Normalize parameter names in configs

This commit is contained in:
Alexander Kachkaev 2018-04-06 03:38:03 -04:00 committed by Traefiker Bot
parent e74e7cf734
commit 66485e81b4
43 changed files with 123 additions and 123 deletions

View file

@ -645,18 +645,18 @@ Once a day (the first call begins 10 minutes after the start of Træfik), we col
swarmMode = true swarmMode = true
[Docker.TLS] [Docker.TLS]
CA = "dockerCA" ca = "dockerCA"
Cert = "dockerCert" cert = "dockerCert"
Key = "dockerKey" key = "dockerKey"
InsecureSkipVerify = true insecureSkipVerify = true
[ECS] [ECS]
Domain = "foo.bar" domain = "foo.bar"
ExposedByDefault = true exposedByDefault = true
Clusters = ["foo-bar"] clusters = ["foo-bar"]
Region = "us-west-2" region = "us-west-2"
AccessKeyID = "AccessKeyID" accessKeyID = "AccessKeyID"
SecretAccessKey = "SecretAccessKey" secretAccessKey = "SecretAccessKey"
``` ```
- Obfuscated and anonymous configuration: - Obfuscated and anonymous configuration:
@ -669,24 +669,24 @@ Once a day (the first call begins 10 minutes after the start of Træfik), we col
[api] [api]
[Docker] [Docker]
Endpoint = "xxxx" endpoint = "xxxx"
Domain = "xxxx" domain = "xxxx"
ExposedByDefault = true exposedByDefault = true
SwarmMode = true swarmMode = true
[Docker.TLS] [Docker.TLS]
CA = "xxxx" ca = "xxxx"
Cert = "xxxx" cert = "xxxx"
Key = "xxxx" key = "xxxx"
InsecureSkipVerify = false insecureSkipVerify = false
[ECS] [ECS]
Domain = "xxxx" domain = "xxxx"
ExposedByDefault = true exposedByDefault = true
Clusters = [] clusters = []
Region = "us-west-2" region = "us-west-2"
AccessKeyID = "xxxx" accessKeyID = "xxxx"
SecretAccessKey = "xxxx" secretAccessKey = "xxxx"
``` ```
### Show me the code ! ### Show me the code !

View file

@ -118,7 +118,7 @@ server {
Here is the `traefik.toml` file used: Here is the `traefik.toml` file used:
```toml ```toml
MaxIdleConnsPerHost = 100000 maxIdleConnsPerHost = 100000
defaultEntryPoints = ["http"] defaultEntryPoints = ["http"]
[entryPoints] [entryPoints]

View file

@ -53,7 +53,7 @@ filename = "boltdb.tmpl"
# ca = "/etc/ssl/ca.crt" # ca = "/etc/ssl/ca.crt"
# cert = "/etc/ssl/boltdb.crt" # cert = "/etc/ssl/boltdb.crt"
# key = "/etc/ssl/boltdb.key" # key = "/etc/ssl/boltdb.key"
# insecureskipverify = true # insecureSkipVerify = true
``` ```
To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific).

View file

@ -53,7 +53,7 @@ prefix = "traefik"
# ca = "/etc/ssl/ca.crt" # ca = "/etc/ssl/ca.crt"
# cert = "/etc/ssl/consul.crt" # cert = "/etc/ssl/consul.crt"
# key = "/etc/ssl/consul.key" # key = "/etc/ssl/consul.key"
# insecureskipverify = true # insecureSkipVerify = true
``` ```
To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific).

View file

@ -57,7 +57,7 @@ prefix = "traefik"
# ca = "/etc/ssl/ca.crt" # ca = "/etc/ssl/ca.crt"
# cert = "/etc/ssl/consul.crt" # cert = "/etc/ssl/consul.crt"
# key = "/etc/ssl/consul.key" # key = "/etc/ssl/consul.key"
# insecureskipverify = true # insecureSkipVerify = true
# Override default configuration template. # Override default configuration template.
# For advanced users :) # For advanced users :)

View file

@ -54,7 +54,7 @@ watch = true
# Optional # Optional
# Default: true # Default: true
# #
exposedbydefault = true exposedByDefault = true
# Use the IP address from the binded port instead of the inner network one. # Use the IP address from the binded port instead of the inner network one.
# For specific use-case :) # For specific use-case :)
@ -69,7 +69,7 @@ usebindportip = true
# Optional # Optional
# Default: false # Default: false
# #
swarmmode = false swarmMode = false
# Enable docker TLS connection. # Enable docker TLS connection.
# #
@ -79,7 +79,7 @@ swarmmode = false
# ca = "/etc/ssl/ca.crt" # ca = "/etc/ssl/ca.crt"
# cert = "/etc/ssl/docker.crt" # cert = "/etc/ssl/docker.crt"
# key = "/etc/ssl/docker.key" # key = "/etc/ssl/docker.key"
# insecureskipverify = true # insecureSkipVerify = true
``` ```
To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific).
@ -89,7 +89,7 @@ To enable constraints see [backend-specific constraints section](/configuration/
```toml ```toml
################################################################ ################################################################
# Docker Swarmmode configuration backend # Docker Swarm Mode configuration backend
################################################################ ################################################################
# Enable Docker configuration backend. # Enable Docker configuration backend.
@ -123,7 +123,7 @@ watch = true
# Optional # Optional
# Default: false # Default: false
# #
swarmmode = true swarmMode = true
# Override default configuration template. # Override default configuration template.
# For advanced users :) # For advanced users :)
@ -146,7 +146,7 @@ swarmmode = true
# Optional # Optional
# Default: true # Default: true
# #
exposedbydefault = false exposedByDefault = false
# Enable docker TLS connection. # Enable docker TLS connection.
# #
@ -156,7 +156,7 @@ exposedbydefault = false
# ca = "/etc/ssl/ca.crt" # ca = "/etc/ssl/ca.crt"
# cert = "/etc/ssl/docker.crt" # cert = "/etc/ssl/docker.crt"
# key = "/etc/ssl/docker.key" # key = "/etc/ssl/docker.key"
# insecureskipverify = true # insecureSkipVerify = true
``` ```
To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific).

