Static webpage to keep track of guest invitations
- Create the docker instance for MariaDB.
In the root of the repository there is file01_create_tables_template.sql
.
Copy/move this file tomariadb/data/init-db/
(if folder does not exist create it).
Caveat! The compose file will create a mounted volume in
mariadb/data/
folder. Every time you need to start from scratch delete the volumes or that folder content.
- Create a CSV file named
guests.csv
holding the guests list in the IO folder of the backend (backend-io/guests.csv
). In this same folder it will be created a CSV file with user passwords.
#security: I know that this should not be done. But it's a good threashold, I need to save those passwords to help the guests that for some reason have difficulties.
Mario,Rossi
John,Doe
....
-
Create password files in the root of the repository
password_db_root.txt
password_db.txt
cookie_passphrase.txt
Copy thecookie_passphrase.txt
file also to thebackend/
folder.
-
Create the wordlist, named
backend-io/passphrase-generator-dictionary.txt
, for passphrase generator. -
In
frontend/
folder create an environment file (frontend/.env
) and put the Google Maps API key in it.
REACT_APP_GMAPS_API_KEY=SECRET
-
Run the setup for elk
docker compose -f "compose.yml" up -d --build setup
-
Run everything else
docker compose -f "compose.yml" up -d --build
For modsecurity ensure that you use CRUD API setting in /usr/local/owasp-modsecurity-crs/crs-setup.conf
# -- [[ HTTP Policy Settings ]] ------------------------------------------------
#
# This section defines your policies for the HTTP protocol, such as:
# - allowed HTTP versions, HTTP methods, allowed request Content-Types
# - forbidden file extensions (e.g. .bak, .sql) and request headers (e.g. Proxy)
#
# These variables are used in the following rule files:
# - REQUEST-911-METHOD-ENFORCEMENT.conf
# - REQUEST-912-DOS-PROTECTION.conf
# - REQUEST-920-PROTOCOL-ENFORCEMENT.conf
# HTTP methods that a client is allowed to use.
# Default: GET HEAD POST OPTIONS
# Example: for RESTful APIs, add the following methods: PUT PATCH DELETE
# Example: for WebDAV, add the following methods: CHECKOUT COPY DELETE LOCK
# MERGE MKACTIVITY MKCOL MOVE PROPFIND PROPPATCH PUT UNLOCK
# Uncomment this rule to change the default.
SecAction \
"id:900200,\
phase:1,\
nolog,\
pass,\
t:none,\
setvar:'tx.allowed_methods=GET HEAD POST OPTIONS DELETE'"
- logging
- more pictures of us
- IBAN
- monitoring
- reverse proxy
- calendar events
- dockerized
- modsecurity