Port details on branch 2024Q2 |
- traefik High availability reverse proxy and load balancer
- 2.11.5 net =0 3.3.2_1Version of this port present on the latest quarterly branch.
- Maintainer: riggs@FreeBSD.org
- Port Added: 2024-04-13 14:42:05
- Last Update: 2024-06-22 09:07:53
- Commit Hash: 4cd2a8a3
- License: MIT
- WWW:
- https://traefik.io/
- Description:
- Traefik (pronounced like traffic) is a modern HTTP reverse proxy and load
balancer made to deploy microservices with ease. It supports several backends
(Docker, Swarm mode, Kubernetes, Marathon, Consul, Etcd, Rancher, Amazon ECS,
and a lot more) to manage its configuration automatically and dynamically.
- ¦ ¦ ¦ ¦
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- To install the port:
- cd /usr/ports/net/traefik/ && make install clean
- To add the package, run one of these commands:
- pkg install net/traefik
- pkg install traefik
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.- PKGNAME: traefik
- Flavors: there is no flavor information for this port.
- distinfo:
- TIMESTAMP = 1719038915
SHA256 (traefik-2.11.5.tar.xz) = cc5565a54ab1ec274f3993b57546d29c13f1a7e48c1c0cd036f1ebb428ad3ded
SIZE (traefik-2.11.5.tar.xz) = 21863256
Packages (timestamps in pop-ups are UTC):
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- go-bindata : devel/go-bindata
- go122 : lang/go122
- There are no ports dependent upon this port
Configuration Options:
- No options to configure
- Options name:
- net_traefik
- USES:
- cpe go:1.22,modules tar:xz
- pkg-message:
- For install:
- Note that traefik starts as unpriviliged user. Thus, it cannot
bind to privileged ports (by default, ports below 1024) and
will exit when configured to do so.
If traefik should serve ports in the privileged range, there
are options to achieve this:
- Have traffic bind to an unprivileged port and use the
packet filter configuration to redirect requests to the
desired privileged port to the unprivileged port in
traefik's configuration file e.g. the rdr rules in pf(4).
- The mac_portacl kernel module allows unprivileged processes
to bind to privileged ports.
- If upgrading from < 2.0:
- The version 2 of Traefik requires manual configuration changes
when migrating from a legacy v1 version to v2.
Please consult the Traefik migration guide at
https://doc.traefik.io/traefik/migration/v1-to-v2/
for details on how to adapt existing configuration files.
Note that there is a tool that can automate migration and
rewrite existing configuration files (at least partially):
https://github.com/traefik/traefik-migration-tool
- Master Sites:
|
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
2.11.5 22 Jun 2024 09:07:53 |
Thomas Zander (riggs) |
net/traefik: Update to upstream release 2.11.5
Details:
- Bugfix release, see
https://github.com/traefik/traefik/releases/tag/v2.11.5
- Fixes an Azure Identity Libraries Elevation of Privilege
Vulnerability, as described in
https://github.com/traefik/traefik/security/advisories/GHSA-rvj4-q8q5-8grf
MFH: 2024Q2
Security: CVE-2024-35255
(cherry picked from commit 6b4fc3fddc586d5734f6ec014308c0568c822552) |
2.11.4 16 Jun 2024 13:10:04 |
Thomas Zander (riggs) |
net/traefik: Update to upstream release 2.11.4
Details:
- Bugfix release addressing unexpected behavior with IPv4-mapped IPv6
addresses, see
https://github.com/traefik/traefik/releases/tag/v2.11.4
MFH: 2024Q2
Security: CVE-2024-24790
https://github.com/traefik/traefik/security/advisories/GHSA-7jmw-8259-q9jx
(cherry picked from commit b9c0a36b4514546dc3b3ccafa0e00c17c0119bfc) |
2.11.3_1 15 Jun 2024 09:58:21 |
Ashish SHUKLA (ashish) |
all: Bump after lang/go122 update
MFH: 2024Q2
(cherry picked from commit b24868e7be03b2ce962ee5e9ead293c10dc15cfb) |
2.11.3 25 May 2024 10:51:01 |
Thomas Zander (riggs) |
net/traefik: Update to upstream release 2.11.3
Details:
- Bugfix release, see
https://github.com/traefik/traefik/releases/tag/v2.11.3
- The website lists CVE-2024-24788 as security reference, but this is
not a vulnerability in traefik itself, but in the Go stdlib, which
was fixed in Go 1.22.3.
MFH: 2024Q2
Security: CVE-2024-24788
(cherry picked from commit dbe448af79a067e65c852dfc0d5b9c6c3e7524d0) |
2.11.2_2 13 May 2024 18:06:39 |
Ashish SHUKLA (ashish) |
all: Bump after lang/go122 update
MFH: 2024Q2
(cherry picked from commit a0676cbde9ff7029f5f0af1c50135be5e669d325) |
2.11.2_1 15 Apr 2024 08:31:41 |
Ashish SHUKLA (ashish) |
all: Bump after lang/go122 update
MFH: 2024Q2
(cherry picked from commit 91f781afd4292e9a950618c4bfa03f756d120d35) |
2.11.2 13 Apr 2024 14:33:17 |
Thomas Zander (riggs) |
net/traefik: Update to upstream release 2.11.2
Details:
- Bugfix release, see
https://github.com/traefik/traefik/releases/tag/v2.11.2
- Defaults around certain timeouts has changed. If those are important
for your use case, please review them, see:
https://doc.traefik.io/traefik/migration/v2/#v2112
MFH: 2024Q2
(cherry picked from commit d866fc74bce5f709bd9232d6f915072198199e1b) |