Skip to content
GitLab
Projects Groups Topics Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Register
  • Sign in
  • P puppet-swh-site
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributor statistics
    • Graph
    • Compare revisions
  • Issues 4
    • Issues 4
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 3
    • Merge requests 3
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Artifacts
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Packages and registries
    • Packages and registries
    • Model experiments
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Repository
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Platform
  • Infrastructure
  • Puppet
  • puppet-swh-site
  • Issues
  • #314

restrict flower (celery console) access

The Flower celery console is currently available read/write at http://moma.internal.softwareheritage.org:5555/ , which is accessible only via the internal VPN. That is no security threat for now, but for consistency with other access controls we should rather make it accessible only to, say, developers, who are the same set of people currently able to deploy packages and fiddle with running services.

Celery does support HTTP basic auth, but it'd be probably better to deploy it behind a real HTTP service, with reverse proxying.


Migrated from T314 (view on Phabricator)

Assignee
Assign to
Time tracking