An error occurred fetching the project authors.
  1. 30 Sep, 2020 1 commit
  2. 25 Sep, 2020 2 commits
  3. 15 Sep, 2020 3 commits
  4. 30 Jul, 2020 2 commits
    • Łukasz Nowak's avatar
      caddy-frontend: Expose backend log files to slaves · 65700284
      Łukasz Nowak authored
      Backend logs are exposed as usual access and error logs.
      
      By using rsyslogd templates and regex filtering, the rsyslogd reacts itself
      and creates needed files per each slave which accesses it. Thanks to this, it's
      configuration is static from point of view of SlapOS profiles, and can be
      generated once.
      
      As the rsyslogd configuration became fully special to backend-haproxy, the
      rsyslogd template filename and its references has been correctly renamed.
      65700284
    • Łukasz Nowak's avatar
      caddy-frontend: Configure log retention locally · 58206fa6
      Łukasz Nowak authored
      Logs are critical for caddy-frontend, so let's configure rotate-num locally,
      as changes in the stack can come unattended, and can result with loosing logs.
      58206fa6
  5. 17 Jul, 2020 3 commits
    • Łukasz Nowak's avatar
      caddy-frontend: Setup backend client auth · 3be5f4ce
      Łukasz Nowak authored
      By default do not offer authentication certificate, the switch
      authenticate-to-backend can be used on cluster or slave level to control
      this feature.
      3be5f4ce
    • Łukasz Nowak's avatar
      caddy-frontend: Implement log file for backend-haproxy · 5b024d04
      Łukasz Nowak authored
      rsyslogd is used, as haproxy does not support writing log files by its own.
      5b024d04
    • Łukasz Nowak's avatar
      caddy-frontend: Put haproxy just before the backend · ec3d4ae9
      Łukasz Nowak authored
      This is needed in order to provide future support for client certificates
      to the backend.
      
      Also it means that haproxy is used in all cases, with or without cache, and as
      a result the "cached" version of caddy is dropped.
      
      Let haproxy setup maxconn by itself, as it's wise enough.
      
      Also trust that it'll detect and use proper limits, instead enforcing them in
      the shell with ulimit trick (ulimit -n $(ulimit -Hn)).
      
      As empty server alias can impact the configuration, add proper test for
      checking it.
      ec3d4ae9
  6. 14 Jul, 2020 2 commits
  7. 22 Jun, 2020 3 commits
  8. 06 Mar, 2020 1 commit
  9. 02 Mar, 2020 2 commits
  10. 30 Dec, 2019 1 commit
    • Łukasz Nowak's avatar
      caddy-frontend: Set open files soft limit · 324c08d0
      Łukasz Nowak authored
      Caddy by itself does not raise soft limit of open files, so it has to be set
      by the wrapper.
      
      As slapos.cookbook:wrapper can't be used for such case, the
      slapos.recipe.template:jinja2 recipe inline style is used to have full
      control over the created wrapper.
      
      /reviewed-on nexedi/slapos!678
      324c08d0
  11. 19 Nov, 2019 1 commit
  12. 04 Oct, 2019 1 commit
    • Thomas Gambier's avatar
      do not create two wrappers for the same executable if hash change · ed707d3b
      Thomas Gambier authored
      Prevent creating 2 wrapper for the same service if hash changed. Here, one service is exited because port is used by the firt to service to start:
      
          slappart6:runner-sshd-4248650e36a9a26a6481df1baffd9f58-on-watch                RUNNING   pid 27835, uptime 0:03:45
          slappart6:runner-sshd-b3b68f4278ceb84691ec27521ea229eb-on-watch                EXITED    Mar 06 04:52 PM
      
      To achieve that, update slapos.cookbook and use hash-existing-files option of wrapper recipe
      
      hash-existing-files list all the files used for hash that are not
      handled by buildout. For those files, the hash is calculated as soon as
      the __init__ function so that if there is a change in those files,
      buildout will remove the existing wrapper (it will uninstall the
      section) and replace it with the new wrapper.
      
      /reviewed-on nexedi/slapos!525
      ed707d3b
  13. 01 Oct, 2019 1 commit
  14. 30 Aug, 2019 2 commits
  15. 18 Jul, 2019 1 commit
  16. 12 Jun, 2019 1 commit
  17. 31 May, 2019 2 commits
  18. 30 May, 2019 1 commit
  19. 28 May, 2019 1 commit
  20. 06 May, 2019 2 commits
  21. 23 Apr, 2019 1 commit
  22. 18 Apr, 2019 2 commits
  23. 16 Apr, 2019 1 commit
  24. 12 Apr, 2019 3 commits
    • Łukasz Nowak's avatar
      caddy-frontend: Re-do zero-SSL BBB · 1d271f4d
      Łukasz Nowak authored
      Instead of complex architecture in the profiles, reuse kedifa-updater
      capability to do backward compatibility certificate management thanks to its
      fall-back mechanism.
      
      kedifa-updater uses state file to know, if it ever succeed to download
      certificate from KeDiFa, and so it really makes it that pushing at least once
      certificate to KeDiFa, even if it is sometimes unresponsive, will switch to
      it.
      
      Fallback certificate is used, thus each slave listens immediately on HTTP and
      HTTPS. Thanks to this, asynchronous updates do not need to communicate with
      slapos node instance, and slapos node instance does not care about the
      certificates anymore.
      1d271f4d
    • Łukasz Nowak's avatar
      caddy-frontend: Pick up kedifa with async updater · 25902c06
      Łukasz Nowak authored
      Instead of fetching certificates on each slapos node instance use new
      kedifa-updater, which is a tool to asynchronously fetch certificates and
      has a hook to reload the server in case if new certificate is available.
      
      custom_ssl_directory is NOT BBB
      25902c06
    • Łukasz Nowak's avatar
      caddy-frontend: Keep certificate and key in one file · 6f3eafe0
      Łukasz Nowak authored
      This is consistent across usage in caddy-frontend and allow better reusage.
      6f3eafe0