Bypass Authentication Rule
When using the traefik-oidc-auth middleware, every request requires authentication by default.
But you might want to forward some public paths to the upstream directly or skip authentication if you're accessing your service from an internal network etc. This is where the BypassAuthenticationRule
comes in.
It lets you specify a rule, similar to traefik's router
-rules. If a request matches this rule, it is forwarded to the upstream service without any authentication.
Here is an example:
http:
middlewares:
oidc-auth:
plugin:
traefik-oidc-auth:
Provider:
UrlEnv: "PROVIDER_URL"
ClientIdEnv: "CLIENT_ID"
ClientSecretEnv: "CLIENT_SECRET"
BypassAuthenticationRule: "PathPrefix(`/public`) || HeaderRegexp(`X-Real-Ip`, `^172\\.18\\.`)"
Multiple rules can also be combined logically by using &&
(logical and) and ||
(logical or). A rule can also be negated by putting a !
in front of it.
The following rules are available:
Rule | Description |
---|---|
Header(`X-Real-Ip`, `172.18.0.2`) | Match every request with an X-Real-Ip header set to 172.18.0.2 . |
HeaderRegexp(`X-Real-Ip`, `^172\.18\.`) | Match every request with an X-Real-Ip header matching the given regex. |
Path(`/products`) | Match every request where the path matches /products exactly. |
PathPrefix(`/products`) | Match every request by a path prefix. Eg. /products/123 would match, /user would not match. |
PathRegexp(`^/products/(shoes|socks)/[0-9]+$`) | Match every request path against the given regex. |
Method(`POST`) | Match every POST request. |
When authentication is bypassed, no headers etc. will be forwarded to the upstream service, even if an existing session is present.