Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FEATURE] Allow separate schemes for LAPI and Appsec endpoints #131

Open
thespad opened this issue Feb 6, 2024 · 2 comments
Open

[FEATURE] Allow separate schemes for LAPI and Appsec endpoints #131

thespad opened this issue Feb 6, 2024 · 2 comments
Assignees
Labels
enhancement New feature or request

Comments

@thespad
Copy link

thespad commented Feb 6, 2024

Is your feature request related to a problem? Please describe. 🐛
Currently (or rather in the RC) the appsec and LAPI endpoints both use crowdsecLapiScheme https://github.com/maxlerebourg/crowdsec-bouncer-traefik-plugin/pull/123/files#diff-b335630551682c19a781afebcf4d07bf978fb1f8ac04c6bf87428ed5106870f5R79 but there are scenarios where this doesn't work - such as pointing at a central LAPI service served over https and a local appsec service over an internal docker network served over http.

Describe the solution you'd like
Allow separate schemes for LAPI and Appsec endpoints

@mathieuHa
Copy link
Collaborator

Hi,

Thanks for using the plugin.

When we added the support for appsec, we thought about "scheme" to connect to the LAPI and Appsec.

Because we already have a lot of variables we decided to not add support by default for different supported scheme.
We wanted to see if it was really needed before implementing it.

I believe it needs at least 2 variables, scheme + insecure and 2 objects in the bouncer httpClient containing a tlsconfig.
It is added to the todolist, we will update you soon

@mathieuHa mathieuHa self-assigned this Feb 11, 2024
@mathieuHa mathieuHa added the enhancement New feature or request label Feb 11, 2024
@thespad
Copy link
Author

thespad commented Feb 11, 2024

Yeah, I understand the desire not to add a bunch more configuration options but unfortunately the way Crowdsec have implemented their appsec component it's perfectly legitimate to have your bouncer talking to a Central LAPI endpoint for normal decisions but a local crowdsec instance for appsec - and in a docker setup that means that configuring https for that appsec instance is a lot of work for little gain because you can push it all over a private docker network.

In the meantime I'm sending all my appsec traffic back to the central LAPI to keep everything secure, and the latency isn't a huge issue in my setup, but it would be nice to be able to split them up.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants