Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[5.0] Terminate ssl on haproxy (bsc#1149535) #2347

Open
wants to merge 2 commits into
base: stable/5.0-pike
Choose a base branch
from

Conversation

bbobrov
Copy link
Contributor

@bbobrov bbobrov commented Jan 24, 2020

If ssl is passed-thru on haproxy, the source ip gets replaced with
the one of the node where haproxy lives, and there is no way to get the
original ip on the services side.

Add ssl termination on haproxy. Two new hidden options are added:
loadbalancer_terminate_ssl (boolean) and pemfile (path to the
certificate to use in haproxy-recognized format).

@bbobrov bbobrov changed the title Terminate nova ssl on haproxy (bsc#1149535) [5.0] Terminate nova ssl on haproxy (bsc#1149535) Jan 24, 2020
@bbobrov bbobrov changed the title [5.0] Terminate nova ssl on haproxy (bsc#1149535) [5.0] Terminate ssl on haproxy (bsc#1149535) Jan 27, 2020
chef/data_bags/crowbar/template-cinder.json Outdated Show resolved Hide resolved
chef/data_bags/crowbar/template-nova.json Outdated Show resolved Hide resolved
Boris Bobrov added 2 commits March 27, 2020 14:41
If ssl is passed-thru on haproxy, the source ip gets replaced with
the one of the node where haproxy lives, and there is no way to get the
original ip on the services side.

Add ssl termination on haproxy. Two new hidden options are added:
loadbalancer_terminate_ssl (boolean) and pemfile (path to the
certificate to use in haproxy-recognized format).

(cherry picked from commit 94fc788)
If ssl is passed-thru on haproxy, the source ip gets replaced with
the one of the node where haproxy lives, and there is no way to get the
original ip on the services side.

Add ssl termination on haproxy. Two new hidden options are added:
loadbalancer_terminate_ssl (boolean) and pemfile (path to the
certificate to use in haproxy-recognized format).

This patch adds support for cinder.

(cherry picked from commit 44e0f6a)
@@ -0,0 +1,12 @@
def upgrade(template_attrs, template_deployment, attrs, deployment)
key = "loadbalancer_terminate_ssl"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what about the pemfile?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

you are right, and the same problem exists in other pull requests. Thanks, will do

@JanZerebecki
Copy link
Contributor

Needs to be refreshed with the changes from master.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

Successfully merging this pull request may close these issues.

4 participants