Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Frontend injects wsprotocols only when not using oidc authn #1241

Merged
merged 1 commit into from
Oct 21, 2019

Conversation

absoludity
Copy link
Contributor

Follows on from #1199. When QAing #1199, we noted that the websocket requests were 400ing. This was because with 1199, I've switched to no longer white-list requests to the k8s api, so they are sent via the proxy. The proxy handles adding any required auth headers for all requests (websocket requests included).

With this change, they upgrade without issue:
oauth2-proxy-websockets

While there, I also removed the specific (key-cloak-based) cookie name which I'd added because I thought it would be referenced in the frontend and need updating there. Turns out its not at all, so we can just let oauth2-proxy use its default cookie name and avoid any confusion.

@absoludity absoludity requested a review from andresmgot October 21, 2019 07:09
@andresmgot
Copy link
Contributor

Great, thank you! Let's merge the two PRs

@absoludity absoludity force-pushed the oauth2_proxy-test-websockets branch from 2320a93 to 1282b0a Compare October 21, 2019 10:33
@absoludity absoludity changed the base branch from oauth2_proxy to master October 21, 2019 10:33
@absoludity absoludity merged commit d74a768 into master Oct 21, 2019
@absoludity absoludity deleted the oauth2_proxy-test-websockets branch October 21, 2019 10:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants