Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: frontend proxies configuration #75

Closed
wants to merge 6 commits into from
Closed

Conversation

DavidePrincipi
Copy link
Member

@DavidePrincipi DavidePrincipi commented Feb 12, 2025

Configure Traefik to trust X-Forwarded* headers from a list of IPs. The PR adds two actions to get/set the list of IPs:

  • set-trusted-proxies
  • get-trusted-proxies

To easily accomplish this task it introduces a new way of manage the static and dynamic configuration of Traefik with YAML configuration files that are merged together. This new behavior is described in the README file.

Refs NethServer/dev#7305 NethServer/dev#7312

- Run v3 upgrade after beta2
- Unconditional restart after any upgrade script

Each upgrade script can stop or restart Traefik as wanted.
- apply configuration templates at traefik restart
- document how custom templates work
- move module configuration under templates/ directory
- allow custom templates override with state/templates/
Configure entryPoints trustedIPs in traefik.yaml.
The PROXY_DEPTH environment variable is passed to Traefik and can be
referenced in IPAllowList strategy configuration to extract the client
IP address.
@DavidePrincipi
Copy link
Member Author

The custom templates implementation is a risk: let's avoid it for now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant