feat(haproxy): timeout client/server 30s → 60s

KVS / management-center brauchen länger als 30s für TOTP-Validierung
(externe Session-Storage). Erhöht beide auf 60s — sicher noch unter
keepalive-grenzen, deckt aber legacy-Auth-flows ab.

Plus: VERSION bump 1.0.20 (asg{1,2}-cleanup direkt am DB-State,
keine code-Änderung dafür).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
This commit is contained in:
Debian
2026-05-10 23:54:19 +02:00
parent 6290cde45f
commit 52da8d7c9e
7 changed files with 8 additions and 8 deletions

View File

@@ -1 +1 @@
1.0.19
1.0.20

View File

@@ -39,7 +39,7 @@ import (
wgsvc "git.netcell-it.de/projekte/edgeguard-native/internal/services/wireguard"
)
var version = "1.0.19"
var version = "1.0.20"
func main() {
addr := os.Getenv("EDGEGUARD_API_ADDR")

View File

@@ -9,7 +9,7 @@ import (
"os"
)
var version = "1.0.19"
var version = "1.0.20"
const usage = `edgeguard-ctl — EdgeGuard CLI

View File

@@ -21,7 +21,7 @@ import (
"git.netcell-it.de/projekte/edgeguard-native/internal/services/tlscerts"
)
var version = "1.0.19"
var version = "1.0.20"
const (
// renewTickInterval — how often we re-evaluate expiring certs.

View File

@@ -18,8 +18,8 @@ defaults
option dontlognull
option forwardfor
timeout connect 5s
timeout client 30s
timeout server 30s
timeout client 60s
timeout server 60s
timeout http-request 10s
# ── Public :80 ─────────────────────────────────────────────────────────

View File

@@ -1,7 +1,7 @@
{
"name": "edgeguard-management-ui",
"private": true,
"version": "1.0.19",
"version": "1.0.20",
"type": "module",
"scripts": {
"dev": "vite",

View File

@@ -70,7 +70,7 @@ const NAV: NavSection[] = [
},
]
const VERSION = '1.0.19'
const VERSION = '1.0.20'
export default function Sidebar({ isOpen, onClose }: SidebarProps) {
const { t } = useTranslation()