Skip to content

Commit

Permalink
Only allow localhost access, temporarily (#7)
Browse files Browse the repository at this point in the history
  • Loading branch information
ivan-c authored Oct 17, 2024
1 parent b772989 commit b33e861
Show file tree
Hide file tree
Showing 6 changed files with 37 additions and 0 deletions.
6 changes: 6 additions & 0 deletions dev/alive/docker-compose.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,9 @@ services:
- traefik.http.routers.alive-coreapi-${COMPOSE_PROJECT_NAME}.tls=true
- traefik.http.routers.alive-coreapi-${COMPOSE_PROJECT_NAME}.tls.certresolver=letsencrypt

# TODO remove after auth implemented via oauth2-proxy
# only allow access from localhost and CIRG IP ranges
- traefik.http.routers.alive-coreapi-${COMPOSE_PROJECT_NAME}.middlewares=limit-access-to-cirg-dc-cidr
node:
labels:
- traefik.enable=true
Expand All @@ -32,5 +35,8 @@ services:
- traefik.http.routers.alive-node-${COMPOSE_PROJECT_NAME}.tls=true
- traefik.http.routers.alive-node-${COMPOSE_PROJECT_NAME}.tls.certresolver=letsencrypt

# TODO remove after auth implemented via oauth2-proxy
# only allow access from localhost and CIRG IP ranges
- traefik.http.routers.alive-node-${COMPOSE_PROJECT_NAME}.middlewares=limit-access-to-cirg-dc-cidr
volumes:
leaf-alive-mssql:
6 changes: 6 additions & 0 deletions dev/gateway/docker-compose.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,9 @@ services:
- traefik.http.routers.gateway-coreapi-${COMPOSE_PROJECT_NAME}.tls=true
- traefik.http.routers.gateway-coreapi-${COMPOSE_PROJECT_NAME}.tls.certresolver=letsencrypt

# TODO remove after auth implemented via oauth2-proxy
# only allow access from localhost and CIRG IP ranges
- traefik.http.routers.gateway-coreapi-${COMPOSE_PROJECT_NAME}.middlewares=limit-access-to-cirg-dc-cidr
node:
extends:
file: ../common-services.yaml
Expand All @@ -35,6 +38,9 @@ services:
- traefik.http.routers.gateway-node-${COMPOSE_PROJECT_NAME}.tls=true
- traefik.http.routers.gateway-node-${COMPOSE_PROJECT_NAME}.tls.certresolver=letsencrypt

# TODO remove after auth implemented via oauth2-proxy
# only allow access from localhost and CIRG IP ranges
- traefik.http.routers.gateway-node-${COMPOSE_PROJECT_NAME}.middlewares=limit-access-to-cirg-dc-cidr
clin-db:
extends:
file: ../common-services.yaml
Expand Down
6 changes: 6 additions & 0 deletions dev/hymtruth/docker-compose.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,9 @@ services:
- traefik.http.routers.hymtruth-coreapi-${COMPOSE_PROJECT_NAME}.tls=true
- traefik.http.routers.hymtruth-coreapi-${COMPOSE_PROJECT_NAME}.tls.certresolver=letsencrypt

# TODO remove after auth implemented via oauth2-proxy
# only allow access from localhost and CIRG IP ranges
- traefik.http.routers.hymtruth-coreapi-${COMPOSE_PROJECT_NAME}.middlewares=limit-access-to-cirg-dc-cidr
node:
labels:
- traefik.enable=true
Expand All @@ -32,5 +35,8 @@ services:
- traefik.http.routers.hymtruth-node-${COMPOSE_PROJECT_NAME}.tls=true
- traefik.http.routers.hymtruth-node-${COMPOSE_PROJECT_NAME}.tls.certresolver=letsencrypt

