Comments (3)
Hi,
This can already be done (it's how I pass those secrets :), it's described at the end of the configuration section of the README: https://github.com/thomseddon/traefik-forward-auth/blob/master/README.md#configuration
Let me know if you have any problems
from traefik-forward-auth.
I don't think this is working in v2. at least not for me:
I've tried:
PROVIDERS_GOOGLE_CLIENT_ID_FILE=/run/secrets/google_client_id
PROVIDERS_GOOGLE_CLIENT_ID=/run/secrets/google_client_id
CLIENT_ID_FILE=/run/secrets/google_client_id
CLIENT_ID=/run/secrets/google_client_id
from traefik-forward-auth.
I don't think this is working in v2. at least not for me:
I've tried:PROVIDERS_GOOGLE_CLIENT_ID_FILE=/run/secrets/google_client_id PROVIDERS_GOOGLE_CLIENT_ID=/run/secrets/google_client_id CLIENT_ID_FILE=/run/secrets/google_client_id CLIENT_ID=/run/secrets/google_client_id
answering to myself. The answer was in issue #147
configuring docker-compose works:
environment:
CONFIG: /run/secrets/credentials
secrets:
- credentials
secrets:
credentials:
name: oauth2_credentials
file: ${SECRETSDIR}/oauth2_credentials.ini
from traefik-forward-auth.
Related Issues (20)
- Redirect to auth:4181/provider HOT 5
- AADSTS900144: the request body must contain the following parameter: 'client_id'.
- Can't login with Google all of a sudden HOT 1
- Invalid cookie doesn't redirect to auth provider to re-login HOT 1
- Control scopes with Open ID provider ?
- On redirect Traefik-forward-auth strips away any existing query-params after successfully authenticating (oauth)
- Google OAuth Set CSRF cookie and redirected to provider login url HOT 4
- Not found "_oauth" with Azure provider HOT 1
- Use docker secrets for environment variables HOT 2
- Feature request: Pull information about groups of user HOT 1
- How to check for token revocation?
- Safe deployment HOT 1
- multiple whitelist users in rules doesn't work HOT 1
- go-compiler Multiple Vulnerabilities
- whitelist rule not working with arm64 images or images <= 2.2
- Invalid Cookie should point to a recoverable state
- oidc: issuer did not match the issuer returned by provider HOT 2
- oidc: id token signed with unsupported algorithm, expected ["RS256"] got "ES384" HOT 2
- 404 not found after Successful Sign in HOT 2
- Endless loop when using OIDC (cognito) as provider ERR_TOO_MANY_REDIRECTS HOT 3
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from traefik-forward-auth.