# {{ ansible_managed }} global log /dev/log local0 log /dev/log local1 notice chroot /var/lib/haproxy stats socket /run/haproxy/admin.sock mode 660 level admin expose-fd listeners stats timeout 30s user haproxy group haproxy daemon # Default SSL material locations ca-base /etc/ssl/certs crt-base /etc/ssl/private # See: https://ssl-config.mozilla.org/#server=haproxy&server-version=2.0.3&config=intermediate ssl-default-bind-ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384 ssl-default-bind-ciphersuites TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 ssl-default-bind-options ssl-min-ver TLSv1.2 no-tls-tickets defaults log global mode http option httplog option dontlognull timeout connect 5000 timeout client 50000 timeout server 50000 errorfile 400 /etc/haproxy/errors/400.http errorfile 403 /etc/haproxy/errors/403.http errorfile 408 /etc/haproxy/errors/408.http errorfile 500 /etc/haproxy/errors/500.http errorfile 502 /etc/haproxy/errors/502.http errorfile 503 /etc/haproxy/errors/503.http errorfile 504 /etc/haproxy/errors/504.http frontend http-in bind 0.0.0.0:80 mode http maxconn 2000 acl login_dispatcher path_beg -i {{ haproxy_hydra_dispatcher_base_path }} {% if enable_hydra_passwordless %} acl login_passwordless path_beg -i {{ haproxy_hydra_passwordless_base_path }} {% endif %} {% if enable_hydra_saml %} acl login_saml path_beg -i {{ haproxy_hydra_saml_base_path }} {% endif %} {% if enable_hydra_oidc %} acl login_oidc path_beg -i {{ haproxy_hydra_oidc_base_path }} {% endif %} {% if enable_oidc_test_app %} acl oidc_test path_beg -i {{ haproxy_oidc_test_base_path }} {% endif %} use_backend hydra_dispatcher if login_dispatcher {% if enable_hydra_passwordless %} use_backend hydra_passwordless if login_passwordless {% endif %} {% if enable_hydra_saml %} use_backend hydra_saml if login_saml {% endif %} {% if enable_hydra_oidc %} use_backend hydra_oidc if login_oidc {% endif %} {% if enable_oidc_test_app %} use_backend oidc_test if oidc_test {% endif %} use_backend hydra option forwardfor http-request set-header X-Forwarded-Proto {{ haproxy_forwarded_proto }} http-request set-header X-Forwarded-Host {{ haproxy_forwarded_host }} http-request set-header X-Forwarded-Port {{ haproxy_forwarded_port }} # Backend Hydra backend hydra balance roundrobin http-request set-path %[path,regsub(^{{ haproxy_hydra_base_path }},)] server hydra 127.0.0.1:4444 check # Backend Hydra Dispatcher backend hydra_dispatcher balance roundrobin # Suppression du préfixe /auth/dispatcher dans l'URL http-request set-path %[path,regsub(^{{ haproxy_hydra_dispatcher_base_path }}/,/)] server hydra-login-dispatcher 127.0.0.1:3000 check {% if enable_hydra_passwordless %} # Backend Hydra Passwordless backend hydra_passwordless balance roundrobin # Suppression du préfixe /auth/passwordless dans l'URL http-request set-path %[path,regsub(^{{ haproxy_hydra_passwordless_base_path }},)] server hydra-login-passwordless 127.0.0.1:3001 check {%- endif %} {% if enable_hydra_oidc %} # Backend Hydra OIDC backend hydra_oidc balance roundrobin # Suppression du préfixe /auth/oidc dans l'URL http-request set-path %[path,regsub(^{{ haproxy_hydra_oidc_base_path }},)] server hydra-login-oidc 127.0.0.1:3004 check {%- endif %} {% if enable_hydra_saml %} # Backend Hydra SAML backend hydra_saml balance roundrobin server hydra-login-saml 127.0.0.1:3002 check {%- endif %} {% if enable_oidc_test_app %} backend oidc_test balance roundrobin # Suppression du préfixe /auth/test dans l'URL http-request set-path %[path,regsub(^{{ haproxy_oidc_test_base_path }},/)] server oidc-test 127.0.0.1:8080 check {% endif %}