-
It would be nice to have the option to configure custom certificates for the L4 TLS handler via the Caddyfile as it is possible in Caddy with the [`tls ` directive](https://caddyserver.com/docs/caddy…
-
### Welcome!
- [X] Yes, I've searched similar issues on [GitHub](https://github.com/traefik/traefik/issues) and didn't find any.
- [X] Yes, I've searched similar issues on the [Traefik community f…
-
### Describe the feature
When trying to utilize [NLB's feature of having ALB target types](https://aws.amazon.com/blogs/networking-and-content-delivery/application-load-balancer-type-target-group-f…
lurnt updated
4 months ago
-
## Overview
When using Exfilac with a Minio server, unnecessary upload detection always fails because the remote content has is always `null`, even when the asset already exists on the remote and h…
-
As an integrator I want to be able to perform Mutual-TLS client authentication as specified in [RFC8705, section 2](https://www.rfc-editor.org/rfc/rfc8705.html). This issue excludes "Certificate-Bound…
-
Thanks for this awesome project. Really enjoy using it!
In the latest codebase there are multiple options for TLS termination. Client, Server and Passthrough.
Could you please add some descripti…
cuwai updated
2 years ago
-
### What are you trying to do?
Many people have a way to create publicly accessible services on Kubernetes with an ingress controller, a certificate issuer like `cert-manager`, and a DNS controller…
-
As far as i can see in the code the spec.tls.caCertificate on the route object is nowhere considered to be set
- Is this on purpose ?
- If yes, then how is this intended to be populated ?
-…
-
### Do you want to request a *feature* or report a *bug*?
Feature
### What did you expect to see?
The goal of this proposal is to be able to have multiple certificate store in Traefik.
#### Ad…
-
## CVE-2024-6119 - High Severity Vulnerability
Vulnerable Library - cryptography-42.0.5-cp37-abi3-manylinux_2_28_x86_64.whl
cryptography is a package which provides cryptographic recipes and primiti…