
defaultCertificate:
certFile: /etc/traefik/certs/cert.pem
keyFile: /etc/traefik/certs/key.pem