tls.yaml 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. ---
  2. # Traefik TLS Configuration
  3. # This file is watched by Traefik and changes are applied automatically
  4. # TLS Options Configuration
  5. # Define custom TLS settings for different security requirements
  6. tls:
  7. options:
  8. # Example: Modern TLS Configuration (Recommended)
  9. # Uncomment and customize as needed
  10. # modern:
  11. # minVersion: VersionTLS13
  12. # cipherSuites:
  13. # - TLS_AES_128_GCM_SHA256
  14. # - TLS_AES_256_GCM_SHA384
  15. # - TLS_CHACHA20_POLY1305_SHA256
  16. # curvePreferences:
  17. # - CurveP521
  18. # - CurveP384
  19. # Example: Intermediate TLS Configuration (Balanced)
  20. # Good balance between security and compatibility
  21. # intermediate:
  22. # minVersion: VersionTLS12
  23. # cipherSuites:
  24. # - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  25. # - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  26. # - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
  27. # curvePreferences:
  28. # - CurveP521
  29. # - CurveP384
  30. # sniStrict: true
  31. # Example: Old TLS Configuration (Maximum Compatibility)
  32. # Use only if you need to support very old clients
  33. # old:
  34. # minVersion: VersionTLS10
  35. # maxVersion: VersionTLS13
  36. # Certificate Stores
  37. # Define custom certificate stores for dynamic certificates
  38. # stores:
  39. # default:
  40. # defaultCertificate:
  41. # certFile: /path/to/cert.pem
  42. # keyFile: /path/to/key.pem
  43. # Dynamic Certificates
  44. # Load certificates from files (alternative to ACME)
  45. # certificates:
  46. # - certFile: /path/to/domain1.cert
  47. # keyFile: /path/to/domain1.key
  48. # stores:
  49. # - default
  50. # - certFile: /path/to/domain2.cert
  51. # keyFile: /path/to/domain2.key
  52. # Server Transports
  53. # Configure how Traefik communicates with backend services
  54. # serversTransports:
  55. # # Example: Skip TLS Verification for Self-Signed Certificates
  56. # # Useful for internal services with self-signed certs
  57. # insecure:
  58. # insecureSkipVerify: true
  59. #
  60. # # Example: Custom Root CA
  61. # # Use a custom CA to verify backend certificates
  62. # custom-ca:
  63. # rootCAs:
  64. # - /path/to/ca.crt
  65. #
  66. # # Example: Client Certificate Authentication
  67. # # Use client certificates to authenticate to backend
  68. # mtls:
  69. # certificates:
  70. # - certFile: /path/to/client.crt
  71. # keyFile: /path/to/client.key
  72. # Usage Examples:
  73. #
  74. # 1. Apply TLS options to a router:
  75. # http:
  76. # routers:
  77. # my-router:
  78. # rule: "Host(`example.com`)"
  79. # tls:
  80. # options: modern@file
  81. #
  82. # 2. Use custom server transport:
  83. # http:
  84. # services:
  85. # my-service:
  86. # loadBalancer:
  87. # servers:
  88. # - url: "https://backend:443"
  89. # serversTransport: insecure@file