schema
stringclasses
471 values
key
stringlengths
0
203
description
stringlengths
0
4.37k
object
stringlengths
2
322k
traefik-v2-file-provider.json
httpMirroringService
The mirroring is able to mirror requests sent to a service to other services. Please note that by default the whole request is buffered in memory while it is being mirrored. See the maxBodySize option for how to modify this behaviour.
{"type": "object", "properties": {"service": {"type": "string"}, "maxBodySize": {"type": "integer", "default": -1}, "mirrors": {"type": "array", "items": {"type": "object", "properties": {"name": {"type": "string"}, "percent": {"type": "number", "minimum": 0, "maximum": 100}}}}, "healthCheck": {"type": "object"}}, "additionalProperties": false}
traefik-v2-file-provider.json
maxBodySize
maxBodySize is the maximum size allowed for the body of the request. If the body is larger, the request is not mirrored. Default value is -1, which means unlimited size.
{"type": "integer", "default": -1}
traefik-v2-file-provider.json
httpService
The Services are responsible for configuring how to reach the actual services that will eventually handle the incoming requests.
{"type": "object", "oneOf": [{"properties": {"loadBalancer": {}}, "additionalProperties": false}, {"properties": {"weighted": {}}, "additionalProperties": false}, {"properties": {"mirroring": {}}, "additionalProperties": false}, {"properties": {"failover": {}}, "additionalProperties": false}]}
traefik-v2-file-provider.json
addPrefixMiddleware
The AddPrefix middleware updates the URL Path of the request before forwarding it.
{"type": "object", "properties": {"prefix": {"type": "string"}}, "additionalProperties": false}
traefik-v2-file-provider.json
prefix
prefix is the string to add before the current path in the requested URL. It should include the leading slash (/).
{"type": "string"}
traefik-v2-file-provider.json
basicAuthMiddleware
The BasicAuth middleware is a quick way to restrict access to your services to known users. If both users and usersFile are provided, the two are merged. The contents of usersFile have precedence over the values in users.
{"type": "object", "properties": {"users": {"type": "array", "items": {"type": "string"}}, "usersFile": {"type": "string"}, "realm": {"type": "string", "default": "traefik"}, "headerField": {"type": "string"}, "removeHeader": {"type": "boolean", "default": false}}}
traefik-v2-file-provider.json
users
The users option is an array of authorized users. Each user will be declared using the `name:hashed-password` format.
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
usersFile
The usersFile option is the path to an external file that contains the authorized users for the middleware. The file content is a list of `name:hashed-password`.
{"type": "string"}
traefik-v2-file-provider.json
realm
You can customize the realm for the authentication with the realm option. The default value is traefik.
{"type": "string", "default": "traefik"}
traefik-v2-file-provider.json
headerField
You can define a header field to store the authenticated user using the headerField option.
{"type": "string"}
traefik-v2-file-provider.json
removeHeader
Set the removeHeader option to true to remove the authorization header before forwarding the request to your service. (Default value is false.)
{"type": "boolean", "default": false}
traefik-v2-file-provider.json
bufferingMiddleware
The Buffering middleware gives you control on how you want to read the requests before sending them to services. With Buffering, Traefik reads the entire request into memory (possibly buffering large requests into disk), and rejects requests that are over a specified limit. This can help services deal with large data (multipart/form-data for example), and can minimize time spent sending data to a service.
{"type": "object", "properties": {"maxRequestBodyBytes": {"type": "integer"}, "memRequestBodyBytes": {"type": "integer"}, "maxResponseBodyBytes": {"type": "integer"}, "memResponseBodyBytes": {"type": "integer"}, "retryExpression": {"type": "string"}}, "additionalProperties": false}
traefik-v2-file-provider.json
maxRequestBodyBytes
With the maxRequestBodyBytes option, you can configure the maximum allowed body size for the request (in Bytes). If the request exceeds the allowed size, it is not forwarded to the service and the client gets a 413 (Request Entity Too Large) response.
{"type": "integer"}
traefik-v2-file-provider.json
memRequestBodyBytes
You can configure a threshold (in Bytes) from which the request will be buffered on disk instead of in memory with the memRequestBodyBytes option.
{"type": "integer"}
traefik-v2-file-provider.json
maxResponseBodyBytes
With the maxResponseBodyBytes option, you can configure the maximum allowed response size from the service (in Bytes). If the response exceeds the allowed size, it is not forwarded to the client. The client gets a 413 (Request Entity Too Large) response instead.
