-
Notifications
You must be signed in to change notification settings - Fork 20
SRAM deploy roles port #634
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: release/597
Are you sure you want to change the base?
Changes from all commits
1f51ce8
64c1a89
961ffa8
0960373
234b5d9
3d1f884
06a6381
6a43eec
6b68917
05b0831
c930adf
14bff9a
48bdd9a
f048ae3
ec66f79
cf73225
19d0a48
52528ec
42930f8
7f85717
9b0db98
0cafab3
9a481e4
9026265
6a30219
2456b25
7a23f86
1feb140
10431c9
09428ab
2744db6
7554335
118a47b
4b29f86
6c25ee4
b17b097
2e366f2
6f47902
1829d45
338d4d2
ed069e3
923793e
0410d4a
42882df
52b4fb2
5a6cdf4
3137cf0
4b4db87
0cff50e
c255aa4
ff6862d
4089da9
5e0ec79
5a7b328
adf12d2
a7aa40d
6669321
0107394
eccfa6c
ca39d8e
e4efb21
5bcf892
78af9df
b0aeac0
801d148
3f39b6d
e3e7276
275475c
03c5b75
e770440
b17b13d
e19ef88
7f408c9
e6a2fb1
ed9f942
f69780a
0989d8b
4ee77f1
0422876
0034180
2ba4d1a
ced2dda
7cc0a50
e709961
f68cf27
523926f
153f72d
112b538
165e826
2f16f08
abfe916
150b22e
28686c4
114a7a9
96bad9f
3eee2dc
b3f85f1
bf52be3
1e8614e
2d131ea
26d52db
82f50f7
9a3c379
77ea117
4793fe7
027c161
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -208,7 +208,7 @@ | |
| PHP_MEMORY_LIMIT: "{{ engine_php_memory }}" | ||
| APP_ENV: "prod" | ||
| APP_SECRET: "{{ engine_parameters_secret }}" | ||
| APP_DEBUG: "{{ engine_debug | bool | int }}" | ||
| APP_DEBUG: "{{ engine_debug | bool | int | string }}" | ||
| etc_hosts: | ||
| host.docker.internal: host-gateway | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. wat doet dit?
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It fixes ansible error |
||
| mounts: | ||
|
|
||
|
mrvanes marked this conversation as resolved.
|
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -12,8 +12,8 @@ frontend stats | |
| # ------------------------------------------------------------------- | ||
| frontend internet_ip | ||
|
|
||
| bind {{ haproxy_sni_ip.ipv4 }}:443 ssl crt-list /etc/haproxy/maps/certlist.lst ssl crt /etc/haproxy/certs/ no-sslv3 no-tlsv10 no-tlsv11 alpn h2,http/1.1 transparent | ||
| bind {{ haproxy_sni_ip.ipv6 }}:443 ssl crt-list /etc/haproxy/maps/certlist.lst ssl crt /etc/haproxy/certs/ no-sslv3 no-tlsv10 no-tlsv11 alpn h2,http/1.1 transparent | ||
| bind {{ haproxy_sni_ip.ipv4 }}:443 ssl crt-list /etc/haproxy/maps/certlist.lst ssl crt /etc/haproxy/certs/ no-sslv3 no-tlsv10 no-tlsv11 alpn h2,http/1.1 transparent | ||
| bind {{ haproxy_sni_ip.ipv6 }}:443 ssl crt-list /etc/haproxy/maps/certlist.lst ssl crt /etc/haproxy/certs/ no-sslv3 no-tlsv10 no-tlsv11 alpn h2,http/1.1 transparent | ||
| bind {{ haproxy_sni_ip.ipv4 }}:80 transparent | ||
| bind {{ haproxy_sni_ip.ipv6 }}:80 transparent | ||
| # Logging is done in the local_ip backend, otherwise all requests are logged twice | ||
|
|
@@ -30,7 +30,7 @@ frontend internet_ip | |
| http-request redirect scheme https code 301 if !{ ssl_fc } | ||
| # Log the user agent in the httplogs | ||
| capture request header User-agent len 256 | ||
| # Put the useragent header in a variable, shared between request and response. | ||
| # Put the useragent header in a variable, shared between request and response. | ||
| http-request set-var(txn.useragent) req.fhdr(User-Agent) | ||
| # The ACL below makes sure only supported http methods are allowed | ||
| acl valid_method method {{ haproxy_supported_http_methods }} | ||
|
|
@@ -51,7 +51,7 @@ frontend internet_ip | |
| http-response replace-header Set-Cookie (?i)(^(?!.*samesite).*$) \1;\ SameSite=None if !no_same_site_uas | ||
