diff --git a/Containers/Docker/Docker Compose/Password Pusher.md b/Containers/Docker/Docker Compose/Password Pusher.md index d4848d7..34b6e33 100644 --- a/Containers/Docker/Docker Compose/Password Pusher.md +++ b/Containers/Docker/Docker Compose/Password Pusher.md @@ -1,5 +1,6 @@ **Purpose**: An application to securely communicate passwords over the web. Passwords automatically expire after a certain number of views and/or time has passed. Track who, what and when. +## Docker Configuration ```jsx title="docker-compose.yml" version: '3' @@ -17,11 +18,10 @@ services: ipv4_address: 192.168.5.170 labels: - "traefik.enable=true" - - "traefik.http.routers.passwordpusher.rule=Host(`pw.domain.com`)" + - "traefik.http.routers.passwordpusher.rule=Host(`temp.bunny-lab.io`)" - "traefik.http.routers.passwordpusher.entrypoints=websecure" - - "traefik.http.routers.passwordpusher.tls.certresolver=letsencrypt" + - "traefik.http.routers.passwordpusher.tls.certresolver=myresolver" - "traefik.http.services.passwordpusher.loadbalancer.server.port=5100" - networks: docker_network: external: true @@ -32,4 +32,25 @@ PWPUSH_MASTER_KEY= ``` !!! note "PWPUSH_MASTER_KEY" - Generate a master key by visiting the [official online key generator](https://pwpush.com/en/pages/generate_key). \ No newline at end of file + Generate a master key by visiting the [official online key generator](https://pwpush.com/en/pages/generate_key). + +## Traefik Reverse Proxy Configuration +If the container does not run on the same host as Traefik, you will need to manually add configuration to Traefik's dynamic config file, outlined below. +``` yaml +http: + routers: + password-pusher: + entryPoints: + - websecure + tls: + certResolver: myresolver + service: password-pusher + rule: Host(`temp.bunny-lab.io`) + + services: + password-pusher: + loadBalancer: + servers: + - url: http://192.168.5.170:5100 + passHostHeader: true +``` \ No newline at end of file