Commit Graph

43 Commits

Author SHA1 Message Date
Kevin Fenzi
a6c096617b proxies: openshift rdu3
So, we renamed the cluster with the ocp-rdu3 name, so drop all this
special handling. All the proxies should be able to reach it by that
name and via the vpn endpoints it has.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-06-16 11:10:08 -07:00
Kevin Fenzi
880e83dd43 proxies / rdu3: fix ca filename
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-06-14 14:51:21 -07:00
Kevin Fenzi
e7e6db8d8d proxies: rename ocp4-rdu3 to ocp4_rdu3 to hopefully get jinja2 to leave it alone
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-06-14 14:30:00 -07:00
Kevin Fenzi
e1132667d3 proxies: add a ocp-rdu3 site/endpoint to get to the new rdu3 prod openshift
We can't use easily the existing hostname/site, as that goes to the
current iad2 cluster, so setup a -rdu3 version for now.
After we switch we can drop this and repoint the main one to the new
cluster.

Hopefully this all works and does the right thing.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-06-14 12:35:20 -07:00
Kevin Fenzi
531eee95d3 proxies / reverseproxy: try and fix template to be correct.
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-12-03 20:39:13 -08:00
Kevin Fenzi
3c5ae163f9 proxy: simplify reverseproxy template
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-12-03 20:29:36 -08:00
Kevin Fenzi
b1b0923af0 openshift 3.11: raise a glass!
Our openshift 3.11 cluster(s) served us long and well.

Now we have everything finally moved to the openshift 4 clusters (fas2
was the last holdout). We can finally retire this. :)

🎉🥂

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-11-28 13:08:01 -08:00
Kevin Fenzi
91ccdea73f proxies: Reach ocp4 cluster in prod over vpn instead of sending 421
I think I handled all the special cases here already.
We want to switch non iad2 proxies to reach the oco4 cluster over it's
vpn now that it has one. This should allow us to still keep ipv6
available for applications and not have to change dns for moving from
ocp3 cluster anymore. Will roll this out slowly to one proxy then
another, then the rest if it all looks ok.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-06-13 10:08:48 -07:00
Kevin Fenzi
80ef5e47df proxies / reverseproxypass: try and only 421 ocp4 non iad2 proxies
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-06-05 13:44:02 -07:00
Kevin Fenzi
7e90378b30 proxies / reverseproxy: Try and clean up logic and whitespace.
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-06-05 11:24:24 -07:00
Kevin Fenzi
77bdc05883 proxies / reverseproxy: work around taskotron with its own config
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-06-04 14:04:07 -07:00
Kevin Fenzi
7455b3fdb1 proxies / reverseproxy: fix missing )
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-06-03 14:22:13 -07:00
Kevin Fenzi
52a8936914 proxies: rework reversepassproxy and mark all ocp4 / ocp3 apps
The ocp3 cluster is reachable/available via the vpn, so any proxy can
reach it.

The ocp4 cluster is (at least for now) only reachable/available from the
iad2 proxies (proxy01/proxy10).

There's a firefox bug that causes it to reuse h2 connections, and in
some cases try and request something of a non iad2 proxy that it can't
reach. To work around this in those cases we need to send a 421 back to
the client so it doesn't do that.

This moves that logic into the template so all ocp4: true hosts do this
by default. Also, we default the balancer nodes so we only have to
change them in one place if we remove/add a compute node.

Finally, we mark all the ocp3 apps with 'ocp4: false' so we know what
they are and can move them more easily.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-06-03 13:14:28 -07:00
David Kirwan
55185861c8 metrics-for-apps:
- Updating apache proxy config to handle ocp4 CA cert
- place ocp4 CA cert on proxies
- add ocp4 stg ca cert to haproxy/files

Signed-off-by: David Kirwan <dkirwan@redhat.com>
2021-08-13 20:02:38 +00:00
Frank Ch. Eigler
77d79cfe8a debuginfod proxy: fix ProxyPassReverse typo (no proxyopts there) 2021-04-08 21:53:30 +00:00
Frank Ch. Eigler
c37d51d236 proxies/debuginfod: allow proxyopts
debuginfod can take O(60s) to run certain webapi queries, so the httpd
mod_proxy default timeouts are too short.  Introduce an ansible
variable "proxyopts", expanded into the httpd ProxyPass and
ProxyPassReverse configuration lines.  Default to "", but set it
with pretty generous limits for debuginfod only.
2021-04-08 20:58:52 +00:00
Patrick Uiterwijk
38dd9cef43 Fix closing quotes and remotepath handling in the balancer members
Signed-off-by: Patrick Uiterwijk <patrick@puiterwijk.org>
2019-03-29 11:44:01 +01:00
Patrick Uiterwijk
b70d43904d Fix broken websocket proxying by double slash in request_uri matching
Signed-off-by: Patrick Uiterwijk <patrick@puiterwijk.org>
2019-03-29 11:39:29 +01:00
Tim Flink
16b791a146 proxies: adding rewritecond to reverseproxy for ws if remotepath exists
I was hitting an issue where there were multiple reverseproxy instances
configured for a single host and some of the rewrite rules were changing
the request when they shouldn't be.

