NethServer / ns8-traefik

NS8 Traefik configuration

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Traefik

This module implements a proxy for web applications using Traefik.

The following table summarizes the available actions and the role(s) required to invoke them. For simplicity, the builtin owner and reader roles are omitted.

Action Roles
set-route routeadm, fulladm
get-route routeadm, fulladm
delete-route routeadm, fulladm
list-routes routeadm, fulladm
set-certificate certadm, fulladm
get-certificate certadm, fulladm
delete-certificate certadm, fulladm
list-certificates certadm, fulladm
set-acme-server
get-acme-server
upload-certificate

set-route

This action creates HTTP routes based on a combination of host and path, is possible to define three type of rules:

  • only host: These rules will capture all the requests directed to a specific host
  • host and path: These rules will capture all the requests directed to a specific combination of host and path prefix
  • only path: These rules will capture all the requests directed to a specific path prefix, regardless of the host.

This is the priority of the rules type evaluation (top-down):

  1. host and path
  2. only host
  3. only path

Parameters

  • instance: the instance name, which is unique inside the cluster, mandatory
  • url: the backend target URL, mandatory
  • host: a fully qualified domain name as virtual host
  • path: a path prefix, the matching evaluation will be performed whit and without the trailing slash, eg /foo will match /foo and /foo/*, also /foo/ will match /foo and /foo/*
  • lets_encrypt: can be true or false, if set to true request a valid Let's Encrypt certificate, mandatory
  • http2https can be true or false, if set to true HTTP will be redirect to HTTPS, mandatory
  • strip_prefix: can be true or false, if set to true the prefix of the requested path will be stripped from the original request before sending it to the downstream server.
  • user_created: can be true or false, if set to true the route will be marked as manually created.
  • headers: list of headers to add/remove from an HTTP request/response before reaching the service/client, to remove the the header an empty value must be set. Example:
      "headers": {
        "request": {
          "X-foo-add": "foo",
          "X-bar-remove": ""
        },
        "response": {
          "X-bar-add": "bar",
          "X-foo-remove": ""
        }
      }
  • forward_auth: prop to configure the forwardAuth config, to remove the the header an empty value must be set. Example:
      "forward_auth": {
        "address": "http://127.0.0.1:9311/api/module/test/http-basic/test-action",
        "skip_tls_verify": true
      }

Examples

Only host

api-cli run set-route --agent module/traefik1 --data - <<EOF
{
  "instance": "module1",
  "url": "http://127.0.0.1:2000",
  "host": "module.example.org",
  "lets_encrypt": true,
  "http2https": true
}
EOF

host and path

api-cli run set-route --agent module/traefik1 --data - <<EOF
{
  "instance": "module1",
  "url": "http://127.0.0.1:2000",
  "host": "module.example.org",
  "path": "/foo",
  "lets_encrypt": true,
  "http2https": true
}
EOF

Only path

api-cli run set-route --agent module/traefik1 --data - <<EOF
{
  "instance": "module1",
  "url": "http://127.0.0.1:2000",
  "path": "/foo",
  "lets_encrypt": true,
  "http2https": true
}
EOF

With forward_auth

api-cli run set-route --agent module/traefik1 --data - <<EOF
{
  "instance": "module1",
  "url": "http://127.0.0.1/add-module1",
  "host": "127.0.0.1",
  "lets_encrypt": false,
  "http2https": false,
  "forward_auth": {
      "address": "http://127.0.0.1:9311/api/module/module1/http-basic/add-module1",
      "skip_tls_verify": true
  }
}
EOF

get-route

This action get an existing route. It returns a JSON object that describes the route configuration, if the route is not found an empty JSON object is returned. The action takes 1 parameter:

  • instance: the instance name

Example:

api-cli run get-route --agent module/traefik1 --data '{"instance": "module1"}'

Output:

{"instance": "module3", "host": "module.example.org", "path": "/foo", "url": "http://127.0.0.1:2000", "lets_encrypt": true, "http2https": true, "strip_prefix": false}

delete-route

This action delets an existing route. It can be used when removing a module instance. The action takes 1 parameter:

  • instance: the instance name

Example:

api-cli run delete-route --agent module/traefik1 --data '{"instance": "module1"}'

list-routes

This action returns a list of configured routes, the list is an JSON array, and if no route is configured, an empty array is returned.

