# add_header Content-Security-Policy "default-src 'self'; script-src 'self'; object-src 'none'; base-uri 'none'; require-trusted-types-for 'script'; frame-ancestors 'self';";
{% endif %}
+{% if spec.enable_health_check_endpoint %}
+ location /health {
+ return 200 'OK';
+ add_header Content-Type text/plain;
+ }
+{% endif %}
{% if oauth2_proxy_url %}
location /oauth2/ {
proxy_pass {{ oauth2_proxy_url }};
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305;
ssl_prefer_server_ciphers on;
+{% if spec.enable_health_check_endpoint %}
+ location /health {
+ return 200 'OK';
+ add_header Content-Type text/plain;
+ }
+{% endif %}
{% if dashboard_endpoints %}
location /internal/dashboard {
rewrite ^/internal/dashboard/(.*) /$1 break;
ssl_stapling_verify: Optional[str] = None,
ssl_protocols: Optional[List[str]] = None,
ssl_ciphers: Optional[List[str]] = None,
+ enable_health_check_endpoint: bool = False,
preview_only: bool = False,
unmanaged: bool = False,
extra_container_args: Optional[GeneralArgList] = None,
self.ssl_protocols = ssl_protocols
#: List of supported secure SSL ciphers. Changing this list may reduce system security.
self.ssl_ciphers = ssl_ciphers
+ self.enable_health_check_endpoint = enable_health_check_endpoint
def get_port_start(self) -> List[int]:
ports = []