From 2a8aa1576ea1a9ae9208cbff0fa8f4e878a1713a Mon Sep 17 00:00:00 2001 From: zino Date: Tue, 5 Dec 2023 22:54:07 +0100 Subject: [PATCH] m --- volumes/conf.d/code.zinomedia.de.conf | 4 ++-- volumes/conf.d/validate.vouch.armos.zinomedia.de.conf | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/volumes/conf.d/code.zinomedia.de.conf b/volumes/conf.d/code.zinomedia.de.conf index 849d42f..8df837b 100644 --- a/volumes/conf.d/code.zinomedia.de.conf +++ b/volumes/conf.d/code.zinomedia.de.conf @@ -24,9 +24,9 @@ server { #include "snippets/enable-vouch.conf"; # send all requests to the `/validate` endpoint for authorization - auth_request /auth; + auth_request /validate; - location = /auth { + location = /validate { internal; proxy_pass https://validate.vouch.armos.zinomedia.de; diff --git a/volumes/conf.d/validate.vouch.armos.zinomedia.de.conf b/volumes/conf.d/validate.vouch.armos.zinomedia.de.conf index ce17928..2f1d214 100644 --- a/volumes/conf.d/validate.vouch.armos.zinomedia.de.conf +++ b/volumes/conf.d/validate.vouch.armos.zinomedia.de.conf @@ -19,7 +19,7 @@ server { add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; - location = /auth { + location = /validate { # forward the /validate request to Vouch Proxy proxy_pass http://vouch:9090/validate; @@ -81,7 +81,7 @@ server { # if validate returns `401 not authorized` then forward the request to the error401block error_page 401 = @error401; - + location @error401 { # redirect to Vouch Proxy for login return 302 https://vouch.armos.zinomedia.de/login?url=$scheme://$http_host$request_uri&vouch-failcount=$auth_resp_failcount&X-Vouch-Token=$auth_resp_jwt&error=$auth_resp_err;