is possible with traefik v3 to disable http to https redirect on a single container?
post i have look at so far:
Disable https redirection for a single container - Traefik / Traefik v1 - Traefik Labs Community Forum
Redirect all HTTP traffic to HTTPS except for one service - Traefik / Traefik v3 (latest) - Traefik Labs Community Forum
How to disable http to https redirect? - Traefik / Traefik v2 - Traefik Labs Community Forum
How to disable http redirect to https for a single container domain? - Traefik / Traefik v2 - Traefik Labs Community Forum
traeifik compose:
traefik:
image: traefik:latest
container_name: traefik
restart: unless-stopped
security_opt:
- no-new-privileges:true
# networks:
# - proxy
ports:
- 80:80
- 443:443
# - 443:443/tcp # Uncomment if you want HTTP3
# - 443:443/udp # Uncomment if you want HTTP3
# - 2022:2022
# - 2121:2121
environment:
- PUID=$PUID
- PGID=$PGID
- TZ=$TIME_ZONE
- CF_API_EMAIL=xxx@yahoo.com
- CF_DNS_API_TOKEN=xxx
# - CF_API_KEY=YOUR_API_KEY
# be sure to use the correct one depending on if you are using a token or key
volumes:
- /etc/localtime:/etc/localtime:ro
- /var/run/docker.sock:/var/run/docker.sock:ro
- $PERSIST/traefik/traefik.yml:/traefik.yml:ro
- $PERSIST/traefik/acme.json:/acme.json
- $PERSIST/traefik/config.yml:/config.yml:ro
#- $PERSIST/traefik/traefik-logs:/var/log/traefik
labels:
- "traefik.enable=true"
- "traefik.http.routers.traefik.entrypoints=http"
- "traefik.http.routers.traefik.rule=Host(`traefik.xxx.top`)"
- "traefik.http.middlewares.traefik-auth.basicauth.users=xxx"
- "traefik.http.middlewares.traefik-https-redirect.redirectscheme.scheme=https"
- "traefik.http.middlewares.sslheader.headers.customrequestheaders.X-Forwarded-Proto=https"
- "traefik.http.routers.traefik.middlewares=traefik-https-redirect"
- "traefik.http.routers.traefik-secure.entrypoints=https"
- "traefik.http.routers.traefik-secure.rule=Host(`traefik.xxx.top`)"
- "traefik.http.routers.traefik-secure.middlewares=traefik-auth"
- "traefik.http.routers.traefik-secure.tls=true"
- "traefik.http.routers.traefik-secure.tls.certresolver=cloudflare"
- "traefik.http.routers.traefik-secure.tls.domains[0].main=xxx.top"
- "traefik.http.routers.traefik-secure.tls.domains[0].sans=*.xxx.top"
- "traefik.http.routers.traefik-secure.service=api@internal"
said container config:
xxx:
container_name: xxx
image: xxx
user: "1000:1000"
working_dir: /
volumes:
- $PERSIST/xxx/config:/config
- $PERSIST/xxx/data:/data
- $PERSIST/xxx/backup:/backup
- $PERSIST/xxx/downloads:/downloads
environment:
- PUID=$PUID
- PGID=$PGID
- TZ=$TIME_ZONE
ports:
- "8903:8903"
restart: unless-stopped
labels:
- "traefik.enable=true"
- "traefik.http.routers.xxx.entrypoints=http"
- "traefik.http.routers.xxx.rule=Host(`xxx.xxx.top`)"
- "traefik.http.middlewares.xxx-https-redirect.redirectscheme.scheme=https"
- "traefik.http.routers.xxx.middlewares=xxx-https-redirect"
- "traefik.http.routers.xxx-secure.entrypoints=https"
- "traefik.http.routers.xxx-secure.rule=Host(`xxx.xxx.top`)"
- "traefik.http.routers.xxx-secure.tls=true"
- "traefik.http.routers.xxx-secure.service=xxx"
- "traefik.http.services.xxx.loadbalancer.server.port=8903"
traefik yml config file:
api:
dashboard: true
debug: true
entryPoints:
# sftp:
# address: ":2022"
# ftp:
# address: ":2121"
# mcjava-tcp:
# address: ":25565"
# mcjava-udp:
# address: ":25565/udp"
# mcbedrock-tcp:
# address: ":19132"
# mcbedrock-udp:
# address: ":19132/udp"
http:
address: ":80"
http:
redirections:
entryPoint:
to: https
scheme: https
https:
address: ":443"
serversTransport:
insecureSkipVerify: true
providers:
docker:
endpoint: "unix:///var/run/docker.sock"
exposedByDefault: false
file:
filename: /config.yml
certificatesResolvers:
cloudflare:
acme:
email: xxx
storage: acme.json
dnsChallenge:
provider: cloudflare
#disablePropagationCheck: true # uncomment this if you have issues pulling certificates through cloudflare, By setting this flag to true disables the need to wait for the propagation of the TXT record to all authoritative name servers.
resolvers:
- "1.1.1.1:53"
- "1.0.0.1:53"
any help will be appreciated, TIA.