- 12 Oct, 2023 5 commits
-
-
Titouan Soulard authored
-
Titouan Soulard authored
-
Jérome Perrin authored
-
Jérome Perrin authored
after 6e8b97ee (Publish IPv6 URL to SlapOs master., 2023-10-02) the parameters are different
-
Jérome Perrin authored
after recent updates, probably 3c514224 (component/freetype: version up 2.13.2, including security fixes., 2023-10-10), the rendering is different.
-
- 11 Oct, 2023 2 commits
-
-
Kazuhiko Shiozaki authored
-
Kazuhiko Shiozaki authored
-
- 10 Oct, 2023 6 commits
-
-
Kazuhiko Shiozaki authored
-
Kazuhiko Shiozaki authored
-
Kazuhiko Shiozaki authored
-
Kazuhiko Shiozaki authored
-
Jérome Perrin authored
See merge request nexedi/slapos!1443
-
Jérome Perrin authored
See merge request nexedi/slapos!1437
-
- 09 Oct, 2023 3 commits
-
-
Kazuhiko Shiozaki authored
-
Kazuhiko Shiozaki authored
-
Kazuhiko Shiozaki authored
-
- 06 Oct, 2023 4 commits
-
-
Kazuhiko Shiozaki authored
-
Kazuhiko Shiozaki authored
-
Kazuhiko Shiozaki authored
-
Jérome Perrin authored
favicon, manifest and service worker do not need to be public, for manifest it's required to explicitly make the link use credential.
-
- 05 Oct, 2023 4 commits
-
-
Łukasz Nowak authored
-
Łukasz Nowak authored
Call to logrotate-setup-validate can take a lot of time and fill the state file with some message from logrotate and in the same time the promise can kick in resulting with false-positive alarm. By using the temporary file such race condition is avoided. Promise running periodically will detect problem with logrotate setup.
-
Jérome Perrin authored
also update related python packages in stack/slapos.cfg
-
Jérome Perrin authored
adjust peertube to explicitly use 16.19.0 as this version does not support nodejs 18 drop some unused versions
-
- 04 Oct, 2023 4 commits
-
-
Jérome Perrin authored
-
Jérome Perrin authored
-
Łukasz Nowak authored
While generating haproxy configuration (including it's CRT list) the specific order of entries is used, so that wildcard domains end up last. Thanks to this they work as a catch-all and allow specific domain to take precedence. Care is taken to support *.example.example.com and *.example.com situation - so tree like possibility of wildcards. Anonymous in-place ACL are used per each domain, instead of per-shared instance grouping in order to avoid situation like *.example.com and example.com having single ACL, thus resulting with catch-all kicking in too fast. For the precision in the haproxy configuration and simplifcation of the regular expressions the -m reg is used, so that host_only can be applied, which also lowercases the hostname. Notes: * test00cluster_request_instance_parameter_dict changed due to sorting slaves in test's requestSlaves * the test infrastructure has been improved to assure repetition of the situation * tests in TestSlaveHostHaproxyClash are asserting that correct domain AND that specific certificate have been used while serving given frontend configuration
-
Joanne Hugé authored
-
- 02 Oct, 2023 5 commits
-
-
Jérome Perrin authored
A similar patches as ca-certificates-sbin-dir was applied upstream as 4f0d3ec7aa4ebc91793245ed66c0e24d7150782b , the rest of our patch was to use mkdir -p instead of mkdir, we keep this part in ca-certificates-mkdir-p.patch This introduces a new patch to not depend on cryptography, which is used only to print a warning on the console when an expired certificate is used.
-
Jérome Perrin authored
We had a mechanism to catch usage of system python2, but using not for system python3, which cause the same kind of problems.
-
Jérome Perrin authored
On old debian (9) where python3 is python3.5 this component fails to build with an error like: Configuring gdbus-example-objectmanager-visibility.h with command Running command: /opt/slapgrid/shared/glib/60e920f1feec2451d51bb344cfcad9ab/.build/glib-2.76.3/tools/gen-visibility-macros.py 2.0 visibility-macros GDBUS_OBJECT_MANAGER_EXAMPLE /opt/slapgrid/shared/glib/60e920f1feec2451d51bb344cfcad9ab/.build/glib-2.76.3/builddir/gio/tests/gdbus-object-manager-example/gdbus-example-objectmanager-visibility.h --- stdout --- --- stderr --- File "/opt/slapgrid/shared/glib/60e920f1feec2451d51bb344cfcad9ab/.build/glib-2.76.3/tools/gen-visibility-macros.py", line 37 """ ^ SyntaxError: invalid syntax This is because this gen-visibility-macros.py script is executable with a shebang: #!/bin/env python3 for python 3 softwares, this is slapos python, because the python section from component/defaults.cfg injects the slapos' python in PATH, but for python 2 software, slapos' python 2 is injected in path and `python3` resolves to system python, which in that case fails because f-strings are SyntaxError but more generally this showed a dependency to system python, but we can not rely on system python here.
-
Ivan Tyagov authored
See merge request nexedi/slapos!1438
-
Ivan Tyagov authored
-
- 29 Sep, 2023 3 commits
-
-
Thomas Gambier authored
this is a fixup of 54a08186
-
Thomas Gambier authored
-
Thomas Gambier authored
For slapos-node package compilation, we use DESTDIR pointing to temp location and PREFIX pointing to future /opt/slapos. Without this commit, bison look at wrong directory for data: bison: cannot open file `/opt/slapos/parts/bison/share/bison/m4sugar/m4sugar.m4'
-
- 28 Sep, 2023 3 commits
-
-
Thomas Gambier authored
-
Jérome Perrin authored
We configure haproxy with "verify optional", which makes haproxy request a client certificate, but accept the case where client does not present a certificate, but as described in [1], if client present a certificate and this certificate can not be verified, handshake is aborted. This is not what we want, we want to treat the case of a non verified certificate same as the case of the absence of certificate. This configures haproxy accordingly, using "crt-ignore-err all" to allow handshake anyway. Once this was fixed, there was a remaining problem with client_cert_verified acl, haproxy acl are OR, but this rule was supposed to be a AND (client present a certificate AND it is verified), this was rewritten to use inline condition which are AND. [1]: https://cbonte.github.io/haproxy-dconv/1.8/configuration.html#5.1-verify Also adjust test_x_forwarded_for_stripped_when_no_certificate to assert that there is no X-Forwarded-For header at all when no client certificate.
-
Xavier Thompson authored
-
- 27 Sep, 2023 1 commit
-
-
Kazuhiko Shiozaki authored
-