1. 12 Oct, 2023 7 commits
  2. 11 Oct, 2023 2 commits
  3. 10 Oct, 2023 6 commits
  4. 09 Oct, 2023 3 commits
  5. 06 Oct, 2023 4 commits
  6. 05 Oct, 2023 4 commits
  7. 04 Oct, 2023 4 commits
    • Jérome Perrin's avatar
      component/git: version up 2.42.0 · e5892c7a
      Jérome Perrin authored
      e5892c7a
    • Jérome Perrin's avatar
    • Łukasz Nowak's avatar
      rapid-cdn: Handle correctly wildcard domains · a039c8cf
      Łukasz Nowak authored
      While generating haproxy configuration (including it's CRT list) the specific
      order of entries is used, so that wildcard domains end up last. Thanks to this
      they work as a catch-all and allow specific domain to take precedence. Care
      is taken to support *.example.example.com and *.example.com situation - so
      tree like possibility of wildcards.
      
      Anonymous in-place ACL are used per each domain, instead of per-shared
      instance grouping in order to avoid situation like *.example.com and
      example.com having single ACL, thus resulting with catch-all kicking in too
      fast.
      
      For the precision in the haproxy configuration and simplifcation of the regular
      expressions the -m reg is used, so that host_only can be applied, which also
      lowercases the hostname.
      
      Notes:
       * test00cluster_request_instance_parameter_dict changed due to sorting slaves
         in test's requestSlaves
       * the test infrastructure has been improved to assure repetition of the
         situation
       * tests in TestSlaveHostHaproxyClash are asserting that correct domain AND
         that specific certificate have been used while serving given frontend
         configuration
      a039c8cf
    • Joanne Hugé's avatar
  8. 02 Oct, 2023 5 commits
    • Jérome Perrin's avatar
      component/ca-certificates: version up 20230311 · 5f05b413
      Jérome Perrin authored
      A similar patches as ca-certificates-sbin-dir was
      applied upstream as 4f0d3ec7aa4ebc91793245ed66c0e24d7150782b , the rest
      of our patch was to use mkdir -p instead of mkdir, we keep this part in
      ca-certificates-mkdir-p.patch
      
      This introduces a new patch to not depend on cryptography, which is used
      only to print a warning on the console when an expired certificate is
      used.
      5f05b413
    • Jérome Perrin's avatar
      software/slapos-sr-testing: disallow usage of system python3 · 24f5a96c
      Jérome Perrin authored
      We had a mechanism to catch usage of system python2, but using not
      for system python3, which cause the same kind of problems.
      24f5a96c
    • Jérome Perrin's avatar
      component/glib: put slapos python3 in PATH · 698f69d5
      Jérome Perrin authored
      On old debian (9) where python3 is python3.5 this component fails to
      build with an error like:
      
          Configuring gdbus-example-objectmanager-visibility.h with command
          Running command: /opt/slapgrid/shared/glib/60e920f1feec2451d51bb344cfcad9ab/.build/glib-2.76.3/tools/gen-visibility-macros.py 2.0 visibility-macros GDBUS_OBJECT_MANAGER_EXAMPLE /opt/slapgrid/shared/glib/60e920f1feec2451d51bb344cfcad9ab/.build/glib-2.76.3/builddir/gio/tests/gdbus-object-manager-example/gdbus-example-objectmanager-visibility.h
          --- stdout ---
          --- stderr ---
            File "/opt/slapgrid/shared/glib/60e920f1feec2451d51bb344cfcad9ab/.build/glib-2.76.3/tools/gen-visibility-macros.py", line 37
              """
              ^
          SyntaxError: invalid syntax
      
      This is because this gen-visibility-macros.py script is executable with
      a shebang:
      
          #!/bin/env python3
      
      for python 3 softwares, this is slapos python, because the python
      section from component/defaults.cfg injects the slapos' python in PATH,
      but for python 2 software, slapos' python 2 is injected in path and
      `python3` resolves to system python, which in that case fails because
      f-strings are SyntaxError but more generally this showed a dependency
      to system python, but we can not rely on system python here.
      698f69d5
    • Ivan Tyagov's avatar
      Publish IPv6 URL to SlapOs master. · 6e8b97ee
      Ivan Tyagov authored
      See merge request nexedi/slapos!1438
      6e8b97ee
    • Ivan Tyagov's avatar
      Publish IPv6 URL to SlapOs master. · 5eac88ee
      Ivan Tyagov authored
      5eac88ee
  9. 29 Sep, 2023 3 commits
  10. 28 Sep, 2023 2 commits
    • Thomas Gambier's avatar
    • Jérome Perrin's avatar
      stack/erp5: serve balancer requests when client certificate is not verified · d58bbbba
      Jérome Perrin authored
      We configure haproxy with "verify optional", which makes haproxy request
      a client certificate, but accept the case where client does not present
      a certificate, but as described in [1], if client present a certificate
      and this certificate can not be verified, handshake is aborted. This is
      not what we want, we want to treat the case of a non verified
      certificate same as the case of the absence of certificate.
      
      This configures haproxy accordingly, using "crt-ignore-err all" to allow
      handshake anyway.
      
      Once this was fixed, there was a remaining problem with
      client_cert_verified acl, haproxy acl are OR, but this rule was supposed
      to be a AND (client present a certificate AND it is verified), this was
      rewritten to use inline condition which are AND.
      
      [1]: https://cbonte.github.io/haproxy-dconv/1.8/configuration.html#5.1-verify
      
      Also adjust test_x_forwarded_for_stripped_when_no_certificate to assert
      that there is no X-Forwarded-For header at all when no client
      certificate.
      d58bbbba