mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-09-11 21:07:16 +02:00
- Move all domain→expected-status mapping to filter `web_health_expectations`. - Require explicit app selection via non-empty `group_names`; only those apps are included. - Add `www_enabled` flag (wired via `WWW_REDIRECT_ENABLED`) to generate/force www.* → 301. - Support `redirect_maps` to include manual redirects (sources forced to 301), independent of app selection. - Aliases always 301; canonicals use per-key override or `server.status_codes.default`, else [200,302,301]. - Remove legacy fallbacks (`server.status_codes.home` / `landingpage`). - Wire filter output into systemd ExecStart script as JSON expectations. - Normalize various templates to use `to_json` and minor spacing fixes. - Update app configs (e.g., YOURLS default=301; Confluence default=302; Bluesky web=405; MediaWiki/Confluence canonical/aliases). - Constructor now uses `WWW_REDIRECT_ENABLED` for domain generation. Tests: - Add comprehensive unit tests for filter: selection by group, keyed/default codes, aliases, www handling, redirect_maps, input sanitization. - Add unit tests for the standalone checker script (JSON parsing, OK/mismatch counting, sanitization). See conversation: https://chatgpt.com/share/68c2b93e-de58-800f-8c16-ea05755ba776
27 lines
2.1 KiB
Django/Jinja
27 lines
2.1 KiB
Django/Jinja
http_address = "0.0.0.0:4180"
|
|
cookie_secret = "{{ applications | get_app_conf(oauth2_proxy_application_id, 'credentials.oauth2_proxy_cookie_secret', True) }}"
|
|
cookie_secure = "true" # True is necessary to force the cookie set via https
|
|
upstreams = "http://{{ applications | get_app_conf(oauth2_proxy_application_id, 'oauth2_proxy.application', True) }}:{{ applications | get_app_conf(oauth2_proxy_application_id, 'oauth2_proxy.port', True) }}"
|
|
cookie_domains = ["{{ domains | get_domain(oauth2_proxy_application_id) }}", "{{ domains | get_domain('web-app-keycloak') }}"] # Required so cookie can be read on all subdomains.
|
|
whitelist_domains = [".{{ PRIMARY_DOMAIN }}"] # Required to allow redirection back to original requested target.
|
|
|
|
# keycloak provider
|
|
client_secret = "{{ OIDC.CLIENT.SECRET }}"
|
|
client_id = "{{ OIDC.CLIENT.ID }}"
|
|
redirect_url = "{{ WEB_PROTOCOL }}://{{ domains | get_domain(oauth2_proxy_application_id) }}/oauth2/callback"
|
|
oidc_issuer_url = "{{ OIDC.CLIENT.ISSUER_URL }}"
|
|
provider = "oidc"
|
|
provider_display_name = "{{ OIDC.BUTTON_TEXT }}"
|
|
|
|
{% if applications | get_app_conf(oauth2_proxy_application_id, 'oauth2_proxy.allowed_groups', False) %}
|
|
{# role based restrictions #}
|
|
scope = "openid email profile {{ RBAC.GROUP.CLAIM }}"
|
|
oidc_groups_claim = "{{ RBAC.GROUP.CLAIM }}"
|
|
allowed_groups = {{ applications | get_app_conf(oauth2_proxy_application_id, 'oauth2_proxy.allowed_groups', True) | to_json }}
|
|
email_domains = ["*"]
|
|
{% else %}
|
|
email_domains = "{{ PRIMARY_DOMAIN }}"
|
|
{% endif %}
|
|
|
|
session_store_type = "redis"
|
|
redis_connection_url = "redis://redis:6379" |