View file

@ -39,13 +39,13 @@ watch = true
# #
refreshSeconds = 15 refreshSeconds = 15
# AccessKeyID to use when connecting to AWS. # Access Key ID to use when connecting to AWS.
# #
# Optional # Optional
# #
accessKeyID = "abc" accessKeyID = "abc"
# SecretAccessKey to use when connecting to AWS. # Secret Access Key to use when connecting to AWS.
# #
# Optional # Optional
# #

View file

@ -66,13 +66,13 @@ exposedByDefault = false
# #
region = "us-east-1" region = "us-east-1"
# AccessKeyID to use when connecting to AWS. # Access Key ID to use when connecting to AWS.
# #
# Optional # Optional
# #
accessKeyID = "abc" accessKeyID = "abc"
# SecretAccessKey to use when connecting to AWS. # Secret Access Key to use when connecting to AWS.
# #
# Optional # Optional
# #
@ -95,7 +95,7 @@ secretAccessKey = "123"
# templateVersion = "2" # templateVersion = "2"
``` ```
If `AccessKeyID`/`SecretAccessKey` is not given credentials will be resolved in the following order: If `accessKeyID`/`secretAccessKey` is not given credentials will be resolved in the following order:
- From environment variables; `AWS_ACCESS_KEY_ID`, `AWS_SECRET_ACCESS_KEY`, and `AWS_SESSION_TOKEN`. - From environment variables; `AWS_ACCESS_KEY_ID`, `AWS_SECRET_ACCESS_KEY`, and `AWS_SESSION_TOKEN`.
- Shared credentials, determined by `AWS_PROFILE` and `AWS_SHARED_CREDENTIALS_FILE`, defaults to `default` and `~/.aws/credentials`. - Shared credentials, determined by `AWS_PROFILE` and `AWS_SHARED_CREDENTIALS_FILE`, defaults to `default` and `~/.aws/credentials`.

View file

@ -63,7 +63,7 @@ useAPIV3 = true
# ca = "/etc/ssl/ca.crt" # ca = "/etc/ssl/ca.crt"
# cert = "/etc/ssl/etcd.crt" # cert = "/etc/ssl/etcd.crt"
# key = "/etc/ssl/etcd.key" # key = "/etc/ssl/etcd.key"
# insecureskipverify = true # insecureSkipVerify = true
``` ```
To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific).

View file

@ -114,7 +114,7 @@ If the service port defined in the ingress spec is 443, then the backend communi
!!! note !!! note
Please note that by enabling TLS communication between traefik and your pods, you will have to have trusted certificates that have the proper trust chain and IP subject name. Please note that by enabling TLS communication between traefik and your pods, you will have to have trusted certificates that have the proper trust chain and IP subject name.
If this is not an option, you may need to skip TLS certificate verification. If this is not an option, you may need to skip TLS certificate verification.
See the [InsecureSkipVerify](/configuration/commons/#main-section) setting for more details. See the [insecureSkipVerify](/configuration/commons/#main-section) setting for more details.
## Annotations ## Annotations

View file

@ -103,7 +103,7 @@ domain = "marathon.localhost"
# CA = "/etc/ssl/ca.crt" # CA = "/etc/ssl/ca.crt"
# Cert = "/etc/ssl/marathon.cert" # Cert = "/etc/ssl/marathon.cert"
# Key = "/etc/ssl/marathon.key" # Key = "/etc/ssl/marathon.key"
# InsecureSkipVerify = true # insecureSkipVerify = true
# DCOSToken for DCOS environment. # DCOSToken for DCOS environment.
# This will override the Authorization header. # This will override the Authorization header.

