Basic auth on nginx containter

Hi everyone,

I'm trying to use the basic auth on the warden nginx container
It works for my traefik dashboard but I can't make it works on nginx.
I don't even have the popup requesting for login/password

services:
  nginx:
    hostname: "${WARDEN_ENV_NAME}-nginx"
    image: ${WARDEN_IMAGE_REPOSITORY}/nginx:${NGINX_VERSION:-1.16}
    labels:
      - traefik.enable=true
      - traefik.http.routers.${WARDEN_ENV_NAME}-nginx.tls=true
      - traefik.http.routers.${WARDEN_ENV_NAME}-nginx.priority=2
      - traefik.http.routers.${WARDEN_ENV_NAME}-nginx.rule=
          HostRegexp(`{subdomain:.+}.${TRAEFIK_DOMAIN}`) || Host(`${TRAEFIK_DOMAIN}`)
      - traefik.http.services.${WARDEN_ENV_NAME}-nginx.loadbalancer.server.port=80
      - traefik.docker.network=${WARDEN_ENV_NAME}_default
      - traefik.http.routers.${WARDEN_ENV_NAME}-nginx.tls.certresolver=myresolver
      - traefik.http.middlewares.${WARDEN_ENV_NAME}-auth.basicauth.usersfile=/var/www/html/.htpasswd
      - traefik.http.routers.${WARDEN_ENV_NAME}-nginx.middlewares=${WARDEN_ENV_NAME}-auth
    volumes:
      - .${WARDEN_WEB_ROOT:-}/:/var/www/html:cached
    environment:
      - XDEBUG_CONNECT_BACK_HOST=${XDEBUG_CONNECT_BACK_HOST:-''}

On the container I can see my .htpasswd file and I also tried using static values for the middlewares name but that didn't changed.
I tried as well to use the same middlewares to point to my traefik file (traefik-auth)

Here is my traefik

services:
  traefik:
    container_name: traefik
    image: traefik:${TRAEFIK_VERSION:-2.2}
    ports:
      - "${TRAEFIK_LISTEN:-127.0.0.1}:80:80"     # The HTTP port
      - "${TRAEFIK_LISTEN:-127.0.0.1}:443:443"   # The HTTPS port
    volumes:
      - ${WARDEN_HOME_DIR}/etc/traefik/traefik.yml:/etc/traefik/traefik.yml
      - ${WARDEN_HOME_DIR}/etc/traefik/acme:/etc/traefik/acme
      - ${WARDEN_HOME_DIR}/etc/traefik/dynamic.yml:/etc/traefik/dynamic.yml
      - ${WARDEN_HOME_DIR}/etc/.htpasswd:/etc/.htpasswd
      - /var/run/docker.sock:/var/run/docker.sock
    labels:
      - traefik.enable=true
      - traefik.http.routers.traefik.tls=true
      - traefik.http.routers.traefik.rule=Host(`traefik.${WARDEN_SERVICE_DOMAIN:-warden.test}`)
      - traefik.http.routers.traefik.service=api@internal
      - traefik.http.routers.traefik.tls.certresolver=myresolver
      - traefik.http.middlewares.traefik-auth.basicauth.usersfile=/etc/.htpasswd
      - traefik.http.routers.traefik.middlewares=traefik-auth
    restart: ${WARDEN_RESTART_POLICY:-always}

I feel like I'm missing something.

Thanks in advance

Enable and check Traefik debug log (doc).

Use docker inspect to check if all your templates are resolved correctly.

Thx
On logs, I don't know if these lines are importants

traefik  | time="2024-06-23T15:54:25Z" level=debug msg="No entryPoint defined for this router, using the default one(s) instead: [http https]" routerName=project-test-varnish
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="No entryPoint defined for this router, using the default one(s) instead: [http https]" routerName=project-test-opensearch
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="No entryPoint defined for this router, using the default one(s) instead: [http https]" routerName=project-test-livereload
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="No entryPoint defined for this router, using the default one(s) instead: [http https]" routerName=project-test-rabbitmq

I could also see that it seems the http challenge don't work with nginx, I have only for traefik

traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Try to challenge certificate for domain [traefik.project.test] found in HostSNI rule" providerName=myresolver.acme routerName=traefik-secure@docker rule="Host(`traefik.project.test`)"

Maybe both issue is linked.

I will try to inspect templates

Here log detail

traefik  | time="2024-06-23T15:54:20Z" level=info msg="Configuration loaded from file: /etc/traefik/traefik.yml"
traefik  | time="2024-06-23T15:54:20Z" level=info msg="Traefik version 2.2.11 built on 2020-09-07T14:12:48Z"
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Static configuration loaded {\"global\":{},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\":80\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{\"redirections\":{\"entryPoint\":{\"to\":\"https\",\"scheme\":\"https\",\"permanent\":true,\"priority\":2147483647}}}},\"https\":{\"address\":\":443\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ .Name }}.project.test`)\",\"network\":\"warden\",\"swarmModeRefreshSeconds\":15000000000},\"file\":{\"watch\":true,\"filename\":\"/etc/traefik/dynamic.yml\"}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"debug\",\"format\":\"common\"},\"certificatesResolvers\":{\"myresolver\":{\"acme\":{\"email\":\"my@mail.com\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"/etc/traefik/acme/acme.json\",\"keyType\":\"RSA4096\",\"httpChallenge\":{\"entryPoint\":\"http\"},\"tlsChallenge\":{}}}}}"
traefik  | time="2024-06-23T15:54:20Z" level=info msg="\nStats collection is disabled.\nHelp us improve Traefik by turning this feature on :)\nMore details on: https://docs.traefik.io/contributing/data-collection/\n"
traefik  | time="2024-06-23T15:54:20Z" level=info msg="Starting provider aggregator.ProviderAggregator {}"
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Start TCP Server" entryPointName=https
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Start TCP Server" entryPointName=http
traefik  | time="2024-06-23T15:54:20Z" level=info msg="Starting provider *file.Provider {\"watch\":true,\"filename\":\"/etc/traefik/dynamic.yml\"}"
traefik  | time="2024-06-23T15:54:20Z" level=info msg="Starting provider *acme.Provider {\"email\":\"my@mail.com\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"/etc/traefik/acme/acme.json\",\"keyType\":\"RSA4096\",\"httpChallenge\":{\"entryPoint\":\"http\"},\"tlsChallenge\":{},\"ResolverName\":\"myresolver\",\"store\":{},\"ChallengeStore\":{}}"
traefik  | time="2024-06-23T15:54:20Z" level=info msg="Testing certificate renew..." providerName=myresolver.acme
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Configuration received from provider file: {\"http\":{},\"tcp\":{},\"udp\":{},\"tls\":{\"stores\":{\"default\":{},\"defaultCertificate\":{}}}}" providerName=file
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Configuration received from provider myresolver.acme: {\"http\":{},\"tls\":{}}" providerName=myresolver.acme
traefik  | time="2024-06-23T15:54:20Z" level=info msg="Starting provider *docker.Provider {\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ .Name }}.project.test`)\",\"network\":\"warden\",\"swarmModeRefreshSeconds\":15000000000}"
traefik  | time="2024-06-23T15:54:20Z" level=info msg="Starting provider *traefik.Provider {}"
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Configuration received from provider internal: {\"http\":{\"routers\":{\"http-to-https\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-http-to-https\"],\"service\":\"noop@internal\",\"rule\":\"HostRegexp(`{host:.+}`)\",\"priority\":2147483647}},\"services\":{\"api\":{},\"dashboard\":{},\"noop\":{}},\"middlewares\":{\"redirect-http-to-https\":{\"redirectScheme\":{\"scheme\":\"https\",\"port\":\"443\",\"permanent\":true}}}},\"tcp\":{},\"tls\":{}}" providerName=internal
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Added outgoing tracing middleware noop@internal" entryPointName=http routerName=http-to-https@internal middlewareName=tracing middlewareType=TracingForwarder
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Creating middleware" middlewareType=RedirectScheme entryPointName=http routerName=http-to-https@internal middlewareName=redirect-http-to-https@internal
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Setting up redirection to https 443" entryPointName=http routerName=http-to-https@internal middlewareName=redirect-http-to-https@internal middlewareType=RedirectScheme
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-to-https@internal middlewareName=redirect-http-to-https@internal
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=http middlewareName=traefik-internal-recovery
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="No default certificate, generating one"
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Provider connection established with docker 26.1.4 (API 1.45)" providerName=docker
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Filtering disabled container" providerName=docker container=php-debug-project-test-dcd07cb254245de16b0b23660a8bf6346ddea48a74aa9458e7b50e93a624d99b
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Filtering disabled container" providerName=docker container=nginx-project-test-db3a4ef3846dd4c19fbd433bb0851e7198e1d4c2d003fa42d02e976990cc6528
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Filtering disabled container" providerName=docker container=redis-project-test-a45c6d9d4285ef10656126a9d0984ffaf11d15949c32aad5c50d59b485b60fb4
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Filtering disabled container" providerName=docker container=db-project-test-90d5fcd626025fb0ddc36ebde2138996cd652be3acaba78aae08308db44c5162
