fix(deploy): fix persistent 404 by correcting gatekeeper forwardauth path

This commit is contained in:
2026-02-11 18:00:51 +01:00
parent e5241ed2bd
commit affd6b3e80
2 changed files with 4 additions and 3 deletions

View File

@@ -228,6 +228,7 @@ jobs:
env: env:
TRAEFIK_RULE: ${{ needs.prepare.outputs.traefik_rule }} TRAEFIK_RULE: ${{ needs.prepare.outputs.traefik_rule }}
TRAEFIK_HOST: ${{ needs.prepare.outputs.traefik_host }} TRAEFIK_HOST: ${{ needs.prepare.outputs.traefik_host }}
GATEKEEPER_HOST: gatekeeper.${{ needs.prepare.outputs.traefik_host }}
ENV_FILE: ${{ needs.prepare.outputs.env_file }} ENV_FILE: ${{ needs.prepare.outputs.env_file }}
run: | run: |
# Generate Environment File # Generate Environment File
@@ -275,8 +276,8 @@ jobs:
ENV_FILE=$ENV_FILE ENV_FILE=$ENV_FILE
TRAEFIK_RULE='$TRAEFIK_RULE' TRAEFIK_RULE='$TRAEFIK_RULE'
TRAEFIK_HOST='$TRAEFIK_HOST' TRAEFIK_HOST='$TRAEFIK_HOST'
GATEKEEPER_HOST='gatekeeper.$TRAEFIK_HOST' GATEKEEPER_HOST='$GATEKEEPER_HOST'
EOF EOF
# AUTH_MIDDLEWARE logic # AUTH_MIDDLEWARE logic
printf "AUTH_MIDDLEWARE=%s\n" "$( [[ "$TARGET" == "production" ]] && echo "compress" || echo "${PROJECT_NAME}-auth,compress" )" >> .env.deploy printf "AUTH_MIDDLEWARE=%s\n" "$( [[ "$TARGET" == "production" ]] && echo "compress" || echo "${PROJECT_NAME}-auth,compress" )" >> .env.deploy

View File

@@ -23,7 +23,7 @@ services:
- "traefik.http.routers.${PROJECT_NAME}-gatekeeper.tls=true" - "traefik.http.routers.${PROJECT_NAME}-gatekeeper.tls=true"
- "traefik.http.routers.${PROJECT_NAME}-gatekeeper.service=${PROJECT_NAME}-gatekeeper" - "traefik.http.routers.${PROJECT_NAME}-gatekeeper.service=${PROJECT_NAME}-gatekeeper"
- "traefik.http.middlewares.${PROJECT_NAME}-auth.forwardauth.address=http://${PROJECT_NAME}-gatekeeper:3000/api/verify" - "traefik.http.middlewares.${PROJECT_NAME}-auth.forwardauth.address=http://${PROJECT_NAME}-gatekeeper:3000/gatekeeper/api/verify"
- "traefik.http.middlewares.${PROJECT_NAME}-auth.forwardauth.trustForwardHeader=true" - "traefik.http.middlewares.${PROJECT_NAME}-auth.forwardauth.trustForwardHeader=true"
- "traefik.http.middlewares.${PROJECT_NAME}-auth.forwardauth.authResponseHeaders=X-Auth-User" - "traefik.http.middlewares.${PROJECT_NAME}-auth.forwardauth.authResponseHeaders=X-Auth-User"
- "traefik.docker.network=infra" - "traefik.docker.network=infra"