View file

@ -62,34 +62,34 @@ domain = "mesos.localhost"
# Optional # Optional
# #
# [mesos.TLS] # [mesos.TLS]
# InsecureSkipVerify = true # insecureSkipVerify = true
# Zookeeper timeout (in seconds). # Zookeeper timeout (in seconds).
# #
# Optional # Optional
# Default: 30 # Default: 30
# #
# ZkDetectionTimeout = 30 # zkDetectionTimeout = 30
# Polling interval (in seconds). # Polling interval (in seconds).
# #
# Optional # Optional
# Default: 30 # Default: 30
# #
# RefreshSeconds = 30 # refreshSeconds = 30
# IP sources (e.g. host, docker, mesos, netinfo). # IP sources (e.g. host, docker, mesos, netinfo).
# #
# Optional # Optional
# #
# IPSources = "host" # ipSources = "host"
# HTTP Timeout (in seconds). # HTTP Timeout (in seconds).
# #
# Optional # Optional
# Default: 30 # Default: 30
# #
# StateTimeoutSecond = "30" # stateTimeoutSecond = "30"
# Convert groups to subdomains. # Convert groups to subdomains.
# Default behavior: /foo/bar/myapp => foo-bar-myapp.{defaultDomain} # Default behavior: /foo/bar/myapp => foo-bar-myapp.{defaultDomain}

View file

@ -77,7 +77,7 @@ To enable constraints see [backend-specific constraints section](/configuration/
# #
[rancher.metadata] [rancher.metadata]
# Poll the Rancher metadata service for changes every `rancher.RefreshSeconds`. # Poll the Rancher metadata service for changes every `rancher.refreshSeconds`.
# NOTE: this is less accurate than the default long polling technique which # NOTE: this is less accurate than the default long polling technique which
# will provide near instantaneous updates to Traefik # will provide near instantaneous updates to Traefik
# #

View file

@ -42,7 +42,7 @@ refreshSeconds = 10
# ca = "/etc/ssl/ca.crt" # ca = "/etc/ssl/ca.crt"
# cert = "/etc/ssl/servicefabric.crt" # cert = "/etc/ssl/servicefabric.crt"
# key = "/etc/ssl/servicefabric.key" # key = "/etc/ssl/servicefabric.key"
# insecureskipverify = true # insecureSkipVerify = true
``` ```
## Labels ## Labels

View file

@ -53,7 +53,7 @@ prefix = "traefik"
# ca = "/etc/ssl/ca.crt" # ca = "/etc/ssl/ca.crt"
# cert = "/etc/ssl/zookeeper.crt" # cert = "/etc/ssl/zookeeper.crt"
# key = "/etc/ssl/zookeeper.key" # key = "/etc/ssl/zookeeper.key"
# insecureskipverify = true # insecureSkipVerify = true
``` ```
To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific).

View file

@ -38,14 +38,14 @@
# Optional # Optional
# Default: "2s" # Default: "2s"
# #
# ProvidersThrottleDuration = "2s" # providersThrottleDuration = "2s"
# Controls the maximum idle (keep-alive) connections to keep per-host. # Controls the maximum idle (keep-alive) connections to keep per-host.
# #
# Optional # Optional
# Default: 200 # Default: 200
# #
# MaxIdleConnsPerHost = 200 # maxIdleConnsPerHost = 200
# If set to true invalid SSL certificates are accepted for backends. # If set to true invalid SSL certificates are accepted for backends.
# This disables detection of man-in-the-middle attacks so should only be used on secure backend networks. # This disables detection of man-in-the-middle attacks so should only be used on secure backend networks.
@ -53,14 +53,14 @@
# Optional # Optional
# Default: false # Default: false
# #
# InsecureSkipVerify = true # insecureSkipVerify = true
# Register Certificates in the RootCA. # Register Certificates in the rootCA.
# #
# Optional # Optional
# Default: [] # Default: []
# #
# RootCAs = [ "/mycert.cert" ] # rootCAs = [ "/mycert.cert" ]
# Entrypoints to be used by frontends that do not specify any entrypoint. # Entrypoints to be used by frontends that do not specify any entrypoint.
# Each frontend can specify its own entrypoints. # Each frontend can specify its own entrypoints.
@ -76,19 +76,19 @@ Can be provided in a format supported by [time.ParseDuration](https://golang.org
If no units are provided, the value is parsed assuming seconds. If no units are provided, the value is parsed assuming seconds.
**Note:** in this time frame no new requests are accepted. **Note:** in this time frame no new requests are accepted.
- `ProvidersThrottleDuration`: Backends throttle duration: minimum duration in seconds between 2 events from providers before applying a new configuration. - `providersThrottleDuration`: Backends throttle duration: minimum duration in seconds between 2 events from providers before applying a new configuration.
It avoids unnecessary reloads if multiples events are sent in a short amount of time. It avoids unnecessary reloads if multiples events are sent in a short amount of time.
Can be provided in a format supported by [time.ParseDuration](https://golang.org/pkg/time/#ParseDuration) or as raw values (digits). Can be provided in a format supported by [time.ParseDuration](https://golang.org/pkg/time/#ParseDuration) or as raw values (digits).
If no units are provided, the value is parsed assuming seconds. If no units are provided, the value is parsed assuming seconds.
- `MaxIdleConnsPerHost`: Controls the maximum idle (keep-alive) connections to keep per-host. - `maxIdleConnsPerHost`: Controls the maximum idle (keep-alive) connections to keep per-host.
If zero, `DefaultMaxIdleConnsPerHost` from the Go standard library net/http module is used. If zero, `DefaultMaxIdleConnsPerHost` from the Go standard library net/http module is used.
If you encounter 'too many open files' errors, you can either increase this value or change the `ulimit`. If you encounter 'too many open files' errors, you can either increase this value or change the `ulimit`.
- `InsecureSkipVerify` : If set to true invalid SSL certificates are accepted for backends. - `insecureSkipVerify` : If set to true invalid SSL certificates are accepted for backends.
**Note:** This disables detection of man-in-the-middle attacks so should only be used on secure backend networks. **Note:** This disables detection of man-in-the-middle attacks so should only be used on secure backend networks.
- `RootCAs`: Register Certificates in the RootCA. This certificates will be use for backends calls. - `rootCAs`: Register Certificates in the RootCA. This certificates will be use for backends calls.
**Note** You can use file path or cert content directly **Note** You can use file path or cert content directly
- `defaultEntryPoints`: Entrypoints to be used by frontends that do not specify any entrypoint. - `defaultEntryPoints`: Entrypoints to be used by frontends that do not specify any entrypoint.
@ -386,24 +386,24 @@ If no units are provided, the value is parsed assuming seconds.
### Idle Timeout (deprecated) ### Idle Timeout (deprecated)
Use [respondingTimeouts](/configuration/commons/#responding-timeouts) instead of `IdleTimeout`. Use [respondingTimeouts](/configuration/commons/#responding-timeouts) instead of `idleTimeout`.
In the case both settings are configured, the deprecated option will be overwritten. In the case both settings are configured, the deprecated option will be overwritten.
`IdleTimeout` is the maximum amount of time an idle (keep-alive) connection will remain idle before closing itself. `idleTimeout` is the maximum amount of time an idle (keep-alive) connection will remain idle before closing itself.
This is set to enforce closing of stale client connections. This is set to enforce closing of stale client connections.
Can be provided in a format supported by [time.ParseDuration](https://golang.org/pkg/time/#ParseDuration) or as raw values (digits). Can be provided in a format supported by [time.ParseDuration](https://golang.org/pkg/time/#ParseDuration) or as raw values (digits).
If no units are provided, the value is parsed assuming seconds. If no units are provided, the value is parsed assuming seconds.
```toml ```toml
# IdleTimeout # idleTimeout
# #
# DEPRECATED - see [respondingTimeouts] section. # DEPRECATED - see [respondingTimeouts] section.
# #
# Optional # Optional
# Default: "180s" # Default: "180s"
# #
IdleTimeout = "360s" idleTimeout = "360s"
``` ```

View file

@ -15,28 +15,28 @@ Træfik supports two backends: Jaeger and Zipkin.
# #
# Default: "jaeger" # Default: "jaeger"
# #
Backend = "jaeger" backend = "jaeger"
# Service name used in Jaeger backend # Service name used in Jaeger backend
# #
# Default: "traefik" # Default: "traefik"
# #
ServiceName = "traefik" serviceName = "traefik"
[tracing.jaeger] [tracing.jaeger]
# SamplingServerURL is the address of jaeger-agent's HTTP sampling server # Sampling Server URL is the address of jaeger-agent's HTTP sampling server
# #
# Default: "http://localhost:5778/sampling" # Default: "http://localhost:5778/sampling"
# #
SamplingServerURL = "http://localhost:5778/sampling" samplingServerURL = "http://localhost:5778/sampling"
# Sampling Type specifies the type of the sampler: const, probabilistic, rateLimiting # Sampling Type specifies the type of the sampler: const, probabilistic, rateLimiting
# #
# Default: "const" # Default: "const"
# #
SamplingType = "const" samplingType = "const"
# SamplingParam Param is a value passed to the sampler. # Sampling Param is a value passed to the sampler.
# Valid values for Param field are: # Valid values for Param field are:
# - for "const" sampler, 0 or 1 for always false/true respectively # - for "const" sampler, 0 or 1 for always false/true respectively
# - for "probabilistic" sampler, a probability between 0 and 1 # - for "probabilistic" sampler, a probability between 0 and 1
@ -44,13 +44,13 @@ Træfik supports two backends: Jaeger and Zipkin.
# #
# Default: 1.0 # Default: 1.0
# #
SamplingParam = 1.0 samplingParam = 1.0
# LocalAgentHostPort instructs reporter to send spans to jaeger-agent at this address # Local Agent Host Port instructs reporter to send spans to jaeger-agent at this address
# #
# Default: "127.0.0.1:6832" # Default: "127.0.0.1:6832"
# #
LocalAgentHostPort = "127.0.0.1:6832" localAgentHostPort = "127.0.0.1:6832"
``` ```
## Zipkin ## Zipkin
@ -62,36 +62,36 @@ Træfik supports two backends: Jaeger and Zipkin.
# #
# Default: "jaeger" # Default: "jaeger"
# #
Backend = "zipkin" backend = "zipkin"
# Service name used in Zipkin backend # Service name used in Zipkin backend
# #
# Default: "traefik" # Default: "traefik"
# #
ServiceName = "traefik" serviceName = "traefik"
[tracing.zipkin] [tracing.zipkin]
# Zipking HTTP endpoint used to send data # Zipking HTTP endpoint used to send data
# #
# Default: "http://localhost:9411/api/v1/spans" # Default: "http://localhost:9411/api/v1/spans"
# #
HTTPEndpoint = "http://localhost:9411/api/v1/spans" httpEndpoint = "http://localhost:9411/api/v1/spans"
# Enable Zipkin debug # Enable Zipkin debug
# #
# Default: false # Default: false
# #
Debug = false debug = false
# Use ZipKin SameSpan RPC style traces # Use ZipKin SameSpan RPC style traces
# #
# Default: false # Default: false
# #
SameSpan = false sameSpan = false
# Use ZipKin 128 bit root span IDs # Use ZipKin 128 bit root span IDs
# #
# Default: true # Default: true
# #
ID128Bit = true id128Bit = true
``` ```

View file

@ -77,12 +77,12 @@ TL;DR:
```shell ```shell
$ traefik \ $ traefik \
--docker \ --docker \
--docker.swarmmode \ --docker.swarmMode \
--docker.domain=mydomain.ca \ --docker.domain=mydomain.ca \
--docker.watch --docker.watch
``` ```
To enable docker and swarm-mode support, you need to add `--docker` and `--docker.swarmmode` flags. To enable docker and swarm-mode support, you need to add `--docker` and `--docker.swarmMode` flags.
To watch docker events, add `--docker.watch`. To watch docker events, add `--docker.watch`.
### Full docker-compose file ### Full docker-compose file
@ -101,11 +101,11 @@ services:
- "--acme.storage=/etc/traefik/acme/acme.json" - "--acme.storage=/etc/traefik/acme/acme.json"
- "--acme.entryPoint=https" - "--acme.entryPoint=https"
- "--acme.httpChallenge.entryPoint=http" - "--acme.httpChallenge.entryPoint=http"
- "--acme.OnHostRule=true" - "--acme.onHostRule=true"
- "--acme.onDemand=false" - "--acme.onDemand=false"
- "--acme.email=contact@mydomain.ca" - "--acme.email=contact@mydomain.ca"
- "--docker" - "--docker"
- "--docker.swarmmode" - "--docker.swarmMode"
- "--docker.domain=mydomain.ca" - "--docker.domain=mydomain.ca"
- "--docker.watch" - "--docker.watch"
volumes: volumes:
@ -211,11 +211,11 @@ services:
- "--acme.storage=traefik/acme/account" - "--acme.storage=traefik/acme/account"
- "--acme.entryPoint=https" - "--acme.entryPoint=https"
- "--acme.httpChallenge.entryPoint=http" - "--acme.httpChallenge.entryPoint=http"
- "--acme.OnHostRule=true" - "--acme.onHostRule=true"
- "--acme.onDemand=false" - "--acme.onDemand=false"
- "--acme.email=foobar@example.com" - "--acme.email=foobar@example.com"
- "--docker" - "--docker"
- "--docker.swarmmode" - "--docker.swarmMode"
- "--docker.domain=example.com" - "--docker.domain=example.com"
- "--docker.watch" - "--docker.watch"
- "--consul" - "--consul"

