Keybase proof
I hereby claim:
- I am robincher on github.
- I am robincher (https://keybase.io/robincher) on keybase.
- I have a public key ASAnWqIXbW8XGBZCwtZJx4tLmEmBLQpUdc5-4pMChJ1gbAo
To claim this, I am signing this object:
## Run Kong 3.2 with Docker Containers | |
#### Create Docker Network | |
docker network create kong-net | |
# Export License | |
export KONG_LICENSE_DATA='' | |
### Start a Postgres Container (If running db mode) |
apiVersion: source.toolkit.fluxcd.io/v1beta2 | |
kind: HelmRepository | |
metadata: | |
name: kong | |
namespace: flux-system | |
spec: | |
interval: 30m | |
url: https://charts.konghq.com | |
--- | |
apiVersion: helm.toolkit.fluxcd.io/v2beta1 |
# Kong for Kubernetes with Kong Enterprise with Enterprise features enabled and | |
# exposed via TLS-enabled Ingresses. Before installing: | |
# * Several settings (search for the string "CHANGEME") require user-provided | |
# Secrets. These Secrets must be created before installation. | |
# * Ingresses reference example "<service>.kong.CHANGEME.example" hostnames. These must | |
# be changed to an actual hostname that resolve to your proxy. | |
# * Ensure that your session configurations create cookies that are usable | |
# across your services. The admin session configuration must create cookies | |
# that are sent to both the admin API and Kong Manager, and any Dev Portal | |
# instances with authentication must create cookies that are sent to both |
#!/bin/bash | |
export AWS_ACCOUNT_ID=$1 | |
export AWS_INSTANCE_ROLE=$2 | |
export EKS_CLUSTER_NAME=$3 | |
if [ -z "$AWS_ACCOUNT_ID" ] | |
then | |
echo -n "AWS Account Number: " | |
read AWS_ACCOUNT_ID |
#!/bin/bash | |
echo "Please enter database Password:" | |
read DB_PASSWD | |
if [ -z "DB_PASSWD" ]; then | |
echo "Please DB Password" | |
exit 1 | |
fi |
#!/bin/bash | |
# Create manual mappings between certificate and Consumer objec | |
curl -X POST -H 'Kong-Admin-Token:xxxxxx' http://localhost:8001/Scratch/consumers/helios/mtls-auth -d 'subject_name=helios.gemsapi.io' | |
# Test route with MTLS and Basic Auth Plugin enabled | |
curl -kv -H 'Authorization: Bearer Basic xxxxxxx' --key helios.key --cert helios.crt https://localhost:8443/mockbin/request |
#!/bin/bash | |
#Generate Self-signed CA | |
openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:2048 -keyout ca.key -out ca.crt | |
#Make a directory | |
mkdir client | |
#Generate Corresponding client certificate | |
openssl genrsa -out client/helios.key 2048 |
I hereby claim:
To claim this, I am signing this object:
const atob = require('atob'); | |
const asn1js = require('asn1js'); | |
const fs = require('fs'); | |
const pkijs = require('pkijs'); | |
const pvutils = require('pvutils') | |
const Certificate = pkijs.Certificate | |
let certificateBuffer = new ArrayBuffer(0); |