| # Remove an already present SameSite cookie attribute for unsupported browsers | ||
| http-response replace-value Set-Cookie (^.*)(?i);\ *SameSite=(Lax|Strict|None)(.*$) \1\3 if no_same_site_uas | ||
| # Log whether the no_same_site_uas ACL has been hit | ||
| # Log whether the no_same_site_uas ACL has been hit | ||
| http-request set-header samesitesupport samesite_notsupported if no_same_site_uas | ||
| http-request set-header samesitesupport samesite_supported if !no_same_site_uas | ||
| # We need a dummy backend in order to be able to rewrite the loadbalancer cookies | ||
|
|
@@ -66,7 +66,7 @@ frontend local_ip | |
| acl valid_vhost hdr(host) -f /etc/haproxy/acls/validvhostsunrestricted.acl | ||
| acl staging req.cook(staging) -m str true | ||
| acl staging src -f /etc/haproxy/acls/stagingips.acl | ||
| acl stagingvhost hdr(host) -i -M -f /etc/haproxy/maps/backendsstaging.map | ||
| acl stagingvhost hdr(host) -i -M -f /etc/haproxy/maps/backendsstaging.map | ||
| use_backend %[req.hdr(host),lower,map(/etc/haproxy/maps/backendsstaging.map)] if stagingvhost staging | ||
| use_backend %[req.hdr(host),lower,map(/etc/haproxy/maps/backends.map)] | ||
| option httplog | ||
|
|
@@ -82,7 +82,7 @@ frontend local_ip | |
| http-request capture sc_http_req_rate(0) len 4 | ||
| # Create an ACL when the request rate exceeds {{ haproxy_max_request_rate }} per 10s | ||
| acl exceeds_max_request_rate_per_ip sc_http_req_rate(0) gt {{ haproxy_max_request_rate }} | ||
| # Measure and log the request rate per path and ip | ||
| # Measure and log the request rate per path and ip | ||
| http-request track-sc1 base32+src table st_httpreqs_per_ip_and_path | ||
| http-request capture sc_http_req_rate(1) len 4 | ||
| # Some paths allow for a higher ratelimit. These are in a seperate mapfile | ||
|
|
@@ -96,7 +96,7 @@ frontend local_ip | |
| http-request deny if ! valid_vhost | ||
| # Deny the request when the request rate exceeds {{ haproxy_max_request_rate }} per 10s | ||
| http-request deny deny_status 429 if exceeds_max_request_rate_per_ip !allowlist | ||
| # Deny the request when the request rate per host header url path and src ip exceeds {{ haproxy_max_request_rate_ip_path }} per 1 m | ||
| # Deny the request when the request rate per host header url path and src ip exceeds {{ haproxy_max_request_rate_ip_path }} per 1 m | ||
| http-request deny deny_status 429 if exceeds_max_request_rate_per_ip_and_path !allowlist | ||
| # Create some http redirects | ||
| {% if haproxy_securitytxt_target_url is defined %} | ||
|
|
@@ -111,8 +111,8 @@ frontend local_ip | |
| ## ------------------------------------------------------------------- | ||
| frontend internet_restricted_ip | ||
|
|
||
| bind {{ haproxy_sni_ip_restricted.ipv4 }}:443 ssl crt-list /etc/haproxy/maps/certlist.lst ssl crt /etc/haproxy/certs/ no-sslv3 no-tlsv10 no-tlsv11 alpn h2,http/1.1 transparent | ||
| bind {{ haproxy_sni_ip_restricted.ipv6 }}:443 ssl crt-list /etc/haproxy/maps/certlist.lst ssl crt /etc/haproxy/certs/ no-sslv3 no-tlsv10 no-tlsv11 alpn h2,http/1.1 transparent | ||
| bind {{ haproxy_sni_ip_restricted.ipv4 }}:443 ssl crt-list /etc/haproxy/maps/certlist.lst ssl crt /etc/haproxy/certs/ no-sslv3 no-tlsv10 no-tlsv11 alpn h2,http/1.1 transparent | ||
| bind {{ haproxy_sni_ip_restricted.ipv6 }}:443 ssl crt-list /etc/haproxy/maps/certlist.lst ssl crt /etc/haproxy/certs/ no-sslv3 no-tlsv10 no-tlsv11 alpn h2,http/1.1 transparent | ||
| bind {{ haproxy_sni_ip_restricted.ipv4 }}:80 transparent | ||
| bind {{ haproxy_sni_ip_restricted.ipv6 }}:80 transparent | ||