View file

@ -97,13 +97,13 @@ defaultEntryPoints = ["https","http"]
endpoint = "unix:///var/run/docker.sock" endpoint = "unix:///var/run/docker.sock"
domain = "my-awesome-app.org" domain = "my-awesome-app.org"
watch = true watch = true
exposedbydefault = false exposedByDefault = false
[acme] [acme]
email = "your-email-here@my-awesome-app.org" email = "your-email-here@my-awesome-app.org"
storage = "acme.json" storage = "acme.json"
entryPoint = "https" entryPoint = "https"
OnHostRule = true onHostRule = true
[acme.httpChallenge] [acme.httpChallenge]
entryPoint = "http" entryPoint = "http"
``` ```
@ -250,7 +250,7 @@ Træfik will create a frontend to listen to incoming HTTP requests which contain
- Always specify the correct port where the container expects HTTP traffic using `traefik.port` label. - Always specify the correct port where the container expects HTTP traffic using `traefik.port` label.
If a container exposes multiple ports, Træfik may forward traffic to the wrong port. If a container exposes multiple ports, Træfik may forward traffic to the wrong port.
Even if a container only exposes one port, you should always write configuration defensively and explicitly. Even if a container only exposes one port, you should always write configuration defensively and explicitly.
- Should you choose to enable the `exposedbydefault` flag in the `traefik.toml` configuration, be aware that all containers that are placed in the same network as Træfik will automatically be reachable from the outside world, for everyone and everyone to see. - Should you choose to enable the `exposedByDefault` flag in the `traefik.toml` configuration, be aware that all containers that are placed in the same network as Træfik will automatically be reachable from the outside world, for everyone and everyone to see.
Usually, this is a bad idea. Usually, this is a bad idea.
- With the `traefik.frontend.auth.basic` label, it's possible for Træfik to provide a HTTP basic-auth challenge for the endpoints you provide the label for. - With the `traefik.frontend.auth.basic` label, it's possible for Træfik to provide a HTTP basic-auth challenge for the endpoints you provide the label for.
- Træfik has built-in support to automatically export [Prometheus](https://prometheus.io) metrics - Træfik has built-in support to automatically export [Prometheus](https://prometheus.io) metrics

View file

@ -89,7 +89,7 @@ This configuration allows generating Let's Encrypt certificates (thanks to `HTTP
Træfik generates these certificates when it starts and it needs to be restart if new domains are added. Træfik generates these certificates when it starts and it needs to be restart if new domains are added.
### OnHostRule option (with HTTP challenge) ### onHostRule option (with HTTP challenge)
```toml ```toml
[entryPoints] [entryPoints]
@ -225,7 +225,7 @@ These variables are described [in this section](/configuration/acme/#provider).
More information about wildcard certificates are available [in this section](/configuration/acme/#wildcard-domain). More information about wildcard certificates are available [in this section](/configuration/acme/#wildcard-domain).
### OnHostRule option and provided certificates (with HTTP challenge) ### onHostRule option and provided certificates (with HTTP challenge)
```toml ```toml
[entryPoints] [entryPoints]
@ -358,7 +358,7 @@ defaultEntryPoints = ["http"]
users = ["test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/", "test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0"] users = ["test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/", "test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0"]
``` ```
## Override the Traefik HTTP server IdleTimeout and/or throttle configurations from re-loading too quickly ## Override the Traefik HTTP server idleTimeout and/or throttle configurations from re-loading too quickly
```toml ```toml
providersThrottleDuration = "5s" providersThrottleDuration = "5s"

View file

@ -45,7 +45,7 @@ At last, we configure our Træfik instance to use both self-signed certificates.
defaultEntryPoints = ["https"] defaultEntryPoints = ["https"]
# For secure connection on backend.local # For secure connection on backend.local
RootCAs = [ "./backend.cert" ] rootCAs = [ "./backend.cert" ]
[entryPoints] [entryPoints]
[entryPoints.https] [entryPoints.https]
@ -76,7 +76,7 @@ RootCAs = [ "./backend.cert" ]
``` ```
!!! warning !!! warning
With some backends, the server URLs use the IP, so you may need to configure `InsecureSkipVerify` instead of the `RootCAS` to activate HTTPS without hostname verification. With some backends, the server URLs use the IP, so you may need to configure `insecureSkipVerify` instead of the `rootCAS` to activate HTTPS without hostname verification.
## Conclusion ## Conclusion

View file

@ -87,7 +87,7 @@ docker-machine ssh manager "docker service create \
--network traefik-net \ --network traefik-net \
traefik \ traefik \
--docker \ --docker \
--docker.swarmmode \ --docker.swarmMode \
--docker.domain=traefik \ --docker.domain=traefik \
--docker.watch \ --docker.watch \
--api" --api"
@ -101,7 +101,7 @@ Let's explain this command:
| `--constraint=node.role==manager` | we ask docker to schedule Træfik on a manager node. | | `--constraint=node.role==manager` | we ask docker to schedule Træfik on a manager node. |
| `--mount type=bind,source=/var/run/docker.sock,target=/var/run/docker.sock` | we bind mount the docker socket where Træfik is scheduled to be able to speak to the daemon. | | `--mount type=bind,source=/var/run/docker.sock,target=/var/run/docker.sock` | we bind mount the docker socket where Træfik is scheduled to be able to speak to the daemon. |
| `--network traefik-net` | we attach the Træfik service (and thus the underlying container) to the `traefik-net` network. | | `--network traefik-net` | we attach the Træfik service (and thus the underlying container) to the `traefik-net` network. |
| `--docker` | enable docker backend, and `--docker.swarmmode` to enable the swarm mode on Træfik. | | `--docker` | enable docker backend, and `--docker.swarmMode` to enable the swarm mode on Træfik. |
| `--api | activate the webUI on port 8080 | | `--api | activate the webUI on port 8080 |

View file

@ -16,7 +16,7 @@ email = "test@traefik.io"
storage = "/etc/traefik/conf/acme.json" storage = "/etc/traefik/conf/acme.json"
entryPoint = "https" entryPoint = "https"
onDemand = false onDemand = false
OnHostRule = true onHostRule = true
caServer = "http://traefik.boulder.com:4001/directory" caServer = "http://traefik.boulder.com:4001/directory"
[acme.httpChallenge] [acme.httpChallenge]
entryPoint="http" entryPoint="http"
@ -27,6 +27,6 @@ caServer = "http://traefik.boulder.com:4001/directory"
endpoint = "unix:///var/run/docker.sock" endpoint = "unix:///var/run/docker.sock"
domain = "traefik.localhost.com" domain = "traefik.localhost.com"
watch = true watch = true
exposedbydefault = false exposedByDefault = false

