From e0c529855e8428f00815ade8be37c6b9532a42c3 Mon Sep 17 00:00:00 2001 From: Thomas Date: Mon, 11 Nov 2019 12:38:27 +1300 Subject: [PATCH] Updated the docker image that is used to the fork (#62) Updated the docker image that is used to the fork for people like me who just copy paste the big code blocks without reading :> --- manuscript/ha-docker-swarm/traefik-forward-auth.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/manuscript/ha-docker-swarm/traefik-forward-auth.md b/manuscript/ha-docker-swarm/traefik-forward-auth.md index db69b3f..10f7ef6 100644 --- a/manuscript/ha-docker-swarm/traefik-forward-auth.md +++ b/manuscript/ha-docker-swarm/traefik-forward-auth.md @@ -52,7 +52,7 @@ This is a small container, you can simply add the following content to the exist ``` traefik-forward-auth: - image: thomseddon/traefik-forward-auth + image: funkypenguin/traefik-forward-auth env_file: /var/data/config/traefik/traefik-forward-auth.env networks: - traefik_public @@ -113,4 +113,4 @@ What have we achieved? By adding an additional three simple labels to any servic 1. Traefik forward auth replaces the use of [oauth_proxy containers](/reference/oauth_proxy/) found in some of the existing recipes 2. [@thomaseddon's original version](https://github.com/thomseddon/traefik-forward-auth) of traefik-forward-auth only works with Google currently, but I've created a [fork](https://www.github.com/funkypenguin/traefik-forward-auth) of a [fork](https://github.com/noelcatt/traefik-forward-auth), which implements generic OIDC providers. 3. I reviewed several implementations of forward authenticators for Traefik, but found most to be rather heavy-handed, or specific to a single auth provider. @thomaseddon's go-based docker image is 7MB in size, and with the generic OIDC patch (above), it can be extended to work with any OIDC provider. -4. No, not github natively, but you can ferderate GitHub into KeyCloak, and then use KeyCloak as the OIDC provider. \ No newline at end of file +4. No, not github natively, but you can ferderate GitHub into KeyCloak, and then use KeyCloak as the OIDC provider.