web frontend for azure-chaos. ☁️
This simply surfaces the azchaos
functionality via authenticated API.
By default, this runs on port 3000
- but that can be configured with the PORT
environment variable.
To configure this authentication layer, use the following environment variables:
AUTH_CLIENT_ID
- an AzureAD application client idAUTH_ISSUER
- the AzureAD issuerAUTH_AUDIENCE
- the AzureAD audience
See passport-azure-ad for more details.
All endpoints require
Authentication: Bearer <token>
header authentication values for the configured AzureAD application.
Returns all registered extensions, as an array:
[
{
"name": "test",
"desc": "test desc",
"uri": "https://test.com"
}
]
Creates a new extension. Takes name, uri, desc
as parts of a json payload.
Gets a particular extension. Takes extId
(the name of the extension) as part of the path.
{
"name": "test",
"desc": "test desc",
"uri": "https://test.com"
}
Starts an extension. Takes extId
(the name of the extension) as part of the path.
Optionally takes ?code=<value>
as a query parameter, where code
is passed along
to the extension. Takes accessToken
and resources
as parts of a json payload.
Stops an extension. Takes extId
(the name of the extension) as part of the path.
Optionally takes ?code=<value>
as a query parameter, where code
is passed along
to the extension. Takes accessToken
and resources
as parts of a json payload.
Deletes an extension. Takes extId
(the name of the extension) as part of the path.
MIT