mirror of
https://github.com/ovh/the-bastion.git
synced 2025-09-08 22:14:25 +08:00
doc: use autosectionlabel
This commit is contained in:
parent
92d4a46ac5
commit
710eb2e4cb
4 changed files with 107 additions and 130 deletions
|
@ -12,127 +12,126 @@ bastion.conf reference
|
|||
Option List
|
||||
===========
|
||||
|
||||
|
||||
Main Options
|
||||
------------
|
||||
Main Options options
|
||||
--------------------
|
||||
|
||||
Those are the options you should customize when first setting up a bastion. All the other options have sane defaults and can be customized later if needed.
|
||||
|
||||
- :ref:`bastionName`
|
||||
- :ref:`bastionCommand`
|
||||
- :ref:`readOnlySlaveMode`
|
||||
- :ref:`adminAccounts`
|
||||
- :ref:`superOwnerAccounts`
|
||||
- `bastionName`_
|
||||
- `bastionCommand`_
|
||||
- `readOnlySlaveMode`_
|
||||
- `adminAccounts`_
|
||||
- `superOwnerAccounts`_
|
||||
|
||||
SSH Policies
|
||||
------------
|
||||
SSH Policies options
|
||||
--------------------
|
||||
|
||||
All the options related to the SSH configuration and policies, both for ingress and egress connections.
|
||||
|
||||
- :ref:`allowedIngressSshAlgorithms`
|
||||
- :ref:`allowedEgressSshAlgorithms`
|
||||
- :ref:`minimumIngressRsaKeySize`
|
||||
- :ref:`maximumIngressRsaKeySize`
|
||||
- :ref:`minimumEgressRsaKeySize`
|
||||
- :ref:`maximumEgressRsaKeySize`
|
||||
- :ref:`defaultAccountEgressKeyAlgorithm`
|
||||
- :ref:`defaultAccountEgressKeySize`
|
||||
- :ref:`moshAllowed`
|
||||
- :ref:`moshTimeoutNetwork`
|
||||
- :ref:`moshTimeoutSignal`
|
||||
- :ref:`moshCommandLine`
|
||||
- `allowedIngressSshAlgorithms`_
|
||||
- `allowedEgressSshAlgorithms`_
|
||||
- `minimumIngressRsaKeySize`_
|
||||
- `maximumIngressRsaKeySize`_
|
||||
- `minimumEgressRsaKeySize`_
|
||||
- `maximumEgressRsaKeySize`_
|
||||
- `defaultAccountEgressKeyAlgorithm`_
|
||||
- `defaultAccountEgressKeySize`_
|
||||
- `moshAllowed`_
|
||||
- `moshTimeoutNetwork`_
|
||||
- `moshTimeoutSignal`_
|
||||
- `moshCommandLine`_
|
||||
|
||||
Global network policies
|
||||
-----------------------
|
||||
Global network policies options
|
||||
-------------------------------
|
||||
|
||||
Those options can set a few global network policies to be applied bastion-wide.
|
||||
|
||||
- :ref:`allowedNetworks`
|
||||
- :ref:`forbiddenNetworks`
|
||||
- :ref:`ingressToEgressRules`
|
||||
- `allowedNetworks`_
|
||||
- `forbiddenNetworks`_
|
||||
- `ingressToEgressRules`_
|
||||
|
||||
Logging
|
||||
-------
|
||||
Logging options
|
||||
---------------
|
||||
|
||||
Options to customize how logs should be produced.
|
||||
|
||||
- :ref:`enableSyslog`
|
||||
- :ref:`syslogFacility`
|
||||
- :ref:`syslogDescription`
|
||||
- :ref:`enableGlobalAccessLog`
|
||||
- :ref:`enableAccountAccessLog`
|
||||
- :ref:`enableGlobalSqlLog`
|
||||
- :ref:`enableAccountSqlLog`
|
||||
- :ref:`ttyrecFilenameFormat`
|
||||
- :ref:`ttyrecAdditionalParameters`
|
||||
- `enableSyslog`_
|
||||
- `syslogFacility`_
|
||||
- `syslogDescription`_
|
||||
- `enableGlobalAccessLog`_
|
||||
- `enableAccountAccessLog`_
|
||||
- `enableGlobalSqlLog`_
|
||||
- `enableAccountSqlLog`_
|
||||
- `ttyrecFilenameFormat`_
|
||||
- `ttyrecAdditionalParameters`_
|
||||
|
||||
Other ingress policies
|
||||
----------------------
|
||||
Other ingress policies options
|
||||
------------------------------
|
||||
|
||||
Policies applying to the ingress connections
|
||||
|
||||
- :ref:`ingressKeysFrom`
|
||||
- :ref:`ingressKeysFromAllowOverride`
|
||||
- `ingressKeysFrom`_
|
||||
- `ingressKeysFromAllowOverride`_
|
||||
|
||||
Other egress policies
|
||||
---------------------
|
||||
Other egress policies options
|
||||
-----------------------------
|
||||
|
||||
Policies applying to the egress connections
|
||||
|
||||
- :ref:`defaultLogin`
|
||||
- :ref:`egressKeysFrom`
|
||||
- :ref:`keyboardInteractiveAllowed`
|
||||
- :ref:`passwordAllowed`
|
||||
- :ref:`telnetAllowed`
|
||||
- `defaultLogin`_
|
||||
- `egressKeysFrom`_
|
||||
- `keyboardInteractiveAllowed`_
|
||||
- `passwordAllowed`_
|
||||
- `telnetAllowed`_
|
||||
|
||||
Session policies
|
||||
----------------
|
||||
Session policies options
|
||||
------------------------
|
||||
|
||||
Options to customize the established sessions behaviour
|
||||
|
||||
- :ref:`displayLastLogin`
|
||||
- :ref:`fanciness`
|
||||
- :ref:`interactiveModeAllowed`
|
||||
- :ref:`interactiveModeTimeout`
|
||||
- :ref:`interactiveModeByDefault`
|
||||
- :ref:`idleLockTimeout`
|
||||
- :ref:`idleKillTimeout`
|
||||
- :ref:`warnBeforeLockSeconds`
|
||||
- :ref:`warnBeforeKillSeconds`
|
||||
- :ref:`accountExternalValidationProgram`
|
||||
- :ref:`accountExternalValidationDenyOnFailure`
|
||||
- :ref:`alwaysActiveAccounts`
|
||||
- `displayLastLogin`_
|
||||
- `fanciness`_
|
||||
- `interactiveModeAllowed`_
|
||||
- `interactiveModeTimeout`_
|
||||
- `interactiveModeByDefault`_
|
||||
- `idleLockTimeout`_
|
||||
- `idleKillTimeout`_
|
||||
- `warnBeforeLockSeconds`_
|
||||
- `warnBeforeKillSeconds`_
|
||||
- `accountExternalValidationProgram`_
|
||||
- `accountExternalValidationDenyOnFailure`_
|
||||
- `alwaysActiveAccounts`_
|
||||
|
||||
Account policies
|
||||
----------------
|
||||
Account policies options
|
||||
------------------------
|
||||
|
||||
Policies applying to the bastion accounts themselves
|
||||
|
||||
- :ref:`accountMaxInactiveDays`
|
||||
- :ref:`accountExpiredMessage`
|
||||
- :ref:`accountCreateSupplementaryGroups`
|
||||
- :ref:`accountCreateDefaultPersonalAccesses`
|
||||
- :ref:`ingressRequirePIV`
|
||||
- :ref:`accountMFAPolicy`
|
||||
- :ref:`MFAPasswordMinDays`
|
||||
- :ref:`MFAPasswordMaxDays`
|
||||
- :ref:`MFAPasswordWarnDays`
|
||||
- :ref:`MFAPasswordInactiveDays`
|
||||
- :ref:`MFAPostCommand`
|
||||
- `accountMaxInactiveDays`_
|
||||
- `accountExpiredMessage`_
|
||||
- `accountCreateSupplementaryGroups`_
|
||||
- `accountCreateDefaultPersonalAccesses`_
|
||||
- `ingressRequirePIV`_
|
||||
- `accountMFAPolicy`_
|
||||
- `MFAPasswordMinDays`_
|
||||
- `MFAPasswordMaxDays`_
|
||||
- `MFAPasswordWarnDays`_
|
||||
- `MFAPasswordInactiveDays`_
|
||||
- `MFAPostCommand`_
|
||||
|
||||
Other options
|
||||
-------------
|
||||
Other options options
|
||||
---------------------
|
||||
|
||||
These options are either discouraged (in which case this is explained in the description) or rarely need to be modified.
|
||||
|
||||
- :ref:`accountUidMin`
|
||||
- :ref:`accountUidMax`
|
||||
- :ref:`ttyrecGroupIdOffset`
|
||||
- :ref:`documentationURL`
|
||||
- :ref:`debug`
|
||||
- :ref:`remoteCommandEscapeByDefault`
|
||||
- :ref:`sshClientDebugLevel`
|
||||
- :ref:`sshClientHasOptionE`
|
||||
- `accountUidMin`_
|
||||
- `accountUidMax`_
|
||||
- `ttyrecGroupIdOffset`_
|
||||
- `documentationURL`_
|
||||
- `debug`_
|
||||
- `remoteCommandEscapeByDefault`_
|
||||
- `sshClientDebugLevel`_
|
||||
- `sshClientHasOptionE`_
|
||||
|
||||
Option Reference
|
||||
================
|
||||
|
|
|
@ -5,30 +5,29 @@ osh-http-proxy.conf reference
|
|||
.. note::
|
||||
|
||||
This module is optional, and disabled by default. To know more about the HTTP Proxy feature
|
||||
of The Bastion, please check :doc:`/using/http_proxy`
|
||||
of The Bastion, please check the :doc:`/using/http_proxy` section
|
||||
|
||||
Option List
|
||||
===========
|
||||
|
||||
|
||||
HTTP Proxy configuration
|
||||
------------------------
|
||||
HTTP Proxy configuration options
|
||||
--------------------------------
|
||||
|
||||
These options modify the behavior of the HTTP Proxy, an optional module of The Bastion
|
||||
|
||||
- :ref:`enabled`
|
||||
- :ref:`port`
|
||||
- :ref:`ssl_certificate`
|
||||
- :ref:`ssl_key`
|
||||
- :ref:`ciphers`
|
||||
- :ref:`insecure`
|
||||
- :ref:`min_servers`
|
||||
- :ref:`max_servers`
|
||||
- :ref:`min_spare_servers`
|
||||
- :ref:`max_spare_servers`
|
||||
- :ref:`timeout`
|
||||
- :ref:`log_request_response`
|
||||
- :ref:`log_request_response_max_size`
|
||||
- `enabled`_
|
||||
- `port`_
|
||||
- `ssl_certificate`_
|
||||
- `ssl_key`_
|
||||
- `ciphers`_
|
||||
- `insecure`_
|
||||
- `min_servers`_
|
||||
- `max_servers`_
|
||||
- `min_spare_servers`_
|
||||
- `max_spare_servers`_
|
||||
- `timeout`_
|
||||
- `log_request_response`_
|
||||
- `log_request_response_max_size`_
|
||||
|
||||
Option Reference
|
||||
================
|
||||
|
@ -36,8 +35,6 @@ Option Reference
|
|||
HTTP Proxy configuration
|
||||
------------------------
|
||||
|
||||
.. _enabled:
|
||||
|
||||
enabled
|
||||
*******
|
||||
|
||||
|
@ -47,8 +44,6 @@ enabled
|
|||
|
||||
Whether the HTTP proxy daemon daemon is enabled or not. If it's not enabled, it'll exit when started. Of course, if you want to enable this daemon, you should **also** configure your init system to start it for you. Both sysV-style scripts and systemd unit files are provided. For systemd, using `systemctl enable osh-http-proxy.service` should be enough. For sysV-style inits, it depends on the scripts provided for your distro, but usually `update-rc.d osh-http-proxy defaults` then `update-rc.d osh-http-proxy enable` should do the trick.
|
||||
|
||||
.. _port:
|
||||
|
||||
port
|
||||
****
|
||||
|
||||
|
@ -58,8 +53,6 @@ port
|
|||
|
||||
The port to listen to. You can use ports < 1024, in which case privileges will be dropped after binding, but please ensure your systemd unit file starts the daemon as root in that case.
|
||||
|
||||
.. _ssl_certificate:
|
||||
|
||||
ssl_certificate
|
||||
***************
|
||||
|
||||
|
@ -69,8 +62,6 @@ ssl_certificate
|
|||
|
||||
The file that contains the server SSL certificate in PEM format. For tests, install the ``ssl-cert`` package and point this configuration item to the snakeoil certs (which is the default).
