I hereby claim:
- I am robincher on github.
- I am robincher (https://keybase.io/robincher) on keybase.
- I have a public key ASAnWqIXbW8XGBZCwtZJx4tLmEmBLQpUdc5-4pMChJ1gbAo
To claim this, I am signing this object:
| const atob = require('atob'); | |
| const asn1js = require('asn1js'); | |
| const fs = require('fs'); | |
| const pkijs = require('pkijs'); | |
| const pvutils = require('pvutils') | |
| const Certificate = pkijs.Certificate | |
| let certificateBuffer = new ArrayBuffer(0); |
I hereby claim:
To claim this, I am signing this object:
| #!/bin/bash | |
| #Generate Self-signed CA | |
| openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:2048 -keyout ca.key -out ca.crt | |
| #Make a directory | |
| mkdir client | |
| #Generate Corresponding client certificate | |
| openssl genrsa -out client/helios.key 2048 |
| #!/bin/bash | |
| # Create manual mappings between certificate and Consumer objec | |
| curl -X POST -H 'Kong-Admin-Token:xxxxxx' http://localhost:8001/Scratch/consumers/helios/mtls-auth -d 'subject_name=helios.gemsapi.io' | |
| # Test route with MTLS and Basic Auth Plugin enabled | |
| curl -kv -H 'Authorization: Bearer Basic xxxxxxx' --key helios.key --cert helios.crt https://localhost:8443/mockbin/request |
| #!/bin/bash | |
| echo "Please enter database Password:" | |
| read DB_PASSWD | |
| if [ -z "DB_PASSWD" ]; then | |
| echo "Please DB Password" | |
| exit 1 | |
| fi |
| #!/bin/bash | |
| export AWS_ACCOUNT_ID=$1 | |
| export AWS_INSTANCE_ROLE=$2 | |
| export EKS_CLUSTER_NAME=$3 | |
| if [ -z "$AWS_ACCOUNT_ID" ] | |
| then | |
| echo -n "AWS Account Number: " | |
| read AWS_ACCOUNT_ID |
| # Kong for Kubernetes with Kong Enterprise with Enterprise features enabled and | |
| # exposed via TLS-enabled Ingresses. Before installing: | |
| # * Several settings (search for the string "CHANGEME") require user-provided | |
| # Secrets. These Secrets must be created before installation. | |
| # * Ingresses reference example "<service>.kong.CHANGEME.example" hostnames. These must | |
| # be changed to an actual hostname that resolve to your proxy. | |
| # * Ensure that your session configurations create cookies that are usable | |
| # across your services. The admin session configuration must create cookies | |
| # that are sent to both the admin API and Kong Manager, and any Dev Portal | |
| # instances with authentication must create cookies that are sent to both |
| apiVersion: source.toolkit.fluxcd.io/v1beta2 | |
| kind: HelmRepository | |
| metadata: | |
| name: kong | |
| namespace: flux-system | |
| spec: | |
| interval: 30m | |
| url: https://charts.konghq.com | |
| --- | |
| apiVersion: helm.toolkit.fluxcd.io/v2beta1 |
| ## Run Kong 3.2 with Docker Containers | |
| #### Create Docker Network | |
| docker network create kong-net | |
| # Export License | |
| export KONG_LICENSE_DATA='' | |
| ### Start a Postgres Container (If running db mode) |
| apiVersion: eksctl.io/v1alpha5 | |
| kind: ClusterConfig | |
| metadata: | |
| name: kong-tal-eks | |
| region: ap-southeast-1 | |
| addons: | |
| - name: vpc-cni | |
| version: latest |