| # Logging is done in the local_ip_restriced backend, otherwise all requests are logged twice | ||
|
|
@@ -128,8 +128,8 @@ frontend internet_restricted_ip | |
| # We redirect all port 80 to port 443 | ||
| http-request redirect scheme https code 301 if !{ ssl_fc } | ||
| # Log the user agent in the httplogs | ||
| capture request header User-agent len 256 | ||
| # Put the useragent header in a variable, shared between request and response. | ||
| capture request header User-agent len 256 | ||
| # Put the useragent header in a variable, shared between request and response. | ||
| http-request set-var(txn.useragent) req.fhdr(User-Agent) | ||
| # The ACL below makes sure only supported http methods are allowed | ||
| acl valid_method method {{ haproxy_supported_http_methods }} | ||
|
|
@@ -155,12 +155,12 @@ frontend internet_restricted_ip | |
| # frontend restricted ip addresses localhost | ||
| # traffic coming back from the dummy backend ends up here | ||
| # ------------------------------------------------------------------- | ||
| frontend localhost_restricted | ||
| frontend localhost_restricted | ||
| bind 127.0.0.1:82 accept-proxy | ||
| acl valid_vhost hdr(host) -f /etc/haproxy/acls/validvhostsrestricted.acl | ||
| acl staging req.cook(staging) -m str true | ||
| acl staging src -f /etc/haproxy/acls/stagingips.acl | ||
| acl stagingvhost hdr(host) -i -M -f /etc/haproxy/maps/backendsstaging.map | ||
| acl stagingvhost hdr(host) -i -M -f /etc/haproxy/maps/backendsstaging.map | ||
| use_backend %[req.hdr(host),lower,map(/etc/haproxy/maps/backendsstaging.map)] if stagingvhost staging | ||
| use_backend %[req.hdr(host),lower,map(/etc/haproxy/maps/backends.map)] | ||
| option httplog | ||
|
|
@@ -177,7 +177,7 @@ frontend localhost_restricted | |
| # Create an ACL when the request rate exceeds {{ haproxy_max_request_rate }} per 10s | ||
| acl exceeds_max_request_rate_per_ip sc_http_req_rate(0) gt {{ haproxy_max_request_rate }} | ||
| http-request deny deny_status 429 if exceeds_max_request_rate_per_ip !allowlist | ||
| # Measure and log the request rate per path and ip | ||
| # Measure and log the request rate per path and ip | ||
| http-request track-sc1 base32+src table st_httpreqs_per_ip_and_path | ||
| http-request capture sc_http_req_rate(1) len 4 | ||
| # Some paths allow for a higher ratelimit. These are in a seperate mapfile | ||
|
|
@@ -191,7 +191,7 @@ frontend localhost_restricted | |
| http-request deny if ! valid_vhost | ||
| # Deny the request when the request rate exceeds {{ haproxy_max_request_rate }} per 10s | ||
| http-request deny deny_status 429 if exceeds_max_request_rate_per_ip !allowlist | ||
| # Deny the request when the request rate per host header url path and src ip exceeds {{ haproxy_max_request_rate_ip_path }} per 1 m | ||
| # Deny the request when the request rate per host header url path and src ip exceeds {{ haproxy_max_request_rate_ip_path }} per 1 m | ||
| http-request deny deny_status 429 if exceeds_max_request_rate_per_ip_and_path !allowlist | ||
| # Create some http redirects | ||
| {% if haproxy_securitytxt_target_url is defined %} | ||
|
|
@@ -201,3 +201,19 @@ frontend localhost_restricted | |
| http-request redirect location %[base,map_reg(/etc/haproxy/maps/redirects.map)] if { base,map_reg(/etc/haproxy/maps/redirects.map) -m found } | ||
|
|
||
| {% endif %} | ||
|
|
||
| {% if haproxy_ldap_servers is defined %} | ||
| #-------------------------------------------------------------------- | ||
| # frontend public ips ldap | ||