|
||||
|
||||
.. _ssl_key:
|
||||
|
||||
ssl_key
|
||||
*******
|
||||
|
||||
|
@ -80,8 +71,6 @@ ssl_key
|
|||
|
||||
The file that contains the server SSL key in PEM format. For tests, install the ``ssl-cert`` package and point this configuration item to the snakeoil certs (which is the default).
|
||||
|
||||
.. _ciphers:
|
||||
|
||||
ciphers
|
||||
*******
|
||||
|
||||
|
@ -94,8 +83,6 @@ ciphers
|
|||
The ordered list the TLS server ciphers, in ``openssl`` classic format. Use ``openssl ciphers`` to see what your system supports,
|
||||
an empty list leaves the choice to your openssl libraries default values (system-dependent)
|
||||
|
||||
.. _insecure:
|
||||
|
||||
insecure
|
||||
********
|
||||
|
||||
|
@ -105,8 +92,6 @@ insecure
|
|||
|
||||
Whether to ignore SSL certificate verification for the connection between the bastion and the devices
|
||||
|
||||
.. _min_servers:
|
||||
|
||||
min_servers
|
||||
***********
|
||||
|
||||
|
@ -116,8 +101,6 @@ min_servers
|
|||
|
||||
Number of child processes to start at launch
|
||||
|
||||
.. _max_servers:
|
||||
|
||||
max_servers
|
||||
***********
|
||||
|
||||
|
@ -127,8 +110,6 @@ max_servers
|
|||
|
||||
Hard maximum number of child processes that can be active at any given time no matter what
|
||||
|
||||
.. _min_spare_servers:
|
||||
|
||||
min_spare_servers
|
||||
*****************
|
||||
|
||||
|
@ -138,8 +119,6 @@ min_spare_servers
|
|||
|
||||
The daemon will ensure that there is at least this number of children idle & ready to accept new connections (as long as max_servers is not reached)
|
||||
|
||||
.. _max_spare_servers:
|
||||
|
||||
max_spare_servers
|
||||
*****************
|
||||
|
||||
|
@ -149,8 +128,6 @@ max_spare_servers
|
|||
|
||||
The daemon will kill *idle* children to keep their number below this maximum when traffic is low
|
||||
|
||||
.. _timeout:
|
||||
|
||||
timeout
|
||||
*******
|
||||
|
||||
|
@ -160,8 +137,6 @@ timeout
|
|||
|
||||
Timeout delay (in seconds) for the connection between the bastion and the devices
|
||||
|
||||
.. _log_request_response:
|
||||
|
||||
log_request_response
|
||||
********************
|
||||
|
||||
|
@ -171,8 +146,6 @@ log_request_response
|
|||
|
||||
When enabled, the complete response of the device to the request we forwarded will be logged, otherwise we'll only log the response headers
|
||||
|
||||
.. _log_request_response_max_size:
|
||||
|
||||
log_request_response_max_size
|
||||
*****************************
|
||||
|
||||
|
|
|
@ -43,7 +43,12 @@ smartquotes = False
|
|||
# ones.
|
||||
extensions = [
|
||||
'sphinx.ext.githubpages',
|
||||
# see https://docs.readthedocs.io/en/stable/guides/cross-referencing-with-sphinx.html#automatically-label-sections
|
||||
'sphinx.ext.autosectionlabel',
|
||||
]
|
||||
# Make sure the target is unique
|
||||
# Sphinx will create explicit targets for all your sections, the name of target has the form {path/to/page}:{title-of-section}
|
||||
autosectionlabel_prefix_document = True
|
||||
|
||||
# Add any paths that contain templates here, relative to this directory.
|
||||
templates_path = ['_templates']
|
||||
|
|
|
@ -223,7 +223,7 @@
|
|||
# Note that when no user-specified ``from="..."`` appears, the value of ``ingressKeysFrom`` is still used, regardless of this option.
|
||||
# DEFAULT: false
|
||||
"ingressKeysFromAllowOverride": false,
|
||||
|
||||
#
|
||||
#########################
|
||||
# > Other egress policies
|
||||
# >> Policies applying to the egress connections
|
||||
|
|
Loading…
Add table
Reference in a new issue