{"type": "integer"}
traefik-v2-file-provider.json
memResponseBodyBytes
You can configure a threshold (in Bytes) from which the response will be buffered on disk instead of in memory with the memResponseBodyBytes option.
{"type": "integer"}
traefik-v2-file-provider.json
retryExpression
You can have the Buffering middleware replay the request with the help of the retryExpression option.
{"type": "string"}
traefik-v2-file-provider.json
chainMiddleware
The Chain middleware enables you to define reusable combinations of other pieces of middleware. It makes reusing the same groups easier.
{"type": "object", "properties": {"middlewares": {"type": "array", "minItems": 1, "items": {"type": "string"}}}, "additionalProperties": false}
traefik-v2-file-provider.json
circuitBreakerMiddleware
The circuit breaker protects your system from stacking requests to unhealthy services (resulting in cascading failures). When your system is healthy, the circuit is closed (normal operations). When your system becomes unhealthy, the circuit becomes open and the requests are no longer forwarded (but handled by a fallback mechanism). To assess if your system is healthy, the circuit breaker constantly monitors the services.
{"type": "object", "properties": {"expression": {"type": "string"}, "checkPeriod": {"type": "string"}, "fallbackDuration": {"type": "string"}, "recoveryDuration": {"type": "string"}}, "additionalProperties": false}
traefik-v2-file-provider.json
expression
You can specify an expression that, once matched, will trigger the circuit breaker (and apply the fallback mechanism instead of calling your services).
{"type": "string"}
traefik-v2-file-provider.json
checkPeriod
The interval between successive checks of the circuit breaker condition (when in standby state)
{"type": "string"}
traefik-v2-file-provider.json
fallbackDuration
The duration for which the circuit breaker will wait before trying to recover (from a tripped state).
{"type": "string"}
traefik-v2-file-provider.json
recoveryDuration
The duration for which the circuit breaker will try to recover (as soon as it is in recovering state).
{"type": "string"}
traefik-v2-file-provider.json
compressMiddleware
The Compress middleware enables the gzip compression.
{"type": "object", "properties": {"excludedContentTypes": {"type": "array", "items": {"type": "string"}}, "minResponseBodyBytes": {"type": "integer"}}, "additionalProperties": false}
traefik-v2-file-provider.json
excludedContentTypes
excludedContentTypes specifies a list of content types to compare the Content-Type header of the incoming requests to before compressing. The requests with content types defined in excludedContentTypes are not compressed. Content types are compared in a case-insensitive, whitespace-ignored manner.
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
minResponseBodyBytes
specifies the minimum amount of bytes a response body must have to be compressed.
{"type": "integer"}
traefik-v2-file-provider.json
contentTypeMiddleware
The Content-Type middleware - or rather its unique autoDetect option - specifies whether to let the Content-Type header, if it has not been set by the backend, be automatically set to a value derived from the contents of the response. As a proxy, the default behavior should be to leave the header alone, regardless of what the backend did with it. However, the historic default was to always auto-detect and set the header if it was nil, and it is going to be kept that way in order to support users currently relying on it. This middleware exists to enable the correct behavior until at least the default one can be changed in a future version.
{"type": "object", "properties": {"autoDetect": {"type": "boolean", "default": false}}, "additionalProperties": false}
traefik-v2-file-provider.json
autoDetect
autoDetect specifies whether to let the Content-Type header, if it has not been set by the backend, be automatically set to a value derived from the contents of the response.
{"type": "boolean", "default": false}
traefik-v2-file-provider.json
digestAuthMiddleware
The DigestAuth middleware is a quick way to restrict access to your services to known users. If both users and usersFile are provided, the two are merged. The contents of usersFile have precedence over the values in users.
{"type": "object", "properties": {"users": {"type": "array", "items": {"type": "string"}}, "usersFile": {"type": "string"}, "realm": {"type": "string", "default": "traefik"}, "headerField": {"type": "string"}, "removeHeader": {"type": "boolean", "default": false}}, "additionalProperties": false}
traefik-v2-file-provider.json
users
The users option is an array of authorized users. Each user will be declared using the `name:realm:encoded-password` format.
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
usersFile
The usersFile option is the path to an external file that contains the authorized users for the middleware. The file content is a list of `name:realm:encoded-password`.
{"type": "string"}
traefik-v2-file-provider.json
realm
You can customize the realm for the authentication with the realm option. The default value is traefik.
{"type": "string", "default": "traefik"}
traefik-v2-file-provider.json
headerField
You can customize the header field for the authenticated user using the headerField option.
{"type": "string"}
traefik-v2-file-provider.json
removeHeader
Set the removeHeader option to true to remove the authorization header before forwarding the request to your service. (Default value is false.)
{"type": "boolean", "default": false}
traefik-v2-file-provider.json
errorsMiddleware
The ErrorPage middleware returns a custom page in lieu of the default, according to configured ranges of HTTP Status codes. The error page itself is not hosted by Traefik.
{"type": "object", "properties": {"status": {"type": "array", "items": {"type": "string"}}, "service": {"type": "string"}, "query": {"type": "string"}}, "additionalProperties": false}
traefik-v2-file-provider.json
status
The status that will trigger the error page. The status code ranges are inclusive (500-599 will trigger with every code between 500 and 599, 500 and 599 included). You can define either a status code like 500 or ranges with a syntax like 500-599.
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
service
The service that will serve the new requested error page.
{"type": "string"}
traefik-v2-file-provider.json
query
The URL for the error page (hosted by service). You can use {status} in the query, that will be replaced by the received status code.
{"type": "string"}
traefik-v2-file-provider.json
forwardAuthMiddleware
The ForwardAuth middleware delegate the authentication to an external service. If the service response code is 2XX, access is granted and the original request is performed. Otherwise, the response from the authentication server is returned.
{"type": "object", "properties": {"address": {"type": "string"}, "tls": {"type": "object", "properties": {"ca": {"type": "string"}, "caOptional": {"type": "boolean"}, "cert": {"type": "string"}, "key": {"type": "string"}, "insecureSkipVerify": {"type": "boolean"}}, "dependencies": {"caOptional": ["ca"]}}, "trustForwardHeader": {"type": "boolean"}, "authResponseHeaders": {"type": "array", "items": {"type": "string"}}, "authResponseHeadersRegex": {"type": "string"}, "authRequestHeaders": {"type": "array", "items": {"type": "string"}}}, "additionalProperties": false}
traefik-v2-file-provider.json
address
The address option defines the authentication server address.
{"type": "string"}
traefik-v2-file-provider.json
tls
The tls option is the TLS configuration from Traefik to the authentication server.
{"type": "object", "properties": {"ca": {"type": "string"}, "caOptional": {"type": "boolean"}, "cert": {"type": "string"}, "key": {"type": "string"}, "insecureSkipVerify": {"type": "boolean"}}, "dependencies": {"caOptional": ["ca"]}}
traefik-v2-file-provider.json
ca
Certificate Authority used for the secured connection to the authentication server.
{"type": "string"}
traefik-v2-file-provider.json
caOptional
Policy used for the secured connection with TLS Client Authentication to the authentication server. Requires tls.ca to be defined.
{"type": "boolean"}
traefik-v2-file-provider.json
cert
Public certificate used for the secured connection to the authentication server.
{"type": "string"}
traefik-v2-file-provider.json
key
Private certificate used for the secure connection to the authentication server.
{"type": "string"}
traefik-v2-file-provider.json
insecureSkipVerify
If insecureSkipVerify is true, TLS for the connection to authentication server accepts any certificate presented by the server and any host name in that certificate.
{"type": "boolean"}
traefik-v2-file-provider.json
trustForwardHeader
Set the trustForwardHeader option to true to trust all the existing X-Forwarded-* headers.
{"type": "boolean"}
traefik-v2-file-provider.json
authResponseHeaders
The authResponseHeaders option is the list of the headers to copy from the authentication server to the request.
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
authResponseHeadersRegex
The authResponseHeadersRegex option is the regex to match headers to copy from the authentication server response and set on forwarded request, after stripping all headers that match the regex.
{"type": "string"}
traefik-v2-file-provider.json
authRequestHeaders
The authRequestHeaders option is the list of the headers to copy from the request to the authentication server.
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
headersMiddleware
The Headers middleware can manage the requests/responses headers.
{"type": "object", "properties": {"customRequestHeaders": {"type": "object", "additionalProperties": {"type": "string"}}, "customResponseHeaders": {"type": "object", "additionalProperties": {"type": "string"}}, "accessControlAllowCredentials": {"type": "boolean"}, "accessControlAllowHeaders": {"type": "array", "items": {"type": "string"}}, "accessControlAllowMethods": {"type": "array", "items": {"type": "string"}}, "accessControlAllowOriginList": {"type": "array", "items": {"type": "string"}}, "accessControlAllowOriginListRegex": {"type": "array", "items": {"type": "string"}}, "accessControlExposeHeaders": {"type": "array", "items": {"type": "string"}}, "accessControlMaxAge": {"type": "integer"}, "addVaryHeader": {"type": "boolean"}, "allowedHosts": {"type": "array", "items": {"type": "string"}}, "hostsProxyHeaders": {"type": "array", "items": {"type": "string"}}, "sslRedirect": {"type": "boolean"}, "sslTemporaryRedirect": {"type": "boolean"}, "sslHost": {"type": "string"}, "sslProxyHeaders": {"type": "object", "additionalProperties": {"type": "string"}}, "sslForceHost": {"type": "boolean"}, "stsSeconds": {"type": "integer"}, "stsIncludeSubdomains": {"type": "boolean"}, "stsPreload": {"type": "boolean"}, "forceSTSHeader": {"type": "boolean"}, "frameDeny": {"type": "boolean"}, "customFrameOptionsValue": {"type": "string"}, "contentTypeNosniff": {"type": "boolean"}, "browserXssFilter": {"type": "boolean"}, "customBrowserXSSValue": {"type": "string"}, "contentSecurityPolicy": {"type": "string"}, "publicKey": {"type": "string"}, "referrerPolicy": {"type": "string"}, "featurePolicy": {"type": "string"}, "permissionsPolicy": {"type": "string"}, "isDevelopment": {"type": "boolean"}}, "additionalProperties": false}
traefik-v2-file-provider.json
customRequestHeaders
The customRequestHeaders option lists the Header names and values to apply to the request.
{"type": "object", "additionalProperties": {"type": "string"}}
traefik-v2-file-provider.json
customResponseHeaders
The customResponseHeaders option lists the Header names and values to apply to the response.
{"type": "object", "additionalProperties": {"type": "string"}}
traefik-v2-file-provider.json
accessControlAllowCredentials
The accessControlAllowCredentials indicates whether the request can include user credentials.
{"type": "boolean"}
traefik-v2-file-provider.json
accessControlAllowHeaders
The accessControlAllowHeaders indicates which header field names can be used as part of the request.
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
accessControlAllowMethods
The accessControlAllowMethods indicates which methods can be used during requests.
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
accessControlAllowOriginList
The accessControlAllowOriginList indicates whether a resource can be shared by returning different values. A wildcard origin * can also be configured, and will match all requests. If this value is set by a backend server, it will be overwritten by Traefik This value can contain a list of allowed origins.
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
accessControlAllowOriginListRegex
The accessControlAllowOriginListRegex option is the counterpart of the accessControlAllowOriginList option with regular expressions instead of origin values.
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
accessControlExposeHeaders
The accessControlExposeHeaders indicates which headers are safe to expose to the api of a CORS API specification.
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
accessControlMaxAge
The accessControlMaxAge indicates how long (in seconds) a preflight request can be cached.
{"type": "integer"}
traefik-v2-file-provider.json
addVaryHeader
The addVaryHeader is used in conjunction with accessControlAllowOriginList to determine whether the vary header should be added or modified to demonstrate that server responses can differ based on the value of the origin header.
{"type": "boolean"}
traefik-v2-file-provider.json
allowedHosts
The allowedHosts option lists fully qualified domain names that are allowed.
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
hostsProxyHeaders
The hostsProxyHeaders option is a set of header keys that may hold a proxied hostname value for the request.
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
sslRedirect
The sslRedirect is set to true, then only allow https requests.
{"type": "boolean"}
traefik-v2-file-provider.json
sslTemporaryRedirect
Set the sslTemporaryRedirect to true to force an SSL redirection using a 302 (instead of a 301).
{"type": "boolean"}
traefik-v2-file-provider.json
sslHost
The sslHost option is the host name that is used to redirect http requests to https.
{"type": "string"}
traefik-v2-file-provider.json
sslProxyHeaders
The sslProxyHeaders option is set of header keys with associated values that would indicate a valid https request. Useful when using other proxies with header like: "X-Forwarded-Proto": "https".
