An error occurred fetching the project authors.
  1. 31 May, 2019 2 commits
  2. 30 May, 2019 4 commits
  3. 29 May, 2019 1 commit
  4. 28 May, 2019 4 commits
  5. 17 May, 2019 1 commit
  6. 16 May, 2019 1 commit
  7. 15 May, 2019 1 commit
  8. 08 May, 2019 2 commits
  9. 06 May, 2019 2 commits
  10. 23 Apr, 2019 3 commits
  11. 18 Apr, 2019 2 commits
  12. 17 Apr, 2019 1 commit
  13. 16 Apr, 2019 1 commit
  14. 15 Apr, 2019 1 commit
  15. 12 Apr, 2019 6 commits
    • Łukasz Nowak's avatar
      caddy-frontend: Re-do zero-SSL BBB · 1d271f4d
      Łukasz Nowak authored
      Instead of complex architecture in the profiles, reuse kedifa-updater
      capability to do backward compatibility certificate management thanks to its
      fall-back mechanism.
      
      kedifa-updater uses state file to know, if it ever succeed to download
      certificate from KeDiFa, and so it really makes it that pushing at least once
      certificate to KeDiFa, even if it is sometimes unresponsive, will switch to
      it.
      
      Fallback certificate is used, thus each slave listens immediately on HTTP and
      HTTPS. Thanks to this, asynchronous updates do not need to communicate with
      slapos node instance, and slapos node instance does not care about the
      certificates anymore.
      1d271f4d
    • Łukasz Nowak's avatar
      caddy-frontend: Pick up kedifa with async updater · 25902c06
      Łukasz Nowak authored
      Instead of fetching certificates on each slapos node instance use new
      kedifa-updater, which is a tool to asynchronously fetch certificates and
      has a hook to reload the server in case if new certificate is available.
      
      custom_ssl_directory is NOT BBB
      25902c06
    • Łukasz Nowak's avatar
      caddy-frontend: Sort slave list during processing · eb33377c
      Łukasz Nowak authored
      This mostly useful during tests to have stable results, especially when
      some slaves are rejected.
      
      This change is expected to be no-op during normal run.
      
      Note: The slave rejection system does not guarantee any ordering, as the sort
            order can change, because of parameters can reorder slaves. Thus, even
            if slave A was requested before slave B, and they conflict each other,
            slave A can be rejected instead of "expected" slave B.
      eb33377c
    • Łukasz Nowak's avatar
      caddy-frontend: Keep certificate and key in one file · 6f3eafe0
      Łukasz Nowak authored
      This is consistent across usage in caddy-frontend and allow better reusage.
      6f3eafe0
    • Łukasz Nowak's avatar
      341df23f
    • Łukasz Nowak's avatar
      fix "caddy-frontend: Drop not needed apache references" · f27a120e
      Łukasz Nowak authored
      Section was not renamed in buildout.hash.cfg
      f27a120e
  16. 26 Mar, 2019 1 commit
  17. 22 Mar, 2019 1 commit
    • Jérome Perrin's avatar
      caddy: use same log format as apache · 5c23e132
      Jérome Perrin authored
      in apache frontend, we have been using:
      
      ```
      LogFormat "%h %l %{REMOTE_USER}i %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %D" combined
      ```
      
      The %l is (from mod_log_config docs): Remote logname (from identd, if
      supplied). This will return a dash unless mod_ident is present and
      IdentityCheck is set On.
      
      In the case of apache frontend, it was always a - . This is missing in
      caddy frontend and our existing log processing tools (apachedex) cannot
      be used on frontend logs since we switched to Caddy.
      
      /reviewed-on nexedi/slapos!530
      5c23e132
  18. 21 Mar, 2019 1 commit
    • Łukasz Nowak's avatar
      caddy-frontend: Adapt to ATS 7 · 7017a46e
      Łukasz Nowak authored
      Adapted configuration and instantiation to ATS 7.
      
      Deployment:
       * traffic_line has been replaced with traffic_ctl
       * access log, of squid style, is ascii instead of binary, to do so
         logging.config is generated
       * ip_allow.config is configured to allow access from any host
       * RFC 5861 (stale content on error or revalidate) is implemented with core
         instead with deprecated plugin
       * trafficserver-autoconf-port renamed to trafficserver-synthetic-port
       * proxy.config.system.mmap_max removed, as it is not used by the system anymore
      
      Tests:
       * As Via header is not returned to the client, it is dropped from the
         tests, instead its existence in the backend is checked.
       * Promise plugin trafficserver-cache-availability.py is re enabled, as
         it is expected to work immediately.
      7017a46e
  19. 13 Mar, 2019 5 commits
    • Łukasz Nowak's avatar
      caddy-frontend: Switch AIKC to default true · a198be7f
      Łukasz Nowak authored
      It is better to have automation similar to previous implementation by
      default.
      a198be7f
    • Łukasz Nowak's avatar
    • Łukasz Nowak's avatar
    • Łukasz Nowak's avatar
      caddy-frontend: Implement AIKC · 28a1283d
      Łukasz Nowak authored
      AIKC - Automatic Internal Kedifa's Caucase CSR signing, which can be triggered
      by option automatic-internal-kedifa-caucase-csr.
      
      It signs all CSR which match csr_id and certificate from the nodes which needs them.
      28a1283d
    • Łukasz Nowak's avatar
      caddy-frontend: Expose csr_id over HTTPS · 7c5c99b1
      Łukasz Nowak authored
      csr_id is exposed over HTTPS with short living self signed certificate,
      which is transmitted via SlapOS Master. Thanks to this, it is possible to
      match csr_id with certificate of given partition and take decision if it shall
      be signed or not.
      
      This is "quite secure" apporach, a bit better than blidny trusting what CSR
      to sign in KeDiFa. The bootstrap information, which is short living
      (certificates are valid for 5 days), resides in SlapOS Master. The csr_id
      is not directly known to SlapOS Master, and shall be consumed as fast as
      possible by frontend cluster operator in order to sign CSR appearing in
      KeDiFa caucase. The known possible attack vector requires that attacker knows
      caucased HTTP listening port and can hijack HTTPS traffic to the csr_id-url
      to get the human approve his own csr_id. The second is hoped to be overcomed
      by publishing certificate of this endpoint via SlapOS Master.
      
      Unfortunately caucase-updater prefix is directly used to find real CSR, as the
      one generated is just a template for rerequest, thus csr_id would be different
      from really used by caucase-updater.
      7c5c99b1