Skip to content

Dependencies update #6

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 45 commits into
base: master
Choose a base branch
from
Open
Changes from 1 commit
Commits
Show all changes
45 commits
Select commit Hold shift + click to select a range
5a676f3
Fix rules argument (#71)
SuperSandro2000 Sep 20, 2019
a99330e
Fix typos
thomseddon Jul 8, 2019
5dfd4f2
Add arm builds. Fixes #38
thomseddon Sep 30, 2019
5a9c6ad
Multiple provider support + OIDC provider
thomseddon Sep 18, 2019
ffa5afb
Simplify oauth server testing
thomseddon Jan 15, 2020
68c3299
Update go1.12 -> go1.13 + update dependencies + mod tidy
thomseddon Jan 18, 2020
3652a0b
Add OIDC docs + examples
thomseddon Feb 10, 2020
e678a33
Add .git to .dockerignore
SuperSandro2000 Apr 8, 2020
b413c60
Update golang arm versions
thspinto Mar 1, 2020
c3b4ba8
Allow multiple cookie domains, domains and whitelists with environmen…
LolHens Apr 14, 2020
3a66191
Document ARM releases on docker hub
thomseddon Apr 23, 2020
9abf564
Add kubernetes examples + better document methods of applying authent…
thomseddon Apr 24, 2020
1ac0ca9
traefik v1.7 kubernetes doc fixes
thomseddon Apr 28, 2020
07f9587
Modify references from Universal Authentication to Global Authentication
thomseddon May 7, 2020
f802a36
Add note on avoiding rules that might break redirect flow
thomseddon May 7, 2020
f7a94e7
Add traefik v2 kubernetes examples
thomseddon May 7, 2020
7381450
Improve internal function docs
thomseddon May 11, 2020
eec62eb
Improve logging detail and consistency
thomseddon May 11, 2020
a668454
Warn when using http without insecure cookie
thomseddon May 12, 2020
60604ad
Always prompt user to select account on google login
thomseddon May 12, 2020
3345f8e
Add traefik v2 swarm examples
thomseddon May 23, 2020
8902cf8
Use Traefik v2 in README examples and links + use consistent images i…
thomseddon May 23, 2020
00b5d9e
standardize on 'traefik-forward-auth-secrets' for kubernetes examples…
LelandSindt May 26, 2020
c63fd73
Rename selective auth + fix selective auth examples (#130)
thomseddon May 26, 2020
655edde
Add note on using auth host mode with selective auth
thomseddon May 26, 2020
8b3a950
Add logout endpoint (#107)
thomseddon Jun 3, 2020
fb8b216
Optionally match emails against *either* whitelist or domains when bo…
thomseddon Jun 3, 2020
2937b04
Add support for resource indicator to OIDC provider (#131)
thomseddon Jun 11, 2020
529e28d
Add FUNDING.yml (#135)
thomseddon Jun 26, 2020
be2b4ba
Remove unused user fields (#141)
thomseddon Jun 29, 2020
870724c
Fail if there is an error retrieving the user + extra test (#142)
thomseddon Jun 29, 2020
9e5994b
Add Generic OAuth Provider (#138)
thomseddon Jun 29, 2020
1743537
Fix simple-separate-pod url path (#148)
Sykkro Jul 17, 2020
41560fe
Support concurrent CSRF cookies by using a prefix of nonce (#187)
thomseddon Sep 23, 2020
04f5499
Allow override of domains and whitelist in rules (#169)
thomseddon Sep 23, 2020
c19f622
Create codeql-analysis.yml
thomseddon Oct 1, 2020
f96a3fb
Remove double brackets typo in readme (#218)
thomseddon Dec 10, 2020
8be8244
Switch to Github Actions for CI (#219)
thomseddon Jan 3, 2021
6c6f75e
Make listen port configurable (#230)
hesstobi Feb 1, 2021
4ffb659
Add GitHub Actions workflow for creating binaries for releases (#184)…
Feb 1, 2021
c4317b7
Allow to be run without middleware + improve request reading consiste…
thomseddon Jun 24, 2021
ce0c3f1
Sync fork with upstream
Jan 12, 2024
ff8fca6
Bump github.com/traefik/traefik/v2 to v2.10.7
Jan 12, 2024
9fcb557
Bump other dependencies
Jan 12, 2024
e97b968
fix: Set Go version to 1.21 to comply with go.mod version expectations
Jan 13, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
standardize on 'traefik-forward-auth-secrets' for kubernetes examples (
  • Loading branch information
LelandSindt authored May 26, 2020