traefik  | time="2024-06-23T15:54:20Z" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"project-test-livereload\":{\"service\":\"project-test-livereload\",\"rule\":\" (HostRegexp(`{subdomain:.+}.test.project.test`) || Host(`test.project.test`)) \\u0026\\u0026 (Path(`/livereload.js`) || Path(`/livereload`))\",\"priority\":3,\"tls\":{}},\"project-test-opensearch\":{\"service\":\"project-test-opensearch\",\"rule\":\"Host(`opensearch.test.project.test`)\",\"tls\":{}},\"project-test-rabbitmq\":{\"service\":\"project-test-rabbitmq\",\"rule\":\"Host(`rabbitmq.test.project.test`)\",\"tls\":{}},\"project-test-varnish\":{\"service\":\"project-test-varnish\",\"rule\":\" HostRegexp(`{subdomain:.+}.test.project.test`) || Host(`test.project.test`)\",\"priority\":1,\"tls\":{}},\"traefik\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"traefik-https-redirect\"],\"service\":\"traefik-docker\",\"rule\":\"Host(`traefik.project.test`)\"},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"service\":\"api@internal\",\"rule\":\"Host(`traefik.project.test`)\",\"tls\":{\"certResolver\":\"myresolver\"}}},\"services\":{\"project-test-livereload\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.96.8:35729\"}],\"passHostHeader\":true}},\"project-test-opensearch\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.96.6:9200\"}],\"passHostHeader\":true}},\"project-test-rabbitmq\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.96.7:15672\"}],\"passHostHeader\":true}},\"project-test-varnish\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.96.11:80\"}],\"passHostHeader\":true}},\"traefik-docker\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.80.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"sslheader\":{\"headers\":{\"customRequestHeaders\":{\"X-Forwarded-Proto\":\"https\"}}},\"traefik-https-redirect\":{\"redirectScheme\":{\"scheme\":\"https\"}}}},\"tcp\":{},\"udp\":{}}" providerName=docker
traefik  | time="2024-06-23T15:54:21Z" level=debug msg="Provider event received {Status:start ID:9fe8967060f4db85a49b79409f8bae1528192ffb94af2443ff5c03a9a6e35d57 From:panubo/sshd:latest Type:container Action:start Actor:{ID:9fe8967060f4db85a49b79409f8bae1528192ffb94af2443ff5c03a9a6e35d57 Attributes:map[com.docker.compose.config-hash:c07f3f41425d16d91def6501f6ea3f620bb444a9eee6a5371d3c10afa61606c9 com.docker.compose.container-number:1 com.docker.compose.depends_on: com.docker.compose.image:sha256:d88626cebb29f9e23d7a10b2f7c18a2a306e6a612d3d014179314a29d069b6c0 com.docker.compose.oneoff:False com.docker.compose.project:docker com.docker.compose.project.config_files:/opt/warden/docker/docker-compose.yml com.docker.compose.project.working_dir:/opt/warden/docker com.docker.compose.service:tunnel com.docker.compose.version:2.27.1 image:panubo/sshd:latest name:tunnel org.opencontainers.image.created:2023-04-09T00:20:46.086Z org.opencontainers.image.description:Minimal Alpine Linux Docker image with sshd exposed and rsync installed org.opencontainers.image.licenses:MIT org.opencontainers.image.revision:90eeba5761f2da6ae650f9002d8bcd7f524d01fd org.opencontainers.image.source:https://github.com/panubo/docker-sshd org.opencontainers.image.title:docker-sshd org.opencontainers.image.url:https://github.com/panubo/docker-sshd org.opencontainers.image.version:weekly]} Scope:local Time:1719158061 TimeNano:1719158061251791327}" providerName=docker
traefik  | time="2024-06-23T15:54:21Z" level=debug msg="Filtering disabled container" providerName=docker container=php-debug-project-test-dcd07cb254245de16b0b23660a8bf6346ddea48a74aa9458e7b50e93a624d99b
traefik  | time="2024-06-23T15:54:21Z" level=debug msg="Filtering disabled container" providerName=docker container=nginx-project-test-db3a4ef3846dd4c19fbd433bb0851e7198e1d4c2d003fa42d02e976990cc6528
traefik  | time="2024-06-23T15:54:21Z" level=debug msg="Filtering disabled container" container=redis-project-test-a45c6d9d4285ef10656126a9d0984ffaf11d15949c32aad5c50d59b485b60fb4 providerName=docker
traefik  | time="2024-06-23T15:54:21Z" level=debug msg="Filtering disabled container" providerName=docker container=db-project-test-90d5fcd626025fb0ddc36ebde2138996cd652be3acaba78aae08308db44c5162
traefik  | time="2024-06-23T15:54:21Z" level=debug msg="Filtering disabled container" providerName=docker container=tunnel-docker-9fe8967060f4db85a49b79409f8bae1528192ffb94af2443ff5c03a9a6e35d57
traefik  | time="2024-06-23T15:54:21Z" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"project-test-livereload\":{\"service\":\"project-test-livereload\",\"rule\":\" (HostRegexp(`{subdomain:.+}.test.project.test`) || Host(`test.project.test`)) \\u0026\\u0026 (Path(`/livereload.js`) || Path(`/livereload`))\",\"priority\":3,\"tls\":{}},\"project-test-opensearch\":{\"service\":\"project-test-opensearch\",\"rule\":\"Host(`opensearch.test.project.test`)\",\"tls\":{}},\"project-test-rabbitmq\":{\"service\":\"project-test-rabbitmq\",\"rule\":\"Host(`rabbitmq.test.project.test`)\",\"tls\":{}},\"project-test-varnish\":{\"service\":\"project-test-varnish\",\"rule\":\" HostRegexp(`{subdomain:.+}.test.project.test`) || Host(`test.project.test`)\",\"priority\":1,\"tls\":{}},\"traefik\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"traefik-https-redirect\"],\"service\":\"traefik-docker\",\"rule\":\"Host(`traefik.project.test`)\"},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"service\":\"api@internal\",\"rule\":\"Host(`traefik.project.test`)\",\"tls\":{\"certResolver\":\"myresolver\"}}},\"services\":{\"project-test-livereload\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.96.8:35729\"}],\"passHostHeader\":true}},\"project-test-opensearch\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.96.6:9200\"}],\"passHostHeader\":true}},\"project-test-rabbitmq\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.96.7:15672\"}],\"passHostHeader\":true}},\"project-test-varnish\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.96.11:80\"}],\"passHostHeader\":true}},\"traefik-docker\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.80.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"sslheader\":{\"headers\":{\"customRequestHeaders\":{\"X-Forwarded-Proto\":\"https\"}}},\"traefik-https-redirect\":{\"redirectScheme\":{\"scheme\":\"https\"}}}},\"tcp\":{},\"udp\":{}}" providerName=docker
