2020-07-15 14:56:03 +00:00
# Traefik & HTTP
2021-02-11 18:04:03 +00:00
Provide your [dynamic configuration ](./overview.md ) via an HTTP(S) endpoint and let Traefik do the rest!
2020-07-15 14:56:03 +00:00
## Routing Configuration
The HTTP provider uses the same configuration as the [File Provider ](./file.md ) in YAML or JSON format.
## Provider Configuration
### `endpoint`
_Required_
2021-02-11 18:04:03 +00:00
Defines the HTTP(S) endpoint to poll.
2020-07-15 14:56:03 +00:00
```toml tab="File (TOML)"
[providers.http]
endpoint = "http://127.0.0.1:9000/api"
```
```yaml tab="File (YAML)"
providers:
http:
endpoint:
- "http://127.0.0.1:9000/api"
```
```bash tab="CLI"
--providers.http.endpoint=http://127.0.0.1:9000/api
```
### `pollInterval`
_Optional, Default="5s"_
Defines the polling interval.
```toml tab="File (TOML)"
[providers.http]
pollInterval = "5s"
```
```yaml tab="File (YAML)"
providers:
http:
pollInterval: "5s"
```
```bash tab="CLI"
--providers.http.pollInterval=5s
```
### `pollTimeout`
_Optional, Default="5s"_
Defines the polling timeout when connecting to the configured endpoint.
```toml tab="File (TOML)"
[providers.http]
pollTimeout = "5s"
```
```yaml tab="File (YAML)"
providers:
http:
pollTimeout: "5s"
```
```bash tab="CLI"
--providers.http.pollTimeout=5s
```
### `tls`
_Optional_
#### `tls.ca`
2021-02-11 18:04:03 +00:00
Certificate Authority used for the secure connection to the configured endpoint.
2020-07-15 14:56:03 +00:00
```toml tab="File (TOML)"
[providers.http.tls]
ca = "path/to/ca.crt"
```
```yaml tab="File (YAML)"
providers:
http:
tls:
ca: path/to/ca.crt
```
```bash tab="CLI"
--providers.http.tls.ca=path/to/ca.crt
```
#### `tls.caOptional`
2021-02-11 18:04:03 +00:00
The value of `tls.caOptional` defines which policy should be used for the secure connection with TLS Client Authentication to the configured endpoint.
2020-07-15 14:56:03 +00:00
2021-02-11 18:04:03 +00:00
!!! warning ""
If `tls.ca` is undefined, this option will be ignored, and no client certificate will be requested during the handshake. Any provided certificate will thus never be verified.
When this option is set to `true` , a client certificate is requested during the handshake but is not required. If a certificate is sent, it is required to be valid.
When this option is set to `false` , a client certificate is requested during the handshake, and at least one valid certificate should be sent by the client.
2020-07-15 14:56:03 +00:00
```toml tab="File (TOML)"
[providers.http.tls]
caOptional = true
```
```yaml tab="File (YAML)"
providers:
http:
tls:
caOptional: true
```
```bash tab="CLI"
--providers.http.tls.caOptional=true
```
#### `tls.cert`
2021-02-11 18:04:03 +00:00
Public certificate used for the secure connection to the configured endpoint.
2020-07-15 14:56:03 +00:00
```toml tab="File (TOML)"
[providers.http.tls]
cert = "path/to/foo.cert"
key = "path/to/foo.key"
```
```yaml tab="File (YAML)"
providers:
http:
tls:
cert: path/to/foo.cert
key: path/to/foo.key
```
```bash tab="CLI"
--providers.http.tls.cert=path/to/foo.cert
--providers.http.tls.key=path/to/foo.key
```
#### `tls.key`
2021-02-11 18:04:03 +00:00
Private certificate used for the secure connection to the configured endpoint.
2020-07-15 14:56:03 +00:00
```toml tab="File (TOML)"
[providers.http.tls]
cert = "path/to/foo.cert"
key = "path/to/foo.key"
```
```yaml tab="File (YAML)"
providers:
http:
tls:
cert: path/to/foo.cert
key: path/to/foo.key
```
```bash tab="CLI"
--providers.http.tls.cert=path/to/foo.cert
--providers.http.tls.key=path/to/foo.key
```
#### `tls.insecureSkipVerify`
2021-02-11 18:04:03 +00:00
If `insecureSkipVerify` is `true` , the TLS connection to the endpoint accepts any certificate presented by the server regardless of the hostnames it covers.
2020-07-15 14:56:03 +00:00
```toml tab="File (TOML)"
[providers.http.tls]
insecureSkipVerify = true
```
```yaml tab="File (YAML)"
providers:
http:
tls:
insecureSkipVerify: true
```
```bash tab="CLI"
--providers.http.tls.insecureSkipVerify=true
```