Affected by GO-2022-0325
and 16 other vulnerabilities
GO-2022-0325 : Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808 : Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923 : Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152 : Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154 : Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376 : Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377 : Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381 : Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722 : Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726 : Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880 : Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917 : Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941 : ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973 : Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135 : HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299 : Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342 : Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
The highest tagged major version is
v3 .
Discover Packages
github.com/traefik/traefik
pkg
provider
rancher
package
Version:
v2.0.0-alpha7+incompat...
Opens a new window with list of versions in this module.
Published: Jun 21, 2019
License: MIT
Opens a new window with license information.
Imports: 16
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
View Source
const (
DefaultTemplateRule = "Host(`{{ normalize .Name }}`)"
)
type Provider struct {
Constraints string ``
Watch bool `description:"Watch provider." export:"true"`
DefaultRule string `description:"Default rule."`
ExposedByDefault bool `description:"Expose containers by default." export:"true"`
EnableServiceHealthFilter bool `description:"Filter services with unhealthy states and inactive states." export:"true"`
RefreshSeconds int `description:"Defines the polling interval in seconds." export:"true"`
IntervalPoll bool `description:"Poll the Rancher metadata service every 'rancher.refreshseconds' (less accurate)."`
Prefix string `description:"Prefix used for accessing the Rancher metadata service."`
}
Provider holds configurations of the provider.
Provide allows the rancher provider to provide configurations to traefik using the given configuration channel.
SetDefaults sets the default values.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.