View file

@ -13,7 +13,7 @@ defaultEntryPoints = ["http", "https"]
email = "test@traefik.io" email = "test@traefik.io"
storage = "traefik/acme/account" storage = "traefik/acme/account"
entryPoint = "https" entryPoint = "https"
OnHostRule = true onHostRule = true
caServer = "http://traefik.boulder.com:4001/directory" caServer = "http://traefik.boulder.com:4001/directory"
[acme.httpChallenge] [acme.httpChallenge]
entryPoint="http" entryPoint="http"
@ -25,4 +25,4 @@ entryPoint="http"
endpoint = "unix:///var/run/docker.sock" endpoint = "unix:///var/run/docker.sock"
domain = "localhost.com" domain = "localhost.com"
watch = true watch = true
exposedbydefault = false exposedByDefault = false

View file

@ -15,7 +15,7 @@ email = "test@traefik.io"
storage = "/dev/null" storage = "/dev/null"
entryPoint = "https" entryPoint = "https"
onDemand = {{.OnDemand}} onDemand = {{.OnDemand}}
OnHostRule = {{.OnHostRule}} onHostRule = {{.OnHostRule}}
caServer = "http://{{.BoulderHost}}:4001/directory" caServer = "http://{{.BoulderHost}}:4001/directory"
[acme.httpchallenge] [acme.httpchallenge]
entrypoint="http" entrypoint="http"

View file

@ -14,7 +14,7 @@ email = "test@traefik.io"
storage = "/dev/null" storage = "/dev/null"
entryPoint = "https" entryPoint = "https"
onDemand = {{.OnDemand}} onDemand = {{.OnDemand}}
OnHostRule = {{.OnHostRule}} onHostRule = {{.OnHostRule}}
caServer = "http://{{.BoulderHost}}:4001/directory" caServer = "http://{{.BoulderHost}}:4001/directory"
[acme.httpchallenge] [acme.httpchallenge]
entrypoint="http" entrypoint="http"

View file

@ -17,7 +17,7 @@ email = "test@traefik.io"
storage = "/dev/null" storage = "/dev/null"
entryPoint = "https" entryPoint = "https"
onDemand = {{.OnDemand}} onDemand = {{.OnDemand}}
OnHostRule = {{.OnHostRule}} onHostRule = {{.OnHostRule}}
caServer = "http://{{.BoulderHost}}:4001/directory" caServer = "http://{{.BoulderHost}}:4001/directory"
[acme.httpChallenge] [acme.httpChallenge]
entryPoint="http" entryPoint="http"

View file

@ -15,7 +15,7 @@ email = "test@traefik.io"
storage = "/dev/null" storage = "/dev/null"
entryPoint = "https" entryPoint = "https"
onDemand = {{.OnDemand}} onDemand = {{.OnDemand}}
OnHostRule = {{.OnHostRule}} onHostRule = {{.OnHostRule}}
caServer = "http://{{.BoulderHost}}:4001/directory" caServer = "http://{{.BoulderHost}}:4001/directory"
[acme.httpChallenge] [acme.httpChallenge]
entryPoint="http" entryPoint="http"

View file

@ -16,7 +16,7 @@ defaultEntryPoints = ["http", "https"]
email = "test@traefik.io" email = "test@traefik.io"
storage = "/dev/null" storage = "/dev/null"
entryPoint = "https" entryPoint = "https"
OnHostRule = true onHostRule = true
caServer = "http://{{.BoulderHost}}:4001/directory" caServer = "http://{{.BoulderHost}}:4001/directory"
# No challenge defined # No challenge defined

View file

@ -16,7 +16,7 @@ defaultEntryPoints = ["http", "https"]
email = "test@traefik.io" email = "test@traefik.io"
storage = "/dev/null" storage = "/dev/null"
entryPoint = "https" entryPoint = "https"
OnHostRule = true onHostRule = true
caServer = "http://wrongurl:4001/directory" caServer = "http://wrongurl:4001/directory"
[file] [file]

View file

@ -14,4 +14,4 @@ logLevel = "DEBUG"
endpoint = "{{.DockerHost}}" endpoint = "{{.DockerHost}}"
domain = "docker.localhost" domain = "docker.localhost"
exposedbydefault = true exposedByDefault = true

View file

@ -9,10 +9,10 @@ logLevel = "DEBUG"
address = ":8081" address = ":8081"
[dynamodb] [dynamodb]
AccessKeyID = "key" accessKeyID = "key"
SecretAccessKey = "secret" secretAccessKey = "secret"
Endpoint = "{{.DynamoURL}}" endpoint = "{{.DynamoURL}}"
Region = "us-east-1" region = "us-east-1"
[api] [api]
entryPoint = "api" entryPoint = "api"