traefik  | time="2024-06-23T15:54:21Z" level=info msg="Skipping same configuration" providerName=docker
traefik  | time="2024-06-23T15:54:21Z" level=debug msg="No default certificate, generating one" tlsStoreName=defaultCertificate@file
traefik  | time="2024-06-23T15:54:23Z" level=debug msg="No default certificate, generating one" tlsStoreName=default
traefik  | time="2024-06-23T15:54:24Z" level=debug msg="Added outgoing tracing middleware noop@internal" middlewareType=TracingForwarder entryPointName=http routerName=http-to-https@internal middlewareName=tracing
traefik  | time="2024-06-23T15:54:24Z" level=debug msg="Creating middleware" entryPointName=http routerName=http-to-https@internal middlewareType=RedirectScheme middlewareName=redirect-http-to-https@internal
traefik  | time="2024-06-23T15:54:24Z" level=debug msg="Setting up redirection to https 443" middlewareName=redirect-http-to-https@internal entryPointName=http routerName=http-to-https@internal middlewareType=RedirectScheme
traefik  | time="2024-06-23T15:54:24Z" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-to-https@internal middlewareName=redirect-http-to-https@internal
traefik  | time="2024-06-23T15:54:24Z" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=http middlewareName=traefik-internal-recovery
traefik  | time="2024-06-23T15:54:24Z" level=debug msg="No default certificate, generating one" tlsStoreName=default
traefik  | time="2024-06-23T15:54:24Z" level=debug msg="No default certificate, generating one" tlsStoreName=defaultCertificate@file
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="Adding certificate for domain(s) traefik.project.test"
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="Adding certificate for domain(s) portainer.project.test"
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="Adding certificate for domain(s) test.project.test"
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="Adding certificate for domain(s) portainer2.project.test"
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="Added outgoing tracing middleware noop@internal" middlewareType=TracingForwarder routerName=http-to-https@internal entryPointName=http middlewareName=tracing
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="Creating middleware" middlewareType=RedirectScheme entryPointName=http routerName=http-to-https@internal middlewareName=redirect-http-to-https@internal
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="Setting up redirection to https 443" middlewareName=redirect-http-to-https@internal middlewareType=RedirectScheme entryPointName=http routerName=http-to-https@internal
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-to-https@internal middlewareName=redirect-http-to-https@internal
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="Creating middleware" entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="No entryPoint defined for this router, using the default one(s) instead: [http https]" routerName=project-test-varnish
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="No entryPoint defined for this router, using the default one(s) instead: [http https]" routerName=project-test-opensearch
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="No entryPoint defined for this router, using the default one(s) instead: [http https]" routerName=project-test-livereload
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="No entryPoint defined for this router, using the default one(s) instead: [http https]" routerName=project-test-rabbitmq
traefik  | time="2024-06-23T15:54:25Z" level=debug msg="No default certificate, generating one" tlsStoreName=defaultCertificate@file
traefik  | time="2024-06-23T15:54:28Z" level=debug msg="No default certificate, generating one" tlsStoreName=default
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Adding certificate for domain(s) traefik.project.test"
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Adding certificate for domain(s) portainer.project.test"
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Adding certificate for domain(s) test.project.test"
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Adding certificate for domain(s) portainer2.project.test"
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating middleware" routerName=traefik@docker middlewareName=pipelining middlewareType=Pipelining serviceName=traefik-docker entryPointName=http
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating load-balancer" entryPointName=http routerName=traefik@docker serviceName=traefik-docker
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating server 0 http://192.168.80.2:80" serviceName=traefik-docker serverName=0 entryPointName=http routerName=traefik@docker
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Added outgoing tracing middleware traefik-docker" middlewareType=TracingForwarder entryPointName=http routerName=traefik@docker middlewareName=tracing
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating middleware" middlewareType=RedirectScheme entryPointName=http routerName=traefik@docker middlewareName=traefik-https-redirect@docker