The action takes 1 optional parameter:

  • expand_list: if set to true the list will be expanded with all route's details

Example:

api-cli run list-routes --agent module/traefik1

Output:

["module1", "module2", "module3"]

Example list expanded:

api-cli run list-routes --agent module/traefik1 --data '{"expand_list": true}'

Output:

[
  {
    "instance": "module1",
    "host": "module.example.org",
    "url": "http://127.0.0.1:2000",
    "lets_encrypt": true,
    "http2https": true
  },
  {
    "instance": "module2",
    "host": "module.example.org",
    "path": "/foo",
    "url": "http://127.0.0.1:2000",
    "lets_encrypt": true,
    "http2https": true,
    "strip_prefix": false
  },
  {
    "instance": "module3",
    "path": "/foo",
    "url": "http://127.0.0.1:2000",
    "lets_encrypt": false,
    "http2https": true,
    "strip_prefix": false
  }
]

set-certificate

Run this action to request a Let's Encrypt certificate if HTTP-01 challenge requirements are met.

It can be used when there is no hostname (or hostname + path) route configured on traefik module or if the service is not make accessible via traefik.

The action takes 3 parameters:

  • fqdn: the fqdn of the requested certificate
  • sync: wait until the certificate is obtained before return, default false.
  • sync_timeout: Max number of seconds to wait for the certificate to be obtained, default 120.

Example:

api-cli run set-certificate --agent module/traefik1 --data "{\"fqdn\": \"$(hostname -f)\""

Output:

{"fqdn": "example.com", "obtained": true}

get-certificate

Run this action to get the status of requested a Let's Encrypt certificate

The action takes 1 parameter:

  • fqdn: the fqdn of the requested certificate

Example:

api-cli run get-certificate --agent module/traefik1 --data "{\"fqdn\": \"$(hostname -f)\""

Output:

{"fqdn": "example.com", "obtained": true}

delete-certificate

This action deletes an existing route used for explicit request a certificate.

NB. The certificate will not actually be removed from traefik and if the conditions will remain in place it will be renewed.

The action takes 1 parameter:

  • fqdn: the fqdn of the requested certificate

Example:

api-cli run delete-certificate --agent module/traefik1 --data "{\"fqdn\": \"$(hostname -f)\""

list-certificates

This action returns a list of requested certificate, the list is an JSON array, and if no certificate was requested, an empty array is returned.

The action takes 1 optional parameter:

  • expand_list: if set to true the list will be expanded with all certificate's details

Example:

api-cli run list-certificates --agent module/traefik1

Output:

["example.com"]

Example list expanded:

api-cli run list-certificates --agent module/traefik1 --data '{"expand_list": true}'

Output:

[{"fqdn": "example.com", "obtained": false}]

set-acme-server

This action allows setting an ACME server that traefik will use to request the HTTPS certificates. The default ACME server used is Let's Encrypt.

The action takes 1 parameter:

  • url: ACME server URL

Example:

api-cli run set-acme-server  --agent module/traefik1 --data '{"url":"https://acme-staging-v02.api.letsencrypt.org/directory"}

get-acme-server

This action returns the current configured ACME server.

The action takes no parameter.

Example:

api-cli run get-acme-server  --agent module/traefik1

Output:

{"url": "https://acme-staging-v02.api.letsencrypt.org/directory"}

upload-certificate

Action allowing the upload of custom certificates to Traefik.

Action takes two parameters:

  • certFile: Certificate (or a chain of certificates) to upload, base64 encoded.
  • keyfile: Key used to generate the certificate, also base64 encoded.

Example:

api-cli run module/traefik1/upload-certificate --data '{"certFile":"LS0tLS1CRUdJTiBSU0EgU...","keyFile":"LS0tLS1CRUdJTiBSU0EgU..."}'

About

NS8 Traefik configuration

License:GNU General Public License v3.0


Languages

Language:Python 61.9%Language:RobotFramework 20.7%Language:Shell 17.0%Language:HTML 0.3%