{"type": "object", "additionalProperties": {"type": "string"}}
traefik-v2-file-provider.json
sslForceHost
Set sslForceHost to true and set SSLHost to forced requests to use SSLHost even the ones that are already using SSL.
{"type": "boolean"}
traefik-v2-file-provider.json
stsSeconds
The stsSeconds is the max-age of the Strict-Transport-Security header. If set to 0, would NOT include the header.
{"type": "integer"}
traefik-v2-file-provider.json
stsIncludeSubdomains
The stsIncludeSubdomains is set to true, the includeSubDomains directive will be appended to the Strict-Transport-Security header.
{"type": "boolean"}
traefik-v2-file-provider.json
stsPreload
Set stsPreload to true to have the preload flag appended to the Strict-Transport-Security header.
{"type": "boolean"}
traefik-v2-file-provider.json
forceSTSHeader
Set forceSTSHeader to true, to add the STS header even when the connection is HTTP.
{"type": "boolean"}
traefik-v2-file-provider.json
frameDeny
Set frameDeny to true to add the X-Frame-Options header with the value of DENY.
{"type": "boolean"}
traefik-v2-file-provider.json
customFrameOptionsValue
The customFrameOptionsValue allows the X-Frame-Options header value to be set with a custom value. This overrides the FrameDeny option.
{"type": "string"}
traefik-v2-file-provider.json
contentTypeNosniff
Set contentTypeNosniff to true to add the X-Content-Type-Options header with the value nosniff.
{"type": "boolean"}
traefik-v2-file-provider.json
browserXssFilter
Set browserXssFilter to true to add the X-XSS-Protection header with the value 1; mode=block.
{"type": "boolean"}
traefik-v2-file-provider.json
customBrowserXSSValue
The customBrowserXssValue option allows the X-XSS-Protection header value to be set with a custom value. This overrides the BrowserXssFilter option.
{"type": "string"}
traefik-v2-file-provider.json
contentSecurityPolicy
The contentSecurityPolicy option allows the Content-Security-Policy header value to be set with a custom value.
{"type": "string"}
traefik-v2-file-provider.json
publicKey
The publicKey implements HPKP to prevent MITM attacks with forged certificates.
{"type": "string"}
traefik-v2-file-provider.json
referrerPolicy
The referrerPolicy allows sites to control when browsers will pass the Referer header to other sites.
{"type": "string"}
traefik-v2-file-provider.json
featurePolicy
The featurePolicy allows sites to control browser features.
{"type": "string"}
traefik-v2-file-provider.json
permissionsPolicy
The permissionsPolicy allows sites to control browser features.
{"type": "string"}
traefik-v2-file-provider.json
isDevelopment
Set isDevelopment to true when developing. The AllowedHosts, SSL, and STS options can cause some unwanted effects. Usually testing happens on http, not https, and on localhost, not your production domain. If you would like your development environment to mimic production with complete Host blocking, SSL redirects, and STS headers, leave this as false.
{"type": "boolean"}
traefik-v2-file-provider.json
ipStrategy
The ipStrategy option defines parameters that set how Traefik will determine the client IP.
{"type": "object", "properties": {"depth": {"type": "integer"}, "excludedIPs": {"type": "array", "items": {"type": "string"}}}, "additionalProperties": false}
traefik-v2-file-provider.json
depth
The depth option tells Traefik to use the X-Forwarded-For header and take the IP located at the depth position (starting from the right). If depth is greater than the total number of IPs in X-Forwarded-For, then the client IP will be empty. depth is ignored if its value is lesser than or equal to 0.
{"type": "integer"}
traefik-v2-file-provider.json
excludedIPs
excludedIPs tells Traefik to scan the X-Forwarded-For header and pick the first IP not in the list. If depth is specified, excludedIPs is ignored.
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
ipWhiteListMiddleware
IPWhitelist accepts / refuses requests based on the client IP.
{"type": "object", "properties": {"sourceRange": {"type": "array", "items": {"type": "string"}}, "ipStrategy": {}}, "additionalProperties": false}
traefik-v2-file-provider.json
sourceRange
The sourceRange option sets the allowed IPs (or ranges of allowed IPs by using CIDR notation).
