Skip to content

Commit 537ead8

Browse files
author
edge-katanomi-app2[bot]
committed
📚 Sync docs from alaudadevops/connectors-operator on dfe55c2a5de413ef5aec931197b06af3426004a1
Source: add docs to explain how to pass auth info when using proxy (#273) Author: chengjingtao Ref: refs/heads/main Commit: dfe55c2a5de413ef5aec931197b06af3426004a1 This commit automatically syncs documentation changes from the source-docs repository. 🔗 View source commit: https://github.com/alaudadevops/connectors-operator/commit/dfe55c2a5de413ef5aec931197b06af3426004a1 🤖 Synced on 2025-10-24 10:20:31 UTC
1 parent 672c1df commit 537ead8

File tree

2 files changed

+72
-15
lines changed

2 files changed

+72
-15
lines changed

‎.github/SYNC_INFO.md‎

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
# Documentation Sync Information
22

3-
- **Last synced**: 2025-10-23 05:52:38 UTC
3+
- **Last synced**: 2025-10-24 10:20:31 UTC
44
- **Source repository**: alaudadevops/connectors-operator
5-
- **Source commit**: [0b818cebe6bfd989edaf3ead7b883cd138bc666b](https://github.com/alaudadevops/connectors-operator/commit/0b818cebe6bfd989edaf3ead7b883cd138bc666b)
5+
- **Source commit**: [dfe55c2a5de413ef5aec931197b06af3426004a1](https://github.com/alaudadevops/connectors-operator/commit/dfe55c2a5de413ef5aec931197b06af3426004a1)
66
- **Triggered by**: edge-katanomi-app2[bot]
7-
- **Workflow run**: [#43](https://github.com/alaudadevops/connectors-operator/actions/runs/18738918779)
7+
- **Workflow run**: [#44](https://github.com/alaudadevops/connectors-operator/actions/runs/18776845356)
88

99
## Files synced:
1010
- docs/

‎docs/en/connectors/concepts/connectors_proxy.mdx‎

Lines changed: 69 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -124,34 +124,91 @@ Custom proxies can point to any address capable of handling proxy requests.
124124

125125
### Connectors Proxy Authentication
126126

127-
Clients must provide authentication when using Connectors Proxy. Authentication uses ServiceAccount tokens, and the ServiceAccount must have read permissions for the target Connector.
127+
When using Connectors Proxy, clients must provide proper authentication credentials to access the proxy. The authentication process requires two key elements:
128128

129-
**Built-in Forward Proxy Authentication**
129+
1. **Connector Identification**: Specify which connector to use for credential injection
130+
2. **Authorization Token**: Provide a ServiceAccount token with read permissions for the target Connector
130131

131-
Authentication credentials are passed via `Proxy-Authorization` header:
132+
The proxy server validates the provided ServiceAccount token to ensure it has the necessary permissions for the specified Connector before processing requests and injects the authentication credentials into the request when valid.
133+
134+
For detailed information about ServiceAccount tokens and RBAC configuration, see the [Kubernetes Authentication documentation](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#service-account-tokens).
135+
136+
#### Built-in Forward Proxy Authentication
137+
138+
For forward proxy mode, authentication information is passed through the `Proxy-Authorization` header using HTTP Proxy Basic Authentication.
132139

133140
- **Username**: `<connector-namespace>/<connector-name>`
134141
- **Password**: ServiceAccount token with read permissions for the Connector
135142

136-
**Example**: For a `github` Connector in the `default` namespace:
143+
Proxy-Authorization Header:
144+
145+
```bash
146+
# credentials format: <connector-namespace>/<connector-name>:<service-account-token>
147+
# example: default/github:sa-token-xxxxxxx
148+
Proxy-Authorization: Basic <base64-encoded-credentials>
149+
```
150+
151+
HTTP Proxy Environment Example:
152+
153+
You can configure proxy authentication using standard HTTP proxy environment variables:
137154

138155
```bash
139-
export http_proxy=http://default%2Fgithub:[email protected]
156+
export http_proxy=http://<connector-namespace>%2F<connector-name>:<service-account-token>@<connector-proxy-address>
157+
export https_proxy=http://<connector-namespace>%2F<connector-name>:<service-account-token>@<connector-proxy-address>
140158
```
141159

142-
Requests through this proxy automatically inject the `default/github` connector's authentication credentials when accessing GitHub services.
160+
> **Note**: The `%2F` is the URL-encoded form of `/` in the connector namespace/name format.
161+
162+
#### Built-in Reverse Proxy Authentication
143163

144-
**Built-in Reverse Proxy Authentication**
164+
For reverse proxy mode, clients connect directly to the connector's proxy address. The authentication token can be provided using either Basic Auth or Bearer Token methods, while connector identification is handled through the connector proxy address.
145165

146-
Authentication credentials are passed via Basic Auth:
166+
##### Basic Authentication
147167

148-
- **Username**: Any value
168+
- **Username**: Any value (ignored)
149169
- **Password**: ServiceAccount token with read permissions for the Connector
150170

151-
**Example**: For a `github` Connector in the `default` namespace:
171+
Example:
152172

153173
```bash
154-
curl -u any:sa-token-xxxxxxx "http://c-github.default.svc.cluster.local/xxx"
174+
curl -u "user:sa-token-xxxxxxx" "http://c-github.default.svc.cluster.local/"
155175
```
156176

157-
The proxy automatically injects the `default/github` connector's authentication credentials when forwarding requests to GitHub services.
177+
##### Bearer Token Authentication
178+
179+
- **Authorization Header**: `Bearer <service-account-token>`
180+
181+
Example:
182+
183+
```bash
184+
curl -H "Authorization: Bearer sa-token-xxxxxxx" "http://c-github.default.svc.cluster.local/"
185+
```
186+
187+
##### Connector Identification
188+
189+
The connector can be identified through different proxy address formats:
190+
191+
- **Service Format**: e.g. `http://c-<connector-name>.<namespace>.svc.cluster.local`
192+
- **Path Format**: `http://<proxy-address>/namespaces/<connector-namespace>/connectors/<connector-name>`
193+
194+
The connector proxy address is automatically generated by the system and is unique for each connector. You **must** retrieve the connector proxy address from the `status.proxy.httpAddress` field of the connector resource before using it.
195+
196+
Example:
197+
198+
For a `github` connector in the `default` namespace:
199+
200+
```bash
201+
# Using Bearer Token and service address format
202+
curl -H "Authorization: Bearer sa-token-xxxxxxx" \
203+
"http://c-github.default.svc.cluster.local/"
204+
205+
# Using Basic Auth and path address format
206+
curl -u ":sa-token-xxxxxxx" \
207+
"http://connector-proxy.example.com/namespaces/default/connectors/github"
208+
```
209+
210+
The proxy will validate the authentication token and automatically inject the `default/github` connector's authentication credentials when forwarding requests to GitHub services.
211+
212+
## References
213+
214+
- [Kubernetes Authentication documentation](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#service-account-tokens)

0 commit comments

Comments
 (0)