-
-
Notifications
You must be signed in to change notification settings - Fork 5.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Basic Auth per Frontend #1147
Add Basic Auth per Frontend #1147
Conversation
@SantoDE Kubernetes please :) |
45b648b
to
2f4bfac
Compare
Hey @cemo , Sadly I've personally never used Kubernetes so it's really hard for me to add it. However, if you're experienced in Kubernetes let's meet on Slack ;-) |
Yes, support for Kubernetes would be nice as well 👍 |
2f4bfac
to
3c8e023
Compare
beautiful! I will test this out very soon |
@SantoDE, maybe you can blind code, just with unit tests ;-) |
Adding to consul_catalog backend would be great |
Is there any scope to add support for an identify provider ? i.e. LDAP / OAUTH ? |
I haven't tested this branch yet, but does it support the functionality added in #889 where the authenticated user is added to the header? |
Seems to be a good first step to me :D |
Will this work with the file backend as well? |
@SantoDE awesome men, I look forward to this merge |
@SantoDE Does this allow use of a htpasswd file? Thank you! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@SantoDE Looks good man, I learned form this. What about the "This branch is out-of-date with the base branch" message?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@SantoDE well done
Yeah @emilevauge , will do tonight or tommorow :) |
It's such a shame that this Feature / Pull Request is still not merged, because dynamic basic auth is such an important feature! :( |
33405d5
to
6a31799
Compare
docs updated @vdemeester 👼 |
Oh man, @SantoDE is soooo fast ! |
@SantoDE Are we able to use a htpasswd file with this? Thanks again! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Found some late typos, otherwise 👍
docs/toml.md
Outdated
@@ -844,6 +844,7 @@ Labels can be used on containers to override default behaviour: | |||
- `traefik.frontend.passHostHeader=true`: forward client `Host` header to the backend. | |||
- `traefik.frontend.priority=10`: override default frontend priority | |||
- `traefik.frontend.entryPoints=http,https`: assign this frontend to entry points `http` and `https`. Overrides `defaultEntryPoints`. | |||
- `traefik.frontend.auth.basic=test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/,test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0`: Set's a Basic Auth for that frontend with the users test:test and test2:test2 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Typo: Set's -> Sets.
docs/toml.md
Outdated
@@ -852,11 +853,11 @@ If several ports need to be exposed from a container, the services labels can be | |||
- `traefik.<service-name>.weight=10`: assign this service weight. Overrides `traefik.weight`. | |||
- `traefik.<service-name>.frontend.backend=fooBackend`: assign this service frontend to `foobackend`. Default is to assign to the service backend. | |||
- `traefik.<service-name>.frontend.entryPoints=http`: assign this service entrypoints. Overrides `traefik.frontend.entrypoints`. | |||
- `traefik.<service-name>.frontend.auth.basic=test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/,test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0` Set's a Basic Auth for that frontend with the users test:test and test2:test2. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sets.
docs/toml.md
Outdated
@@ -1601,6 +1602,7 @@ Labels can be used on task containers to override default behaviour: | |||
- `traefik.frontend.passHostHeader=true`: forward client `Host` header to the backend. | |||
- `traefik.frontend.priority=10`: override default frontend priority | |||
- `traefik.frontend.entryPoints=http,https`: assign this frontend to entry points `http` and `https`. Overrides `defaultEntryPoints`. | |||
- `traefik.frontend.auth.basic=test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/,test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0`: Set's a Basic Auth for that frontend with the users test:test and test2:test2 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sets.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for your work @SantoDE !
Could you open an issue to remember implementing this in other providers?
LGTM!
6a31799
to
8a892b2
Compare
Typos fixed @timoreimann :) So feel free to merge! :D cc: @containous/traefik |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
Hi, Best regards, |
@jri-sp @Starefossen previous release cycles are probably not a good indication anymore as we are currently trying to release more frequently. The goal is to ship every other month. Code freeze is supposed to happen at the end of April. Depending on how much feedback we get during the release candidate phase, 1.3 should be out sooner or later. I'd think on the order of 2-3 weeks. |
@Starefossen @timoreimann |
Fixes #751
Currently, only Basic Auth and the docker & rancher provider are supported.