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Setting up redirection to https " entryPointName=http routerName=traefik@docker middlewareName=traefik-https-redirect@docker middlewareType=RedirectScheme
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Adding tracing to middleware" middlewareName=traefik-https-redirect@docker entryPointName=http routerName=traefik@docker
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Added outgoing tracing middleware noop@internal" middlewareName=tracing middlewareType=TracingForwarder entryPointName=http routerName=http-to-https@internal
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating middleware" routerName=http-to-https@internal middlewareName=redirect-http-to-https@internal middlewareType=RedirectScheme entryPointName=http
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Setting up redirection to https 443" entryPointName=http routerName=http-to-https@internal middlewareName=redirect-http-to-https@internal middlewareType=RedirectScheme
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-to-https@internal middlewareName=redirect-http-to-https@internal
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating middleware" entryPointName=http middlewareType=Recovery middlewareName=traefik-internal-recovery
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating middleware" serviceName=project-test-rabbitmq middlewareName=pipelining middlewareType=Pipelining entryPointName=http routerName=project-test-rabbitmq@docker
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating load-balancer" entryPointName=http routerName=project-test-rabbitmq@docker serviceName=project-test-rabbitmq
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating server 0 http://192.168.96.7:15672" entryPointName=http routerName=project-test-rabbitmq@docker serviceName=project-test-rabbitmq serverName=0
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Added outgoing tracing middleware project-test-rabbitmq" entryPointName=http routerName=project-test-rabbitmq@docker middlewareName=tracing middlewareType=TracingForwarder
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating middleware" serviceName=project-test-varnish middlewareType=Pipelining middlewareName=pipelining entryPointName=http routerName=project-test-varnish@docker
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating load-balancer" serviceName=project-test-varnish entryPointName=http routerName=project-test-varnish@docker
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating server 0 http://192.168.96.11:80" serverName=0 entryPointName=http routerName=project-test-varnish@docker serviceName=project-test-varnish
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Added outgoing tracing middleware project-test-varnish" entryPointName=http routerName=project-test-varnish@docker middlewareName=tracing middlewareType=TracingForwarder
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating middleware" routerName=project-test-opensearch@docker serviceName=project-test-opensearch middlewareName=pipelining middlewareType=Pipelining entryPointName=http
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating load-balancer" entryPointName=http routerName=project-test-opensearch@docker serviceName=project-test-opensearch
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating server 0 http://192.168.96.6:9200" routerName=project-test-opensearch@docker serviceName=project-test-opensearch serverName=0 entryPointName=http
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Added outgoing tracing middleware project-test-opensearch" entryPointName=http routerName=project-test-opensearch@docker middlewareName=tracing middlewareType=TracingForwarder
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating middleware" middlewareName=pipelining middlewareType=Pipelining routerName=project-test-livereload@docker serviceName=project-test-livereload entryPointName=http
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating load-balancer" routerName=project-test-livereload@docker serviceName=project-test-livereload entryPointName=http
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating server 0 http://192.168.96.8:35729" routerName=project-test-livereload@docker serviceName=project-test-livereload serverName=0 entryPointName=http
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Added outgoing tracing middleware project-test-livereload" entryPointName=http routerName=project-test-livereload@docker middlewareName=tracing middlewareType=TracingForwarder
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=http middlewareName=traefik-internal-recovery
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Added outgoing tracing middleware api@internal" entryPointName=https routerName=traefik-secure@docker middlewareName=tracing middlewareType=TracingForwarder
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=https middlewareName=traefik-internal-recovery
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Try to challenge certificate for domain [traefik.project.test] found in HostSNI rule" providerName=myresolver.acme routerName=traefik-secure@docker rule="Host(`traefik.project.test`)"
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="Looking for provided certificate(s) to validate [\"traefik.project.test\"]..." routerName=traefik-secure@docker rule="Host(`traefik.project.test`)" providerName=myresolver.acme
traefik  | time="2024-06-23T15:54:29Z" level=debug msg="No ACME certificate generation required for domains [\"traefik.project.test\"]." providerName=myresolver.acme routerName=traefik-secure@docker rule="Host(`traefik.project.test`)"

It says "Filtering disabled container"? but they are running

CONTAINER ID   IMAGE                                    COMMAND                  CREATED          STATUS              PORTS                                                                                                                  NAMES
d9cde5edb748   wardenenv/varnish:7.1                    "/usr/local/bin/dock…"   7 minutes ago    Up 7 minutes        80/tcp, 8443/tcp                                                                                                       project-test-varnish-1
7e8bbecf627a   wardenenv/php-fpm:8.2-magento2-xdebug3   "docker-entrypoint p…"   7 minutes ago    Up 7 minutes        9000/tcp                                                                                                               project-test-php-debug-1
969301974a27   wardenenv/nginx:1.16                     "/bin/sh -c 'envsubs…"   7 minutes ago    Up 7 minutes        80/tcp                                                                                                                 project-test-nginx-1
1ca388c7a5bd   wardenenv/php-fpm:8.2-magento2           "docker-entrypoint p…"   7 minutes ago    Up 7 minutes        9000/tcp                                                                                                               project-test-php-fpm-1
704da5f4dad8   wardenenv/redis:7.0                      "docker-entrypoint.s…"   8 minutes ago    Up 7 minutes        6379/tcp                                                                                                               project-test-redis-1
686d6bb4727b   wardenenv/rabbitmq:3.9                   "docker-entrypoint.s…"   8 minutes ago    Up 7 minutes        4369/tcp, 5671-5672/tcp, 15671-15672/tcp,                                                 15691-15692/tcp, 25672/tcp   project-test-rabbitmq-1
7cda9fc5c837   wardenenv/mariadb:10.6                   "docker-entrypoint.s…"   8 minutes ago    Up 7 minutes        3306/tcp                                                                                                               project-test-db-1
cdd6c05010af   wardenenv/opensearch:2.5                 "./opensearch-docker…"   8 minutes ago    Up 7 minutes        9200/tcp, 9300/tcp, 9600/tcp, 9650/tcp                                                                                 project-test-opensearch-1
56d3ffc610b0   traefik:2.2                              "/entrypoint.sh trae…"   39 minutes ago   Up About a minute   0.0.0.0:80->80/tcp, 0.0.0.0:443->443/tcp                                                                               traefik
9fe8967060f4   panubo/sshd:latest                       "/entry.sh /usr/sbin…"   43 minutes ago   Up About a minute   127.0.0.1:2222->22/tcp                                                                                                 tunnel