docs: fix ip addresses (#4843)
Co-authored-by: James Elliott <james-d-elliott@users.noreply.github.com>pull/4842/head^2
parent
50f0520abe
commit
b3b24f4479
|
@ -59,7 +59,7 @@ In the example we have a commented `trusted_proxies` directive which shows an ex
|
||||||
to the trusted proxy list in [Caddy]:
|
to the trusted proxy list in [Caddy]:
|
||||||
|
|
||||||
* 10.0.0.0/8
|
* 10.0.0.0/8
|
||||||
* 172.16.0.0/16
|
* 172.16.0.0/12
|
||||||
* 192.168.0.0/16
|
* 192.168.0.0/16
|
||||||
* fc00::/7
|
* fc00::/7
|
||||||
|
|
||||||
|
@ -84,7 +84,7 @@ support to ensure the basic example covers your use case in a secure way.
|
||||||
## https://www.authelia.com/integration/proxies/caddy/#forwarded-header-trust#trusted-proxies
|
## https://www.authelia.com/integration/proxies/caddy/#forwarded-header-trust#trusted-proxies
|
||||||
(trusted_proxy_list) {
|
(trusted_proxy_list) {
|
||||||
## Uncomment & adjust the following line to configure specific ranges which should be considered as trustworthy.
|
## Uncomment & adjust the following line to configure specific ranges which should be considered as trustworthy.
|
||||||
# trusted_proxies 10.0.0.0/8 172.16.0.0/16 192.168.0.0/16 fc00::/7
|
# trusted_proxies 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 fc00::/7
|
||||||
}
|
}
|
||||||
|
|
||||||
# Authelia Portal.
|
# Authelia Portal.
|
||||||
|
@ -123,7 +123,7 @@ nextcloud.example.com {
|
||||||
## https://www.authelia.com/integration/proxies/caddy/#forwarded-header-trust#trusted-proxies
|
## https://www.authelia.com/integration/proxies/caddy/#forwarded-header-trust#trusted-proxies
|
||||||
(trusted_proxy_list) {
|
(trusted_proxy_list) {
|
||||||
## Uncomment & adjust the following line to configure specific ranges which should be considered as trustworthy.
|
## Uncomment & adjust the following line to configure specific ranges which should be considered as trustworthy.
|
||||||
# trusted_proxies 10.0.0.0/8 172.16.0.0/16 192.168.0.0/16 fc00::/7
|
# trusted_proxies 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 fc00::/7
|
||||||
}
|
}
|
||||||
|
|
||||||
example.com {
|
example.com {
|
||||||
|
@ -168,7 +168,7 @@ preferred in *most* situations. If you are unsure of what you're doing please do
|
||||||
## https://www.authelia.com/integration/proxies/caddy/#forwarded-header-trust#trusted-proxies
|
## https://www.authelia.com/integration/proxies/caddy/#forwarded-header-trust#trusted-proxies
|
||||||
(trusted_proxy_list) {
|
(trusted_proxy_list) {
|
||||||
## Uncomment & adjust the following line to configure specific ranges which should be considered as trustworthy.
|
## Uncomment & adjust the following line to configure specific ranges which should be considered as trustworthy.
|
||||||
# trusted_proxies 10.0.0.0/8 172.16.0.0/16 192.168.0.0/16 fc00::/7
|
# trusted_proxies 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 fc00::/7
|
||||||
}
|
}
|
||||||
|
|
||||||
# Authelia Portal.
|
# Authelia Portal.
|
||||||
|
|
|
@ -62,7 +62,7 @@ line in the main configuration which shows an example of not trusting any proxie
|
||||||
the following networks to the trusted proxy list in [HAProxy]:
|
the following networks to the trusted proxy list in [HAProxy]:
|
||||||
|
|
||||||
* 10.0.0.0/8
|
* 10.0.0.0/8
|
||||||
* 172.16.0.0/16
|
* 172.16.0.0/12
|
||||||
* 192.168.0.0/16
|
* 192.168.0.0/16
|
||||||
* fc00::/7
|
* fc00::/7
|
||||||
|
|
||||||
|
|
|
@ -55,7 +55,7 @@ In the example we have four commented lines which configure `trustedIPs` which s
|
||||||
networks to the trusted proxy list in [Traefik]:
|
networks to the trusted proxy list in [Traefik]:
|
||||||
|
|
||||||
* 10.0.0.0/8
|
* 10.0.0.0/8
|
||||||
* 172.16.0.0/16
|
* 172.16.0.0/12
|
||||||
* 192.168.0.0/16
|
* 192.168.0.0/16
|
||||||
* fc00::/7
|
* fc00::/7
|
||||||
|
|
||||||
|
@ -109,15 +109,15 @@ services:
|
||||||
- '--entryPoints.http.http.redirections.entryPoint.to=https'
|
- '--entryPoints.http.http.redirections.entryPoint.to=https'
|
||||||
- '--entryPoints.http.http.redirections.entryPoint.scheme=https'
|
- '--entryPoints.http.http.redirections.entryPoint.scheme=https'
