-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HTTP 401 Unauthorized #26
Comments
It shouldn't make a difference. In the docs right below where your screen shot cuts off, it states:
Furthermore, it looks like your API key may be copied incorrectly in your examples.
My guess is that your API key in the top example with just basic auth is incorrect. You're using that same key in the authorization header of the second example. And the reason the second example works is likely that you're also using basic auth with a different key that I'd assume is actually valid. |
Yeah, you are most probably right. It's just that I experienced this issue and the fix was to add the auth header. If no one else experiences this issue, then it must have been just me. Most probably, (like, 99%), Grizzly works fine. Just to make sure, I will try to reproduce this issue in a step by step scenario, and document everything. It Grizzly works our of the box, then this Issue was non existant. Else, well, we would have proven the bug! Just a sec, BRB |
Is there a solution to this? I couldn't find the branch AuthorizationHeader. |
They closed my branch PR, was here. Want to reopen? |
Hi Miguel
That would be helpful! Yes, please!
Thanks!
KR,
Patrick
Von meinem iPhone gesendet
… Am 16.12.2021 um 12:38 schrieb Miguel Lemos ***@***.***>:
They closed my branch PR, was here. Want to reopen?
#27
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub, or unsubscribe.
Triage notifications on the go with GitHub Mobile for iOS or Android.
|
Oh, I don't have permissions to reopen the PR |
@PatMis16 I think if you can confirm reproduction of the bug they will consider reopening the PR. |
Whether it is considered as a bug or not is a matter of the viewing point. However, in some setups there is no basic authentication possible, because the Grafana instance is behind a reverse proxy. We would like to automate some things with Grizzly and it would be very helpful if we could connect through the proxy. @malcolmholmes Please reopen the bug. If the PR is available again we can apply the changes to the latest version. |
I did, @PatMis16 go.mod (require oauth2) |
Thank you @miguelemosreverte However, it looks like a lot of things have changed in the current release. I am concerned to break things. Regards, |
There is another angle which has an impact to this issue. There are enviornments, where basic authentication is not pass through e.g. if the Grafana sits behind a proxy, which normaly handles the authentication via an OpenID provider or something similar. In such a scenario it is well possible, that the basic auth requests are not forwarded to the grafana instance by the proxy. However, if a request contains an authentication header with the baerer token it is passed through. Therefore I think it is neccessary to add the authentication header method to grizzly. |
I am experiencing this issue as well. further details here: #196 |
Hi @tamirshaul |
Hi, Actuallty, Grizzly use only Bearer Authentication (Hardcoded) Why not make this dynamic depending on user credentials :
|
@HabibMAALEM what benefit would this give? |
Actually according to the docs this should work already, but it seems that is not the case:
So it kind of feels like #197 broke the basic auth? With the |
Same here, basic auth works with 0.2.0-beta3 but not 0.2.0, nor 0.2.1. |
Issue: #26 To verify issues like above, we need to be able to test with various auth methods This adds a `basic_auth` context (and instance) and adds the functionality to run the same test on all contexts Also, I changed from the `RunTests` function to individual t.Run. This is helpful because vscode can now see the individual tests and we can run them individually
Issue: #26 To verify issues like above, we need to be able to test with various auth methods This adds a `basic_auth` context (and instance) and adds the functionality to run the same test on all contexts Also, I changed from the `RunTests` function to individual t.Run. This is helpful because vscode can now see the individual tests and we can run them individually
Issue: #26 To verify issues like above, we need to be able to test with various auth methods This adds a `basic_auth` context (and instance) and adds the functionality to run the same test on all contexts Also, I changed from the `RunTests` function to individual t.Run. This is helpful because vscode can now see the individual tests and we can run them individually
) Issue: #26 To verify issues like above, we need to be able to test with various auth methods This adds a `basic_auth` context (and instance) and adds the functionality to run the same test on all contexts Also, I changed from the `RunTests` function to individual t.Run. This is helpful because vscode can now see the individual tests and we can run them individually
the bug
The text was updated successfully, but these errors were encountered: