Compare commits

...

3 Commits

Author SHA1 Message Date
14eecbf01e feat: comment packaged agent and server configurations (#1)
All checks were successful
arcad/emissary/pipeline/head This commit looks good
2023-08-25 09:32:08 -06:00
c51ac0adc7 docs: add reference to emissary-firmware project
All checks were successful
arcad/emissary/pipeline/head This commit looks good
2023-08-25 09:09:09 -06:00
3e168dadf6 Revert "doc: add one file to stack all documentation source for install emissary (local, package, ansible)"
Some checks reported errors
arcad/emissary/pipeline/head Something is wrong with the build of this commit
This reverts commit 5c36955c13.
2023-08-25 09:07:01 -06:00
4 changed files with 78 additions and 26 deletions

View File

@ -8,10 +8,6 @@
- (FR) - [Déployer un serveur mandataire inverse sur un agent](./tutorials/fr/deploy-reverse-proxy.md) - (FR) - [Déployer un serveur mandataire inverse sur un agent](./tutorials/fr/deploy-reverse-proxy.md)
- (FR) - [Déployer une configuration UCI personnalisée sur un agent](./tutorials/fr/deploy-uci-configuration.md) - (FR) - [Déployer une configuration UCI personnalisée sur un agent](./tutorials/fr/deploy-uci-configuration.md)
Emplacement des différentes documentation pour installation emissary.
- (FR) -[Différentes méthodes pour installer emissary](./tutorials/fr/install-emmissary-only.md)
## References ## References
### Specifications ### Specifications
@ -28,3 +24,7 @@ See:
- [`misc/packaging/common/config-agent.yml`](../misc/packaging/common/config-agent.yml) - [`misc/packaging/common/config-agent.yml`](../misc/packaging/common/config-agent.yml)
- [`misc/packaging/common/config-server.yml`](../misc/packaging/common/config-server.yml) - [`misc/packaging/common/config-server.yml`](../misc/packaging/common/config-server.yml)
### Other projects
- [`emissary-firmware`](https://forge.cadoles.com/arcad/emissary-firmware) - Preconfigured OpenWRT firmwares with an agent

View File

@ -1,17 +0,0 @@
# installation
processus d'installation
Il y a à ce jours trois méthode différente d'installation !
1. via le paquet.deb disponible sur la forge (pour installation sur un serveur)
cf : [doc-emissary](./first-steps.md) (chapitre : Installer le serveur Emissary)
2. via l'archive disponible sur la forge (pour installation sur une machine locale a des fin de test ou autre)
cf : [doc-emissary-firmware](https://forge.cadoles.com/arcad/emissary-firmware/src/branch/master/doc/tutorials/first-steps.md) (chapitre : Récupérer et lancer un serveur Emissary sur sa machine)
3. via ansible (uniquement alpine pour le moment) (cf: [arcad-ansible](https://forge.cadoles.com/arcad/ansible))
cf : [doc-arcad-ansible](https://forge.cadoles.com/arcad/ansible/src/branch/master/doc/deploy-new-env.md) (Chapitre : Préparation de l'environnement)

View File

@ -1,26 +1,55 @@
# Emissary agent configuration
# Logger configuration
logger: logger:
# Logging verbosity
# DEBUG: 0
# INFO: 1
# WARN: 2
# ERROR: 3
# CRITICAL: 4
level: 1 level: 1
# Logging format
# Possible values: human, json
format: human format: human
# Agent configuration
agent: agent:
# Emissary server URL
serverUrl: http://127.0.0.1:3000 serverUrl: http://127.0.0.1:3000
# Agent private key path
privateKeyPath: /var/lib/emissary/agent-key.json privateKeyPath: /var/lib/emissary/agent-key.json
reconciliationInterval: 5 # Agent reconciliation interval (in seconds)
reconciliationInterval: 30
# Controllers configuration
controllers: controllers:
# Persistence controller configuration
persistence: persistence:
enabled: true enabled: true
stateFile: /var/lib/emissary/state.json stateFile: /var/lib/emissary/state.json
# Spec controller configuration
spec: spec:
enabled: true enabled: true
# Proxy controller configuration
proxy: proxy:
enabled: true enabled: true
# UCI controller configuration
uci: uci:
enabled: true enabled: true
binPath: uci binPath: uci
configBackupFile: /var/lib/emissary/uci-backup.conf configBackupFile: /var/lib/emissary/uci-backup.conf
# App controller configuration
app: app:
enabled: true enabled: true
dataDir: /var/lib/emissary/apps/data dataDir: /var/lib/emissary/apps/data
downloadDir: /var/lib/emissary/apps/bundles downloadDir: /var/lib/emissary/apps/bundles
# Sysupgrade controller configuration
sysupgrade: sysupgrade:
enabled: true enabled: true
sysupgradeCommand: sysupgradeCommand:
@ -33,6 +62,8 @@ agent:
- sh - sh
- -c - -c
- source /etc/openwrt_release && echo "$DISTRIB_ID-$DISTRIB_RELEASE-$DISTRIB_REVISION" - source /etc/openwrt_release && echo "$DISTRIB_ID-$DISTRIB_RELEASE-$DISTRIB_REVISION"
# Collectors configuration
collectors: collectors:
- name: uname - name: uname
command: uname command: uname

View File

@ -1,13 +1,38 @@
# Emissary server configuration
# Logger configuration
logger: logger:
# Logging verbosity
# DEBUG: 0
# INFO: 1
# WARN: 2
# ERROR: 3
# CRITICAL: 4
level: 1 level: 1
# Logging format
# Possible values: human, json
format: human format: human
# Server configuration
server: server:
# HTTP server configuration
http: http:
# Listening address (0.0.0.0 to listen on all interfaces)
host: 0.0.0.0 host: 0.0.0.0
# Listening port
port: 3000 port: 3000
# Database configuration
database: database:
# Database driver
# Possible values: sqlite
driver: sqlite driver: sqlite
# Database DSN
# sqlite: see https://github.com/mattn/go-sqlite3#connection-string
dsn: sqlite:///var/lib/emissary/data.sqlite?_pragma=foreign_keys(1)&_pragma=busy_timeout=60000 dsn: sqlite:///var/lib/emissary/data.sqlite?_pragma=foreign_keys(1)&_pragma=busy_timeout=60000
# CORS configuration
# See https://developer.mozilla.org/en/docs/Glossary/CORS
cors: cors:
allowedOrigins: [] allowedOrigins: []
allowCredentials: true allowCredentials: true
@ -22,12 +47,25 @@ server:
- Content-Type - Content-Type
- Authorization - Authorization
- Sentry-Trace - Sentry-Trace
debug: false
# Auth configuration
auth: auth:
# Local authentication configuration
local: local:
privateKeyPath: /var/lib/emissary/server-key.json privateKeyPath: /var/lib/emissary/server-key.json
roleExtractionRules:
- "jwt.role != nil ? str(jwt.role) : ''" # Remote authentication configuration
# Disabled by default
remote: ~ remote: ~
# jwksUrl: https://my-server/.well-known/jwks.json # jwksUrl: https://my-server/.well-known/jwks.json
# Role extraction rules
# Permit to derivate user's role
# from the received JWT.
#
# The first rule returning a non empty
# string will define the role of the user.
#
# The role should be 'reader' or 'writer'.
roleExtractionRules:
- "jwt.role != nil ? str(jwt.role) : ''"