You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This is to configure envoy for end-to-end HTTP/2 required by zitadel management API. zitadel API bugs with self-signed certificates.
69
+
For publicly trusted certificates, enable TLS by updating env vars in ZITADEL.
70
+
67
71
```sh
68
-
go run ./internal/stack/configure/...
72
+
docker compose up -d
69
73
```
70
74
71
-
The above go code creates, among others, an OIDC client which pgo uses for authN/authZ. Any OIDC compliant Identity Provider (eg , Keycloak, Auth0) can be used; pgo just needs the client credentials.
75
+
Check zitadel health with `curl http://iam.${EDGE_DOMAIN_ROOT}/debug/healthz` or `docker exec -it edge_edge_1 /edge healthz`
76
+
77
+
#### Use the centralized IdP for authorization in Postgres via `pgo rest` (PostgREST API) as well as minio-s3, NATS etc
72
78
73
-
Once ZITADEL is configured, revert the ports (use 80 for envoy), and `docker compose down && docker compose up -d`
79
+
edge so far creates the OIDC clients on ZITADEL. a bit works needed to for configuring consumers of client secrets.
80
+
The idea is to use `edge` to serve config for each component, much like envoy control plane which is already embeded in edge for envoy to pull config dynamically.
74
81
75
-
Visit ZITADEL UI (eg at http://iam.192-168-0-121.sslip.io), login (see docker-compose.yaml) and regenerate client-secret for oauth2-proxy client in edge project. Then update `internal/stack/pgo/config.yaml` with the values. Again, `docker compose down && docker compose up -d`
82
+
For now, visit ZITADEL UI at http://iam.${EDGE_DOMAIN_ROOT}, login (see docker-compose.yaml) and regenerate client-secrets for oauth2-proxy and minio clients in edge project. Then
83
+
84
+
- update `internal/stack/pgo/config.yaml` with the values
85
+
- update relevant env vars in minio container
86
+
87
+
And `docker compose down && docker compose up -d`
76
88
77
89
#### `pgo rest`: PostgREST-compatible REST API
78
90
@@ -98,13 +110,16 @@ GRANT ALL ON iam.users to anon;
98
110
Now we can GET, POST, PATCH, DELETE on the users table in iam schema like:
99
111
100
112
```sh
101
-
curl http://api.127-0-0-1.sslip.io/iam/users
113
+
curl http://api.${EDGE_DOMAIN_ROOT}/iam/users
102
114
```
103
115
104
116
##### `pgo pipeline`: Debezium-compatible CDC for realtime-event/replication etc
105
117
106
118
The demo pgo-pipeline container syncs users from auth-db (in projections.users14 table) to app-db (in iam.users)
107
119
120
+
#### minio-s3
121
+
ensure minio MINIO_IDENTITY_OPENID_CLIENT_ID and MINIO_IDENTITY_OPENID_CLIENT_SECRET are set withc appropriate values. console ui is at http://minio.${EDGE_DOMAIN_ROOT}.
122
+
108
123
### Kubernetes
109
124
If you already have a live k8s cluster, great just copy-paste-enter.
110
125
For development and lightweight prod, [k3s](https://github.com/k3s-io/k3s) seems a great option.
0 commit comments