View file

@ -1,6 +1,6 @@
defaultEntryPoints = ["https"] defaultEntryPoints = ["https"]
RootCAs = [ """{{ .CertContent }}""" ] rootCAs = [ """{{ .CertContent }}""" ]
[entryPoints] [entryPoints]
[entryPoints.https] [entryPoints.https]

View file

@ -1,6 +1,6 @@
defaultEntryPoints = ["https"] defaultEntryPoints = ["https"]
InsecureSkipVerify = true insecureSkipVerify = true
[entryPoints] [entryPoints]
[entryPoints.https] [entryPoints.https]

View file

@ -3,7 +3,7 @@ logLevel = "DEBUG"
defaultEntryPoints = ["http"] defaultEntryPoints = ["http"]
# Use certificate in net/internal/testcert.go # Use certificate in net/internal/testcert.go
RootCAs = [ """ rootCAs = [ """
-----BEGIN CERTIFICATE----- -----BEGIN CERTIFICATE-----
MIICEzCCAXygAwIBAgIQMIMChMLGrR+QvmQvpwAU6zANBgkqhkiG9w0BAQsFADAS MIICEzCCAXygAwIBAgIQMIMChMLGrR+QvmQvpwAU6zANBgkqhkiG9w0BAQsFADAS
MRAwDgYDVQQKEwdBY21lIENvMCAXDTcwMDEwMTAwMDAwMFoYDzIwODQwMTI5MTYw MRAwDgYDVQQKEwdBY21lIENvMCAXDTcwMDEwMTAwMDAwMFoYDzIwODQwMTI5MTYw

View file

@ -3,7 +3,7 @@ logLevel = "DEBUG"
defaultEntryPoints = ["http"] defaultEntryPoints = ["http"]
# Use certificate in net/internal/testcert.go # Use certificate in net/internal/testcert.go
RootCAs = [ "fixtures/https/rootcas/local.crt"] rootCAs = [ "fixtures/https/rootcas/local.crt"]
[entryPoints] [entryPoints]
[entryPoints.http] [entryPoints.http]

View file

@ -11,7 +11,7 @@ debug=true
[docker] [docker]
endpoint = "unix:///var/run/docker.sock" endpoint = "unix:///var/run/docker.sock"
watch = true watch = true
exposedbydefault = false exposedByDefault = false
[file] [file]
[frontends] [frontends]

View file

@ -15,7 +15,7 @@ email = "test@traefik.io"
storage = "/dev/null" storage = "/dev/null"
entryPoint = "https" entryPoint = "https"
onDemand = {{.OnDemand}} onDemand = {{.OnDemand}}
OnHostRule = {{.OnHostRule}} onHostRule = {{.OnHostRule}}
caServer = "http://{{.BoulderHost}}:4001/directory" caServer = "http://{{.BoulderHost}}:4001/directory"
[acme.httpChallenge] [acme.httpChallenge]
entryPoint="http" entryPoint="http"

View file

@ -15,7 +15,7 @@ email = "test@traefik.io"
storage = "/dev/null" storage = "/dev/null"
entryPoint = "https" entryPoint = "https"
onDemand = false onDemand = false
OnHostRule = false onHostRule = false
caServer = "http://{{.BoulderHost}}:4001/directory" caServer = "http://{{.BoulderHost}}:4001/directory"
[acme.httpChallenge] [acme.httpChallenge]
entryPoint="http" entryPoint="http"

View file

@ -15,7 +15,7 @@ email = "test@traefik.io"
storage = "/dev/null" storage = "/dev/null"
entryPoint = "https" entryPoint = "https"
onDemand = {{.OnDemand}} onDemand = {{.OnDemand}}
OnHostRule = {{.OnHostRule}} onHostRule = {{.OnHostRule}}
caServer = "http://{{.BoulderHost}}:4001/directory" caServer = "http://{{.BoulderHost}}:4001/directory"
[acme.httpChallenge] [acme.httpChallenge]
entryPoint="http" entryPoint="http"

View file

@ -13,11 +13,11 @@ debug = true
backend = "{{.TracingBackend}}" backend = "{{.TracingBackend}}"
servicename = "tracing" servicename = "tracing"
[tracing.zipkin] [tracing.zipkin]
HTTPEndpoint = "http://{{.ZipkinIP}}:9411/api/v1/spans" httpEndpoint = "http://{{.ZipkinIP}}:9411/api/v1/spans"
debug = true debug = true
[tracing.jaeger] [tracing.jaeger]
SamplingType = "const" samplingType = "const"
SamplingParam = 1.0 samplingParam = 1.0
[retry] [retry]
attempts = 3 attempts = 3
[file] [file]

View file

@ -1,7 +1,7 @@
defaultEntryPoints = ["wss"] defaultEntryPoints = ["wss"]
logLevel = "DEBUG" logLevel = "DEBUG"
InsecureSkipVerify=true insecureSkipVerify=true
[entryPoints] [entryPoints]
[entryPoints.wss] [entryPoints.wss]

View file

@ -151,4 +151,4 @@
# Optional # Optional
# Default: true # Default: true
# #
# exposedbydefault = true # exposedByDefault = true