# TODO remove after auth implemented via oauth2-proxy
# only allow access from localhost and CIRG IP ranges
- traefik.http.routers.hymtruth-node-${COMPOSE_PROJECT_NAME}.middlewares=limit-access-to-cirg-dc-cidr
volumes:
leaf-hymtruth-mssql:
6 changes: 6 additions & 0 deletions dev/mash/docker-compose.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,9 @@ services:
- traefik.http.routers.mash-coreapi-${COMPOSE_PROJECT_NAME}.tls=true
- traefik.http.routers.mash-coreapi-${COMPOSE_PROJECT_NAME}.tls.certresolver=letsencrypt

# TODO remove after auth implemented via oauth2-proxy
# only allow access from localhost and CIRG IP ranges
- traefik.http.routers.mash-coreapi-${COMPOSE_PROJECT_NAME}.middlewares=limit-access-to-cirg-dc-cidr
node:
labels:
- traefik.enable=true
Expand All @@ -32,5 +35,8 @@ services:
- traefik.http.routers.mash-node-${COMPOSE_PROJECT_NAME}.tls=true
- traefik.http.routers.mash-node-${COMPOSE_PROJECT_NAME}.tls.certresolver=letsencrypt

# TODO remove after auth implemented via oauth2-proxy
# only allow access from localhost and CIRG IP ranges
- traefik.http.routers.mash-node-${COMPOSE_PROJECT_NAME}.middlewares=limit-access-to-cirg-dc-cidr
volumes:
leaf-mash-mssql:
6 changes: 6 additions & 0 deletions dev/mstudy/docker-compose.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,9 @@ services:
- traefik.http.routers.mstudy-coreapi-${COMPOSE_PROJECT_NAME}.tls=true
- traefik.http.routers.mstudy-coreapi-${COMPOSE_PROJECT_NAME}.tls.certresolver=letsencrypt

# TODO remove after auth implemented via oauth2-proxy
# only allow access from localhost and CIRG IP ranges
- traefik.http.routers.mstudy-coreapi-${COMPOSE_PROJECT_NAME}.middlewares=limit-access-to-cirg-dc-cidr
node:
labels:
- traefik.enable=true
Expand All @@ -32,5 +35,8 @@ services:
- traefik.http.routers.mstudy-node-${COMPOSE_PROJECT_NAME}.tls=true
- traefik.http.routers.mstudy-node-${COMPOSE_PROJECT_NAME}.tls.certresolver=letsencrypt

# TODO remove after auth implemented via oauth2-proxy
# only allow access from localhost and CIRG IP ranges
- traefik.http.routers.mstudy-node-${COMPOSE_PROJECT_NAME}.middlewares=limit-access-to-cirg-dc-cidr
volumes:
leaf-mstudy-mssql:
7 changes: 7 additions & 0 deletions dev/radar/docker-compose.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,9 @@ services:
- traefik.http.routers.radar-coreapi-${COMPOSE_PROJECT_NAME}.tls=true
- traefik.http.routers.radar-coreapi-${COMPOSE_PROJECT_NAME}.tls.certresolver=letsencrypt

# TODO remove after auth implemented via oauth2-proxy
# only allow access from localhost and CIRG IP ranges
- traefik.http.routers.radar-coreapi-${COMPOSE_PROJECT_NAME}.middlewares=limit-access-to-cirg-dc-cidr
node:
labels:
- traefik.enable=true
Expand All @@ -32,5 +35,9 @@ services:
- traefik.http.routers.radar-node-${COMPOSE_PROJECT_NAME}.tls=true
- traefik.http.routers.radar-node-${COMPOSE_PROJECT_NAME}.tls.certresolver=letsencrypt

# TODO remove after auth implemented via oauth2-proxy
# only allow access from localhost and CIRG IP ranges
- traefik.http.routers.radar-node-${COMPOSE_PROJECT_NAME}.middlewares=limit-access-to-cirg-dc-cidr

volumes:
leaf-radar-mssql:

0 comments on commit b33e861

Please sign in to comment.