busyboy77
busyboy77
@javsalgar -- I'm not good at PRs. If you can guide me I'll definitely do that.
This results in `openssl.conf` like below ``` root@devops218:~/mongodb# k -n er logs -f mongo-mongodb-0 -c generate-tls-certs 1 [req] 2 req_extensions = v3_req 3 distinguished_name = req_distinguished_name 4 [req_distinguished_name] 5 [...
suppose your upstream is echo-server ```YAML apiVersion: networking.k8s.io/v1 kind: Ingress metadata: name: echo-auth-ingress namespace: auth annotations: haproxy.ingress.kubernetes.io/auth-url: "https://appsecure.domain.com/oauth2/auth" haproxy.ingress.kubernetes.io/auth-signin: "https://appsecure.domain.com/oauth2/start?rd=https://$host$request_uri" haproxy.ingress.kubernetes.io/auth-response-headers: "Authorization,X-Auth-Request-User,X-Auth-Request-Email" haproxy.ingress.kubernetes.io/auth-signin: "https://appsecure.domain.com/oauth2/start?rd=$escaped_request_uri" spec: ingressClassName: haproxy tls: - hosts:...
remember I'm using this setup for M2M auth purpose, without requiring the user to be redirect to any web page, your setup might be different at all
I have discussed this within our Team as well, and looks like the Haproxy is more focused towards routing and load balancing, rather than customizing the header based authorization specially...
Hi, Use this instead ``` wget https://apt.repos.intel.com/intel-gpg-keys/GPG-PUB-KEY-INTEL-SW-PRODUCTS.PUB apt-key add GPG-PUB-KEY-INTEL-SW-PRODUCTS.PUB ```
worked after adding `--security-opt seccomp=unconfined` as per below ```YAML version: "3" services: # ... other services mysql: image: mysql:8.0-debian container_name: mysql cap_add: - SYS_NICE restart: always environment: - MYSQL_ROOT_PASSWORD=GreaterPassword1245 -...
and the last message means, stop using bitnami, go away, in simpler words