| # ------------------------------------------------------------------- | ||
| listen ldap | ||
| mode tcp | ||
| no option dontlognull | ||
| option tcplog | ||
| option logasap | ||
| timeout client 900s | ||
| timeout server 901s | ||
| bind {{ haproxy_sni_ip.ipv4 }}:636 ssl crt-list /etc/haproxy/maps/certlist.lst ssl crt /etc/haproxy/certs/ no-sslv3 no-tlsv10 no-tlsv11 transparent | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Hoe komt de ldap hostname aan een certificaat? Moet dan
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Dat is geregeld in de loadbalancer hostname configuratie voor zover ik me herinner. Het gaat in elk geval goed op dit moment? |
||
| bind {{ haproxy_sni_ip.ipv6 }}:636 ssl crt-list /etc/haproxy/maps/certlist.lst ssl crt /etc/haproxy/certs/ no-sslv3 no-tlsv10 no-tlsv11 transparent | ||
| use_backend ldap_servers | ||
| {% endif %} | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Hier is ook een firewall change nodig denk ik?
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Geen idee, het werkt nu in iedergeval zonder? |
||
This file was deleted.
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -7,6 +7,7 @@ logging: | |
| org.springframework.security: WARN | ||
| com.zaxxer.hikari: ERROR | ||
| invite: DEBUG | ||
| net.javacrumbs.shedlock: DEBUG | ||
|
|
||
| server: | ||
| port: 8080 | ||
|
|
@@ -74,11 +75,13 @@ crypto: | |
| private-key-location: file:///private_key_pkcs8.pem | ||
|
|
||
| cron: | ||
| user-cleaner-expression: "0 0/30 * * * *" | ||
| user-cleaner-cron: "PT30M" | ||
| user-cleaner-cron-initial-delay: "PT10M" | ||
| user-cleaner-lock-at-least-for: "PT5M" | ||
| user-cleaner-lock-at-most-for: "PT28M" | ||
| last-activity-duration-days: 1000 | ||
| role-expiration-notifier-expression: "0 0/30 * * * *" | ||
| role-expiration-notifier-cron: "PT30M" | ||
| role-expiration-notifier-cron-initial-delay: "PT15M" | ||
| # Set to -1 to suppress role expiry notifications | ||
| role-expiration-notifier-duration-days: 5 | ||
| role-expiration-notifier-lock-at-least-for: "PT5M" | ||
|
|
@@ -87,7 +90,7 @@ cron: | |
| metadata-resolver-fixed-rate-milliseconds: 86_400_000 | ||
| metadata-resolver-url: "https://metadata.{{ base_domain }}/idps-metadata.xml" | ||
| # A value of 0 means no logs will be deleted | ||
| purge-audit-log-days: 365 | ||
| purge-audit-log-days: 0 | ||
| # A value of 0 means no invitations will be deleted | ||
| purge-expired-invitations-days: 365 | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Dit lijkt me niet de bedoeling?
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Ik weet niet waar deze change vandaan komt, ik denk dat het een rebase is? |
||
|
|
||
|
|
@@ -158,6 +161,7 @@ external-api-configuration: | |
| password: "{{ invite_attribute_aggregation_secret }}" | ||
| scopes: | ||
| - attribute_aggregation | ||
| - crm | ||
| - username: {{ invite.lifecycle_user }} | ||
| password: "{{ invite.lifecycle_secret }}" | ||
| scopes: | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,5 @@ | ||
| --- | ||
| mailpit_image: "axllent/mailpit" | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Ik denk niet dat we een random image van een vaag persoon op internet direct willen utirollen, zeker niet als dat straks ook in publieke test terecht komt. Waarschijnlijk beter om zelf een baseimage te bouwen hiervoor. |
||
| mailpit_hostname: "mailpit.{{ base_domain }}" | ||
| mailpit_user: "mailpit" | ||
| mailpit_group: "mailpit" | ||
Uh oh!
There was an error while loading. Please reload this page.