Skip to content

Conversation

@LaurenceJJones
Copy link
Member

@LaurenceJJones LaurenceJJones commented Nov 18, 2025

Update HAProxy configuration files to use standardized paths and canonical header names:

  • Fix setenv paths from /var/lib/crowdsec/lua/haproxy/templates/ to /var/lib/crowdsec-haproxy-spoa-bouncer/html/ to match Debian/RPM/Docker packaging
  • Update header names from X-CrowdSec-* to X-Crowdsec-* (canonical form) for feat: add experimental HTTP template server #109

This ensures consistency across all deployment methods.

Update HAProxy configuration files to use standardized paths and canonical
header names:

- Fix setenv paths from /var/lib/crowdsec/lua/haproxy/templates/ to
  /var/lib/crowdsec-haproxy-spoa-bouncer/html/ to match Debian/RPM/Docker
  packaging
- Update header names from X-CrowdSec-* to X-Crowdsec-* (canonical form)

This ensures consistency across all deployment methods.
Update Dockerfile to use the same standardized paths as Debian/RPM packaging:
- Lua files: /usr/lib/crowdsec-haproxy-spoa-bouncer/lua/
- Templates: /var/lib/crowdsec-haproxy-spoa-bouncer/html/

This ensures consistency across all deployment methods (Docker, Debian, RPM).
Update volume mount paths in docker-compose files to match standardized
locations:
- Templates: /var/lib/crowdsec-haproxy-spoa-bouncer/html/
- Lua files: /usr/lib/crowdsec-haproxy-spoa-bouncer/lua/

This ensures consistency with Dockerfile, Debian, and RPM packaging.
@LaurenceJJones LaurenceJJones merged commit 10eec3b into main Nov 18, 2025
4 checks passed
@LaurenceJJones LaurenceJJones deleted the fix/haproxy-config-paths branch November 18, 2025 15:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants