You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Nov 6, 2025. It is now read-only.
Copy file name to clipboardExpand all lines: docs/egress.md
+5-33Lines changed: 5 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,19 +6,11 @@ As part of Tock's compliance process, egress filtering is set up for cloud.gov d
6
6
7
7
> Connect to external networks or systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security and privacy architecture.
8
8
9
-
Accordingly, we have configured [a Caddy proxy](https://github.com/GSA-TTS/cg-egress-proxy) with the following rules:
10
-
11
-
```
12
-
proxydeny:
13
-
proxyallow: |
14
-
uaa.fr.cloud.gov
15
-
google-analytics.com
16
-
```
17
-
18
-
That is, this proxy rejects all external connections to all sites save for these two exceptions:
9
+
Accordingly, we have configured [a Caddy proxy](https://github.com/GSA-TTS/cg-egress-proxy) with an [allow list and deny list](../egress_proxy/tock.vars.yml). This proxy configuration rejects all external connections to all sites save for these exceptions:
19
10
20
11
-`uaa.fr.cloud.gov`: The [cloud.gov UAA server](https://cloud.gov/docs/management/leveraging-authentication/) which in turn uses GSA SecureAuth for authentication.
21
12
-`google-analytics.com`: [DAP](https://digital.gov/guides/dap/), for web app analytics
13
+
-`api.newrelic.com`: [New Relic endpoints](https://docs.newrelic.com/docs/apis/rest-api-v2/get-started/introduction-new-relic-rest-api-v2/) which is used for the `newrelic-admin` tool
Rename `vars.yml-example` to `vars.tock.yml` and configure it for your application. Use `uuidgen` for the username and password.
47
-
48
-
```
49
-
proxyname: staging-egress
50
-
hostname: tock-staging-egress
51
-
username: (generated)
52
-
password: (generated)
53
-
54
-
# See [the docs]() for more about what can appear below
55
-
proxydeny:
56
-
proxyallow: |
57
-
uaa.fr.cloud.gov
58
-
google-analytics.com
59
-
```
60
-
61
-
Open `manifest.yml` and change the instances to 1:
62
-
63
-
```bash
64
-
instances: 1
65
-
```
38
+
Copy over [vars.tock.yml](../egress_proxy/tock.vars.yml) and configure it for your application. Use `uuidgen` for the username and password. Also copy over the [manifest.yml](../egress_proxy/manifest.yml). Finally, push the egress application to your space.
66
39
67
-
Push the egress application to your space
68
40
```bash
69
41
cf target -s staging-egress
70
-
cf push --vars-file vars.tock.yml
42
+
cf push --vars-file tock.vars.yml
71
43
```
72
44
73
45
SSH into the proxy to make sure that it is running and restricting URLs as advertised.
0 commit comments