We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
#275 was tested with the bundle below. We should add something like this as a manual test to the existing collection of bundles under tests/manual.
tests/manual
bundle: kubernetes applications: ok: # From https://github.com/canonical/oathkeeper-operator # 1e23771 - (HEAD -> address-forward-auth-comments, origin/address-forward-auth-comments) refactor charm: ./oathkeeper-operator/oathkeeper_ubuntu-22.04-amd64.charm scale: 1 constraints: arch=amd64 trust: true resources: oci-image: "ghcr.io/canonical/oathkeeper:0.40.6" options: # until tls is impl'd dev mode would resort to http decisions url dev: true trfk: # From https://github.com/canonical/traefik-k8s-operator/pull/275 # cc35a85 - (HEAD -> IAM-500-forward-auth-relation-implementation, natalian98/IAM-500-forward-auth-relation-implementation) refactor: add experimental_forward_auth_enabled as an init arg charm: ./traefik-k8s-operator/traefik-k8s_ubuntu-20.04-amd64.charm series: focal scale: 1 constraints: arch=amd64 storage: configurations: kubernetes,1,1024M trust: true resources: traefik-image: "docker.io/ubuntu/traefik:2-22.04" options: enable_experimental_forward_auth: true zinc: # From https://github.com/natalian98/zinc-k8s-operator # 0c19865 - (HEAD -> test-proxy-interfaces, origin/test-proxy-interfaces) fix: auth-proxy charm: ./zinc-k8s-operator/zinc-k8s_ubuntu-22.04-amd64.charm scale: 1 constraints: arch=amd64 storage: data: kubernetes,1,1024M trust: true resources: zinc-image: "ghcr.io/jnsgruk/zinc:0.4.9" relations: - - ok:forward-auth - trfk:experimental-forward-auth - - ok:auth-proxy - zinc:auth-proxy - - zinc:ingress - trfk:ingress
$ juju run trfk/0 show-proxied-endpoints proxied-endpoints: '{"zinc": {"url": "http://10.43.8.206/auth2-zinc"}}' $ curl http://10.43.8.206/auth2-zinc/version {"version":"'0.4.9'","build":"0","commit_hash":"'249a843897ade8ca3f7e80ac6036b8ac0a27154a'","branch":"0","build_date":"'2023-09-13_09:50:04AM-GMT'"}% $ curl http://10.43.8.206/auth2-zinc/versionn {"error":{"code":401,"status":"Unauthorized","message":"The request could not be authorized"}}
The text was updated successfully, but these errors were encountered:
@natalian98 would you be able to help with this once oathkeeper and zinc (or some other charm) are all merged?
Sorry, something went wrong.
Sure, I'll open a PR for this once we have some charm integrated with the proxy.
No branches or pull requests
#275 was tested with the bundle below.
We should add something like this as a manual test to the existing collection of bundles under
tests/manual
.The text was updated successfully, but these errors were encountered: