Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: admin oathkeeper request fwd #4397

Merged
merged 2 commits into from
Oct 5, 2023

Conversation

krtk6160
Copy link
Member

@krtk6160 krtk6160 commented Oct 5, 2023

This is a hacky fix for forwarding the requests made to the admin ingress to the correct path on the decisions api endpoint. Because oathkeeper uses cues from the nginx headers that we set via the auth-snippet annotation, it sends the requests to the /graphql path on the decisions api - which then gets matched against the public api rules.

@krtk6160 krtk6160 requested a review from nicolasburtey October 5, 2023 11:08
@krtk6160 krtk6160 force-pushed the chore--hacky-fix-for-oathkeeper-admin-rule branch from 3cce304 to a4e4175 Compare October 5, 2023 11:09
@krtk6160 krtk6160 force-pushed the chore--hacky-fix-for-oathkeeper-admin-rule branch from a4e4175 to 1d5f024 Compare October 5, 2023 11:10
@nicolasburtey nicolasburtey merged commit 147d8f3 into main Oct 5, 2023
3 of 4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants