Skip to content

Commit

Permalink
Remove louketo name from code (#16)
Browse files Browse the repository at this point in the history
Co-authored-by: Pavol Ipoth <pavol.ipoth@telekom.com>
  • Loading branch information
p53 and Pavol Ipoth committed Dec 15, 2020
1 parent 5926092 commit 58e154f
Show file tree
Hide file tree
Showing 13 changed files with 28 additions and 28 deletions.
12 changes: 6 additions & 6 deletions .goreleaser.yml
@@ -1,4 +1,4 @@
# Mark the release as not ready for production in case there is an
# Mark the release as not ready for production in case there is an
# indicator for this in the tag e.g. v1.0.0-rc1
# See: https://goreleaser.com/customization/release/
release:
Expand All @@ -17,11 +17,11 @@ builds:
- id: macos
goos: [darwin]
goarch: [amd64]

- id: linux
goos: [linux]
goarch: [amd64]

- id: windows
goos: [windows]
goarch: [amd64]
Expand All @@ -44,14 +44,14 @@ archives:
builds: [macos, linux]
# Generate the compresed files based on the following templates
name_template: "{{ .ProjectName }}_{{ .Version }}_{{ .Os }}_{{ .Arch }}"
# All files will be in a single directory. For example: louketo_0.0.1_linux_amd64
# All files will be in a single directory. For example: gatekeeper_0.0.1_linux_amd64
wrap_in_directory: true
# Replacement for the Platform name. Instead of have -darwin, replace by macOS
replacements:
darwin: macOS
format: tar.gz
- id: windows
builds: [windows]
# All files will be in a single directory. For example: louketo_0.0.1_linux_amd64
# All files will be in a single directory. For example: gatekeeper_0.0.1_linux_amd64
wrap_in_directory: true
format: zip
format: zip
2 changes: 1 addition & 1 deletion cli.go
Expand Up @@ -38,7 +38,7 @@ func newOauthProxyApp() *cli.App {
app.Author = author
app.Email = email
app.Flags = getCommandLineOptions()
app.UsageText = "louketo-proxy [options]"
app.UsageText = "gatekeeper [options]"

// step: the standard usage message isn't that helpful
app.OnUsageError = func(context *cli.Context, err error, isSubcommand bool) error {
Expand Down
8 changes: 4 additions & 4 deletions doc.go
Expand Up @@ -27,7 +27,7 @@ import (
)

var (
release = "v2.3.0"
release = "1.1.0"
gitsha = "no gitsha provided"
compiled = "0"
version = ""
Expand All @@ -36,9 +36,9 @@ var (
type contextKey int8

const (
prog = "louketo-proxy"
author = "Louketo"
email = "louketo@googlegroups.com"
prog = "gatekeeper"
author = "go-gatekeeper"
email = ""
description = "is a proxy using the keycloak service for auth and authorization"

authorizationHeader = "Authorization"
Expand Down
6 changes: 3 additions & 3 deletions e2e_test.go
Expand Up @@ -57,7 +57,7 @@ func checkListenOrBail(endpoint string) bool {
return limit < maxWaitCycles
}

func runTestLouketo(t *testing.T, config *Config) error {
func runTestProxy(t *testing.T, config *Config) error {
proxy, err := newProxy(config)
if err != nil {
return err
Expand Down Expand Up @@ -140,8 +140,8 @@ func TestCorsWithUpstream(t *testing.T) {
// launch fake oauth OIDC server
_ = runTestAuth(t)

// launch louketo-proxy proxy
_ = runTestLouketo(t, config)
// launch gatekeeper proxy
_ = runTestProxy(t, config)

// ok now exercise the ensemble with a CORS-enabled request
client := http.Client{}
Expand Down
2 changes: 1 addition & 1 deletion forwarding.go
Expand Up @@ -47,7 +47,7 @@ func (r *oauthProxy) proxyMiddleware(next http.Handler) http.Handler {
req.Header.Set("X-Forwarded-Proto", req.Header.Get("X-Forwarded-Proto"))

if len(r.config.CorsOrigins) > 0 {
// if CORS is enabled by Louketo Proxy, do not propagate CORS requests upstream
// if CORS is enabled by Gatekeeper, do not propagate CORS requests upstream
req.Header.Del("Origin")
}
// @step: add any custom headers to the request
Expand Down
2 changes: 1 addition & 1 deletion go.mod
@@ -1,4 +1,4 @@
module github.com/louketo/louketo-proxy
module github.com/go-gatekeeper/gatekeeper

require (
github.com/PuerkitoBio/purell v1.1.0
Expand Down
4 changes: 2 additions & 2 deletions release.sh
@@ -1,5 +1,5 @@
#!/bin/bash -e
NAME="louketo-proxy"
NAME="gatekeeper"
PLATFORMS="darwin linux windows"
ARCHITECTURES="amd64"
GIT_SHA=$(git --no-pager describe --always --dirty)
Expand Down Expand Up @@ -31,7 +31,7 @@ release() {
tar -czvf release/"$NAME-$PLATFORM-$ARCH".tar.gz -C bin/ $NAME$EXT >/dev/null
sha1sum release/"$NAME-$PLATFORM-$ARCH".tar.gz | cut -d " " -f1 > release/"$NAME-$PLATFORM-$ARCH".tar.gz.sha1
# Test if tar file is not corrupted
if ! tar -tf release/"$NAME-$PLATFORM-$ARCH".tar.gz &>/dev/null;then
if ! tar -tf release/"$NAME-$PLATFORM-$ARCH".tar.gz &>/dev/null;then
echo "Corrupted tar file"
exit 1
fi
Expand Down
4 changes: 2 additions & 2 deletions server.go
Expand Up @@ -390,7 +390,7 @@ func (r *oauthProxy) Run() error {
r.listener = listener

go func() {
r.log.Info("Louketo proxy service starting", zap.String("interface", r.config.Listen))
r.log.Info("Gatekeeper proxy service starting", zap.String("interface", r.config.Listen))
if err = server.Serve(listener); err != nil {
if err != http.ErrServerClosed {
r.log.Fatal("failed to start the http service", zap.Error(err))
Expand All @@ -400,7 +400,7 @@ func (r *oauthProxy) Run() error {

// step: are we running http service as well?
if r.config.ListenHTTP != "" {
r.log.Info("Louketo proxy http service starting", zap.String("interface", r.config.ListenHTTP))
r.log.Info("Gatekeeper proxy http service starting", zap.String("interface", r.config.ListenHTTP))
httpListener, err := r.createHTTPListener(listenerConfig{
listen: r.config.ListenHTTP,
proxyProtocol: r.config.EnableProxyProtocol,
Expand Down
2 changes: 1 addition & 1 deletion store_boltdb.go
Expand Up @@ -25,7 +25,7 @@ import (
)

const (
dbName = "louketo"
dbName = "gatekeeper"
)

var (
Expand Down
2 changes: 1 addition & 1 deletion store_boltdb_test.go
Expand Up @@ -39,7 +39,7 @@ func (f *fakeBoltDBStore) close() {
}

func newTestBoldDB(t *testing.T) *fakeBoltDBStore {
tmpfile, err := ioutil.TempFile("/tmp", "louketo-proxy")
tmpfile, err := ioutil.TempFile("/tmp", "gatekeeper")
if err != nil {
t.Fatalf("unable to create temporary file, error: %s", err)
}
Expand Down
4 changes: 2 additions & 2 deletions tests/ca-csr.json
@@ -1,5 +1,5 @@
{
"CN": "Louketo Proxy",
"CN": "Gatekeeper",
"CA": {
"expiry": "87600h"
},
Expand All @@ -11,7 +11,7 @@
{
"C": "GB",
"L": "London",
"O": "Louketo Proxy",
"O": "Gatekeeper",
"OU": "Dev Environment",
"ST": "London"
}
Expand Down
2 changes: 1 addition & 1 deletion utils.go
Expand Up @@ -86,7 +86,7 @@ func createCertificate(key *rsa.PrivateKey, hostnames []string, expire time.Dura
SignatureAlgorithm: x509.SHA512WithRSA,
Subject: pkix.Name{
CommonName: hostnames[0],
Organization: []string{"Louketo Proxy"},
Organization: []string{"Gatekeeper"},
},
}

Expand Down
6 changes: 3 additions & 3 deletions utils_test.go
Expand Up @@ -150,12 +150,12 @@ func TestEncryptDataBlock(t *testing.T) {
Ok bool
}{
{
Text: "hello world, my name is Louketo proxy",
Text: "hello world, my name is Gatekeeper",
Key: "DtNMS2eO7Fi5vsuLrW55nrRbir2kPfTw",
Ok: true,
},
{
Text: "hello world, my name is Louketo proxy",
Text: "hello world, my name is Gatekeeper",
Key: "DtNMS2eO7Fi5vsu",
},
{
Expand Down Expand Up @@ -253,7 +253,7 @@ func TestDecryptDataBlock(t *testing.T) {
Ok bool
}{
{
Text: "hello world, my name is Louketo proxy",
Text: "hello world, my name is Gatekeeper",
Key: "DtNMS2eO7Fi5vsuLrW55nrRbir2kPfss",
Ok: true,
},
Expand Down

0 comments on commit 58e154f

Please sign in to comment.