web frontend for azure-chaos. ☁️
This simply surfaces the azchaos functionality via authenticated API.
By default, this runs on port 3000 - but that can be configured with the PORT environment variable.
To configure this authentication layer, use the following environment variables:
AUTH_CLIENT_ID- an AzureAD application client idAUTH_ISSUER- the AzureAD issuerAUTH_AUDIENCE- the AzureAD audience
See passport-azure-ad for more details.
All endpoints require
Authentication: Bearer <token>header authentication values for the configured AzureAD application.
Returns all registered extensions, as an array:
[
{
"name": "test",
"desc": "test desc",
"uri": "https://test.com"
}
]
Creates a new extension. Takes name, uri, desc as parts of a json payload.
Gets a particular extension. Takes extId (the name of the extension) as part of the path.
{
"name": "test",
"desc": "test desc",
"uri": "https://test.com"
}
Starts an extension. Takes extId (the name of the extension) as part of the path.
Optionally takes ?code=<value> as a query parameter, where code is passed along
to the extension. Takes accessToken and resources as parts of a json payload.
Stops an extension. Takes extId (the name of the extension) as part of the path.
Optionally takes ?code=<value> as a query parameter, where code is passed along
to the extension. Takes accessToken and resources as parts of a json payload.
Deletes an extension. Takes extId (the name of the extension) as part of the path.
MIT