Skip to content

Instantly share code, notes, and snippets.

@fordnox
Last active November 16, 2024 16:22
Show Gist options
  • Save fordnox/317244d0015a52193aa1adb9adc8c334 to your computer and use it in GitHub Desktop.
Save fordnox/317244d0015a52193aa1adb9adc8c334 to your computer and use it in GitHub Desktop.
dokploy service under google auth
services:
traefik-forward-auth:
image: thomseddon/traefik-forward-auth:2
environment:
- PROVIDERS_GOOGLE_CLIENT_ID=
- PROVIDERS_GOOGLE_CLIENT_SECRET=
- SECRET=
- INSECURE_COOKIE=false
labels:
- traefik.enable=true
- traefik.http.middlewares.traefik-forward-auth.forwardauth.trustForwardHeader=true
- traefik.http.middlewares.traefik-forward-auth.forwardauth.address=http://traefik-forward-auth:4181
- traefik.http.middlewares.traefik-forward-auth.forwardauth.authResponseHeaders=X-Forwarded-User
- traefik.http.services.traefik-forward-auth.loadbalancer.server.port=4181
networks:
- dokploy-network
networks:
dokploy-network:
external: true
services:
caddy:
image: caddy
labels:
- traefik.enable=true
- traefik.http.routers.${COMPOSE_PROJECT_NAME}.rule=Host(`hello.test.com`)
- traefik.http.middlewares.${COMPOSE_PROJECT_NAME}-middleware.headers.customrequestheaders.X-Forwarded-Proto=https
- traefik.http.routers.${COMPOSE_PROJECT_NAME}.middlewares=${COMPOSE_PROJECT_NAME}-middleware,traefik-forward-auth
networks:
- dokploy-network
whoami:
image: traefik/whoami
labels:
- traefik.enable=true
- traefik.http.routers.${COMPOSE_PROJECT_NAME}.rule=Host(`whoami.test.com`)
- traefik.http.middlewares.${COMPOSE_PROJECT_NAME}-middleware.headers.customrequestheaders.X-Forwarded-Proto=https
- traefik.http.routers.${COMPOSE_PROJECT_NAME}.middlewares=${COMPOSE_PROJECT_NAME}-middleware,traefik-forward-auth
networks:
- dokploy-network
networks:
dokploy-network:
external: true
@fordnox
Copy link
Author

fordnox commented Nov 16, 2024

Google Credentials

Head to https://console.developers.google.com/ and make sure you've switched to the correct email account.

Create a new project then search for and select "Credentials" in the search bar. Fill out the "OAuth Consent Screen" tab.

Click "Create Credentials" > "OAuth client ID". Select "Web Application", fill in the name of your app, skip "Authorized JavaScript origins" and fill "Authorized redirect URIs" with all the domains you will allow authentication from, appended with the url-path (e.g. https://app.test.com/_oauth)

Screenshot 2024-11-16 at 18 20 00

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment