docs: fix ip addresses (#4843)

Co-authored-by: James Elliott <james-d-elliott@users.noreply.github.com>
pull/4842/head^2
Krasimir Nedelchev 2023-01-28 12:25:32 -10:00 committed by GitHub
parent 50f0520abe
commit b3b24f4479
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 13 additions and 13 deletions

View File

@ -59,7 +59,7 @@ In the example we have a commented `trusted_proxies` directive which shows an ex
to the trusted proxy list in [Caddy]: to the trusted proxy list in [Caddy]:
* 10.0.0.0/8 * 10.0.0.0/8
* 172.16.0.0/16 * 172.16.0.0/12
* 192.168.0.0/16 * 192.168.0.0/16
* fc00::/7 * fc00::/7
@ -84,7 +84,7 @@ support to ensure the basic example covers your use case in a secure way.
## https://www.authelia.com/integration/proxies/caddy/#forwarded-header-trust#trusted-proxies ## https://www.authelia.com/integration/proxies/caddy/#forwarded-header-trust#trusted-proxies
(trusted_proxy_list) { (trusted_proxy_list) {
## Uncomment & adjust the following line to configure specific ranges which should be considered as trustworthy. ## Uncomment & adjust the following line to configure specific ranges which should be considered as trustworthy.
# trusted_proxies 10.0.0.0/8 172.16.0.0/16 192.168.0.0/16 fc00::/7 # trusted_proxies 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 fc00::/7
} }
# Authelia Portal. # Authelia Portal.
@ -123,7 +123,7 @@ nextcloud.example.com {
## https://www.authelia.com/integration/proxies/caddy/#forwarded-header-trust#trusted-proxies ## https://www.authelia.com/integration/proxies/caddy/#forwarded-header-trust#trusted-proxies
(trusted_proxy_list) { (trusted_proxy_list) {
## Uncomment & adjust the following line to configure specific ranges which should be considered as trustworthy. ## Uncomment & adjust the following line to configure specific ranges which should be considered as trustworthy.
# trusted_proxies 10.0.0.0/8 172.16.0.0/16 192.168.0.0/16 fc00::/7 # trusted_proxies 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 fc00::/7
} }
example.com { example.com {
@ -168,7 +168,7 @@ preferred in *most* situations. If you are unsure of what you're doing please do
## https://www.authelia.com/integration/proxies/caddy/#forwarded-header-trust#trusted-proxies ## https://www.authelia.com/integration/proxies/caddy/#forwarded-header-trust#trusted-proxies
(trusted_proxy_list) { (trusted_proxy_list) {
## Uncomment & adjust the following line to configure specific ranges which should be considered as trustworthy. ## Uncomment & adjust the following line to configure specific ranges which should be considered as trustworthy.
# trusted_proxies 10.0.0.0/8 172.16.0.0/16 192.168.0.0/16 fc00::/7 # trusted_proxies 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 fc00::/7
} }
# Authelia Portal. # Authelia Portal.

View File

@ -62,7 +62,7 @@ line in the main configuration which shows an example of not trusting any proxie
the following networks to the trusted proxy list in [HAProxy]: the following networks to the trusted proxy list in [HAProxy]:
* 10.0.0.0/8 * 10.0.0.0/8
* 172.16.0.0/16 * 172.16.0.0/12
* 192.168.0.0/16 * 192.168.0.0/16
* fc00::/7 * fc00::/7

View File

@ -55,7 +55,7 @@ In the example we have four commented lines which configure `trustedIPs` which s
networks to the trusted proxy list in [Traefik]: networks to the trusted proxy list in [Traefik]:
* 10.0.0.0/8 * 10.0.0.0/8
* 172.16.0.0/16 * 172.16.0.0/12
* 192.168.0.0/16 * 192.168.0.0/16
* fc00::/7 * fc00::/7
@ -109,15 +109,15 @@ services:
- '--entryPoints.http.http.redirections.entryPoint.to=https' - '--entryPoints.http.http.redirections.entryPoint.to=https'
- '--entryPoints.http.http.redirections.entryPoint.scheme=https' - '--entryPoints.http.http.redirections.entryPoint.scheme=https'
## Please see the Forwarded Header Trust section of the Authelia Traefik Integration documentation. ## Please see the Forwarded Header Trust section of the Authelia Traefik Integration documentation.
# - '--entryPoints.http.forwardedHeaders.trustedIPs=10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7' # - '--entryPoints.http.forwardedHeaders.trustedIPs=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7'
# - '--entryPoints.http.proxyProtocol.trustedIPs=10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7' # - '--entryPoints.http.proxyProtocol.trustedIPs=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7'
- '--entryPoints.http.forwardedHeaders.insecure=false' - '--entryPoints.http.forwardedHeaders.insecure=false'
- '--entryPoints.http.proxyProtocol.insecure=false' - '--entryPoints.http.proxyProtocol.insecure=false'
- '--entryPoints.https=true' - '--entryPoints.https=true'
- '--entryPoints.https.address=:8443/tcp' - '--entryPoints.https.address=:8443/tcp'
## Please see the Forwarded Header Trust section of the Authelia Traefik Integration documentation. ## Please see the Forwarded Header Trust section of the Authelia Traefik Integration documentation.
# - '--entryPoints.https.forwardedHeaders.trustedIPs=10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7' # - '--entryPoints.https.forwardedHeaders.trustedIPs=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7'
# - '--entryPoints.https.proxyProtocol.trustedIPs=10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7' # - '--entryPoints.https.proxyProtocol.trustedIPs=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7'
- '--entryPoints.https.forwardedHeaders.insecure=false' - '--entryPoints.https.forwardedHeaders.insecure=false'
- '--entryPoints.https.proxyProtocol.insecure=false' - '--entryPoints.https.proxyProtocol.insecure=false'
networks: networks:

View File

@ -45,7 +45,7 @@ In the example we have four commented lines which configure `TrustedIPs` which s
networks to the trusted proxy list in [Traefik]: networks to the trusted proxy list in [Traefik]:
* 10.0.0.0/8 * 10.0.0.0/8
* 172.16.0.0/16 * 172.16.0.0/12
* 192.168.0.0/16 * 192.168.0.0/16
* fc00::/7 * fc00::/7
@ -105,8 +105,8 @@ services:
- '--entryPoints=Name:http Address::80' - '--entryPoints=Name:http Address::80'
- '--entryPoints=Name:https Address::443 TLS' - '--entryPoints=Name:https Address::443 TLS'
## See the Forwarded Header Trust section. Comment the above two lines, then uncomment and customize the next two lines to configure the TrustedIPs. ## See the Forwarded Header Trust section. Comment the above two lines, then uncomment and customize the next two lines to configure the TrustedIPs.
# - '--entryPoints=Name:http Address::80 ForwardedHeaders.TrustedIPs:10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7 ProxyProtocol.TrustedIPs:10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7' # - '--entryPoints=Name:http Address::80 ForwardedHeaders.TrustedIPs:10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7 ProxyProtocol.TrustedIPs:10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7'
# - '--entryPoints=Name:https Address::443 TLS ForwardedHeaders.TrustedIPs:10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7 ProxyProtocol.TrustedIPs:10.0.0.0/8,172.16.0.0/16,192.168.0.0/16,fc00::/7' # - '--entryPoints=Name:https Address::443 TLS ForwardedHeaders.TrustedIPs:10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7 ProxyProtocol.TrustedIPs:10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,fc00::/7'
- '--entryPoints=Name:api Address::8081' - '--entryPoints=Name:api Address::8081'
authelia: authelia:
image: authelia/authelia image: authelia/authelia