
* clarify link * Add section headers * console blocks * grpc example json was not valid * multi-tls update text The preceding point 1 related to4f2cb51ef8/ingress/controllers/nginx/examples/ingress.yaml
and the deployments referenced in4f2cb51ef8/ingress/controllers/nginx/examples/README.md
They are not relevant to the current instructions. * add whitespace around parens * grammar setup would be a proper noun, but it is not the intended concept, which is a state * grammar * is-only * via * Use bullets for choices * ingress-controller nginx is a distinct brand. generally this repo talks about ingress-controller, although it is quite inconsistent about how... * drop stray paren * OAuth is a brand and needs an article here also GitHub is a brand * Indent text under numbered lists * use e.g. * Document that customer header config maps changes do not trigger updates This should be removed if https://github.com/kubernetes/ingress-nginx/issues/5238 is fixed. * article * period * infinitive verb + period * clarify that the gRPC server is responsible for listening for TCP traffic and not some other part of the backend application * avoid using ; and reword * whitespace * brand: gRPC * only-does is the right form `for` adds nothing here * spelling: GitHub * punctuation `;` is generally not the right punctuation... * drop stray `to` * sentence * backticks * fix link * Improve readability of compare/vs * Renumber list * punctuation * Favor Ingress-NGINX and Ingress NGINX * Simplify custom header restart text * Undo typo damage Co-authored-by: Josh Soref <jsoref@users.noreply.github.com>
156 lines
3.9 KiB
Markdown
156 lines
3.9 KiB
Markdown
# External Basic Authentication
|
|
|
|
### Example 1
|
|
|
|
Use an external service (Basic Auth) located in `https://httpbin.org`
|
|
|
|
```
|
|
$ kubectl create -f ingress.yaml
|
|
ingress "external-auth" created
|
|
|
|
$ kubectl get ing external-auth
|
|
NAME HOSTS ADDRESS PORTS AGE
|
|
external-auth external-auth-01.sample.com 172.17.4.99 80 13s
|
|
|
|
$ kubectl get ing external-auth -o yaml
|
|
apiVersion: networking.k8s.io/v1
|
|
kind: Ingress
|
|
metadata:
|
|
annotations:
|
|
nginx.ingress.kubernetes.io/auth-url: https://httpbin.org/basic-auth/user/passwd
|
|
creationTimestamp: 2016-10-03T13:50:35Z
|
|
generation: 1
|
|
name: external-auth
|
|
namespace: default
|
|
resourceVersion: "2068378"
|
|
selfLink: /apis/networking/v1/namespaces/default/ingresses/external-auth
|
|
uid: 5c388f1d-8970-11e6-9004-080027d2dc94
|
|
spec:
|
|
rules:
|
|
- host: external-auth-01.sample.com
|
|
http:
|
|
paths:
|
|
- path: /
|
|
pathType: Prefix
|
|
backend:
|
|
service:
|
|
name: http-svc
|
|
port:
|
|
number: 80
|
|
status:
|
|
loadBalancer:
|
|
ingress:
|
|
- ip: 172.17.4.99
|
|
$
|
|
```
|
|
|
|
## Test 1: no username/password (expect code 401)
|
|
|
|
```console
|
|
$ curl -k http://172.17.4.99 -v -H 'Host: external-auth-01.sample.com'
|
|
* Rebuilt URL to: http://172.17.4.99/
|
|
* Trying 172.17.4.99...
|
|
* Connected to 172.17.4.99 (172.17.4.99) port 80 (#0)
|
|
> GET / HTTP/1.1
|
|
> Host: external-auth-01.sample.com
|
|
> User-Agent: curl/7.50.1
|
|
> Accept: */*
|
|
>
|
|
< HTTP/1.1 401 Unauthorized
|
|
< Server: nginx/1.11.3
|
|
< Date: Mon, 03 Oct 2016 14:52:08 GMT
|
|
< Content-Type: text/html
|
|
< Content-Length: 195
|
|
< Connection: keep-alive
|
|
< WWW-Authenticate: Basic realm="Fake Realm"
|
|
<
|
|
<html>
|
|
<head><title>401 Authorization Required</title></head>
|
|
<body bgcolor="white">
|
|
<center><h1>401 Authorization Required</h1></center>
|
|
<hr><center>nginx/1.11.3</center>
|
|
</body>
|
|
</html>
|
|
* Connection #0 to host 172.17.4.99 left intact
|
|
```
|
|
|
|
## Test 2: valid username/password (expect code 200)
|
|
|
|
```
|
|
$ curl -k http://172.17.4.99 -v -H 'Host: external-auth-01.sample.com' -u 'user:passwd'
|
|
* Rebuilt URL to: http://172.17.4.99/
|
|
* Trying 172.17.4.99...
|
|
* Connected to 172.17.4.99 (172.17.4.99) port 80 (#0)
|
|
* Server auth using Basic with user 'user'
|
|
> GET / HTTP/1.1
|
|
> Host: external-auth-01.sample.com
|
|
> Authorization: Basic dXNlcjpwYXNzd2Q=
|
|
> User-Agent: curl/7.50.1
|
|
> Accept: */*
|
|
>
|
|
< HTTP/1.1 200 OK
|
|
< Server: nginx/1.11.3
|
|
< Date: Mon, 03 Oct 2016 14:52:50 GMT
|
|
< Content-Type: text/plain
|
|
< Transfer-Encoding: chunked
|
|
< Connection: keep-alive
|
|
<
|
|
CLIENT VALUES:
|
|
client_address=10.2.60.2
|
|
command=GET
|
|
real path=/
|
|
query=nil
|
|
request_version=1.1
|
|
request_uri=http://external-auth-01.sample.com:8080/
|
|
|
|
SERVER VALUES:
|
|
server_version=nginx: 1.9.11 - lua: 10001
|
|
|
|
HEADERS RECEIVED:
|
|
accept=*/*
|
|
authorization=Basic dXNlcjpwYXNzd2Q=
|
|
connection=close
|
|
host=external-auth-01.sample.com
|
|
user-agent=curl/7.50.1
|
|
x-forwarded-for=10.2.60.1
|
|
x-forwarded-host=external-auth-01.sample.com
|
|
x-forwarded-port=80
|
|
x-forwarded-proto=http
|
|
x-real-ip=10.2.60.1
|
|
BODY:
|
|
* Connection #0 to host 172.17.4.99 left intact
|
|
-no body in request-
|
|
```
|
|
|
|
## Test 3: invalid username/password (expect code 401)
|
|
|
|
```
|
|
curl -k http://172.17.4.99 -v -H 'Host: external-auth-01.sample.com' -u 'user:user'
|
|
* Rebuilt URL to: http://172.17.4.99/
|
|
* Trying 172.17.4.99...
|
|
* Connected to 172.17.4.99 (172.17.4.99) port 80 (#0)
|
|
* Server auth using Basic with user 'user'
|
|
> GET / HTTP/1.1
|
|
> Host: external-auth-01.sample.com
|
|
> Authorization: Basic dXNlcjp1c2Vy
|
|
> User-Agent: curl/7.50.1
|
|
> Accept: */*
|
|
>
|
|
< HTTP/1.1 401 Unauthorized
|
|
< Server: nginx/1.11.3
|
|
< Date: Mon, 03 Oct 2016 14:53:04 GMT
|
|
< Content-Type: text/html
|
|
< Content-Length: 195
|
|
< Connection: keep-alive
|
|
* Authentication problem. Ignoring this.
|
|
< WWW-Authenticate: Basic realm="Fake Realm"
|
|
<
|
|
<html>
|
|
<head><title>401 Authorization Required</title></head>
|
|
<body bgcolor="white">
|
|
<center><h1>401 Authorization Required</h1></center>
|
|
<hr><center>nginx/1.11.3</center>
|
|
</body>
|
|
</html>
|
|
* Connection #0 to host 172.17.4.99 left intact
|
|
```
|