Roll out header based Rack::Attack bypass
Steps:
- Independently:
-
Complete #624 (closed) and confirm it is deployed, -
Add haproxy configuration (change to the haproxy cookbook) to set the selected header for trusted IPs, and verify the header is being passed as expected.
-
- Under a Change issue (particularly necessary to describe how to monitor the rollout, and to have prepared responses to various eventualities). In particular:
-
Add the environment variable defining the header to both VM deployments (to omnibus configuration, via chef) and Kubernetes (in k8s-workloads). This will start safe-listing trusted IPs for access to protected pathsand the allow2ban configuration in the auth rate-limiter, which are currently potentially rate-limited, so it cannot be turned on outside a change issue.
-
Edited by Craig Miskell