Skip to content
This repository was archived by the owner on Apr 18, 2024. It is now read-only.

Conversation

Starefossen
Copy link

Adds support for JWKS-based token validation (nokia#150) and also extracting token attributes as HTTP headers (besides the X-Userinfo header)

@Starefossen Starefossen changed the title Adding support for JWKS-based token validation and token attribute mapping (nokia#151) Adding support for JWKS-based token validation and token attribute mapping (#151) Jan 12, 2021
@Starefossen
Copy link
Author

@cristichiru will you be accepting this pull request if I resolve the merge conflicts?

@Starefossen
Copy link
Author

@jmdacruz I have proposed this change for the revomatico fork since that seams to be the one that is most maintained.

@cristichiru
Copy link

@Starefossen of course!

@hanlaur
Copy link

hanlaur commented Jan 13, 2021

@Starefossen You could check #2 if it covers your JWT validation and header injection use case. Quite a timing coincidence!

@nachtfisch
Copy link

nachtfisch commented Jan 14, 2021

for me that did the trick. both JWKS based validation from discovery endpoint as well as header mapping works.

Using a config like this.

_format_version: "1.1"

services:
 - name: mock-service
   url: http://mockbin.org/request
   path: /
   tags:
   - example
   routes:
    - name: mock-route
      methods:
      - GET      
      paths: ["/mock"] 
plugins:
- name: oidc
  config:
    client_id: "dummy"
    client_secret: "dummy"
    discovery: "redacted"
    unauth_action: deny
    # bearer_only: "yes"
    bearer_jwt_auth_enable: "yes"
    bearer_jwt_auth_allowed_auds: ["redacted"]
  enabled: true
  protocols:
  - grpc
  - grpcs
  - http
  - https    

@cristichiru
Copy link

So, can we close this?

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants