2 # Copyright © 2018 Amdocs, Bell Canada, AT&T
3 # Modifications Copyright © 2023 Nordix Foundation
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
9 # http://www.apache.org/licenses/LICENSE-2.0
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
19 stats socket /usr/local/etc/haproxy/haproxy.socket mode 660 level admin
21 # it is required else pod will not come up
26 #################################
27 # Default SSL material locations#
28 #################################
29 ca-base /etc/ssl/certs
30 crt-base /etc/ssl/private
32 # Default ciphers to use on SSL-enabled listening sockets.
33 # For more information, see ciphers(1SSL). This list is from:
34 # https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/
35 # An alternative list with additional directives can be obtained from
36 # https://mozilla.github.io/server-side-tls/ssl-config-generator/?server=haproxy
37 tune.ssl.default-dh-param 2048
45 http-check send meth GET uri /aai/util/echo ver HTTP/1.1 hdr Host aai hdr X-TransactionId haproxy-0111 hdr X-FromAppId haproxy hdr Accept application/json hdr Authorization 'Basic QUFJOkFBSQ=='
46 default-server init-addr none
48 # errorfile 400 /etc/haproxy/errors/400.http
49 # errorfile 403 /etc/haproxy/errors/403.http
50 # errorfile 408 /etc/haproxy/errors/408.http
51 # errorfile 500 /etc/haproxy/errors/500.http
52 # errorfile 502 /etc/haproxy/errors/502.http
53 # errorfile 503 /etc/haproxy/errors/503.http
54 # errorfile 504 /etc/haproxy/errors/504.http
56 option http-server-close
57 option forwardfor except 127.0.0.1
64 timeout http-keep-alive 30000
68 http-request use-service prometheus-exporter if { path /metrics }
75 bind 0.0.0.0:8443 name https ssl crt /opt/app/osaaf/local/certs/fullchain.pem
76 # log-format %ci:%cp\ [%t]\ %ft\ %b/%s\ %Tq/%Tw/%Tc/%Tr/%Tt\ %ST\ %B\ %CC\ %CS\ %tsc\ %ac/%fc/%bc/%sc/%rc\ %sq/%bq\ %hr\ %hs\ {%[ssl_c_verify],%{+Q}[ssl_c_s_dn],%{+Q}[ssl_c_i_dn]}\ %{+Q}r
77 log-format "%ci:%cp [%tr] %ft %b/%s %TR/%Tw/%Tc/%Tr/%Ta %ST %B %CC \ %CS %tsc %ac/%fc/%bc/%sc/%rc %sq/%bq %hr %hs %{+Q}r"
82 capture request header Host len 100
83 capture response header Host len 100
84 option log-separate-errors
87 http-request set-header X-Forwarded-Proto https
88 http-request add-header X-Forwarded-Port 8443
90 http-request set-header X-Forwarded-Proto https if { ssl_fc }
91 http-request set-header X-AAI-Client-SSL TRUE if { ssl_c_used }
92 http-request set-header X-AAI-SSL %[ssl_fc]
93 http-request set-header X-AAI-SSL-Client-Verify %[ssl_c_verify]
94 http-request set-header X-AAI-SSL-Client-DN %{+Q}[ssl_c_s_dn]
95 http-request set-header X-AAI-SSL-Client-CN %{+Q}[ssl_c_s_dn(cn)]
96 http-request set-header X-AAI-SSL-Issuer %{+Q}[ssl_c_i_dn]
97 http-request set-header X-AAI-SSL-Client-NotBefore %{+Q}[ssl_c_notbefore]
98 http-request set-header X-AAI-SSL-Client-NotAfter %{+Q}[ssl_c_notafter]
99 http-request set-header X-AAI-SSL-ClientCert-Base64 %{+Q}[ssl_c_der,base64]
100 http-request set-header X-AAI-SSL-Client-OU %{+Q}[ssl_c_s_dn(OU)]
101 http-request set-header X-AAI-SSL-Client-L %{+Q}[ssl_c_s_dn(L)]
102 http-request set-header X-AAI-SSL-Client-ST %{+Q}[ssl_c_s_dn(ST)]
103 http-request set-header X-AAI-SSL-Client-C %{+Q}[ssl_c_s_dn(C)]
104 http-request set-header X-AAI-SSL-Client-O %{+Q}[ssl_c_s_dn(O)]
105 #######################################
106 ## Request blocking configuration ###
107 #######################################
108 {{- if eq $.Values.haproxy.requestBlocking.enabled true }}
109 {{- range $custom_config := $.Values.haproxy.requestBlocking.customConfigs }}
114 #######################
115 #ACLS FOR PORT 8446####
116 #######################
118 acl is_Port_8446_generic path_reg -i ^/aai/v[0-9]+/search/generic-query$
119 acl is_Port_8446_nodes path_reg -i ^/aai/v[0-9]+/search/nodes-query$
120 acl is_Port_8446_version path_reg -i ^/aai/v[0-9]+/query$
121 acl is_dsl path_reg -i ^/aai/v[0-9]+/dsl$
122 acl is_named-query path_beg -i /aai/search/named-query
123 acl is_search-model path_beg -i /aai/search/model
124 use_backend IST_AAI_8446 if is_Port_8446_generic or is_Port_8446_nodes or is_Port_8446_version or is_named-query or is_search-model or is_dsl
126 default_backend IST_Default_8447
129 #######################
130 #DEFAULT BACKEND 8447##
131 #######################
133 backend IST_Default_8447
135 stick-table type string len 100 size 200k expire 2m
137 http-request set-header X-Forwarded-Port %[src_port]
138 http-response set-header Strict-Transport-Security max-age=16000000;\ includeSubDomains;\ preload;
139 server-template aai-resources.{{.Release.Namespace}} {{$.Values.haproxy.replicas.aaiResources}} aai-resources.{{.Release.Namespace}}.svc.cluster.local:8447 resolvers kubernetes check check-ssl port 8447 ssl verify none
142 #######################
143 # BACKEND 8446#########
144 #######################
148 stick-table type string len 100 size 200k expire 2m
150 http-request set-header X-Forwarded-Port %[src_port]
151 http-response set-header Strict-Transport-Security max-age=16000000;\ includeSubDomains;\ preload;
152 server-template aai-traversal.{{.Release.Namespace}} {{$.Values.haproxy.replicas.aaiTraversal}} aai-traversal.{{.Release.Namespace}}.svc.cluster.local:8446 resolvers kubernetes check check-ssl port 8446 ssl verify none
161 stats auth admin:admin
163 stats show-desc IST AAI APPLICATION NODES