|
||||||
## Please see the Forwarded Header Trust section of the Authelia Traefik Integration documentation.
|
## Please see the Forwarded Header Trust section of the Authelia Traefik Integration documentation.
|
||||||
# - '--entryPoints.http.forwardedHeaders.trustedIPs=10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7'
|
# - '--entryPoints.http.forwardedHeaders.trustedIPs=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7'
|
||||||
# - '--entryPoints.http.proxyProtocol.trustedIPs=10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7'
|
# - '--entryPoints.http.proxyProtocol.trustedIPs=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7'
|
||||||
- '--entryPoints.http.forwardedHeaders.insecure=false'
|
- '--entryPoints.http.forwardedHeaders.insecure=false'
|
||||||
- '--entryPoints.http.proxyProtocol.insecure=false'
|
- '--entryPoints.http.proxyProtocol.insecure=false'
|
||||||
- '--entryPoints.https=true'
|
- '--entryPoints.https=true'
|
||||||
- '--entryPoints.https.address=:8443/tcp'
|
- '--entryPoints.https.address=:8443/tcp'
|
||||||
## Please see the Forwarded Header Trust section of the Authelia Traefik Integration documentation.
|
## Please see the Forwarded Header Trust section of the Authelia Traefik Integration documentation.
|
||||||
# - '--entryPoints.https.forwardedHeaders.trustedIPs=10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7'
|
# - '--entryPoints.https.forwardedHeaders.trustedIPs=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7'
|
||||||
# - '--entryPoints.https.proxyProtocol.trustedIPs=10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7'
|
# - '--entryPoints.https.proxyProtocol.trustedIPs=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7'
|
||||||
- '--entryPoints.https.forwardedHeaders.insecure=false'
|
- '--entryPoints.https.forwardedHeaders.insecure=false'
|
||||||
- '--entryPoints.https.proxyProtocol.insecure=false'
|
- '--entryPoints.https.proxyProtocol.insecure=false'
|
||||||
networks:
|
networks:
|
||||||
|
|
|
@ -45,7 +45,7 @@ In the example we have four commented lines which configure `TrustedIPs` which s
|
||||||
networks to the trusted proxy list in [Traefik]:
|
networks to the trusted proxy list in [Traefik]:
|
||||||
|
|
||||||
* 10.0.0.0/8
|
* 10.0.0.0/8
|
||||||
* 172.16.0.0/16
|
* 172.16.0.0/12
|
||||||
* 192.168.0.0/16
|
* 192.168.0.0/16
|
||||||
* fc00::/7
|
* fc00::/7
|
||||||
|
|
||||||
|
@ -105,8 +105,8 @@ services:
|
||||||
- '--entryPoints=Name:http Address::80'
|
- '--entryPoints=Name:http Address::80'
|
||||||
- '--entryPoints=Name:https Address::443 TLS'
|
- '--entryPoints=Name:https Address::443 TLS'
|
||||||
## See the Forwarded Header Trust section. Comment the above two lines, then uncomment and customize the next two lines to configure the TrustedIPs.
|
## See the Forwarded Header Trust section. Comment the above two lines, then uncomment and customize the next two lines to configure the TrustedIPs.
|
||||||
# - '--entryPoints=Name:http Address::80 ForwardedHeaders.TrustedIPs:10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7 ProxyProtocol.TrustedIPs:10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7'
|
# - '--entryPoints=Name:http Address::80 ForwardedHeaders.TrustedIPs:10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7 ProxyProtocol.TrustedIPs:10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7'
|
||||||
# - '--entryPoints=Name:https Address::443 TLS ForwardedHeaders.TrustedIPs:10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7 ProxyProtocol.TrustedIPs:10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7'
|
# - '--entryPoints=Name:https Address::443 TLS ForwardedHeaders.TrustedIPs:10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7 ProxyProtocol.TrustedIPs:10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7'
|
||||||
- '--entryPoints=Name:api Address::8081'
|
- '--entryPoints=Name:api Address::8081'
|
||||||
authelia:
|
authelia:
|
||||||
image: authelia/authelia
|
image: authelia/authelia
|
||||||
|
|
Loading…
Reference in New Issue