{"type": "array", "items": {"type": "string"}}
traefik-v2-file-provider.json
sourceCriterion
SourceCriterion defines what criterion is used to group requests as originating from a common source. The precedence order is ipStrategy, then requestHeaderName, then requestHost. If none are set, the default is to use the requestHost.
{"type": "object", "properties": {"ipStrategy": {}, "requestHeaderName": {"type": "string"}, "requestHost": {"type": "boolean"}}, "additionalProperties": false}
traefik-v2-file-provider.json
requestHeaderName
Requests having the same value for the given header are grouped as coming from the same source.
{"type": "string"}
traefik-v2-file-provider.json
requestHost
Whether to consider the request host as the source.
{"type": "boolean"}
traefik-v2-file-provider.json
inFlightReqMiddleware
To proactively prevent services from being overwhelmed with high load, a limit on the number of simultaneous in-flight requests can be applied.
{"type": "object", "properties": {"amount": {"type": "integer"}, "sourceCriterion": {}}, "additionalProperties": false}
traefik-v2-file-provider.json
amount
The amount option defines the maximum amount of allowed simultaneous in-flight request. The middleware will return an HTTP 429 Too Many Requests if there are already amount requests in progress (based on the same sourceCriterion strategy).
{"type": "integer"}
traefik-v2-file-provider.json
passTLSClientCertMiddleware
PassTLSClientCert adds in header the selected data from the passed client tls certificate.
{"type": "object", "properties": {"pem": {"type": "boolean"}, "info": {"type": "object", "properties": {"notAfter": {"type": "boolean"}, "notBefore": {"type": "boolean"}, "sans": {"type": "boolean"}, "subject": {"type": "object", "properties": {"country": {"type": "boolean"}, "province": {"type": "boolean"}, "locality": {"type": "boolean"}, "organization": {"type": "boolean"}, "commonName": {"type": "boolean"}, "serialNumber": {"type": "boolean"}, "domainComponent": {"type": "boolean"}}}, "issuer": {"type": "object", "properties": {"country": {"type": "boolean"}, "province": {"type": "boolean"}, "locality": {"type": "boolean"}, "organization": {"type": "boolean"}, "commonName": {"type": "boolean"}, "serialNumber": {"type": "boolean"}, "domainComponent": {"type": "boolean"}}}}}}, "additionalProperties": false}
traefik-v2-file-provider.json
pem
The pem option sets the X-Forwarded-Tls-Client-Cert header with the escape certificate.
{"type": "boolean"}
traefik-v2-file-provider.json
info
The info option select the specific client certificate details you want to add to the X-Forwarded-Tls-Client-Cert-Info header. The value of the header will be an escaped concatenation of all the selected certificate details.
{"type": "object", "properties": {"notAfter": {"type": "boolean"}, "notBefore": {"type": "boolean"}, "sans": {"type": "boolean"}, "subject": {"type": "object", "properties": {"country": {"type": "boolean"}, "province": {"type": "boolean"}, "locality": {"type": "boolean"}, "organization": {"type": "boolean"}, "commonName": {"type": "boolean"}, "serialNumber": {"type": "boolean"}, "domainComponent": {"type": "boolean"}}}, "issuer": {"type": "object", "properties": {"country": {"type": "boolean"}, "province": {"type": "boolean"}, "locality": {"type": "boolean"}, "organization": {"type": "boolean"}, "commonName": {"type": "boolean"}, "serialNumber": {"type": "boolean"}, "domainComponent": {"type": "boolean"}}}}}
traefik-v2-file-provider.json
notAfter
Set the notAfter option to true to add the Not After information from the Validity part.
{"type": "boolean"}
traefik-v2-file-provider.json
notBefore
Set the notBefore option to true to add the Not Before information from the Validity part.
{"type": "boolean"}
traefik-v2-file-provider.json
sans
Set the sans option to true to add the Subject Alternative Name information from the Subject Alternative Name part.
{"type": "boolean"}
traefik-v2-file-provider.json
subject
The subject select the specific client certificate subject details you want to add to the X-Forwarded-Tls-Client-Cert-Info header.
{"type": "object", "properties": {"country": {"type": "boolean"}, "province": {"type": "boolean"}, "locality": {"type": "boolean"}, "organization": {"type": "boolean"}, "commonName": {"type": "boolean"}, "serialNumber": {"type": "boolean"}, "domainComponent": {"type": "boolean"}}}