Traefik v3 ignores tls.stores.default in the static config, causing it to serve its auto-generated fallback cert instead of the platform cert. Moving the default certificate store to the dynamic config (file provider) fixes this — Traefik now serves the correct cert and also picks up cert rotations without a restart. This was the root cause of OIDC PKIX failures: the server imported the CA into its JVM truststore, but Traefik was serving a different cert entirely. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
25 lines
397 B
YAML
25 lines
397 B
YAML
api:
|
|
dashboard: false
|
|
|
|
entryPoints:
|
|
web:
|
|
address: ":80"
|
|
http:
|
|
redirections:
|
|
entryPoint:
|
|
to: websecure
|
|
scheme: https
|
|
websecure:
|
|
address: ":443"
|
|
admin-console:
|
|
address: ":3002"
|
|
|
|
providers:
|
|
docker:
|
|
endpoint: "unix:///var/run/docker.sock"
|
|
exposedByDefault: false
|
|
network: cameleer
|
|
file:
|
|
filename: /etc/traefik/dynamic.yml
|
|
|