-
Notifications
You must be signed in to change notification settings - Fork 413
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Webhook authentication option #752
Comments
We have a dash `--username` flag already and ask pass URL support. Does
that not do what you need? If not, can yo be more specific about what you
need?
I am not familiar with WEBHOOK_* variables but that doesn't mean they're
not a thing. I just need to learn about them. In general, I am happy to
support other auth modes. I just need to know what they are and what
they're for and how to test them.
If you could help me craft an E2E test, that would be an awesome way to
start.
… Message ID: ***@***.***>
|
I am talking about the authentication when calling the webhook URL, not the git sync itself.
But are they not used for git auth as opposed to webhook endpoint auth?
Oh no, they don't exist 😄 - it would have been analogous to the Let me have a look at the current e2e tests and I'll get back to you. |
I would guess we could add another container config under The tests would be Line 1978 in 1894192
|
Ahh! I see. I could buy adding The slightly harder part is getting that e2e set up that demands basic-auth. Is this something you want to do a pull-request for? If not, I can ACK it as a feature request and I'll get to it when I have some time. |
Great. I can have a look at creating a pull-request. Not sure if I'll have time this week but will definitely try to get it in sooner rather than later. Could we have a Slightly related, but before I create extra noise with a ticket. Would there be interest in discussing using kubernetes volume mounts for configuration in addition to environment variables and flags? Please tell if this is too far fetched but...
The advantages I see are:
Anyway, let me know. I can put it in a separate ticket if there is interest. |
Feel free to open a new issue to discuss the config-file topic. Seems plausible on it's face, but need to think thru the intersection and logging and such |
Still on this btw. Fell ill this week so not able to do anything as yet. |
Could there also be an option to set a "Authorization: Bearer <token>" header? For example, RESTful APIs seem to make use of such headers. As an example: https://developers.home-assistant.io/docs/api/rest/ |
I am open to ideas, they just need someone to flesh them out.
…On Thu, Jul 6, 2023, 8:50 PM Miles Simpson ***@***.***> wrote:
Could there also be an option to set a "Authorization: Bearer " header?
For example, RESTful APIs seem to make use of such headers. As an example:
https://developers.home-assistant.io/docs/api/rest/
—
Reply to this email directly, view it on GitHub
<#752 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABKWAVHVHQNVLALGOHPWSATXO6BPFANCNFSM6AAAAAAYT6PGZE>
.
You are receiving this because you commented.Message ID:
***@***.***>
|
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale - I still like this idea and will set time aside for implementation in the coming weeks. |
Hi, I may have missed something here but if not, do you think something like this would be possible?
What?
WEBHOOK_USERNAME
andWEBHOOK_PASSWORD[_FILE]
environment variablesWhy?
https://user:token@acme.org
is uglyThe text was updated successfully, but these errors were encountered: