Added traefik labels to allow forward auth
Signed-off-by: karmacoma <karmacoma@karmacoma.dev>
This commit is contained in:
parent
bc1a65a0e2
commit
586aef0e33
1 changed files with 3 additions and 5 deletions
|
|
@ -40,11 +40,9 @@ services:
|
||||||
aliases:
|
aliases:
|
||||||
- auth-core
|
- auth-core
|
||||||
labels:
|
labels:
|
||||||
# 1. Define the Middleware (Forces HTTPS protocol header)
|
- "traefik.http.middlewares.authentik.forwardauth.address=http://authentik_server:80/outpost.goauthentik.io/auth/traefik"
|
||||||
- "traefik.http.middlewares.authentik-force-https.headers.customrequestheaders.X-Forwarded-Proto=https"
|
- "traefik.http.middlewares.authentik.forwardauth.trustForwardHeader=true"
|
||||||
# 2. Attach it to Coolify's generated Router
|
- "traefik.http.middlewares.authentik.forwardauth.authResponseHeaders=X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid,X-authentik-jwt,X-authentik-meta-jwks,X-authentik-meta-outpost,X-authentik-meta-provider,X-authentik-meta-app,X-authentik-meta-version"
|
||||||
# (Note: We usually append 'gzip' as Coolify adds it by default, ensuring we don't remove it)
|
|
||||||
- "traefik.http.routers.https-0-j88cw4skoowsccs4oc44g0wg-authentik_server.middlewares=gzip,authentik-force-https"
|
|
||||||
authentik_worker:
|
authentik_worker:
|
||||||
command: worker
|
command: worker
|
||||||
depends_on:
|
depends_on:
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue