fix(haproxy): backend.scheme auswerten (https → ssl verify none alpn h2,h1)
Bug: backends.scheme war im Datenmodell + UI vorhanden, aber der HAProxy-Renderer hat das Feld komplett ignoriert. Jeder Backend wurde als plain HTTP angesprochen — wenn das Upstream (nginx etc.) HTTPS erwartet, kam '400 The plain HTTP request was sent to HTTPS port' zurück, was im Browser als 404/Fehler erschien. Fix im Template: server-Zeile bekommt 'ssl verify none alpn h2,http/1.1' wenn .Scheme == "https". 'verify none' weil interne Backends meist self-signed; ALPN deckt H1 + H2 via Aushandlung ab (also funktioniert sowohl proxy_protocol=https als auch =h2 aus dem alten EdgeGuard). Version 1.0.19. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
This commit is contained in:
@@ -39,7 +39,7 @@ import (
|
||||
wgsvc "git.netcell-it.de/projekte/edgeguard-native/internal/services/wireguard"
|
||||
)
|
||||
|
||||
var version = "1.0.18"
|
||||
var version = "1.0.19"
|
||||
|
||||
func main() {
|
||||
addr := os.Getenv("EDGEGUARD_API_ADDR")
|
||||
|
||||
@@ -9,7 +9,7 @@ import (
|
||||
"os"
|
||||
)
|
||||
|
||||
var version = "1.0.18"
|
||||
var version = "1.0.19"
|
||||
|
||||
const usage = `edgeguard-ctl — EdgeGuard CLI
|
||||
|
||||
|
||||
@@ -21,7 +21,7 @@ import (
|
||||
"git.netcell-it.de/projekte/edgeguard-native/internal/services/tlscerts"
|
||||
)
|
||||
|
||||
var version = "1.0.18"
|
||||
var version = "1.0.19"
|
||||
|
||||
const (
|
||||
// renewTickInterval — how often we re-evaluate expiring certs.
|
||||
|
||||
Reference in New Issue
Block a user