Compare commits

..

5 Commits

Author SHA1 Message Date
4a2fb750a0 Testing with real IP 2026-04-01 12:22:38 +02:00
1d30d5afad Added route file back
All checks were successful
Remote Deployment Pipeline / Prepare Context (pull_request) Successful in 3s
Remote Deployment Pipeline / Deploy (Staging) (pull_request) Has been skipped
Remote Deployment Pipeline / Deploy (Dev/Preview) (pull_request) Has been skipped
Remote Deployment Pipeline / Cleanup Preview (pull_request) Successful in 10s
Remote Deployment Pipeline / Deploy (Production) (pull_request) Has been skipped
2025-12-25 21:20:32 +01:00
ef466353b8 Merge pull request 'fix-pipeline-fail' (#27) from fix-pipeline-fail into main
All checks were successful
Remote Deployment Pipeline / Prepare Context (push) Successful in 2s
Remote Deployment Pipeline / Deploy (Staging) (push) Successful in 49s
Remote Deployment Pipeline / Deploy (Dev/Preview) (push) Has been skipped
Remote Deployment Pipeline / Cleanup Preview (push) Has been skipped
Remote Deployment Pipeline / Deploy (Production) (push) Successful in 1m1s
Reviewed-on: #27
2025-12-25 21:13:47 +01:00
6e9c0f0442 Removed new file
All checks were successful
Remote Deployment Pipeline / Prepare Context (pull_request) Successful in 3s
Remote Deployment Pipeline / Deploy (Staging) (pull_request) Has been skipped
Remote Deployment Pipeline / Deploy (Dev/Preview) (pull_request) Has been skipped
Remote Deployment Pipeline / Deploy (Production) (pull_request) Has been skipped
Remote Deployment Pipeline / Cleanup Preview (pull_request) Successful in 14s
2025-12-25 21:11:27 +01:00
ba65f0609a chore: remove staging/dev routing configuration and associated extra host entries 2025-12-25 21:09:55 +01:00
2 changed files with 9 additions and 9 deletions

View File

@@ -21,9 +21,9 @@ services:
- "--certificatesResolvers.letsencrypt.acme.caServer=${CERTBOT_CA_RESOLVER}"
- "${TRAEFIK_LEGACY_OPT:-}"
- "--providers.file.watch=true"
extra_hosts:
- "staging:${STAGING_IP:-192.168.1.85}"
- "webserver:${LEGACY_IP:-192.168.1.85}"
# extra_hosts:
# - "staging:${STAGING_IP:-192.168.1.85}"
# - "webserver:${LEGACY_IP:-192.168.1.85}"
ports:
- "${PORT}:80"
- "${HTTPS_PORT}:443"

View File

@@ -7,8 +7,8 @@ DOMAIN = os.getenv("DOMAIN", "dev.kovagoadi.hu")
PORT = os.getenv("PORT", "898")
HTTPS_PORT = os.getenv("HTTPS_PORT", "446")
BASE_URL = f"http://127.0.0.1:{PORT}"
HTTPS_BASE_URL = f"https://127.0.0.1:{HTTPS_PORT}"
BASE_URL = f"http://192.168.1.85:{PORT}"
HTTPS_BASE_URL = f"https://192.168.1.85:{HTTPS_PORT}"
HOST_HEADER = f"test-whoami.{DOMAIN}"
@pytest.fixture(scope="session", autouse=True)
@@ -122,7 +122,7 @@ def test_whoami_https_reachable():
# We use curl because requests doesn't support --resolve easily to force SNI with custom IP
cmd = [
"curl", "-s", "-k", "--fail",
"--resolve", f"{HOST_HEADER}:{HTTPS_PORT}:127.0.0.1",
"--resolve", f"{HOST_HEADER}:{HTTPS_PORT}:192.168.1.85",
f"https://{HOST_HEADER}:{HTTPS_PORT}"
]
try:
@@ -159,7 +159,7 @@ def test_unknown_host_https_passthrough():
# unknown.com should hit the catch-all SNI router
cmd = [
"curl", "-s", "-k", "-i", "--fail",
"--resolve", f"tar.kovagoadi.hu:{HTTPS_PORT}:127.0.0.1",
"--resolve", f"tar.kovagoadi.hu:{HTTPS_PORT}:192.168.1.85",
f"https://tar.kovagoadi.hu:{HTTPS_PORT}/login"
]
try:
@@ -193,7 +193,7 @@ def test_staging_https_routing():
host = "test-whoami.staging.kovagoadi.hu"
cmd = [
"curl", "-s", "-k", "-i", "--fail",
"--resolve", f"{host}:{HTTPS_PORT}:127.0.0.1",
"--resolve", f"{host}:{HTTPS_PORT}:192.168.1.85",
f"https://{host}:{HTTPS_PORT}"
]
try:
@@ -209,7 +209,7 @@ def test_dev_https_routing():
host = "test-whoami.dev.kovagoadi.hu"
cmd = [
"curl", "-s", "-k", "-i", "--fail",
"--resolve", f"{host}:{HTTPS_PORT}:127.0.0.1",
"--resolve", f"{host}:{HTTPS_PORT}:192.168.1.85",
f"https://{host}:{HTTPS_PORT}"
]
try: