Skip to content
Snippets Groups Projects
Verified Commit b7145dea authored by Martin Weise's avatar Martin Weise
Browse files

They are not needed

parent cc1caf3a
No related branches found
No related tags found
1 merge request!401They are not needed
Showing
with 3 additions and 247 deletions
...@@ -425,7 +425,7 @@ ...@@ -425,7 +425,7 @@
}, },
"dbrepo": { "dbrepo": {
"hashes": [ "hashes": [
"sha256:d6a1b79f43dbe10ecbd09db082228eb51c5858370f4499aa1c8b02399da95d87" "sha256:55de6a4934010e14a574032b5a5179bf3dac9895ef74e5cd4a221a625a75674b"
], ],
"path": "./lib/dbrepo-1.8.0.tar.gz" "path": "./lib/dbrepo-1.8.0.tar.gz"
}, },
......
No preview for this file type
No preview for this file type
No preview for this file type
...@@ -373,7 +373,7 @@ ...@@ -373,7 +373,7 @@
}, },
"dbrepo": { "dbrepo": {
"hashes": [ "hashes": [
"sha256:d6a1b79f43dbe10ecbd09db082228eb51c5858370f4499aa1c8b02399da95d87" "sha256:55de6a4934010e14a574032b5a5179bf3dac9895ef74e5cd4a221a625a75674b"
], ],
"path": "./lib/dbrepo-1.8.0.tar.gz" "path": "./lib/dbrepo-1.8.0.tar.gz"
}, },
......
...@@ -259,7 +259,7 @@ ...@@ -259,7 +259,7 @@
}, },
"dbrepo": { "dbrepo": {
"hashes": [ "hashes": [
"sha256:d6a1b79f43dbe10ecbd09db082228eb51c5858370f4499aa1c8b02399da95d87" "sha256:55de6a4934010e14a574032b5a5179bf3dac9895ef74e5cd4a221a625a75674b"
], ],
"path": "./lib/dbrepo-1.8.0.tar.gz" "path": "./lib/dbrepo-1.8.0.tar.gz"
}, },
......
No preview for this file type
No preview for this file type
No preview for this file type
No preview for this file type
FROM opensearchproject/opensearch:2.10.0 AS runtime
USER root
RUN yum install -y jq
COPY ./limits.conf /etc/security/limits.conf
WORKDIR /usr/share/opensearch
RUN chmod 0700 ./config
COPY --chown=opensearch:opensearch ./opensearch.yml ./config/opensearch.yml
COPY --chown=opensearch:opensearch ./config.yml ./config/opensearch-security/config.yml
RUN chmod 0600 ./config/opensearch.yml
RUN chmod 0600 ./config/opensearch-security/config.yml
COPY --chown=opensearch:opensearch ./pem/admin.pem ./config/admin.pem
COPY --chown=opensearch:opensearch ./pem/admin-key.pem ./config/admin-key.pem
RUN chmod 0600 ./config/admin*.pem
COPY --chown=opensearch:opensearch ./pem/node1.pem ./config/node1.pem
COPY --chown=opensearch:opensearch ./pem/node1-key.pem ./config/node1-key.pem
RUN chmod 0600 ./config/node1*.pem
COPY --chown=opensearch:opensearch ./pem/root-ca.pem ./config/root-ca.pem
COPY --chown=opensearch:opensearch ./pem/root-ca-key.pem ./config/root-ca-key.pem
RUN chmod 0600 ./config/root-ca*.pem
USER opensearch
ENV DISABLE_INSTALL_DEMO_CONFIG=true
# Search Database
## REST
### Indices
* View all [http://localhost:9200/_cat/indices](http://localhost:9200/_cat/indices)
### Nodes
* View all [http://localhost:9200/_cat/nodes](http://localhost:9200/_cat/nodes)
### Health
* View all [http://localhost:9200/_plugins/_security/health](http://localhost:9200/_plugins/_security/health)
\ No newline at end of file
---
_meta:
type: "config"
config_version: 2
config:
dynamic:
http:
# Either enables or disables anonymous authentication. When true, HTTP authenticators try to find user credentials in
# the HTTP request. If credentials are found, the user is authenticated. If none are found, the user is authenticated
# as an “anonymous” user. This user then has the username “anonymous” and one role named “anonymous_backendrole”.
# When you enable anonymous authentication, all defined HTTP authenticators are non-challenging. Also see The
# challenge setting.
anonymous_auth_enabled: true
xff:
enabled: false
authc:
basic_internal_auth_domain:
description: "Authenticate via HTTP Basic against internal users database"
http_enabled: true
transport_enabled: true
order: 0
http_authenticator:
type: basic
challenge: true
authentication_backend:
type: intern
openid_auth_domain:
http_enabled: true
transport_enabled: true
order: 1
http_authenticator:
type: openid
challenge: false
config:
subject_key: client_id
roles_key: roles
openid_connect_url: http://auth-service:8080/api/auth/realms/dbrepo/.well-known/openid-configuration
authentication_backend:
type: noop
#!/bin/bash
# Generate the private key of the root CA
openssl genrsa -out ./pem/root-ca-key.pem 4096
# Generate the self-signed root CA certificate
openssl req -x509 -sha256 -new -nodes -key ./pem/root-ca-key.pem -days 3650 -out ./pem/root-ca.pem -subj "/C=AT/O=Technische Universität Wien/CN=test.dbrepo.tuwien.ac.at"
# Create the certificate key
openssl genrsa -out ./pem/admin-key.pem 4096
# Create the signing (csr)
openssl req -new -sha256 -key ./pem/admin-key.pem -subj "/C=AT/O=Technische Universität Wien/CN=test.dbrepo.tuwien.ac.at" -out ./pem/admin.csr
# Generate the certificate using the csr and key along with the CA Root key
openssl x509 -req -in ./pem/admin.csr -CA ./pem/root-ca.pem -CAkey ./pem/root-ca-key.pem -CAcreateserial -out ./pem/admin.pem -days 365 -sha256
# Create the certificate key
openssl genrsa -out ./pem/node1-key.pem 4096
# Create the signing (csr)
openssl req -new -sha256 -key ./pem/node1-key.pem -subj "/C=AT/O=Technische Universität Wien/CN=test.dbrepo.tuwien.ac.at" -out ./pem/node1.csr
# Generate the certificate using the csr and key along with the CA Root key
openssl x509 -req -in ./pem/node1.csr -CA ./pem/root-ca.pem -CAkey ./pem/root-ca-key.pem -CAcreateserial -out ./pem/node1.pem -days 365 -sha256
\ No newline at end of file
# allow user 'opensearch' mlockall
opensearch soft memlock unlimited
opensearch hard memlock unlimited
---
cluster.name: search-db
# Bind to all interfaces because we don't know what IP address Docker will assign to us.
network.host: 0.0.0.0
# Setting network.host to a non-loopback address enables the annoying bootstrap checks. "Single-node" mode disables them again.
discovery.type: single-node
plugins.security.ssl.transport.pemcert_filepath: /usr/share/opensearch/config/node1.pem
plugins.security.ssl.transport.pemkey_filepath: /usr/share/opensearch/config/node1-key.pem
plugins.security.ssl.transport.pemtrustedcas_filepath: /usr/share/opensearch/config/root-ca.pem
plugins.security.ssl.http.pemcert_filepath: /usr/share/opensearch/config/node1.pem
plugins.security.ssl.http.pemkey_filepath: /usr/share/opensearch/config/node1-key.pem
plugins.security.ssl.http.pemtrustedcas_filepath: r/usr/share/opensearch/config/root-ca.pem
plugins.security.allow_default_init_securityindex: true
plugins.security.audit.type: internal_opensearch
plugins.security.enable_snapshot_restore_privilege: true
plugins.security.check_snapshot_restore_write_privileges: true
plugins.security.restapi.roles_enabled: ["all_access", "security_rest_api_access"]
cluster.routing.allocation.disk.threshold_enabled: false
server.name: log-dashboard
server.host: "0.0.0.0"
opensearch.hosts: http://search-db:9200
opensearch.username: admin
opensearch.password: admin
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment