Port details on branch 2023Q2 |
- traefik High availability reverse proxy and load balancer
- 2.10.3 net
=1 3.3.6Version of this port present on the latest quarterly branch. - Maintainer: riggs@FreeBSD.org
 - Port Added: 2023-04-04 20:36:14
- Last Update: 2023-06-30 18:10:40
- Commit Hash: 9e973f9
- People watching this port, also watch:: mailutils, osv-scanner, opensmtpd, memcached, tmux
- License: MIT
- WWW:
- https://traefik.io/
- Description:
- Traefik (pronounced like traffic) is a modern HTTP reverse proxy and load
balancer made to deploy microservices with ease. It supports several backends
(Docker, Swarm mode, Kubernetes, Marathon, Consul, Etcd, Rancher, Amazon ECS,
and a lot more) to manage its configuration automatically and dynamically.
¦ ¦ ¦ ¦ 
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- To install the port:
- cd /usr/ports/net/traefik/ && make install clean
- To add the package, run one of these commands:
- pkg install net/traefik
- pkg install traefik
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.- PKGNAME: traefik
- Flavors: there is no flavor information for this port.
- distinfo:
- TIMESTAMP = 1687893026
SHA256 (traefik-2.10.3.tar.xz) = ce40b5ecd34d99befa44c04b79a9baaaa700f5c6545e515e2d96615564ca77c8
SIZE (traefik-2.10.3.tar.xz) = 21535040
Packages (timestamps in pop-ups are UTC):
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- go-bindata : devel/go-bindata
- go120 : lang/go120
- There are no ports dependent upon this port
Configuration Options:
- No options to configure
- Options name:
- net_traefik
- USES:
- cpe go:modules tar:xz
- pkg-message:
- For install:
- Note that traefik starts as unpriviliged user. Thus, it cannot
bind to privileged ports (by default, ports below 1024) and
will exit when configured to do so.
If traefik should serve ports in the privileged range, there
are options to achieve this:
- Have traffic bind to an unprivileged port and use the
packet filter configuration to redirect requests to the
desired privileged port to the unprivileged port in
traefik's configuration file e.g. the rdr rules in pf(4).
- The mac_portacl kernel module allows unprivileged processes
to bind to privileged ports.
- If upgrading from < 2.0:
- The version 2 of Traefik requires manual configuration changes
when migrating from a legacy v1 version to v2.
Please consult the Traefik migration guide at
https://doc.traefik.io/traefik/migration/v1-to-v2/
for details on how to adapt existing configuration files.
Note that there is a tool that can automate migration and
rewrite existing configuration files (at least partially):
https://github.com/traefik/traefik-migration-tool
- Master Sites:
|