This patch adds a rewritecond to the websocket rewrite rule to make sure that
the REQUEST_URI starts with $remotepath before it's rewritten.
2019-03-25 16:56:20 +00:00
Tim Flink
16c2787a56 proxies: Adding remotepath to websocket balancers
The current template assumes that websockets are at the base of a URL
but that is not true for our buildmaster. This patch adds remotepath
to the end of the websocket url if remotepath is defined.
2019-03-22 15:23:28 +00:00
Patrick Uiterwijk
afde4968e5 And do https if not disabled
Signed-off-by: Patrick Uiterwijk <patrick@puiterwijk.org>
2018-11-23 21:50:45 +01:00
Patrick Uiterwijk
158847f9b5 OpenQA is non-HTTPS for backend, sadly
Signed-off-by: Patrick Uiterwijk <patrick@puiterwijk.org>
2018-11-23 21:49:46 +01:00
Patrick Uiterwijk
ee0748715a Allow the HTTP Connection header to contain more for websockets
Firefox is hell-bent on sending "keep-alive, Upgrade", which did not match
^Upgrade$....
Let's accept either.

Signed-off-by: Patrick Uiterwijk <patrick@puiterwijk.org>
2018-11-23 21:38:40 +01:00
Patrick Uiterwijk
3ffd179216 Simplify reverseproxy for openshift and setup SSL config for it
Signed-off-by: Patrick Uiterwijk <patrick@puiterwijk.org>
2018-09-28 18:46:08 +02:00
Patrick Uiterwijk
12186da25f Fix websockets for prod openshift
Signed-off-by: Patrick Uiterwijk <patrick@puiterwijk.org>
2018-09-12 17:33:01 +02:00
Patrick Uiterwijk
b97a401f57 Make WebSocket possible for (app.)os.stg.fedoraproject.org
Signed-off-by: Patrick Uiterwijk <patrick@puiterwijk.org>
2018-09-12 01:24:30 +02:00
Patrick Uiterwijk
f483a219df Move remote path around
Signed-off-by: Patrick Uiterwijk <puiterwijk@redhat.com>
2018-05-31 23:29:03 +02:00
Patrick Uiterwijk
9b1fd99655 Fix balancer reversed
Signed-off-by: Patrick Uiterwijk <puiterwijk@redhat.com>
2018-05-31 23:25:20 +02:00
Patrick Uiterwijk
ab4c8f3521 Fix trailing slash on balancer
Signed-off-by: Patrick Uiterwijk <puiterwijk@redhat.com>
2018-05-31 21:35:01 +02:00
Patrick Uiterwijk
f3fb0336e3 Enable TLS proxying
Signed-off-by: Patrick Uiterwijk <puiterwijk@redhat.com>
2018-05-31 21:21:51 +02:00
Patrick Uiterwijk
f027845144 There is no elif, just an else
Signed-off-by: Patrick Uiterwijk <puiterwijk@redhat.com>
2017-10-10 15:12:58 +00:00
Patrick Uiterwijk
3233cc1388 Allow mod_proxy_balancer optionally
Signed-off-by: Patrick Uiterwijk <patrick@puiterwijk.org>
2017-10-10 17:07:48 +02:00
Patrick Uiterwijk
e714c9dcb5 Add expect clear header
Signed-off-by: Patrick Uiterwijk <puiterwijk@redhat.com>
2016-12-09 14:18:30 +00:00
Patrick Uiterwijk
c0b7382df2 Allow to keep the host header through a setting
Signed-off-by: Patrick Uiterwijk <puiterwijk@redhat.com>
2016-03-10 22:07:34 +00:00
Patrick Uiterwijk
62a0372a38 Add the de-facto x-forwarded-proto
Signed-off-by: Patrick Uiterwijk <puiterwijk@redhat.com>
2016-01-15 09:34:32 +00:00
Patrick Uiterwijk
2b1d97f004 Set the X-Scheme header as we agreed on
Signed-off-by: Patrick Uiterwijk <puiterwijk@redhat.com>
2015-02-11 09:47:49 +00:00
Ralph Bean
0ec6d0e2e1 Whitespace. 2014-12-08 17:40:07 +00:00
Ralph Bean
5ac9136973 Some apps need to set this header. 2014-12-08 17:37:48 +00:00
Ralph Bean
bfd7cb3b5f whitespace. 2014-12-08 17:22:20 +00:00
Ralph Bean
edec8eb95e This is non-essential. 2014-12-08 15:50:34 +00:00
Ralph Bean
4dce7b2b3a Whitespace. 2014-12-08 15:48:38 +00:00
Ralph Bean
d2502b2754 Prune reversepassproxy configs. 2014-12-08 15:47:36 +00:00
Ralph Bean
30dfd807ba First try at a reversepassproxy role. 2014-12-08 15:40:15 +00:00