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
commit 00b5d9e0315be7f36ae97235e6902d4b2a0fe1e1
Original file line number Diff line number Diff line change
@@ -42,17 +42,17 @@ spec:
- name: PROVIDERS_GOOGLE_CLIENT_ID
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: google-client-id
- name: PROVIDERS_GOOGLE_CLIENT_SECRET
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: google-client-secret
- name: SECRET
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: secret
volumeMounts:
- name: configs
@@ -63,6 +63,6 @@ spec:
- name: configs
configMap:
name: configs
- name: secrets
- name: traefik-forward-auth-secrets
secret:
secretName: secrets
Original file line number Diff line number Diff line change
@@ -18,5 +18,5 @@ configMapGenerator:
# Secrets
#
secretGenerator:
- name: secrets
- name: traefik-forward-auth-secrets
env: traefik-forward-auth.env
Original file line number Diff line number Diff line change
@@ -65,17 +65,17 @@ spec:
- name: PROVIDERS_GOOGLE_CLIENT_ID
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: google-client-id
- name: PROVIDERS_GOOGLE_CLIENT_SECRET
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: google-client-secret
- name: SECRET
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: secret
volumeMounts:
- name: configs
@@ -86,7 +86,7 @@ spec:
- name: configs
configMap:
name: configs
- name: secrets
- name: traefik-forward-auth-secrets
secret:
secretName: secrets
- name: acme
Original file line number Diff line number Diff line change
@@ -24,5 +24,5 @@ configMapGenerator:
# Secrets
#
secretGenerator:
- name: secrets
- name: traefik-forward-auth-secrets
env: secrets/traefik-forward-auth.env
Original file line number Diff line number Diff line change
@@ -35,17 +35,17 @@ spec:
- name: PROVIDERS_GOOGLE_CLIENT_ID
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: traefik-forward-auth-google-client-id
- name: PROVIDERS_GOOGLE_CLIENT_SECRET
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: traefik-forward-auth-google-client-secret
- name: SECRET
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: traefik-forward-auth-secret

---
Original file line number Diff line number Diff line change
@@ -45,17 +45,17 @@ spec:
- name: PROVIDERS_GOOGLE_CLIENT_ID
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: google-client-id
- name: PROVIDERS_GOOGLE_CLIENT_SECRET
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: google-client-secret
- name: SECRET
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: secret
volumeMounts:
- name: configs
@@ -66,6 +66,6 @@ spec:
- name: configs
configMap:
name: configs
- name: secrets
- name: traefik-forward-auth-secrets
secret:
secretName: secrets
secretName: traefik-forward-auth-secrets
Original file line number Diff line number Diff line change
@@ -22,5 +22,5 @@ configMapGenerator:
# Secrets
#
secretGenerator:
- name: secrets
- name: traefik-forward-auth-secrets
env: secrets/traefik-forward-auth.env
Original file line number Diff line number Diff line change
@@ -81,17 +81,17 @@ spec:
- name: PROVIDERS_GOOGLE_CLIENT_ID
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: google-client-id
- name: PROVIDERS_GOOGLE_CLIENT_SECRET
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: google-client-secret
- name: SECRET
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: secret
volumeMounts:
- name: configs
@@ -102,9 +102,9 @@ spec:
- name: configs
configMap:
name: configs
- name: secrets
- name: traefik-forward-auth-secrets
secret:
secretName: secrets
secretName: traefik-forward-auth-secrets
- name: acme
persistentVolumeClaim:
claimName: traefik-acme
Original file line number Diff line number Diff line change
@@ -25,5 +25,5 @@ configMapGenerator:
# Secrets
#
secretGenerator:
- name: secrets
- name: traefik-forward-auth-secrets
env: secrets/traefik-forward-auth.env
Original file line number Diff line number Diff line change
@@ -35,17 +35,17 @@ spec:
- name: PROVIDERS_GOOGLE_CLIENT_ID
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: traefik-forward-auth-google-client-id
- name: PROVIDERS_GOOGLE_CLIENT_SECRET
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: traefik-forward-auth-google-client-secret
- name: SECRET
valueFrom:
secretKeyRef:
name: secrets
name: traefik-forward-auth-secrets
key: traefik-forward-auth-secret

---