diff --git a/dbrepo-gateway-service/dbrepo.conf b/dbrepo-gateway-service/dbrepo.conf index 0fcec7824a6e1f024c5e0cc6e2f0362f8312d84e..9f989dae656d0212e6028f991263ba7dff3250b7 100644 --- a/dbrepo-gateway-service/dbrepo.conf +++ b/dbrepo-gateway-service/dbrepo.conf @@ -14,6 +14,15 @@ server { listen 8080 default_server; server_name _; + location /admin/ { + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Host $host; + proxy_set_header X-Forwarded-Proto $scheme; + proxy_pass http://auth-service:8080/; + proxy_read_timeout 90; + } + location /dashboard/ { proxy_set_header Host $http_host; proxy_set_header X-Real-IP $remote_addr; diff --git a/helm/dbrepo/files/dbrepo.conf b/helm/dbrepo/files/dbrepo.conf index e1ed114d1e47da472849481df4314988167a3097..935ce4b9b5b26cd7569178c7d15a8c46c4f987f6 100644 --- a/helm/dbrepo/files/dbrepo.conf +++ b/helm/dbrepo/files/dbrepo.conf @@ -27,6 +27,15 @@ server { autoindex_localtime on; } + location /admin/ { + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Host $host; + proxy_set_header X-Forwarded-Proto $scheme; + proxy_pass http://auth-service:8080/; + proxy_read_timeout 90; + } + location /dashboard/ { proxy_set_header Host $http_host; proxy_set_header X-Real-IP $remote_addr; diff --git a/helm/dbrepo/templates/auth-secret.yaml b/helm/dbrepo/templates/auth-secret.yaml index da47194ddfd93d225242ed84df35802d42501ecf..fd10d3b259ff00e5e0e4e0e0dee5f9ebd815b339 100644 --- a/helm/dbrepo/templates/auth-secret.yaml +++ b/helm/dbrepo/templates/auth-secret.yaml @@ -14,6 +14,8 @@ stringData: KC_LOG_FILE_LEVEL: "debug" KC_LOG_FILE_OUTPUT: "json" KEYCLOAK_HOSTNAME: "{{ .Values.gateway }}" + KEYCLOAK_HOSTNAME_ADMIN: "{{ .Values.gateway }}/admin/" + KEYCLOAK_PROXY_HEADERS: "xforwarded" LDAP_ROOT: "{{ .Values.identityservice.global.ldapDomain }}" LDAP_ADMIN_DN: "cn={{ .Values.identityservice.global.adminUser }},{{ .Values.identityservice.global.ldapDomain }}" LDAP_ADMIN_PASSWORD: "{{ .Values.identityservice.global.adminPassword }}"